General discussions
Why cloud?
The terminology: relating virtualization and cloud
Types of Virtualization and Cloud deployment model
Decisive factors in migration
Hands-on cloud deployment
Cloud for banks
This presentation gives a detailed overview about Cloud Computing, its features and challenges faced by it in the market. It gives an insight into cloud security and privacy issues and its measures.
This presentation gives a detailed overview about Cloud Computing, its features and challenges faced by it in the market. It gives an insight into cloud security and privacy issues and its measures.
Cloud computing
Definition of Cloud Computing
History and origins of Cloud Computing
Cloud Computing services and model
cloud service engineering life cycle
TEST AND DEVELOPMENT PLATFORM
Cloud migration
“This chapter provide an overview of introductory cloud computing topics. It begins with a brief history of cloud computing along with short descriptions of its business and technology drivers. This is followed by definitions of basic concepts and terminology, in addition to explanations of the primary benefits and challenges of cloud computing adoption.”
Cloud computing is a releasing individual and institutions from the traditional cvcle of buying-using-maintaining-upgrading IT resourcs - both hardware and software. Instead it is making IT resource accessible from anywhere and at proportions as required by the end user. Here is a brief introduction to this new transformation
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
This PPT contains Following Topics-
1.what is virtualization?
2.Examples of virtualization.
3.Techniques of virtualization.
4.Types of virtualization.
5.What is Hipervisor.
6.Types of Hypervisor with Diagrams.
Some set of examples are there like Virtual Box with demo image.
This slides focuses on Virtualization concepts, types of virtualization, Hypervisors, Evolution of virtualization towards cloud and QEMU-KVM architecture.
Cloud computing
Definition of Cloud Computing
History and origins of Cloud Computing
Cloud Computing services and model
cloud service engineering life cycle
TEST AND DEVELOPMENT PLATFORM
Cloud migration
“This chapter provide an overview of introductory cloud computing topics. It begins with a brief history of cloud computing along with short descriptions of its business and technology drivers. This is followed by definitions of basic concepts and terminology, in addition to explanations of the primary benefits and challenges of cloud computing adoption.”
Cloud computing is a releasing individual and institutions from the traditional cvcle of buying-using-maintaining-upgrading IT resourcs - both hardware and software. Instead it is making IT resource accessible from anywhere and at proportions as required by the end user. Here is a brief introduction to this new transformation
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
This PPT contains Following Topics-
1.what is virtualization?
2.Examples of virtualization.
3.Techniques of virtualization.
4.Types of virtualization.
5.What is Hipervisor.
6.Types of Hypervisor with Diagrams.
Some set of examples are there like Virtual Box with demo image.
This slides focuses on Virtualization concepts, types of virtualization, Hypervisors, Evolution of virtualization towards cloud and QEMU-KVM architecture.
Cloud Service Management. A New Beginning. This presentation looks at the disruptive nature of cloud computing and cloud based services. It explores organizations current ability to understand the impact cloud. The final section provides a number of suggested and recommended sources of information regarding cloud service management in an ITIL environment.
Keeping an application running at scale can be a daunting task. When do you need to add more capacity? Larger databases? Additional servers? These questions get harder as the complexity of your application grows. Microservice based architectures and cloud-based dynamic infrastructures are technologies that help you keep your application running with high availability, even during times of extreme scaling. We will discuss some of the best practices we’ve learned working with New Relic customers on how you can manage your applications running at scale, and how technologies such as microservices and dynamic infrastructure can help you with this challenge.
As presented by Lee Atchison, Senior Director, Strategic Architecture of New Relic at Amazon Web Services Summit, Sydney on April 6, 2017.
This PPT covers the following topics...
Definition’s
CC in a Nutshell
Roots of CC
Layers and Types of Clouds
Desired Features of Cloud
Cloud Infrastructure Management
Infrastructure as a Service Providers
Platform as a Service Providers
Challenge and Risks
With all the hype around Cloud and SDN, business decision makers are finding themselves trying to navigate through many new concepts and consequently needing to change the way they have traditionally selected their IT infrastructure. Technologies are now becoming more integrated and it is more important than ever to help your business be agile enough to keep up with the demands of your users and your customers. Come hear from Lisa Guess to learn how organizations can embrace Cloud technologies such as automation, SDN and Orchestration platforms to help you build next-generation networks.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1. Virtualization &
Cloud Computing
A new window to the computing zone
Presented by: iTech River Consultancy Services
www.itechriver.com
dcg@itechriver.com
2. Agenda
• General discussions
• Why cloud?
• The terminology: relating virtualization and cloud
• Types of Virtualization and Cloud deployment model
• Decisive factors in migration
• Hands-on cloud deployment
• Cloud for banks
3. Cloud for the Mango Man
• What is cloud?
Network Data
Storage Processing
4. Cloud for the Mango Man
Hey, this thing connects via cloud!
Lets call it cloud computing
5. Cloud for the Mango Man
Hey, this thing connects via cloud!
Lets call it cloud computing
6. Cloud for the Mango Man
Hey, this thing connects via cloud!
Lets call it cloud computing
7. Cloud for the Mango Man
Hey, this thing connects via cloud!
Lets call it cloud computing
9. Cloud for the geeks
• NIST definition:
Cloud computing is a model for enabling convenient, on-demand network
access to a shared pool of configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be rapidly provisioned
and released with minimal management effort or service provider interaction
13. Why cloud?
• Resource allocation and optimization
• Cost efficiency: CapEx to OpEx
• All things being equal, OpEx should be more expensive than CapEx
• Choosing one option over another is a trade-off
• Friction affects the OpEx vs CapEx evaluation
• Automation leads to lower transaction cost
• Security
• Consolidation and ease of management
• Scalability
• Elasticity
14. Virtualization and Cloud
• Virtualization
• Meaning: virtualize compute, storage, network, application etc.
• Application: from testing to production
• Cloud computing: building the empire above virtualization
• Need for new technology
• Consolidation
• Orchestration
• Metering
• Cost optimization
• Elasticity
• The hype, the myth, the reality
15. Types of Virtualization
• Server Virtualization
• Desktop Virtualization
• Application Virtualization
• Network Virtualization
• Storage Virtualization
16. Server Virtualization
• Create virtual machines with desired configuration on top of a physical bare
metal box
• Hypervisor acts as a broker between hardware and virtual machines
• May or may not need a host OS
• Elasticity and resource optimization are prime motives
• Applications need resources, not servers
• Wide implementation: fun, experiment, research, enterprise
17. Server Virtualization
• Full virtualization vs Para-virtualization
Hardware Layer
Hypervisor
Mgmt
Console
VM VM
Linux
VM
Win
2k
VM
Hardware Layer
Hypervisor
Mgmt
Console
VM VM
Host Operating System
Linux
VM
Win
2k
VM
18. Server Virtualization
• Hypervisor vs Docker
Hardware Layer
Host OS
Hypervisor
App A App B
Bins / Libs
Guest OS
Bins / Libs
Guest OS
Hardware Layer
Host OS
Docker Engine
App A App B
Bins / Libs Bins / Libs
19. Desktop Virtualization (VDI/DaaS)
• Virtualize desktops in a client server model
• Use of thin clients instead of thick clients
• Centralized resource pooling
• Centralized management of resources and policies
• Easy and quick migrations
• Data security
20. Application Virtualization
• Application sits only as a stub at user end
• Encapsulated and sandboxed from OS
• Allow apps to run in non-suitable environment
• Run incompatible applications side-by-side, at the same time
• Simplified OS level migrations
• Improved security by isolating apps from OS
• Portability of apps from one machine to other
• SaaS is an enhanced derivation
24. Network Virtualization
• Network provisioning and expansion is complex today
• Migrate to Software Defined Networks
• Decoupling control plane from data plane
• Build centralized set of rules (firewalls, load balancers etc.)
• Acceptance of open interfaces instead of locking into proprietary solutions
• External virtualization combines several networking units into virtual unit
• Internal virtualization provides network functionality to software containers
• Implementations: AKARI, FIRE etc.
25. Vertically integrated
Closed, proprietary
Slow innovation
Small industry
Specialized
Operating
System
Specialized
Hardware
AppAppAppAppAppAppAppAppAppAppApp
Specialized
Applications
Horizontal
Open interfaces
Rapid innovation
Huge industry
Microprocessor
Open Interface
Mainframe era
26. Million of
lines
of source
code
Thousands of RFCs per code block
Billions of
gates
Bloated Power Hungry
• Vertically integrated, complex, closed, proprietary
• Networking industry with “mainframe” mindset
Custom Hardware
OS
Routing, management, mobility
management,
access control, VPNs…
Feature Feature
Networking today
27. SDN
Vertically integrated
Closed, proprietary
Slow innovation
AppAppAppAppAppAppAppAppAppAppApp
Horizontal
Open interfaces
Rapid innovation
Control
Plane
Control
Plane
Control
Plane or or
Open Interface
Specialized
Control
Plane
Specialized
Hardware
Specialized
Features
Merchant
Switching Chips
Open Interface
28. Storage Virtualization
• Block virtualization: abstraction of logical storage from physical storage
• More flexibility for SA in managing storage
• Address space remapping with multi layer remapping (LUNs out of LUNs)
• Metadata optimization: tradeoff between granularity and addressable capacity, solved by
three layers of virtualization
• In built replication via synchronous and asynchronous mirroring
• Pooling and scaling remains transparent to application layer
• Host based, storage based and network based
• Benefits:
• Non-disruptive data migration (transparent mapping to host, depend on granularity)
• Improved utilization (avoid over-buying and over-provisioning)
• Fewer points of management (monolithic storage with central management)
29.
30. Cloud based storage
• Cloud storage is an important service of cloud computing, which allows users to
move their data from local computing systems to the Cloud.
• Examples:
• Amazon Simple Storage Service (S3)
• DropBox
• Rackspace Cloud etc.
31. Challenges in Cloud Computing
• Security
• Privacy
• Performance
• Availability
• Compliance
• Long-Term viability
• Interoperability
• Legal Issues
• Open Standard
32. Security Issues
• Data Storage Security and Privacy
• Virtualization Security
• Infrastructure Security
• Network Security
• Host Security
• Governance, Regularity and Compliance
• More…
33. Three pillars of Security
• Confidentiality
• Maintain confidentiality of sensitive data
• Encryption
• Integrity
• Is the data stored at provider’s premises without tampering?
• Metadata generation
• Availability
• Data should be available even if hardware failure occurs in the cloud
• Data replication
34. Cloud security audit model
Storage
Servers
Internet
Data Flow
Challenge
Users Cloud Service Provider(CSP)
Third Party Auditor(TPA)
Response
35. Cloud security verification
pk, metadata
User CSPTPA
(d)MetadataGen
(b)Encryption
(a)Keygen
(c)Replication
TPA stores the
metadata
TPA stores public key
file
CSP stores file
36. Cloud Deployment and Service Model
Rapid Elasticity
On Demand Self Service
Measured Service
Resource Pooling Broad Network Access
Platform as a Service
(PaaS)
Software as a Service
(SaaS)
Private Cloud
Hybrid Cloud
Deployment
Models
Service
Models
Infrastructure as a
Service (IaaS)
Characteristics of
Cloud
Public Cloud
Community Cloud
37. Migrating to Cloud: When, Why and Why Not
• Good for applications which need to scale up or scale out only for a small
span of time
• Less initial capital investment
• Best suited for low budget projects
• Facilitates centralized management
• Best optimization and utilization of resources
• Metered usage: switch from CapEx to OpEx
• OpEx is not always the cheapest
• Legal concerns and issues
38. Cloud Computing for Banks?
•Workflow based compute and storage requisition process
•Management layer for Banks to track the usage
On Demand Self
Service
•Provision for requesting scaling down the infrastructure for
optimal usage
•Standardize OS, Database and patching
Measured Service
•Can be accessed through INFINET/MPLS or Leased line
•Options for Internet facing applications
Broad Network
Access
•Usage of scalable environment for banking sector
•Reduces people, HVAC and Real estate requirements. Also, the
future hardware/software refresh overheads
Resource Pooling
•Automated Vertical and Horizontal scaling to meet future
requirements to handle cyclical requirementsRapid Elasticity
39. IDRBT Banking Community Cloud
• Based on Meghdoot stack, developed from Eucalyptus by CDAC-Chennai
• Presently supports x86 architecture only
• Offers services of IaaS, plans to migrate to SaaS as well
• First banking community cloud in the world
• Non-customer facing and less critical apps can be migrated
• No major unplanned downtime so far
• IBM z series machines, multi tenant QoS enabled MPLS network
40. IDRBT Banking Community Cloud: Use Cases
• DR Site for an existing production environment
• Dev, Test and Training environment
• Existing applications requiring hardware refresh
• Separation of Database and application layer
• Common Tools as Software Testing, Code Review tools, etc
• Email Service
• Learning Management and other intranet systems
41. IDRBT Banking Community Cloud: Security
• Access to Server room: 3 level access controls (Biometric, PIN & Access card)
to enter into server room
• Hardware: Kept in lock and key in the data center with access controls
Password protected Cloud machines access is IP based
• Cloud Stack: Virtual Machine access is through PKI (recommend to have a
maximum of 3 administrators per VM), PKI to be issued by IDRBTCA*
• Network: IPSec / GRE tunnel Network Firewalls Virtual Machines are in
designated VLAN of the bank and even Cloud administrators cannot access it
• Identity Management: Strong User ID and password Single Sign-on/ Active
Directory / LDAP integration to access applications
• Anti-virus: on VM Server level anti-virus (symantec Endpoint Protection)
• Operating System security: VM Updates/patches at Cloud stack