Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cloud Computing Tools

2,779 views

Published on

An introduction to working model of IaaS and PaaS cloud.

Published in: Education
  • Be the first to comment

Cloud Computing Tools

  1. 1. Jithin ParakkaDepartment of Computer Science Pondicherry University
  2. 2. • Cloud Middleware• Amazon EC2• Eucalyptus• Openstack• Ubuntu Enterprise Cloud• Google App Engine• Approaches to enable multi-tenancy 2
  3. 3. 3
  4. 4. Middleware is a general term for any program that serves to "glue together"or mediate between two separate and often already existing programs.Cloud Middleware is software used to integrate services, applications andcontent available on the cloud. 4
  5. 5. Data managementIdentity / security managementUser interfaces and portalsBilling and meteringManagement and monitoring 5
  6. 6. Image RepositoryUser Portal Compute Servers Cloud Controller Block Storage User 6
  7. 7. Image RepositoryUser Portal Compute Servers Cloud Controller Block Storage 7
  8. 8. User 8
  9. 9. Cloud ControllerVM VM VM VMNode Node Node Node 9
  10. 10. Virtual Virtual VirtualVirtual Machine Machine Machine Machine Management Hypervisor Physical Hardware 10
  11. 11. Applications Applications Gust OS Gust OSVirtual Hardware Virtual Hardware Virtual Machine Software Layer Physical Hardware 11
  12. 12. Virtual machine talks to VMM which communicates with the hardwareplatformCPU understands the unmodified instructions generated by VirtualizedOSAdvantages Complete decoupling of the software from the hardware Complete isolation of different applicationsDisadvantages VMM should provide additionally virtual bios, virtual memory space and virtual devices 12
  13. 13. Applications ApplicationsApplications Gust OS Gust OS Host OS Virtual Hardware Virtual Hardware Virtual Machine Software Layer Physical Hardware 13
  14. 14. Guest OS uses specialized API that talks to the VMM which sends thevirtualization requests to the hardware.VMM does not need a resource intensive translation of instructions.Advantages Near native performance MigrationDisadvantages Not applicable for Windows OS 14
  15. 15. Allow multiple operating systems, termed guests, to runconcurrently on a host computer. 15
  16. 16. A software implementation of a computing environment in which anoperating system (OS) or program can be installed and run.Typically emulates a physical computing environment.Requests for CPU, memory, hard disk, network and other hardwareresources are managed by a virtualization layer which translates theserequests to the underlying physical hardware.Advantages. Multiple OS environments can co-exist on the same computer. Application provisioning, maintenance, high availability and disaster recovery.Disadvantages Security 16
  17. 17. Look up and retrieval system for virtual machine images. 19
  18. 18. Contain Core Operating System and essential tools.It’s a prototype from which virtual servers are created.Can be obtained from public repository.Or you can create yourself.An image have unique ID and it is used to provision the image.Contain three part Kernel Image. Ramdisk Image. Is an initial root file system that is mounted prior to when the real root file system is available Root File System image. 20
  19. 19. Create a virtual disk imageˆ Installing the OSˆ Installing required applicationsˆ Make the OS ready to run on cloudRegistering the images with image repositoryˆ Testing the image 21
  20. 20. 22
  21. 21. Provide block level storage that you can mount from your instances.You can format it as your wish. With multiple block you can create RAID.You can take Snapshot of volume Back up. Replication. 23
  22. 22. A GUI for users to access the cloud.User can Launch Instances. Shut down or terminate. List available images. List running instances. Manage security groups. Manage block storage. Manage IP address. Create Key pairs. 24
  23. 23. Elasticfox.Hybridfox.Authenticate using credentials. 25
  24. 24. Euca2ools.User can Launch Instances. Shut down or terminate. List available images. List running instances. Manage security groups. Manage block storage. Manage IP address. Create Key pairs. 26
  25. 25. Cryptographic Keypairs to verify access to instances.Contain two keys Public key: saved within cloud. Private key: output to the user as character string.Public key is injected to VM when instance starts.When attempting to login to the VMinstance using SSH, the public key ischecked against your private key to verify access. 27
  26. 26. A security group is a set of networking rules applied to instances.When you first create an instance, it is assigned to a default security groupthat denies incoming network traffic from all sources.To allow login and usage of a new instance, you must authorize networkaccess to the default security group. 28
  27. 27. Instances typically have two IPs associated with them.Private IPs are intended for internal communications between instancesand are usually only routable within a cloud.Public IPs are used for external access and are usually routable outside ofcloud.With elastic IPs the user gains control over a set of static IP addresses. Onceallocated to the user, those same IPs can be dynamically associated torunning instances, overriding pre-assigned public IPs. 29
  28. 28. On-premise and Hybrid Cloud Infrastructure as a Service.It uses existing infrastructure to create a scalable, secure web services layerthat abstracts compute, network and storage to offer IaaS.Eucalyptus web services are uniquely designed for hybrid clouds using theindustry standard Amazon Web Services™ (AWS) API.Research project in the Computer Science Department at the University ofCalifornia, Santa Barbara.Elastic Utility Computing Architecture Linking Your Programs To UsefulSystems. 32
  29. 29. Amazon AWS Interface CompatibilityHigh-Availability IaaS Service Quota Management and AccountingFlexible Clustering User Group and Role-Based AccessNetwork Management, Security ManagementGroups, Traffic Isolation Self-service User Portal*Elasticity and Self-Service Capability VMware Hypervisor Support*Bucket-Based Storage Abstraction (S3- Virtual-to-Virtual Image Conversion forCompatible) VMware*Block-Based Storage Abstraction (EBS- Robust SAN Integration*Compatible)Xen and KVM Hypervisor SupportMicrosoft Windows Guest Support 33
  30. 30. 34
  31. 31. Node Controller (NC)Cluster Controller (CC)Walrus Storage Controller (WS3)Storage Controller (SC)Cloud Controller (CLC)VMware Broker 35
  32. 32. Component that runs on every nodes.Virtual Machines lifecycle management.Maintains local ache of instance images.Manage the virtual network end point.Queries and control the system software. 36
  33. 33. Gather information about set of Node Controllers.Schedule a virtual machine execution on a specific Node controller.Manage the virtual machine network. 37
  34. 34. Persistent storage for both virtual machine images and users data usingREST and SOAP.In walrus data is stored as objects and organized in buckets.Interface compatible with Amazone Simple Storage Service (S3). 38
  35. 35. Provides persistent block storage that can be dynamically attached to thevirtual machine.The SC is capable of interfacing with various storage systems(NFS, iSCSI, SAN devices, etc.)Allow creation of snapshots of volumes. 39
  36. 36. Front end of the entire cloud infrastructure.Entry point into the cloud for administrators, developers, project managersand end users.Monitoring resources: Queries other components for information aboutresources.Resource abstraction: Decide which cluster will be used for provisioning theinstances.Monitoring the running instances. 40
  37. 37. 41
  38. 38. Cloud Controller Node Controller 42
  39. 39. kvm-okINFO: /dev/kvm does not existHINT: sudo modprobe kvm_intelINFO: Your CPU supports KVM extensionsKVM acceleration can be used 43
  40. 40. Assigns a random MAC address to the VM instance before booting andattaches the VM instances Ethernet device to the physical Ethernet throughthe nodes local Xen bridge.VM instances typically obtain an IP address using DHCP.Administrator configures Eucalyptus with a map of MAC address/IPAddress pairs 44
  41. 41. Maintain a DHCP server with static mappings for each VM instance that iscreated.Allows Eucalyptus expose a capability similar to Amazons security groups.Elastic IP is supported in this mode only. 45
  42. 42. 1. Download the Eucalyptus release key from http://www.eucalyptus.com/eucalyptus-cloud/security/keys.2. Add the public key to the list of trusted keys. apt-key add c1240596-eucalyptus-release-key.pub3. Create a file in /etc/apt/sources.list.d called eucalyptus.list with the following content: deb http://downloads.eucalyptus.com/software/eucalyptus/3.1/ubuntu precise main4. On all machines that will run either Eucalyptus or Euca2ools, create a file in /etc/apt/sources.list.d called euca2ools.list with the following content: deb http://downloads.eucalyptus.com/software/euca2ools/2.1/ubuntu precise mainNow install packagesapt-get install eucalyptus-cloud eucalyptus-cc eucalyptus-sc eucalyptus- walrus 46
  43. 43. 1. Download the Eucalyptus release key from http://www.eucalyptus.com/eucalyptus-cloud/security/keys.2. Add the public key to the list of trusted keys. apt-key add c1240596-eucalyptus-release-key.pub3. Create a file in /etc/apt/sources.list.d called eucalyptus.list with the following content: deb http://downloads.eucalyptus.com/software/eucalyptus/3.1/ubuntu precise main4. On all machines that will run either Eucalyptus or Euca2ools, create a file in /etc/apt/sources.list.d called euca2ools.list with the following content: deb http://downloads.eucalyptus.com/software/euca2ools/2.1/ubuntu precise mainNow install packagesapt-get install eucalyptus-nc 47
  44. 44. 48
  45. 45. 49
  46. 46. 50
  47. 47. 51
  48. 48. Open source IaaS cloud computing project started by Rackspace Cloud andNASA in 2010.Currently OpenStack is a global collaboration of more than hundredcompanies including Dell, AMD, Intel, hp, SUSE, redhat etc.Currently has packages for CentOS, Fedora, RHEL, Debian, and Ubuntu.Hypervisors supported by open stack are Xen, KVM, VMware V-Sphere andHyper-V. 53
  49. 49. OpenStack compute - NovaOpenStack object storage - SwiftOpenStack image service - GlanceIdentity Service - KeystoneUI service - Horizon 54
  50. 50. A package stack of applications from Canonical.UEC includes a number of open source tools to manage the infrastructure,including open source cloud software Eucalyptus.KVM support.Interface compatibility with EC2.Simple installation and deployment.Basic administrative tools for system management and user accounting. 55
  51. 51. 56
  52. 52. Lets you run web applications on Googles infrastructure.App Engine applications are easy to build, easy to maintain, and easy toscale as your traffic and data storage needs grow.With App Engine, there are no servers to maintain.You can serve your app from your own domain name.You can serve your app using a free name on the appspot.com domain. 59
  53. 53. Java runtime environment.Python runtime environments.Go runtime environment. 60
  54. 54. 62
  55. 55. 63
  56. 56. 64
  57. 57. 65
  58. 58. 66
  59. 59. 67
  60. 60. Jithin Parakkaparakkajithin@gmail.com

×