SlideShare a Scribd company logo
IT19741
Cloud and Big Data
Analytics
Dr G Geetha
Dean innovation and Professor CSE
Women Scientist, Qualified Patent agent
UNIT-I CLOUD
ENABLING
TECHNOLOGIES
Technologies for Network-Based Systems -
System Models for Distributed and Cloud
Computing - Implementation Levels of
Virtualization - Virtualization Structures/Tools
and Mechanisms - Virtualization of CPU,
Memory, and I/O Devices - Virtual Clusters
and Resource Management - Virtualization for
Data-Center Automation.
1.1 Technologies for Network-Based Systems
1. Multicore CPUs and Multithreading Technologies
2. GPU Computing to Exascale and Beyond
3. Memory, Storage, and Wide-Area Networking
4. Virtual Machines and Virtualization Middleware
5. Data Center Virtualization for Cloud Computing
4
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 4
Data Deluge Enabling New Challenges
(Courtesy of Judy Qiu, Indiana University, 2011)
5
From Desktop/HPC/Grids to Internet Clouds
in 30 Years
• HPC moving from centralized supercomputers to geographically distributed
desktops, desksides, clusters, and grids to clouds over last 30 years
• R/D efforts on HPC, clusters, Grids, P2P, and virtual machines has laid the
foundation of cloud computing that has been greatly advocated since 2007
• Location of computing infrastructure in areas with lower costs in hardware,
software, datasets, space, and power requirements – moving from desktop
computing to datacenter-based clouds
6
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 6
Interactions among 4 technical challenges :Data Deluge, Cloud
Technology, eScience,and Multicore/Parallel Computing
(Courtesy of Judy Qiu, Indiana University, 2011)
7
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 7
Clouds and Internet of Things
HPC: High-Performance
Computing
HTC: High-Throughput Computing
P2P: Peer to Peer
MPP: Massively Parallel
Processors
Source: K. Hwang, G. Fox, and J. Dongarra,Distributed and Cloud Computing,
Morgan Kaufmann, 2012.
8
Computing Paradigm Distinctions
• Centralized Computing
• All computer resources are centralized in one physical system.
• Parallel Computing
• All processors are either tightly coupled with central shard memory or loosely coupled with
distributed memory
• Distributed Computing
• Field of CS/CE that studies distributed systems. A distributed system consists of multiple
autonomous computers, each with its own private memory, communicating over a network.
• Cloud Computing
• An Internet cloud of resources that may be either centralized or decentralized. The cloud
apples to parallel or distributed computing or both. Clouds may be built from physical or
virtualized resources.
9
Technology Convergence toward HPC for Science and HTC for
Business: Utility Computing
(Courtesy of Raj Buyya, University of Melbourne, 2011)
Copyright © 2012, Elsevier Inc. All rights reserved.
10
2011 Gartner “IT Hype Cycle” for Emerging Technologies
2007
2008
2009
2010
2011
Copyright © 2012, Elsevier Inc. All rights reserved.
11
33 year Improvement in Processor and Network Technologies
Technologies for Network-based Systems
12
Modern Multi-core CPU Chip
13
14
Multi-threading Processors
• Four-issue superscalar (e.g. Sun Ultrasparc I)
• Implements instruction level parallelism (ILP) within a single processor.
• Executes more than one instruction during a clock cycle by sending multiple
instructions to redundant functional units.
• Fine-grain multithreaded processor
• Switch threads after each cycle
• Interleave instruction execution
• If one thread stalls, others are executed
• Coarse-grain multithreaded processor
• Executes a single thread until it reaches certain situations
• Simultaneous multithread processor (SMT)
• Instructions from more than one thread can execute in any given pipeline stage
at a time.
15
5 Micro-architectures of CPUs
Each row represents the issue slots for a single execution cycle:
• A filled box indicates that the processor found an instruction to execute in that
issue slot on that cycle;
• An empty box denotes an unused slot.
16
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 16
33 year Improvement in Memory and Disk Technologies
17
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 17
Architecture of A Many-Core Multiprocessor GPU
interacting with a CPU Processor
18
NVIDIA Fermi GPU
19
GPU Performance
Bottom – CPU - 0.8 Gflops/W/Core (2011)
Middle – GPU - 5 Gflops/W/Core (2011)
Top - EF – Exascale computing (10^18 Flops)
20
Interconnection Networks
• SAN (storage area network) - connects servers with disk arrays
• LAN (local area network) – connects clients, hosts, and servers
• NAS (network attached storage) – connects clients with large storage
systems
21
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 21
Datacenter and Server Cost Distribution
22
Virtual Machines
• Eliminate real machine constraint
• Increases portability and flexibility
• Virtual machine adds software to a physical machine to give it the
appearance of a different platform or multiple platforms.
• Benefits
• Cross platform compatibility
• Increase Security
• Enhance Performance
• Simplify software migration
23
Initial Hardware Model
 All applications access hardware resources (i.e. memory, i/o)
through system calls to operating system (privileged
instructions)
 Advantages
 Design is decoupled (i.e. OS people can develop OS
separate of Hardware people developing hardware)
 Hardware and software can be upgraded without notifying
the Application programs
 Disadvantage
 Application compiled on one ISA will not run on another
ISA.
 Applications compiled for Mac use different operating
system calls then application designed for windows.
 ISA’s must support old software
 Can often be inhibiting in terms of performance
 Since software is developed separately from hardware…
Software is not necessarily optimized for hardware.
24
Virtual Machine Basics
• Virtual software placed between underlying
machine and conventional software
• Conventional software sees different ISA from the
one supported by the hardware
• Virtualization process involves:
• Mapping of virtual resources (registers and
memory) to real hardware resources
• Using real machine instructions to carry out the
actions specified by the virtual machine
instructions
25
Three VM Architectures
1.2 System Models for Distributed and Cloud
Computing
1. Clusters of Cooperative Computers
2. Grid Computing Infrastructures
3. Peer-to-Peer Network Families
4. Cloud Computing over the Internet .
27
System Models for Distributed and Cloud
Computing
28
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 28
A Typical Cluster Architecture
29
Computational or Data Grid
30
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 30
A Typical Computational Grid
31
Peer-to-Peer (P2P) Network
• A distributed system architecture
• Each computer in the network can act as a client or server for other netwpork
computers.
• No centralized control
• Typically many nodes, but unreliable and heterogeneous
• Nodes are symmetric in function
• Take advantage of distributed, shared resources (bandwidth, CPU, storage) on
peer-nodes Fault-tolerant, self-organizing Operate in dynamic environment,
frequent join and leave is the norm
32
Peer-to-Peer (P2P) Network
Overlay network - computer network built on top of another network.
• Nodes in the overlay can be thought of as being connected by virtual or logical links, each of which
corresponds to a path, perhaps through many physical links, in the underlying network.
• For example, distributed systems such as cloud computing, peer-to-peer networks, and client-server
applications are overlay networks because their nodes run on top of the Internet.
33
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 33
Peer-to-Peer (P2P) Network
34
The Cloud
• Historical roots in today’s Internet apps
• Search, email, social networks
• File storage (Live Mesh, Mobile Me, Flicker, …)
• A cloud infrastructure provides a framework to manage
scalable, reliable, on-demand access to applications
• A cloud is the “invisible” backend to many of our mobile
applications
• A model of computation and data storage based on “pay
as you go” access to “unlimited” remote data center
capabilities
Copyright © 2012, Elsevier Inc. All rights reserved.
35
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 35
Basic Concept of Internet Clouds
• Cloud computing is the use of computing resources (hardware and software) that are
delivered as a service over a network (typically the Internet).
• The name comes from the use of a cloud-shaped symbol as an abstraction for the
complex infrastructure it contains in system diagrams.
• Cloud computing entrusts remote services with a user's data, software and computation.
36
The Next Revolution in IT
Cloud Computing
 Classical Computing
 Buy & Own
 Hardware, System
Software, Applications
often to meet peak needs.
 Install, Configure, Test, Verify,
Evaluate
 Manage
 ..
 Finally, use it
 $$$$....$(High CapEx)
 Cloud Computing
 Subscribe
 Use
 $ - pay for what you use,
based on QoS
Every
18
months?
Copyright © 2012, Elsevier Inc. All rights reserved.
(Courtesy of Raj Buyya, 2012)
37
Cloud Service Models (1)
Infrastructure as a service (IaaS)
• Most basic cloud service model
• Cloud providers offer computers, as physical or more often as virtual machines,
and other resources.
• Virtual machines are run as guests by a hypervisor, such as Xen or KVM.
• Cloud users deploy their applications by then installing operating system images
on the machines as well as their application software.
• Cloud providers typically bill IaaS services on a utility computing basis, that is,
cost will reflect the amount of resources allocated and consumed.
• Examples of IaaS include: Amazon Cloud Formation (and underlying services
such as Amazon EC2), Rackspace Cloud, Terre mark, and Google Compute
Engine.
38
Cloud Service Models (2)
Platform as a service (PaaS)
• Cloud providers deliver a computing platform typically including operating system,
programming language execution environment, database, and web server.
• Application developers develop and run their software on a cloud platform without
the cost and complexity of buying and managing the underlying hardware and
software layers.
• Examples of PaaS include: Amazon Elastic Beanstalk, Cloud Foundry, Heroku,
Force.com, EngineYard, Mendix, Google App Engine, Microsoft Azure and
OrangeScape.
39
Cloud Service Models (3)
Software as a service (SaaS)
• Cloud providers install and operate application software in the cloud and cloud
users access the software from cloud clients.
• The pricing model for SaaS applications is typically a monthly or yearly flat fee
per user, so price is scalable and adjustable if users are added or removed at
any point.
• Examples of SaaS include: Google Apps, innkeypos, Quickbooks Online,
Limelight Video Platform, Salesforce.com, and Microsoft Office 365.
40
Service-oriented architecture (SOA)
• SOA is an evolution of distributed computing based on the request/reply design
paradigm for synchronous and asynchronous applications.
• An application's business logic or individual functions are modularized and
presented as services for consumer/client applications.
• Key to these services - their loosely coupled nature;
• i.e., the service interface is independent of the implementation.
• Application developers or system integrators can build applications by composing
one or more services without knowing the services' underlying implementations.
• For example, a service can be implemented either in .Net or J2EE, and the
application consuming the service can be on a different platform or language.
41
SOA key characteristics:
• SOA services have self-describing interfaces in platform-independent XML documents.
• Web Services Description Language (WSDL) is the standard used to describe the services.
• SOA services communicate with messages formally defined via XML Schema (also called
XSD).
• Communication among consumers and providers or services typically happens in
heterogeneous environments, with little or no knowledge about the provider.
• Messages between services can be viewed as key business documents processed in an
enterprise.
• SOA services are maintained in the enterprise by a registry that acts as a directory listing.
• Applications can look up the services in the registry and invoke the service.
• Universal Description, Definition, and Integration (UDDI) is the standard used for service
registry.
• Each SOA service has a quality of service (QoS) associated with it.
• Some of the key QoS elements are security requirements, such as authentication and
authorization, reliable messaging, and policies regarding who can invoke services.
42
Layered Architecture for Web Services
43
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 43
Cloud Computing Challenges:
Dealing with too many issues (Courtesy of R. Buyya)
Billing
Utility & Risk
Management
Scalability
Reliability
Software Eng.
Complexity
Programming Env.
& Application Dev.
44
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 44
The Internet of Things (IoT)
Internet of
Things
Smart Earth
Smart
Earth:
An
IBM
Dream
45
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 45
Opportunities of IoT in 3 Dimensions
(courtesy of Wikipedia, 2010)
46
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 46
Virtualization for Datacenter Automation
to serve millions of clients, simultaneously
• Server Consolidation in Virtualized Datacenter
• Virtual Storage Provisioning and Deprovisioning
• Cloud Operating Systems for Virtual Datacenters
• Trust Management in virtualized Datacenters
1.3 Implementation Levels of Virtualization
1. Levels of Virtualization Implementation
2. VMM Design Requirements and Providers
3. Virtualization Support at the OS Level
4. Middleware Support for Virtualization
48
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 48
Difference between Traditional Computer and Virtual machines
(Courtesy of VMWare, 2008)
49
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 49
Virtual Machine, Guest Operating System,
and VMM (Virtual Machine Monitor) :
The Virtualization layer is the middleware between the underlying hardware and
virtual machines represented in the system, also known as virtual machine
monitor (VMM) or hypervisor.
50
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 50
(Courtesy of VMWare, 2008)
51
Virtualization Ranging from Hardware to Applications in
Five Abstraction Levels
52
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 52
Virtualization at ISA (Instruction Set Architecture) level
Emulating a given ISA by the ISA of the host machine.
• e.g, MIPS binary code can run on an x-86-based host machine with the help of ISA emulation.
• Typical systems: Bochs, Crusoe, Quemu, BIRD, Dynamo
Advantage:
• It can run a large amount of legacy binary codes written for various processors on any given
new hardware host machines
• best application flexibility
Shortcoming & limitation:
• One source instruction may require tens or hundreds of native target instructions to perform its
function, which is relatively slow.
• V-ISA requires adding a processor-specific software translation layer in the complier.
53
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 53
Virtualization at Hardware Abstraction level
Virtualization is performed right on top of the hardware.
• It generates virtual hardware environments for VMs, and manages the underlying
hardware through virtualization.
• Typical systems: VMware, Virtual PC, Denali, Xen
Advantage:
• Has higher performance and good application isolation
Shortcoming & limitation:
• Very expensive to implement (complexity)
54
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 54
Virtualization at OS Level
55
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 55
Virtualization at Operating System (OS) level
It is an abstraction layer between traditional OS and user applications.
• This virtualization creates isolated containers on a single physical server and the OS-instance
to utilize the hardware and software in datacenters.
• Typical systems: Jail / Virtual Environment / Ensim's VPS / FVM
Advantage:
• Has minimal starup/shutdown cost, low resource requirement, and high scalability;
synchronize VM and host state changes.
Shortcoming & limitation:
• All VMs at the operating system level must have the same kind of guest OS
• Poor application flexibility and isolation.i
56
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 56
Virtualization for Linux and Windows NT Platforms
57
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 57
58
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 58
Advantages of OS Extension for Virtualization
1. VMs at OS level has minimum startup/shutdown costs
2. OS-level VM can easily synchronize with its
environment
Disadvantage of OS Extension for Virtualization
All VMs in the same OS container must have the same or similar guest OS,
which restrict application flexibility of different VMs on the same physical
machine.
59
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 59
Library Support level
It creates execution environments for running alien programs on a platform
rather than creating VM to run the entire operating system.
• It is done by API call interception and remapping.
• Typical systems: Wine, WAB, LxRun , VisualMainWin
Advantage:
• It has very low implementation effort
Shortcoming & limitation:
• poor application flexibility and isolation
60
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 60
Virtualization with Middleware/Library Support
61
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 61
The vCUBE for Virtualization of GPGPU
62
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 62
User-Application level
It virtualizes an application as a virtual machine.
• This layer sits as an application program on top of an operating system and
exports an abstraction of a VM that can run programs written and compiled to a
particular abstract machine definition.
• Typical systems: JVM , NET CLI , Panot
Advantage:
• has the best application isolation
Shortcoming & limitation:
• low performance, low application flexibility and high implementation complexity.
63
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 63
More Xs mean higher merit
1.4 Virtualization Structures/Tools and
Mechanisms
• Hypervisor and Xen Architecture
• Binary Translation with Full Virtualization
• Para-Virtualization with Compiler Support
65
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 65
Hypervisor
A hypervisor is a hardware virtualization technique allowing multiple operating systems, called
guests to run on a host machine. This is also called the Virtual Machine Monitor (VMM).
Type 1: bare metal hypervisor
• sits on the bare metal computer hardware like the CPU, memory, etc.
• All guest operating systems are a layer above the hypervisor.
• The original CP/CMS hypervisor developed by IBM was of this kind.
Type 2: hosted hypervisor
• Run over a host operating system.
• Hypervisor is the second layer over the hardware.
• Guest operating systems run a layer over the hypervisor.
• The OS is usually unaware of the virtualization
66
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 66
Major VMM and Hypervisor Providers
67
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 67
The XEN Architecture (1)
68
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 68
The XEN Architecture (2)
69
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 69
The XEN Architecture (3)
70
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 70
Full virtualization
It is the first software solution for server virtualization and
uses binary translation and direct approach techniques. In
full virtualization, guest OS is completely isolated by the
virtual machine from the virtualization layer and hardware.
• Para virtualization
Paravirtualization is the category of CPU virtualization
which uses hypercalls for operations to handle
instructions at compile time. In paravirtualization, guest
OS is not completely isolated but it is partially isolated by
the virtual machine from the virtualization layer and
hardware. VMware and Xen are some examples of
paravirtualization.
Full Virtualization vs. Para-Virtualization
71
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 71
Binary
Translation
of Guest OS
Requests
using a
VMM:
72
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 72
73
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 73
Full virtualization
• Does not need to modify guest OS, and critical instructions are emulated by software through the
use of binary translation.
• VMware Workstation applies full virtualization, which uses binary translation to automatically modify
x86 software on-the-fly to replace critical instructions.
• Advantage: no need to modify OS.
• Disadvantage: binary translation slows down the performance.
Para virtualization
• Reduces the overhead, but cost of maintaining a para virtualized OS is high.
• The improvement depends on the workload.
• Para virtualization must modify guest OS, non-virtualizable instructions are replaced by hypercalls
that communicate directly with the hypervisor or VMM.
• Para virtualization is supported by Xen, Denali and VMware ESX.
Full Virtualization vs. Para-Virtualization
74
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 74
Full Virtualization
75
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 75
Para- Virtualization with Compiler Support.
The KVM builds offers kernel-based VM on the Linux
platform, based on para-virtualization
76
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 76
VMWare ESX Server for Para-Virtualization
77
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 77
1.5 Virtualization of CPU, Memory, and I/O
Devices
• Hardware Support for Virtualization
• CPU Virtualization
• Memory Virtualization
• I/O Virtualization
• Virtualization in Multi-Core Processors
79
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 79
80
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 80
CPU, Memory and I/O Virtualization
• CPU virtualization demands hardware-assisted traps of sensitive
instructions by the VMM
• Memory virtualization demands special hardware support (shadow page
tables by VMWare or extended page table by Intel) to help translate virtual
address into physical address and machine memory in two stages.
• I/O virtualization is the most difficult one to realize due to the complexity if
I/O service routines and the emulation needed between the guest OS and
host OS.
81
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 81
Multi-Core Virtualization:
VCPU vs. traditional CPU
Figure 3.16 Four VCPUs are exposed to the software, only three cores are actually present. VCPUs V0, V1, and V3 have
been transparently migrated, while VCPU V2 has been transparently suspended. (Courtesy of Wells, et al., “Dynamic
Heterogeneity and the Need for Multicore Virtualization”, ACM SIGOPS Operating Systems Review, ACM Press, 2009 [68] )
1.6 Virtual Clusters and Resource
Management
• Physical versus Virtual Clusters
• Live VM Migration Steps and Performance Effects
• Migration of Memory, Files, and Network Resources
• Dynamic Deployment of Virtual Clusters
83
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 83
Virtual Cores vs. Physical Processor Cores
Physical cores Virtual cores
The actual physical cores present in the
processor.
There can be more virtual cores
visible to a single OS than there are
physical cores.
More burden on the software to write
applications which can run directly on
the cores.
Design of software becomes easier as
the hardware assists the software in
dynamic resource utilization.
Hardware provides no assistance to the
software and is hence simpler.
Hardware provides assistance to the
software and is hence more complex.
Poor resource management. Better resource management.
The lowest level of system software has
to be modified.
The lowest level of system software
need not be modified.
84
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 84
(Courtesy of Marty and Hill, 2007)
85
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 85
Virtual Clusters in Many Cores
Space Sharing of VMs -- Virtual Hierarchy
(Courtesy of Marty and Hill, 2007)
86
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 86
• The virtual cluster nodes can be either physical or virtual machines. Multiple VMs running with
different OSs can be deployed on the same physical node.
• A VM runs with a guest OS, which is often different from the host OS, that manages the
resources in the physical machine, where the VM is implemented.
• The purpose of using VMs is to consolidate multiple functionalities on the same server. This will
greatly enhance the server utilization and application flexibility.
• VMs can be colonized (replicated) in multiple servers for the purpose of promoting distributed
parallelism, fault tolerance, and disaster recovery.
• The size (number of nodes) of a virtual cluster can grow or shrink dynamically, similarly to the
way an overlay network varies in size in a P2P network.
• The failure of any physical nodes may disable some VMs installed on the failing nodes. But the
failure of VMs will not pull down the host system.
Virtual Cluster Characteristics
87
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 87
Virtual Clusters vs. Physical Clusters
88
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 88
89
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 89
Live Migration of Virtual Machines
90
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 90
Live Migration of Virtual Machines
91
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 91
92
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 92
Virtual Cluster Projects
93
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 93
94
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 94
Cluster-on-Demand (COD Project) at Duke University
95
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 95
96
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 96
VIOLIN Project at Purdue University
97
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 97
1.7 Virtualization for Data-Center Automation
• Server Consolidation in Data Centers
Server consolidation is the process of migrating network services and applications
from multiple computers to a singular computer. This consolidation can include
multiple physical computers to multiple virtual computers on one host computer
• Virtual Storage Management
Virtual Storage Management provides end-to-end view of the storage assigned to
client logical partition.
• Cloud OS for Virtualized Data Centers
vSphere is primarily intended to offer virtualization support and resource
management of data-center resources in building private clouds.
• Trust Management in Virtualized Data Centers
assures secure data access through trustworthy cloud service provider
99
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 99
Parallax for VM Storage Management
100
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 100
Cloud OS for Building Private Clouds
101
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 101
102
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 102
Eucalyptus : An Open-Source OS for Setting
Up and Managing Private Clouds
103
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 103
104
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 104
Trusted Zones for VM Insulation
Tenant #2
APP
OS
APP
OS
Virtual Infrastructure
Physical Infrastructure
Cloud Provider
APP
OS
APP
OS
Virtual Infrastructure
Tenant #1
Insulate
information
from cloud
providers’
employees
Insulate
information
from other
tenants
Insulate
infrastructure from
Malware, Trojans
and cybercriminals
Segregate and
control user
access
Control and
isolate VM in
the virtual
infrastructure
Federate
identities with
public clouds
Identity
federation
Virtual
network
security
Access
Mgmt
Cybercrime
intelligence
Strong
authentication
Data loss
prevention
Encryption
& key mgmt
Tokenization
Enable end to end view of security events
and compliance across infrastructures
Security Info. &
Event Mgmt GRC
Anti-malware
(Courtesy of L. Nick, EMC 2008)
1.1 Technologies for Network-Based Systems
1. Multicore CPUs and Multithreading Technologies
2. GPU Computing to Exascale and Beyond
3. Memory, Storage, and Wide-Area Networking
4. Virtual Machines and Virtualization Middleware
5. Data Center Virtualization for Cloud Computing
1.2 System Models for Distributed and Cloud
Computing
1. Clusters of Cooperative Computers
2. Grid Computing Infrastructures
3. Peer-to-Peer Network Families
4. Cloud Computing over the Internet .
1.3 Implementation Levels of Virtualization
1. Levels of Virtualization Implementation
2. VMM Design Requirements and Providers
3. Virtualization Support at the OS Level
4. Middleware Support for Virtualization
1.4 Virtualization Structures/Tools and
Mechanisms
• Hypervisor and Xen Architecture
• Binary Translation with Full Virtualization
• Para-Virtualization with Compiler Support
1.5 Virtualization of CPU, Memory, and I/O
Devices
• Hardware Support for Virtualization
• CPU Virtualization
• Memory Virtualization
• I/O Virtualization
• Virtualization in Multi-Core Processors
1.6 Virtual Clusters and Resource
Management
• Physical versus Virtual Clusters
• Live VM Migration Steps and Performance Effects
• Migration of Memory, Files, and Network Resources
• Dynamic Deployment of Virtual Clusters
1.7 Virtualization for Data-Center Automation
• Server Consolidation in Data Centers
• Virtual Storage Management
• Cloud OS for Virtualized Data Centers
• Trust Management in Virtualized Data Centers
Test
• https://forms.gle/GkzouAN2ChrPCdmc9

More Related Content

What's hot

Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperability
gaurav jain
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
Software Park Thailand
 
Cs6703 grid and cloud computing unit 1
Cs6703 grid and cloud computing unit 1Cs6703 grid and cloud computing unit 1
Cs6703 grid and cloud computing unit 1
RMK ENGINEERING COLLEGE, CHENNAI
 
Unit 4
Unit 4Unit 4
Unit 4
Ravi Kumar
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
Animesh Chaturvedi
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
Dr.Neeraj Kumar Pandey
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computing
Pyingkodi Maran
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
SohailAliMalik
 
CloudOpen 2012 OpenNebula talk
CloudOpen 2012 OpenNebula talkCloudOpen 2012 OpenNebula talk
CloudOpen 2012 OpenNebula talkOpenNebula Project
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
SANTHOSHKUMARKL1
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using Eucalyptus
Abhishek Dey
 
Google App Engine ppt
Google App Engine  pptGoogle App Engine  ppt
Scalability and fault tolerance
Scalability and fault toleranceScalability and fault tolerance
Scalability and fault tolerance
gaurav jain
 
cloud computing: Vm migration
cloud computing: Vm migrationcloud computing: Vm migration
cloud computing: Vm migration
Dr.Neeraj Kumar Pandey
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
Sonia Nagpal
 
Virtualize of IO Devices .docx
Virtualize of IO Devices .docxVirtualize of IO Devices .docx
Virtualize of IO Devices .docx
kumari36
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource Management
NASIRSAYYED4
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docx
kumari36
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
Mehul Jariwala
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Majid Hajibaba
 

What's hot (20)

Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperability
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
 
Cs6703 grid and cloud computing unit 1
Cs6703 grid and cloud computing unit 1Cs6703 grid and cloud computing unit 1
Cs6703 grid and cloud computing unit 1
 
Unit 4
Unit 4Unit 4
Unit 4
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computing
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
 
CloudOpen 2012 OpenNebula talk
CloudOpen 2012 OpenNebula talkCloudOpen 2012 OpenNebula talk
CloudOpen 2012 OpenNebula talk
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using Eucalyptus
 
Google App Engine ppt
Google App Engine  pptGoogle App Engine  ppt
Google App Engine ppt
 
Scalability and fault tolerance
Scalability and fault toleranceScalability and fault tolerance
Scalability and fault tolerance
 
cloud computing: Vm migration
cloud computing: Vm migrationcloud computing: Vm migration
cloud computing: Vm migration
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
 
Virtualize of IO Devices .docx
Virtualize of IO Devices .docxVirtualize of IO Devices .docx
Virtualize of IO Devices .docx
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource Management
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docx
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
 

Similar to CLOUD ENABLING TECHNOLOGIES.pptx

00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf
aminnezarat
 
_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdf_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdf
TyStrk
 
Week 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdfWeek 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdf
John422973
 
1..pptxcloud commuting cloud commuting cloud commuting
1..pptxcloud commuting cloud commuting cloud commuting1..pptxcloud commuting cloud commuting cloud commuting
1..pptxcloud commuting cloud commuting cloud commuting
SarthakSrivastava70
 
Week 1 lecture material cc
Week 1 lecture material ccWeek 1 lecture material cc
Week 1 lecture material cc
Ankit Gupta
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Material
pkaviya
 
Cloud & Data Center Networking
Cloud & Data Center NetworkingCloud & Data Center Networking
Cloud & Data Center Networking
Thamalsha Wijayarathna
 
CCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptxCCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptx
NiviV4
 
Cloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptxCloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptx
atul190389
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Selvaraj Kesavan
 
vssutcloud computing.pptx
vssutcloud computing.pptxvssutcloud computing.pptx
vssutcloud computing.pptx
MunmunSaha7
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
Hitesh Mohapatra
 
Cloud computing basic introduction and notes for exam
Cloud computing basic introduction and notes for examCloud computing basic introduction and notes for exam
Cloud computing basic introduction and notes for exam
UtkarshAnand512529
 
CLOUD COMPUTING UNIT-1
CLOUD COMPUTING UNIT-1CLOUD COMPUTING UNIT-1
CLOUD COMPUTING UNIT-1
Dr K V Subba Reddy
 
introduction to cloud computing for college.pdf
introduction to cloud computing for college.pdfintroduction to cloud computing for college.pdf
introduction to cloud computing for college.pdf
snehan789
 
CCUnit1.pdf
CCUnit1.pdfCCUnit1.pdf
CCUnit1.pdf
AnayGupta26
 
e-Infrastructure available for research, using the right tool for the right job
e-Infrastructure available for research, using the right tool for the right jobe-Infrastructure available for research, using the right tool for the right job
e-Infrastructure available for research, using the right tool for the right job
David Wallom
 
Elements of Systems Design.ppt
Elements of Systems Design.pptElements of Systems Design.ppt
Elements of Systems Design.ppt
KRISHNARAJ207
 
Grid computing notes
Grid computing notesGrid computing notes
Grid computing notes
Syed Mustafa
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Bharat Kalia
 

Similar to CLOUD ENABLING TECHNOLOGIES.pptx (20)

00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf
 
_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdf_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdf
 
Week 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdfWeek 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdf
 
1..pptxcloud commuting cloud commuting cloud commuting
1..pptxcloud commuting cloud commuting cloud commuting1..pptxcloud commuting cloud commuting cloud commuting
1..pptxcloud commuting cloud commuting cloud commuting
 
Week 1 lecture material cc
Week 1 lecture material ccWeek 1 lecture material cc
Week 1 lecture material cc
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Material
 
Cloud & Data Center Networking
Cloud & Data Center NetworkingCloud & Data Center Networking
Cloud & Data Center Networking
 
CCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptxCCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptx
 
Cloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptxCloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
vssutcloud computing.pptx
vssutcloud computing.pptxvssutcloud computing.pptx
vssutcloud computing.pptx
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
 
Cloud computing basic introduction and notes for exam
Cloud computing basic introduction and notes for examCloud computing basic introduction and notes for exam
Cloud computing basic introduction and notes for exam
 
CLOUD COMPUTING UNIT-1
CLOUD COMPUTING UNIT-1CLOUD COMPUTING UNIT-1
CLOUD COMPUTING UNIT-1
 
introduction to cloud computing for college.pdf
introduction to cloud computing for college.pdfintroduction to cloud computing for college.pdf
introduction to cloud computing for college.pdf
 
CCUnit1.pdf
CCUnit1.pdfCCUnit1.pdf
CCUnit1.pdf
 
e-Infrastructure available for research, using the right tool for the right job
e-Infrastructure available for research, using the right tool for the right jobe-Infrastructure available for research, using the right tool for the right job
e-Infrastructure available for research, using the right tool for the right job
 
Elements of Systems Design.ppt
Elements of Systems Design.pptElements of Systems Design.ppt
Elements of Systems Design.ppt
 
Grid computing notes
Grid computing notesGrid computing notes
Grid computing notes
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 

More from Dr Geetha Mohan

INTRODUCTION TO BIG DATA AND HADOOP
INTRODUCTION TO BIG DATA AND HADOOPINTRODUCTION TO BIG DATA AND HADOOP
INTRODUCTION TO BIG DATA AND HADOOP
Dr Geetha Mohan
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptx
Dr Geetha Mohan
 
IPR in Academic Research:Dr G Geetha
IPR in Academic Research:Dr G GeethaIPR in Academic Research:Dr G Geetha
IPR in Academic Research:Dr G Geetha
Dr Geetha Mohan
 
How to file a patent
How to file a patentHow to file a patent
How to file a patent
Dr Geetha Mohan
 
Design and analysis of algorithms
Design and analysis of algorithmsDesign and analysis of algorithms
Design and analysis of algorithms
Dr Geetha Mohan
 
Machine learning
Machine learningMachine learning
Machine learning
Dr Geetha Mohan
 
Resource management techniques
Resource management techniquesResource management techniques
Resource management techniques
Dr Geetha Mohan
 
Ge6075 professional ethics in engineering unit 1
Ge6075 professional ethics in engineering  unit 1Ge6075 professional ethics in engineering  unit 1
Ge6075 professional ethics in engineering unit 1
Dr Geetha Mohan
 
Cp7101 design and management of computer networks-flow analysis
Cp7101 design and management of computer networks-flow analysisCp7101 design and management of computer networks-flow analysis
Cp7101 design and management of computer networks-flow analysis
Dr Geetha Mohan
 
Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2 Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2
Dr Geetha Mohan
 
Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysis
Dr Geetha Mohan
 
Cp7101 design and management of computer networks-design concepts
Cp7101 design and management of computer networks-design conceptsCp7101 design and management of computer networks-design concepts
Cp7101 design and management of computer networks-design concepts
Dr Geetha Mohan
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
Dr Geetha Mohan
 

More from Dr Geetha Mohan (13)

INTRODUCTION TO BIG DATA AND HADOOP
INTRODUCTION TO BIG DATA AND HADOOPINTRODUCTION TO BIG DATA AND HADOOP
INTRODUCTION TO BIG DATA AND HADOOP
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptx
 
IPR in Academic Research:Dr G Geetha
IPR in Academic Research:Dr G GeethaIPR in Academic Research:Dr G Geetha
IPR in Academic Research:Dr G Geetha
 
How to file a patent
How to file a patentHow to file a patent
How to file a patent
 
Design and analysis of algorithms
Design and analysis of algorithmsDesign and analysis of algorithms
Design and analysis of algorithms
 
Machine learning
Machine learningMachine learning
Machine learning
 
Resource management techniques
Resource management techniquesResource management techniques
Resource management techniques
 
Ge6075 professional ethics in engineering unit 1
Ge6075 professional ethics in engineering  unit 1Ge6075 professional ethics in engineering  unit 1
Ge6075 professional ethics in engineering unit 1
 
Cp7101 design and management of computer networks-flow analysis
Cp7101 design and management of computer networks-flow analysisCp7101 design and management of computer networks-flow analysis
Cp7101 design and management of computer networks-flow analysis
 
Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2 Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2
 
Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysis
 
Cp7101 design and management of computer networks-design concepts
Cp7101 design and management of computer networks-design conceptsCp7101 design and management of computer networks-design concepts
Cp7101 design and management of computer networks-design concepts
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
 

Recently uploaded

The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 

Recently uploaded (20)

The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 

CLOUD ENABLING TECHNOLOGIES.pptx

  • 1. IT19741 Cloud and Big Data Analytics Dr G Geetha Dean innovation and Professor CSE Women Scientist, Qualified Patent agent
  • 2. UNIT-I CLOUD ENABLING TECHNOLOGIES Technologies for Network-Based Systems - System Models for Distributed and Cloud Computing - Implementation Levels of Virtualization - Virtualization Structures/Tools and Mechanisms - Virtualization of CPU, Memory, and I/O Devices - Virtual Clusters and Resource Management - Virtualization for Data-Center Automation.
  • 3. 1.1 Technologies for Network-Based Systems 1. Multicore CPUs and Multithreading Technologies 2. GPU Computing to Exascale and Beyond 3. Memory, Storage, and Wide-Area Networking 4. Virtual Machines and Virtualization Middleware 5. Data Center Virtualization for Cloud Computing
  • 4. 4 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 4 Data Deluge Enabling New Challenges (Courtesy of Judy Qiu, Indiana University, 2011)
  • 5. 5 From Desktop/HPC/Grids to Internet Clouds in 30 Years • HPC moving from centralized supercomputers to geographically distributed desktops, desksides, clusters, and grids to clouds over last 30 years • R/D efforts on HPC, clusters, Grids, P2P, and virtual machines has laid the foundation of cloud computing that has been greatly advocated since 2007 • Location of computing infrastructure in areas with lower costs in hardware, software, datasets, space, and power requirements – moving from desktop computing to datacenter-based clouds
  • 6. 6 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 6 Interactions among 4 technical challenges :Data Deluge, Cloud Technology, eScience,and Multicore/Parallel Computing (Courtesy of Judy Qiu, Indiana University, 2011)
  • 7. 7 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 7 Clouds and Internet of Things HPC: High-Performance Computing HTC: High-Throughput Computing P2P: Peer to Peer MPP: Massively Parallel Processors Source: K. Hwang, G. Fox, and J. Dongarra,Distributed and Cloud Computing, Morgan Kaufmann, 2012.
  • 8. 8 Computing Paradigm Distinctions • Centralized Computing • All computer resources are centralized in one physical system. • Parallel Computing • All processors are either tightly coupled with central shard memory or loosely coupled with distributed memory • Distributed Computing • Field of CS/CE that studies distributed systems. A distributed system consists of multiple autonomous computers, each with its own private memory, communicating over a network. • Cloud Computing • An Internet cloud of resources that may be either centralized or decentralized. The cloud apples to parallel or distributed computing or both. Clouds may be built from physical or virtualized resources.
  • 9. 9 Technology Convergence toward HPC for Science and HTC for Business: Utility Computing (Courtesy of Raj Buyya, University of Melbourne, 2011) Copyright © 2012, Elsevier Inc. All rights reserved.
  • 10. 10 2011 Gartner “IT Hype Cycle” for Emerging Technologies 2007 2008 2009 2010 2011 Copyright © 2012, Elsevier Inc. All rights reserved.
  • 11. 11 33 year Improvement in Processor and Network Technologies Technologies for Network-based Systems
  • 13. 13
  • 14. 14 Multi-threading Processors • Four-issue superscalar (e.g. Sun Ultrasparc I) • Implements instruction level parallelism (ILP) within a single processor. • Executes more than one instruction during a clock cycle by sending multiple instructions to redundant functional units. • Fine-grain multithreaded processor • Switch threads after each cycle • Interleave instruction execution • If one thread stalls, others are executed • Coarse-grain multithreaded processor • Executes a single thread until it reaches certain situations • Simultaneous multithread processor (SMT) • Instructions from more than one thread can execute in any given pipeline stage at a time.
  • 15. 15 5 Micro-architectures of CPUs Each row represents the issue slots for a single execution cycle: • A filled box indicates that the processor found an instruction to execute in that issue slot on that cycle; • An empty box denotes an unused slot.
  • 16. 16 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 16 33 year Improvement in Memory and Disk Technologies
  • 17. 17 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 17 Architecture of A Many-Core Multiprocessor GPU interacting with a CPU Processor
  • 19. 19 GPU Performance Bottom – CPU - 0.8 Gflops/W/Core (2011) Middle – GPU - 5 Gflops/W/Core (2011) Top - EF – Exascale computing (10^18 Flops)
  • 20. 20 Interconnection Networks • SAN (storage area network) - connects servers with disk arrays • LAN (local area network) – connects clients, hosts, and servers • NAS (network attached storage) – connects clients with large storage systems
  • 21. 21 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 21 Datacenter and Server Cost Distribution
  • 22. 22 Virtual Machines • Eliminate real machine constraint • Increases portability and flexibility • Virtual machine adds software to a physical machine to give it the appearance of a different platform or multiple platforms. • Benefits • Cross platform compatibility • Increase Security • Enhance Performance • Simplify software migration
  • 23. 23 Initial Hardware Model  All applications access hardware resources (i.e. memory, i/o) through system calls to operating system (privileged instructions)  Advantages  Design is decoupled (i.e. OS people can develop OS separate of Hardware people developing hardware)  Hardware and software can be upgraded without notifying the Application programs  Disadvantage  Application compiled on one ISA will not run on another ISA.  Applications compiled for Mac use different operating system calls then application designed for windows.  ISA’s must support old software  Can often be inhibiting in terms of performance  Since software is developed separately from hardware… Software is not necessarily optimized for hardware.
  • 24. 24 Virtual Machine Basics • Virtual software placed between underlying machine and conventional software • Conventional software sees different ISA from the one supported by the hardware • Virtualization process involves: • Mapping of virtual resources (registers and memory) to real hardware resources • Using real machine instructions to carry out the actions specified by the virtual machine instructions
  • 26. 1.2 System Models for Distributed and Cloud Computing 1. Clusters of Cooperative Computers 2. Grid Computing Infrastructures 3. Peer-to-Peer Network Families 4. Cloud Computing over the Internet .
  • 27. 27 System Models for Distributed and Cloud Computing
  • 28. 28 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 28 A Typical Cluster Architecture
  • 30. 30 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 30 A Typical Computational Grid
  • 31. 31 Peer-to-Peer (P2P) Network • A distributed system architecture • Each computer in the network can act as a client or server for other netwpork computers. • No centralized control • Typically many nodes, but unreliable and heterogeneous • Nodes are symmetric in function • Take advantage of distributed, shared resources (bandwidth, CPU, storage) on peer-nodes Fault-tolerant, self-organizing Operate in dynamic environment, frequent join and leave is the norm
  • 32. 32 Peer-to-Peer (P2P) Network Overlay network - computer network built on top of another network. • Nodes in the overlay can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. • For example, distributed systems such as cloud computing, peer-to-peer networks, and client-server applications are overlay networks because their nodes run on top of the Internet.
  • 33. 33 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 33 Peer-to-Peer (P2P) Network
  • 34. 34 The Cloud • Historical roots in today’s Internet apps • Search, email, social networks • File storage (Live Mesh, Mobile Me, Flicker, …) • A cloud infrastructure provides a framework to manage scalable, reliable, on-demand access to applications • A cloud is the “invisible” backend to many of our mobile applications • A model of computation and data storage based on “pay as you go” access to “unlimited” remote data center capabilities Copyright © 2012, Elsevier Inc. All rights reserved.
  • 35. 35 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 35 Basic Concept of Internet Clouds • Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). • The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. • Cloud computing entrusts remote services with a user's data, software and computation.
  • 36. 36 The Next Revolution in IT Cloud Computing  Classical Computing  Buy & Own  Hardware, System Software, Applications often to meet peak needs.  Install, Configure, Test, Verify, Evaluate  Manage  ..  Finally, use it  $$$$....$(High CapEx)  Cloud Computing  Subscribe  Use  $ - pay for what you use, based on QoS Every 18 months? Copyright © 2012, Elsevier Inc. All rights reserved. (Courtesy of Raj Buyya, 2012)
  • 37. 37 Cloud Service Models (1) Infrastructure as a service (IaaS) • Most basic cloud service model • Cloud providers offer computers, as physical or more often as virtual machines, and other resources. • Virtual machines are run as guests by a hypervisor, such as Xen or KVM. • Cloud users deploy their applications by then installing operating system images on the machines as well as their application software. • Cloud providers typically bill IaaS services on a utility computing basis, that is, cost will reflect the amount of resources allocated and consumed. • Examples of IaaS include: Amazon Cloud Formation (and underlying services such as Amazon EC2), Rackspace Cloud, Terre mark, and Google Compute Engine.
  • 38. 38 Cloud Service Models (2) Platform as a service (PaaS) • Cloud providers deliver a computing platform typically including operating system, programming language execution environment, database, and web server. • Application developers develop and run their software on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. • Examples of PaaS include: Amazon Elastic Beanstalk, Cloud Foundry, Heroku, Force.com, EngineYard, Mendix, Google App Engine, Microsoft Azure and OrangeScape.
  • 39. 39 Cloud Service Models (3) Software as a service (SaaS) • Cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients. • The pricing model for SaaS applications is typically a monthly or yearly flat fee per user, so price is scalable and adjustable if users are added or removed at any point. • Examples of SaaS include: Google Apps, innkeypos, Quickbooks Online, Limelight Video Platform, Salesforce.com, and Microsoft Office 365.
  • 40. 40 Service-oriented architecture (SOA) • SOA is an evolution of distributed computing based on the request/reply design paradigm for synchronous and asynchronous applications. • An application's business logic or individual functions are modularized and presented as services for consumer/client applications. • Key to these services - their loosely coupled nature; • i.e., the service interface is independent of the implementation. • Application developers or system integrators can build applications by composing one or more services without knowing the services' underlying implementations. • For example, a service can be implemented either in .Net or J2EE, and the application consuming the service can be on a different platform or language.
  • 41. 41 SOA key characteristics: • SOA services have self-describing interfaces in platform-independent XML documents. • Web Services Description Language (WSDL) is the standard used to describe the services. • SOA services communicate with messages formally defined via XML Schema (also called XSD). • Communication among consumers and providers or services typically happens in heterogeneous environments, with little or no knowledge about the provider. • Messages between services can be viewed as key business documents processed in an enterprise. • SOA services are maintained in the enterprise by a registry that acts as a directory listing. • Applications can look up the services in the registry and invoke the service. • Universal Description, Definition, and Integration (UDDI) is the standard used for service registry. • Each SOA service has a quality of service (QoS) associated with it. • Some of the key QoS elements are security requirements, such as authentication and authorization, reliable messaging, and policies regarding who can invoke services.
  • 43. 43 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 43 Cloud Computing Challenges: Dealing with too many issues (Courtesy of R. Buyya) Billing Utility & Risk Management Scalability Reliability Software Eng. Complexity Programming Env. & Application Dev.
  • 44. 44 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 44 The Internet of Things (IoT) Internet of Things Smart Earth Smart Earth: An IBM Dream
  • 45. 45 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 45 Opportunities of IoT in 3 Dimensions (courtesy of Wikipedia, 2010)
  • 46. 46 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 46 Virtualization for Datacenter Automation to serve millions of clients, simultaneously • Server Consolidation in Virtualized Datacenter • Virtual Storage Provisioning and Deprovisioning • Cloud Operating Systems for Virtual Datacenters • Trust Management in virtualized Datacenters
  • 47. 1.3 Implementation Levels of Virtualization 1. Levels of Virtualization Implementation 2. VMM Design Requirements and Providers 3. Virtualization Support at the OS Level 4. Middleware Support for Virtualization
  • 48. 48 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 48 Difference between Traditional Computer and Virtual machines (Courtesy of VMWare, 2008)
  • 49. 49 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 49 Virtual Machine, Guest Operating System, and VMM (Virtual Machine Monitor) : The Virtualization layer is the middleware between the underlying hardware and virtual machines represented in the system, also known as virtual machine monitor (VMM) or hypervisor.
  • 50. 50 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 50 (Courtesy of VMWare, 2008)
  • 51. 51 Virtualization Ranging from Hardware to Applications in Five Abstraction Levels
  • 52. 52 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 52 Virtualization at ISA (Instruction Set Architecture) level Emulating a given ISA by the ISA of the host machine. • e.g, MIPS binary code can run on an x-86-based host machine with the help of ISA emulation. • Typical systems: Bochs, Crusoe, Quemu, BIRD, Dynamo Advantage: • It can run a large amount of legacy binary codes written for various processors on any given new hardware host machines • best application flexibility Shortcoming & limitation: • One source instruction may require tens or hundreds of native target instructions to perform its function, which is relatively slow. • V-ISA requires adding a processor-specific software translation layer in the complier.
  • 53. 53 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 53 Virtualization at Hardware Abstraction level Virtualization is performed right on top of the hardware. • It generates virtual hardware environments for VMs, and manages the underlying hardware through virtualization. • Typical systems: VMware, Virtual PC, Denali, Xen Advantage: • Has higher performance and good application isolation Shortcoming & limitation: • Very expensive to implement (complexity)
  • 54. 54 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 54 Virtualization at OS Level
  • 55. 55 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 55 Virtualization at Operating System (OS) level It is an abstraction layer between traditional OS and user applications. • This virtualization creates isolated containers on a single physical server and the OS-instance to utilize the hardware and software in datacenters. • Typical systems: Jail / Virtual Environment / Ensim's VPS / FVM Advantage: • Has minimal starup/shutdown cost, low resource requirement, and high scalability; synchronize VM and host state changes. Shortcoming & limitation: • All VMs at the operating system level must have the same kind of guest OS • Poor application flexibility and isolation.i
  • 56. 56 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 56 Virtualization for Linux and Windows NT Platforms
  • 57. 57 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 57
  • 58. 58 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 58 Advantages of OS Extension for Virtualization 1. VMs at OS level has minimum startup/shutdown costs 2. OS-level VM can easily synchronize with its environment Disadvantage of OS Extension for Virtualization All VMs in the same OS container must have the same or similar guest OS, which restrict application flexibility of different VMs on the same physical machine.
  • 59. 59 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 59 Library Support level It creates execution environments for running alien programs on a platform rather than creating VM to run the entire operating system. • It is done by API call interception and remapping. • Typical systems: Wine, WAB, LxRun , VisualMainWin Advantage: • It has very low implementation effort Shortcoming & limitation: • poor application flexibility and isolation
  • 60. 60 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 60 Virtualization with Middleware/Library Support
  • 61. 61 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 61 The vCUBE for Virtualization of GPGPU
  • 62. 62 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 62 User-Application level It virtualizes an application as a virtual machine. • This layer sits as an application program on top of an operating system and exports an abstraction of a VM that can run programs written and compiled to a particular abstract machine definition. • Typical systems: JVM , NET CLI , Panot Advantage: • has the best application isolation Shortcoming & limitation: • low performance, low application flexibility and high implementation complexity.
  • 63. 63 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 63 More Xs mean higher merit
  • 64. 1.4 Virtualization Structures/Tools and Mechanisms • Hypervisor and Xen Architecture • Binary Translation with Full Virtualization • Para-Virtualization with Compiler Support
  • 65. 65 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 65 Hypervisor A hypervisor is a hardware virtualization technique allowing multiple operating systems, called guests to run on a host machine. This is also called the Virtual Machine Monitor (VMM). Type 1: bare metal hypervisor • sits on the bare metal computer hardware like the CPU, memory, etc. • All guest operating systems are a layer above the hypervisor. • The original CP/CMS hypervisor developed by IBM was of this kind. Type 2: hosted hypervisor • Run over a host operating system. • Hypervisor is the second layer over the hardware. • Guest operating systems run a layer over the hypervisor. • The OS is usually unaware of the virtualization
  • 66. 66 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 66 Major VMM and Hypervisor Providers
  • 67. 67 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 67 The XEN Architecture (1)
  • 68. 68 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 68 The XEN Architecture (2)
  • 69. 69 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 69 The XEN Architecture (3)
  • 70. 70 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 70 Full virtualization It is the first software solution for server virtualization and uses binary translation and direct approach techniques. In full virtualization, guest OS is completely isolated by the virtual machine from the virtualization layer and hardware. • Para virtualization Paravirtualization is the category of CPU virtualization which uses hypercalls for operations to handle instructions at compile time. In paravirtualization, guest OS is not completely isolated but it is partially isolated by the virtual machine from the virtualization layer and hardware. VMware and Xen are some examples of paravirtualization. Full Virtualization vs. Para-Virtualization
  • 71. 71 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 71 Binary Translation of Guest OS Requests using a VMM:
  • 72. 72 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 72
  • 73. 73 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 73 Full virtualization • Does not need to modify guest OS, and critical instructions are emulated by software through the use of binary translation. • VMware Workstation applies full virtualization, which uses binary translation to automatically modify x86 software on-the-fly to replace critical instructions. • Advantage: no need to modify OS. • Disadvantage: binary translation slows down the performance. Para virtualization • Reduces the overhead, but cost of maintaining a para virtualized OS is high. • The improvement depends on the workload. • Para virtualization must modify guest OS, non-virtualizable instructions are replaced by hypercalls that communicate directly with the hypervisor or VMM. • Para virtualization is supported by Xen, Denali and VMware ESX. Full Virtualization vs. Para-Virtualization
  • 74. 74 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 74 Full Virtualization
  • 75. 75 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 75 Para- Virtualization with Compiler Support. The KVM builds offers kernel-based VM on the Linux platform, based on para-virtualization
  • 76. 76 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 76 VMWare ESX Server for Para-Virtualization
  • 77. 77 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 77
  • 78. 1.5 Virtualization of CPU, Memory, and I/O Devices • Hardware Support for Virtualization • CPU Virtualization • Memory Virtualization • I/O Virtualization • Virtualization in Multi-Core Processors
  • 79. 79 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 79
  • 80. 80 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 80 CPU, Memory and I/O Virtualization • CPU virtualization demands hardware-assisted traps of sensitive instructions by the VMM • Memory virtualization demands special hardware support (shadow page tables by VMWare or extended page table by Intel) to help translate virtual address into physical address and machine memory in two stages. • I/O virtualization is the most difficult one to realize due to the complexity if I/O service routines and the emulation needed between the guest OS and host OS.
  • 81. 81 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 81 Multi-Core Virtualization: VCPU vs. traditional CPU Figure 3.16 Four VCPUs are exposed to the software, only three cores are actually present. VCPUs V0, V1, and V3 have been transparently migrated, while VCPU V2 has been transparently suspended. (Courtesy of Wells, et al., “Dynamic Heterogeneity and the Need for Multicore Virtualization”, ACM SIGOPS Operating Systems Review, ACM Press, 2009 [68] )
  • 82. 1.6 Virtual Clusters and Resource Management • Physical versus Virtual Clusters • Live VM Migration Steps and Performance Effects • Migration of Memory, Files, and Network Resources • Dynamic Deployment of Virtual Clusters
  • 83. 83 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 83 Virtual Cores vs. Physical Processor Cores Physical cores Virtual cores The actual physical cores present in the processor. There can be more virtual cores visible to a single OS than there are physical cores. More burden on the software to write applications which can run directly on the cores. Design of software becomes easier as the hardware assists the software in dynamic resource utilization. Hardware provides no assistance to the software and is hence simpler. Hardware provides assistance to the software and is hence more complex. Poor resource management. Better resource management. The lowest level of system software has to be modified. The lowest level of system software need not be modified.
  • 84. 84 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 84 (Courtesy of Marty and Hill, 2007)
  • 85. 85 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 85 Virtual Clusters in Many Cores Space Sharing of VMs -- Virtual Hierarchy (Courtesy of Marty and Hill, 2007)
  • 86. 86 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 86 • The virtual cluster nodes can be either physical or virtual machines. Multiple VMs running with different OSs can be deployed on the same physical node. • A VM runs with a guest OS, which is often different from the host OS, that manages the resources in the physical machine, where the VM is implemented. • The purpose of using VMs is to consolidate multiple functionalities on the same server. This will greatly enhance the server utilization and application flexibility. • VMs can be colonized (replicated) in multiple servers for the purpose of promoting distributed parallelism, fault tolerance, and disaster recovery. • The size (number of nodes) of a virtual cluster can grow or shrink dynamically, similarly to the way an overlay network varies in size in a P2P network. • The failure of any physical nodes may disable some VMs installed on the failing nodes. But the failure of VMs will not pull down the host system. Virtual Cluster Characteristics
  • 87. 87 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 87 Virtual Clusters vs. Physical Clusters
  • 88. 88 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 88
  • 89. 89 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 89 Live Migration of Virtual Machines
  • 90. 90 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 90 Live Migration of Virtual Machines
  • 91. 91 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 91
  • 92. 92 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 92 Virtual Cluster Projects
  • 93. 93 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 93
  • 94. 94 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 94 Cluster-on-Demand (COD Project) at Duke University
  • 95. 95 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 95
  • 96. 96 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 96 VIOLIN Project at Purdue University
  • 97. 97 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 97
  • 98. 1.7 Virtualization for Data-Center Automation • Server Consolidation in Data Centers Server consolidation is the process of migrating network services and applications from multiple computers to a singular computer. This consolidation can include multiple physical computers to multiple virtual computers on one host computer • Virtual Storage Management Virtual Storage Management provides end-to-end view of the storage assigned to client logical partition. • Cloud OS for Virtualized Data Centers vSphere is primarily intended to offer virtualization support and resource management of data-center resources in building private clouds. • Trust Management in Virtualized Data Centers assures secure data access through trustworthy cloud service provider
  • 99. 99 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 99 Parallax for VM Storage Management
  • 100. 100 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 100 Cloud OS for Building Private Clouds
  • 101. 101 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 101
  • 102. 102 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 102 Eucalyptus : An Open-Source OS for Setting Up and Managing Private Clouds
  • 103. 103 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 103
  • 104. 104 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 104 Trusted Zones for VM Insulation Tenant #2 APP OS APP OS Virtual Infrastructure Physical Infrastructure Cloud Provider APP OS APP OS Virtual Infrastructure Tenant #1 Insulate information from cloud providers’ employees Insulate information from other tenants Insulate infrastructure from Malware, Trojans and cybercriminals Segregate and control user access Control and isolate VM in the virtual infrastructure Federate identities with public clouds Identity federation Virtual network security Access Mgmt Cybercrime intelligence Strong authentication Data loss prevention Encryption & key mgmt Tokenization Enable end to end view of security events and compliance across infrastructures Security Info. & Event Mgmt GRC Anti-malware (Courtesy of L. Nick, EMC 2008)
  • 105. 1.1 Technologies for Network-Based Systems 1. Multicore CPUs and Multithreading Technologies 2. GPU Computing to Exascale and Beyond 3. Memory, Storage, and Wide-Area Networking 4. Virtual Machines and Virtualization Middleware 5. Data Center Virtualization for Cloud Computing
  • 106. 1.2 System Models for Distributed and Cloud Computing 1. Clusters of Cooperative Computers 2. Grid Computing Infrastructures 3. Peer-to-Peer Network Families 4. Cloud Computing over the Internet .
  • 107. 1.3 Implementation Levels of Virtualization 1. Levels of Virtualization Implementation 2. VMM Design Requirements and Providers 3. Virtualization Support at the OS Level 4. Middleware Support for Virtualization
  • 108. 1.4 Virtualization Structures/Tools and Mechanisms • Hypervisor and Xen Architecture • Binary Translation with Full Virtualization • Para-Virtualization with Compiler Support
  • 109. 1.5 Virtualization of CPU, Memory, and I/O Devices • Hardware Support for Virtualization • CPU Virtualization • Memory Virtualization • I/O Virtualization • Virtualization in Multi-Core Processors
  • 110. 1.6 Virtual Clusters and Resource Management • Physical versus Virtual Clusters • Live VM Migration Steps and Performance Effects • Migration of Memory, Files, and Network Resources • Dynamic Deployment of Virtual Clusters
  • 111. 1.7 Virtualization for Data-Center Automation • Server Consolidation in Data Centers • Virtual Storage Management • Cloud OS for Virtualized Data Centers • Trust Management in Virtualized Data Centers