Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
232 views
116 pages
Tech Max
Uploaded by
crazzy demon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Tech Max For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
232 views
116 pages
Tech Max
Uploaded by
crazzy demon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Tech Max For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 116
Search
Fullscreen
PREFACE | le a exvemey hope peer the book of “oud Computing” for you. We have vise the We retort Sh Sahn Shab forthe encouragement and suppert hath {08 We roo ther tte member of Tech ee Publations ond others forthe efor moe bok os oo si We hve jnlp made every posible eos to emit al the ear {bok Mower 0 fn on, please now because hep us to imorove further we rota tomy omiy members nd frend for the patience and encouragement SYLLABUS —————| ‘TORIES (Cree: 09 Lastrev Week 08) Chad Chats of Vieulaed Exvvoanens Tiosomy of Vi Vieulaaton mi Cod Comping. Pros a Cons of Vim |, Ceili Ve = monn lr | open ngs of Cent Conpaig cont Opec, OperSck wt de Bae Oper tnd APL, Tek ool pets, Quotas, Pie cloudCONTENTS —— 24 10227 ssl 103-59 el L- toL-76 aaaCetin cmp ince deo CAAT ‘ai Cc spent oe srs of Peer Peer Camping ‘tango Pea Per Compu sadnnages Puan Per Compingadm. such 8 gi computing, have promised to deliver ompesing ‘emerging paradigm that promises totum the vision of “computing lement Severs, and only pay for sing these resources = tn 1969, Leona Kleiwock, one of the principal scientists ofthe exiginal Advanced Research Projets ‘Azncy Network (ARFANET), soda the Itemet, ~The later erm often refers to infuse asa “loud” fom which basi ‘oplcatins frm anywhere nthe weld ans 8 dein. ~ Ss eve mollis made possible by an effective combination of mulipe technologies tat ave reached resonable maar levels puting, which is an wtractve opportunity 12 = Senvice xenon allows clot ‘inusiaon provides the eee Be cretion of etre sen ~The NIST's defnion of coud computing is, “Cloud com convesien, ondemant network ming to liver it capabiies with familiar capabiies, while mization contr and flexibility required on cloud computing tad noting is & model for enabling ubiquitous, Neoess 10 4 shared pool of coniuble {ek Ne ile the aap ig A (B) cous conputng Mu Se Cog Same) 15 oud Corte Rr SS cet corpiing ‘The Vision of Cloud Computing [iq 3.32” Deere the vision introduced by cloud computing the provision of viual hardware, runtime grvronment and services to possible to find 2 soluion that maches our needs by ac dong busines wit cloud computing services. ~The exisence of soch a market will enable automation ofthe search process and its in esting software systems. = Theexisene ofa global platform or tang cloud services wil also help service providers to incrente thet = The cloud provider can also become a consumer ofa competitive sevice tofu is promises teasers Fig LL THe Cd Computing Vision ‘Ta Se Pit he at ii inotiveBowempeevsncmpemg 1s a > 1.1.2: Defining Cloud 22.453 Define the term Cloud. way of computing ther the medium or the platform network access to a shared pool of and services, All these operations can be performed by entering creditcard deals and accessing the exposed services ‘trough a web bowser ~ Cloud computing is tase on tse criteria (© Theservices are accesible via internet. (© Tose! sured with cloud computing er capital expenditure i necessary, © Payas per usages,model supports all users Who want {0 Use 3 sory, storage) on subscription, of Software 2, Platform as a Service (Pans) = The Platform as a Service (PatS) model 2 1.132 Cloud Computing Reterence Model [6a 226 “wt shore nee on Cloud Computing Reference Model 4. Resources Pooling hie meas tte clo provider pled computing reso provide serves a multine isttey with te hep of node Diferent physic and val resources ar asigned and reasgned which depends en sioner demand = The ewstomer ypclly Bas 0c bles pei te eto hi Fea Re iii Me ath in the tocaton of the resources provided, Batis sed Fig 114: Cloud Compuung Reference Model ak Palin lrgEconomical TeX lat — re pit 3. Easy Maintenance = Serves are easily maintained and the downtime is very low and even in some eases, there is no ddowatine = Cloud computing slowly improves with ach update Updates are more compatible with device and perform faster han older ones with bugs that have been ‘This means that esource usage tha canbe citer viru serve instances that are unig in he lv is fixed being measred and reported by the service provide, ‘The model you go to is variable based on the actu! contumption of the payment minuacting organization. ‘Advantages of Cloud Computing ai 25:4" expan the bnats fora art wp timplamen Goud ntact, OREM | Ga. 32.40 what are the advantages and disadvantages coud computing? 41. Easy implementation Cloud hosting allows te business to mai sna applications an besines proceso deal wih backend tecology. | = Easily manageable by the Inemet, cloud infaseucture can he easly and quckly acest by enterprises 2 Accessity ~ Access your data anywhere, anytime We can monitor, control and report usage. This will provide transparency for the host ax well atthe = Thisisaone-ime investment because the company ‘canbe provided to many companies tht save the purchase storage anda small porionof 3, Nohardware required or annual costs. = Only the amount spent ison basic maintenance and some other expenses which are very less. Security ~ Cloud Secuiy, is one ofthe best features of eloud computing, |. Cost per Head required technology of cloud should keep ize tonal tne and resources to improve i load hosing serves, ovis mpany’s instru = Weereates snapshot ofthe data stored so thi the data may not get lost even if one of the servers ges damaged. - Tre sored within the storage devises, which cannot be hacked and wilzed by any other person = The storage service quick and reliable AST Tee |As companis grow, ter system wil grow with them. Cloud resources are quite exile f0 easily scale. pandcaledownas per ned and data. 1.16 Disadvantages of Cloud Computing Ga 3433, what ore the advantages and disadvantages of cloud computing? 1. No fongerin contro! ~ When tansfering services on tothe cloud, you ae handing over your dita and information = Even thoagh companies that hve inhouse FT engineer, they will not be able to handle issves on their However, te cloud company shoul have 8247 live helpdesk hat can quickly fx any problem, 2 Notall features can be found 1 what your cloud service 3. Doesnt mean you should do away with servers ~ You may have fewer serves to handle, which means thet you ‘mean you can let al you servers and employees go. = Although dat centers and cloud infrateture ae cosy, redundancy is critical for backup and recovery, 4. No redundancy ~ Aloud servers no redundant and also not baked up. Since technology ca fail bere and thee, avoid ‘buming by purchasing redundancy Although itis an sional cot, 5. Bandwidth estes For ideal performance, customers have to plan according ‘storage devices ina smal set of data centers. 2.147 chalergein ort Cu Comping Ga 8a on eng wt a I and do no pack large amounts of servers and 2. Interoperabi Security eas the repo the pasword with anyone, and Ifthe dita is ouside the reall then there maybe some problems tht can be eliminated by he cloud provier = Hlacking and malware ae also one ~ + Hacking can cause data toe; enryt 1d Portability = Thecastome shouldbe provided with migration services in end ou ofthe cloud, ~ There should be no bond periods ican rete obstaces for customer for cloud customers and can be ge serves provided by third pte should be maitre and supervised on performance, robustness, and business dependency. is inexpensive but modifying the cloud to customer demand can sometimes be create obstacles in sl sae organization asthe cloud is maifying because their o tion aio plays an important ole because if a company has an uit intemet ee canbe a problem a they may face downtime. “eR Flin —— Fh hat ini aig = aT Tatethe cloud industry and may in ar more experience, = These workers will not on rn existing employees ty teneft tbe company. = Today many IT workers are working to promote cloud computing expertise and the CEO of the company is find se he workers are not very skilled. th Knowledge of the latest developments and related technologies yi ‘Wrens company wes muli-
1.5. Utllty-Orlented Computing 8 ee comping =" Ua comping er camper wey i ing bt cio provisioning mde in wich a see rove mies conping rears td isrcaemanepene vale othe Core Redes, chaps er gece eget an at = Tem iy fon wy sees ache salty conpny = Silat cy eee be cosoner mi he recive hey comping, thc 2 shard computer consensual en a = Teter ty ef iy verve ach ey, tee we ad gs Temi estos, water, nd et wich provide by = Asie dency oF gto ite cwsone eves = art ty comping, computing power on “Computer network, its consumption is measured and billed on that basis. 2 meee ~ _Ualiy computing i very similar to viualiation, 0 that he otal amount of web storage space, along with te comping poser at sr ce, mach pe ans ingle sarees ater and gas that are provided by & ing power on To Ne Pl — Wo aon nama ASIC See Fie 181 Utey Comping 2 1.5.1 Properties of Uity Computing 4. Scatabty = Uilty computing shouldbe ensred tht adequate IT resources re avaiable in al ecumsances. “= Increasing demand fora service bt it doesnot harm is quay, sponse time). 2 Demand pricing = Until nom, companies have ad o bey ther owe haware and software when they ned computing 3, Standerdized Uulty Computing Services = The utility computing service provider provides is customers with liso andadized services, grerentson various seve level apreements (uty and pric fT)yo ) Bi caccoramgiwascarp tent costco ‘4 Usiity Computing and Virtualization = Viwalizatn technologies can be ws share web and eer resources in a sare pool of machines ~ This will dvi the nerwort int lopca resources instead of eval memory fom the poo 5. Automation . = Therepeaing management tacks soch as installing anew server or installing updates can be automated, ~ In alton, the allocation of resources to services atomically and the management of TT services ‘ould he cpimizd, considering service level agreements and operating costs of IT resources. 2 152. Diterent Types of Uuity Computing ~ Vil comping is categories into two types: aterm wility and External wit Imemal tty means ha the computer network i shared only within a company. = Used by many diferent computer companies to poo! together a particular service provider called an external vay Additonal, various bybri forms are possible inthis typeof uit computing 2 152. Acvantages of uity Computing 1. Cont = The contof I canbe reduce due o Usity computing, given that existing resources can be used more cttecvely. = Inadition, the costs ansparent and canbe asignd directly to different departments ofa company, > _ Tere wil be fewer people reuied fr operational activities in TT departments. Flexibitty ~ Gonrnis pin mere feb as er I escrces adapt to Mocating demand more guicky and easy. » ~ Oren he entire 7 inrsrucae is easier to manage, as it will no longer be buit for every ‘iain, which an advantage for specific TF infrastructre 1.6 Elements of Paral! Computing 1.6.1 Whats Parallel Computing? ~ Ine simplest sense, parle! computing is sone aconptaion pees nmin ewe of mull computational resources simaltaneasl 0 e © Ame brs io dice Fas hat cane ved conuenty © Every pais ten oken down oa srs of inseuctone © The nstions fr ect strc Fer ae simultaneously executed on diferent proceser. eh Plena Wh en apn anig asia eee “Fe Ne Pl Mi ed ae iynamis simulation and modeling, and to achieve the same, palit ng used to provide concurency ad also sav time and mone. Be datasets and thee management can be condaced sing an apprcach of only and only parle Allinstrctons an data o be proceed have to be ord in primtry memory ‘The sped ofthe processing element in the SISD mec! is limited (Sepeneat to there at which the compute can taster information internally ~ Key representatives of SISD Systems IBM PC, Workstason Fig LA Sinetron pe data ISD) tee AS mmel —_——— Vv ) X : corey Bl cnconsangene sc concen a Qa 2a) Gane} aa) Boscom awn scomsen aiipeocessor machine capuble of executing the same instructions on all CPUs but itfret data sees rmpating because they involve alot of nts (PEs), the organized data elements of 4 Muttiptenstruction, multiple-data (MIMD) systems ‘The MIMD system is muliprocesor machine capable of exciting multiple instructions on mile ata es, = Bach PE of tbe MIMD model hs itfereatinsuuctions and data sean. Therefore machines manufactured using ths model ae capale of aay typeof splicaton = Unlike SIMD and MISD machines, PEs operate asynhroncesy in MIMD machines. Ses es, Wish penance {| 2 stn sne st 2) poe ~ The MISD computing sytem is 2 mukiprocesor machine capable of executing various instructions on tert PEs bl f them working om the same dataset. Examph (4) +605) +a (4) ~The system performs dient opesins ca these data et ‘Machines ui sing the MISD ml ae. sere an, Rese! ena useful inmost appicatons, some machines ae bull, bat none of them are commercial availabe TN Pisa Pl op tang ———— Tr 7In disribied memory, all PEs in MIMD machines (loosely coupled multiprocessor systems) have @ toca memo. ~ Networks connecting PE cane configured a tees, mesh, or as needed. ‘model, in which ech PE canbe easly separated 16 Plein — Fo he ag nwnaig rr 7 ) ley to sale Beaute the ation of mare ted memory, in Which each PE as its own 1 ouomes and user requirement, the distibued memory MIMD her exiting mets, ce the number of isrctons the system mst execute to work om large-sized daa rari where an 8-i processor must calcula the sm of two 16-bit integers re-order bis, ten ald 8 higher-order bits, tus requiring two instructions to Fg 14S: Sard memory MIMD mde 2 Instructiontovel Pent \Pc.cranat 2 = Science and Baginerng, = Advanced graphics, agmentd reality and virtual aly, 2 1.65 Advantages of Parallel Computing over Serial Computing ee ns time and ut pte ra This saves te and money becanse mutiple resources ogee wil reduce te and cut poe 's more sy to program, but is ess tolerant of failures and ‘memory MIMD moxie cots, ~ Teean be tecacally ie affets he ent system, whi eante " lve major problems on sig ot the case fr a distributed Taboo hb pi awn = A SCY A etre > aethe vantage of nonlocal resources when local esouces are iis cz, ths making parle! computing etter work between many sub-asks and processes tat ae difficlt tg = Agoritins st be managed i such away that they an be handled in system. ‘Tee algonihm or program mst have low coupling and high cohesion. But itis dificult implement such = Mor tchcally profit and exper programmers can code a similarity based program well 21.7. Elements of Distributing Computing Ci Ua. £7.8 Write hort note on Distributed computing 2a.17.2 What ina debuted stom? What ar the components that characterise I? = Asperthe general defnion of dissibuted system, we use the one proposed by Teanebaum =A distbuted ‘stem is. coin of independent computers tha appears to its users asa single coherent system. asc aspect of istribued computing Since dsbuted systems are made up of more than ne computer tat collaborates logeter, its necessary tw exchange some cp of data and information between them, which is usally via the network. message. Iisa term hat incads several communication modes 1.7.1 Components ofa Distributed System 60,473 what is distributed stem? what are the components that cheracteriaa kt) = The distibud sytem teres fi of multiple compos : seratons of multiple component averse the entre compute stock trom barre software anand Ic emerges in colton with makile ine cements dat by working togeter give users the isin of? sine oben sytem Seen Tab Pits — Fhe gi nang rt” en UB ce conpstog 1.0.52. cono Sone) = Layers or Components involved in Distibuted System 1. Haraware Ata very low level, computer and nework hardvare const physical infarc, These components ae dicey managed by the operating sytem, which provides baie serves for Jmerprocesscommunicaon (PC), process éetermination and management and resource management In the comext of le sytems and lea vce. = When taken together these two lyers become platform, above which pci softwar is deployed 0 tum on set of networked computers ina distributed system, 2 Operating System known standards atthe operating system evel and hardware and network levels ition of heterogeneous components abd tir orgaization into 2 consent and autcoes, where racks of servers ae deployed and connected together va high speed connec = This infaszucure Is managed by the operating sytem, which povies basic capabites of machine and network management [eben — For beinstributed systems. By relying on the services offered its own protocols, data formats, and programming appicatons, operating stem a hides al the ies of the botlom layers layer, whichis deployed runtime eavironmeat for = Mitewar proves dierent features to application developers according tothe fype of services sold These feaes fered dugh the Web 20-ompliant interfaces, ange from virtual infrastructure ‘Nalng an deployment to aplistion development and runtime environments 4 Applications ~ These can sere mu purposes and fen highlight their features asa grapial user interface (GUD, sxcesue via entre, sally oe thruph a web rower = Foreuangle in he case of hud computing systems, the use of web technologies is srongy prefered, eon to intertave snteat epiations with the eni-user, bu Wo provide platform services aimed &t uhh anand system, © 122 etme Darn Cnsng = Architectural styles are mainly used 40 det the omponer conecos cit mie fora se a ‘weed as examples of syle together with a set of constrains on bow they can : Deg pemtp nota seme see vita eaean ese imine S winin werent yacacectnemepnes 7 Athen oleae sentir he vel ashe of star stem = Arcstrl soe for seed systems be ~ Anthea sys at feo mse clases Sctware antiesnel sles © System artes spies TN Fe ees ‘Software Architectural Styles Write short neta on Software architectural rye. = Softvare architectural styles ae based onthe These models consiate the foundations on top of which dstibuted systems ae designed from 2 logical point of view. Category ‘Most Common Architectural Sys Repository, Blackboard Pipe and fer Datscentered Dataflow Batch sequential Role based system Imerpreter ‘Main program and browne calltop- down systems ‘Virtue machine Objectorened systems Layered systems (Call and turn ‘Commaniatng processes Eveot systems | independent components o 1.7.2.20ata Centered Architecture “These architectures ienily data score element of software systems, and aces (0 shared data is 3 core feature of dent aries ; “Therefore, patil in the case of dstbuted and parallel computing systems, dia nteprityiste veal goa for such systems. ‘Tee Pla fata a edindependent components tat operate on the central data pendent components interact with the central data structure can be very avhitccures differentiate and move into subcategories related 0 the Inthe former group the dyna of ie system is controlled by independent components tha, by issuing sn opeation a te central repository, tigger the selection of specific processes that work on the data, = tn Blackhead systems, the cera ta strecture the core trigger for selecting processes to execute, 9. Blackboard = Thebiacthoad arcitctur syle has categories int three main components © Keowledge sources: These ae the units hat update the knowledgebase bul ino the backboard. ‘© Blackboard: I represents data structure that is shared between knowledge sources and sores the applications knowledge base. Control: Contl is ealletion of triggers and processes that control interactions with the ‘of expe in fon of the Hackbow, = Biockboard modes are popular and widely used for stil inteligence applications, in whic Blackboard mainsins knowledge abouts domain as asertion and rules that are entered by domsin experts. = Those operate via a contl sel that conto system problem solving activity, ~ Special and success applications of his model canbe found inthe domains of speech recognition signal procesing > 1.723 patattow Architecture = Inthe eas oa data architecture, the computation i = With respect to datecentic sys, in which access to Include paters of dataflow, ster design is dtenet 'wcomponeat Which sth pe of communication betwen thes = Styles within this category der in one f the fl ‘eniteney between components, andthe topology ‘motion of the data from compone®! lowing ways: how contol is handed, the degree of . lat describes thew of dat, oN Filho ke ap ig aa ic ~ Applications an systems are implemented ontop of his ayer and become xt program, the ouput generated by the lst program ofa fe = _kewas 0 popular design in the maitre er of computing and stil find application ody. = Example i, many dintributed pica ene computing ae specified by jobs expesed as 2 aly, and post proces dt, 2. Pipe and itr ~The pipe and fier syle is variation of the previous style to expres the activi of software sytem 8 Dataflow architectures are optimal when the system being designed embodies a mle process, which can be clearly identified in a collection of infvidal components thit need to be orcheured simultaneously ‘Within tis cse, components have well-defined iterices showing input and cupat pots, and connectors ar represate by datasueams between these pot. 1.7.2.4Virtual Machine Architectures Visual machine clases of architecture syle ae characterized by the presence of anabsrct execution envionment (ously refered to 86a vitwal machine) tat emus features hat are not avaible in hardware or softwarenine a internal presentation of the sat of Very poplar examples of this category ae rule-based systems, interpreters, and command language process 1. Rule-based system “Tis architecture is characterized as representing an abstract execution environment inthe form ofan “Te et oe predict of rules entities the knowledgebase that can make assumptions about the system. = This approach is quite range, a allows the sytem or domain to be expressed in tems ofits memory that consists of the pseudo-code 1 ofthe cument state of the engine, ad also a representation ofthe umes = Witin dis case, he visual machine closes the loses the gap between the end user abstractions and th softmcchararenvionnetia wich uch barat a exec ‘> harctetzed by an indiection layer between applications at =f dsouping spins tom he undying hardware sat = some dsadtaniges sch a performance botlencked, tat the etme tie as asa "| 117.25Call and Return Architectures ~ Tis eprint are panied ino components wily comet ogebby mend = But, i is posible to find out thre major subeateories, which different bythe anne the system is ‘sritued and how methods ar invoked: top-down syle, objoc-catad se, and layered se, = Thecomponent fis style are process and subprogram, andthe connection method ical or invoke. The calling program passes information in the form of parameters and receives dat rom the earn ‘vale or parameter, = Method cll cin extend beyond the limits of ile process by taking advantage of technologies for remote proces il, suchas remote procedure calls (RPC) and als descents = eis wide range of rhitectaral style systems designed and implemented by leveraging the eseace of Objet Orisotd Programming (OOP) ‘Systems ar defo in terms of classes and apd ines of objets. ‘Cases specity the types of components by defining daa that repesect thr tate andthe operations fo be performed on these dat. ‘One ofthe important benefits ofthe top-down syle that here sa coupling between the ata andthe ‘pertons used to maniplate hem. = Object instances become lable fo hiding tei internal state representation and protecting its inerty while proving operations to cer components. “This els ia a beter decomposition process and more manapement-
1.837 Advantages of SOA ae a ~ Service reusability: In SOA, applications are made from existing or previously created services. Thus, | services canbe reused to make anyother applications. se _ a et application, it can be updated and modified S ] teat application cits platform. o it permite, A ‘by combining several services picked from different sources, independent of _—_Fie 146 ess Workiog of ep Servi _ —S ai Tie eR Filan — Pi inp ASN Soea J tout Comput css cong MUS Se Comps 5) +6 For example Java application can interact wit Java, Netand PHP applications and also extract nformaton cor dt from that language . ig. 187 7A Web Services Interaction Reference Scenario, ~ System arcs creates a web service with te teciaoogy oftheir choice and depoy i ina compatible | request or needed by other aplietion. No need to provide rie or tighly binding } 1.9 Cloud Computing Architecture nsdered asa best solution for SOA with respect 1 RMI, .NET remoting and DCOM / COMI, hich sone ofthe reasons, because of which we acts forthe web service mtd ~ Parodi vena wea aching map for discovery services (UDDI) and sidaloware. ‘main componens tha establish web services are SOAP and WSDL, To Ce rate which ex Pian Pe olen ota {aN Vala bong lamang Teig 195: Cla Computing Architecture } 1.10 The Cloud Reference Model ‘Pig. 1103. User asoitd with erent Serviees of Cd Computing D 1.10.1 infrastructure as a Service (AAS) = tas, asthe term anggess is # wy of providing clod computing infasructe lke viral machioes vain aarage dives operating systems ad networks, whch lo on sme condone. an on-demand serve as ike Su. = tasted of purchasing servers or deve cutourced serie based on thelr need oping sofware, clients can purchase those resources a «filly sed ona sttserice putt cloud” is considered as an infarct hat consi of shared resus, ome rey nt cl ta cnet Been fr i itn 01 Cod er red Conpig here ue T infasrutare on py ere bss ToS hilar ee enamel A wa | | Ne Ren cmon edThe public loud” uses fastrctre consisting of shared resources. = tn aneher word itis te only Iyer ofthe cloud where the cient gets the platform for thet organization tp ° easy Access: Users can eal acces vation ctsource the TF ifrastrutre ona poy-per-se basis | R aie Dynamic: The user en dynam dynamically selct and configure devices lke as CPUs, storage drives, et, Jes investment in hardware and software. us cloud computing infase. <= Accelerated Communities :The PaaS providers provide usr wit online communities where a develops perce ene 1044 ee ein Un an as cee Bes = | 2 sz adanaesct Pass ~ vans | ~ seaaity The nut of wes ngs ome esis. Se a spre tin! ten sly © 0 4042 aoartage cran | = | - remap as snar atts nt ~ Renting : exible and efficent when hing IT Infrastructure i quite exible so ser Can US or pay as their ~ User wil ge fll consa of compute resources as well as they ae ponbity Internet connection most be required ‘an gt new ideas and sare ther experiences and advice require ~ Dilzation : Simple and easy 1036. tsndvantages of PaaS - nigration:Migatn fom one Pes vend apical acter wil ene some rote | Daemgrvay 1 uta conten cn be Rnd 16 nt bd win emi oF te comeny 1.40.13 Disadvantages of las ~ Ia relies on vtuatization services. ion. conga “Teh Pliner ig isa spplntons developed my belocled wit aber ar fem he co wih ce eis on wer pevacy and customization. = Mixcup complet: Some Platform as a Service (PaaS) can increase compli eee sa plform fr proranin D 1.10.3 Somwareas a Service Sas developer an E evelopment poi of view Pe and brings benefits - Sais lized for but fom a software oe apc voter tery mol eyed onthe ret i wich hd se ie rae elves appieaions, aan Feb illo ew harp me a a Tr 7[Bl coud computing WU Se Comp Sem) rman bth "e demand ata” apa you go apn iz -can licenses his product through SaaS-providers. 10 cout Conouing 10.33 Disadvantages of SaaS, = Latency factor: Occurs due to variable distance of data between the cloud and the end use. Therefore the and with his rpiy growing service. SaaS will soon become gy possibility of latency may aise when interacting with applications ‘connection 5 Ic is the major issue, Without din internet connection, Sa aplicaios ae not ng betwen SaaS vendors is very difcalt in case of any change ~ Sta cloud service i not very secure as compared to inhouse deployment ig. 1106 Sotware ata Service (AAS) ~ Rasy tay : Saas costs ate ated ona monthly or annul fe, wich allows new organizations to enter the | aS softwares are hosted remotely, therefore there is litle |= Put © SE STEEN ett veo seguir besa al wars wil se he sme soft ‘ostcareing hardware and software inintenance, of installation, maintenance and uy lation software, SaaS | oat oer setup ons tn encase " a ‘eho Plies hee dots np insog ic coud isa typeof cloud that is hosted on the and allows every wie to use their services This typeof coud is economical because of the ection in capital overheads Wie a iitD4.11:12 Advantages of Public Cloud = Cost Etectve ides a large mmber of resources from many regions se resources whenever you wat he nee. se the storage resource any point of ime Invoices wll te generated acordng to the usage of resources. pay as per usages. 13. Disadvantages of Publle Cloud ‘Thee is proem reld to Secunyand privacy. is es customizable. you can change resources ape your requirement, Private Cloud loud can known a “intertal cloud”. This clouds eompromise unde single organization and und ‘single on Provided by firewalls because only authorized wsers can access resources, it ives bene contl over data and security ons which requires a dynamic, secure, demandbased need for management shoud ishigy seur 3 1.1121 Advantages of Private Cloud ~ _Rovounes are as pe eof organization. 7 Orne sty manaps rive clo which provides greater con 16a —R eapaagg 2 Tee eee ieee 1.11.22. Disadvantages of Private Cloud ‘Scalability ses, ast canbe sable on limited resources tis dificult to deploy sobally, sits built under organization boundary. ‘For implementation of private cloud requires cloud specialists who can deploy, ruins, ex the clowd 1.11.23 Hybrid Cloud Al ofthe organization's sensitive operations vate cloud sich that the organization’ data handing and nonrical operations such as deployment or testing canbe executed on the public or comunity coud. ‘The organization used to implement aecwork servers tht pets interaction between multiple clouds. ‘This provides seperation tothe rgaizaton allows ito crose the boundaries set by public clouds Pig 114 Hyd Cl ‘Advantages of Hybrid Cloud foads ae cost elective asus pubic low aso, 1125 Dlesdvantages of Hybrid Cloud snplex neering problem becuse of te presence of bah private and publi lou ccna to ensue loud serve confom the eer polices of organization eT aa ea Wh a ap Tabet~ Organizations with siniar computing concerns This typeof cloud computing is best appropriate The example of # community cloud i: where 198 cracture, soit is necessary to ensure redundancy in dag | “The hybrid loud model eles on interval TT infrastructure, sary 1.414 Community Cloud loud model enables rultipe organizations within the same community or region to share environment or cloud: sac concer. toe managed either by thied parties or internally and share interest may sha it. for enterprises, business organizations, tendee and esearch organizations fits the users of Community Clos wo be aware, understand and analyze business neods ‘and demands. The community cloud can be present atelier onsite o offs é Orinsaton | ‘Orponeaton2 Pig LS : Community Coad nstinsins/ banks, 1 1 Advantages ot Community Cloud Ris coeteffecive ~ Community coeds more secure than public cloud but ess secure as compe to private clo. 1.11.42. Disadvantages of Community Cloud Privacy concerns when mail organizations shared. Allocation of esponsibility i asa challenging. 1 service shares berween different organizations and companies that belong to the same community | Virtualization University Presonbed Syllabus Characrsics of Vituszed Emonmens. Tocrany of Viuslsion Tecnines. Vetlzalon and Cla Computing Pres and Cor of Vitzton Viator ug KV, Cen itil machin ov - management ‘nator etuseaton ewvronmert. Opn chalengs of Cad Comping (00.211 What levitation nsw rs bene? as V0.21.2_ Whatevitusanion? Gree mujer casos! Stun of vunzaon [ERENT 23 What oh bere of vtaiaston ne con oft computing” CREATES. 2:3 284 Witla Bae ane ant isan Aponte vo.aia Chaco of Vested Eom nn as Wat eth csatrt rad onoament 7 28 122 Taxonomy Vitam Tec anne oo 2s lei calor ortreny of azatlon real... 26 oa.221 ¥0.222 acannon ortoenomy of vitaztin acter ve EE2 0.223 explo vere nes ot, TREES — : 221 meu Vinten, - 2214 Wasting lr Molo es 2212 ‘Harare Vien nnn as 22:13. Pregrening Language os Vian. — . 2214 © Appleton! Vuaeson -. = ‘oper Toe ot Viz. ne =—_—_——— » ~ Yeuatzatn | FS nscomenmpasconpteng 2, | 2221 Stage Vitusaton. ———— 2222 Network Ytuea8On Introduction to Virtualization 2223 Deskop VisazaON nn 2224 Appleton Saver Vinsalaton [dQ 23.3 What virualation and what or tbat? [UR 242 What is virtualisation? Give the major cases of dition of virtualization CEE 23 votre Cian Corn. i | 09 23.5 What are te butt of vitualatin he conte dcop 231 WhyCroue Vinton? i : 232 iuslon Var Ce Comat ; y i 3 ceang vital (ran tu) vio of somebig cong ee eee eee vial compute aware psf, singe devo nd comput te ues ‘onoang? CETTE ~ Violation isa age umbels of techsogis and ones Ql age meat 10 provide an abt 24 Prosand Geel Vo se ara on oesig sys an gplaions event = roi a vr cova frst oly exci apn at ofr storage, memory, and networking. So its inception, vmuaization tas teen spratcally explored anid adopt, but in the last few years ther 0.242 Exlinteprosand cons of viusaaton. (2 ‘nas beea a consisteat and growing trend to leverage this technology. 242 Caneel Vinataton “= This technology bavegsied renewed intrested recently due othe confluence of rome phesomens: 160.243 What ae he advantages and cesartigos ef WMUMESHOR nnn (@) Increased performance and computing cpscity. Almost all these PCS have resources enough thos a vial machine mansger and exeut inual machine with by fc acceptable pecfermance, Nowadsys, UO.244 Elan te pros and cone of vsizton, ETE... the average end-user desktop PC is powerful enough to meet mest the requirements of everday 25. Vinslzaton wing KM v0.251 wrateKM? & ‘computing, wit xtra capacity that is arly used (©) Undertilizd hardware and software resources, Hardware and software ungerulization ae occuring ue to firs inreased performance and computing capacity, and second the effet of lined cr sporadic se of resources, (©) Lackoof space. The continuous need for ston capacity, whether storage or compute power, makes 26 Crestng Vina Machina 261 To Crestea Vital Machine Usog Vihare Wokaaion, 27 o¥in-Manegoment Toa ar Vtuatzaon Envios es, Recently, companies ate increasingly looking for ways to reduce the amount of sume ano reduce their carbon fotprint (e) Rise of adinseave costs, Power cosumption and cooling cous have now become igh ha the thont of TT equipment. Vituaiaion cin help redoce tbe number of requted servers for a given ‘workioad, hs redoing the cost ofthe sdminitative personel 6.27.1 wea shoraote on it. a 28 Open Chatanges of Cloud Computing . 00.281 Lstscme fe chatonges in oud computing. 0.282 —Ustsome ote chatngss in cous computing. © cueTEAENOS....... 5 Benefit of Virtualization tncrese ait, exit and scalability whereas etn inet cos sigs. | Greer workload mobili, ind performance and avai of eouces, automated operons. Reduced capital and operating Pies Minimize o eiminted downtime. pereased FT producti. ficieny, aglity and responsiveness, ASC Ta aie hina iw es ige Feb Paina Rw am | 7 — cpp aVieuateatn ‘Availabilty of real Sofware-Defined DataCenter Virtualization Basics: runt machine is 4 software computer thi, lie a physical computer, runs an operating system and applications. = The hypervisor serves as platform for running virtual machines and allows for the consolidation of ‘computing resources. = Each virual machine contains its own virual, oF software-based, hardware, including a virtual CPU, memory, hard disk, and network interface card Increase the availability an security of your virtual infrastructure D 2.1.2 Virtualization Approaches alization, operating sem vendors began with hardware-based parting capabilites before moving on to partioning ase system, With appropriate management software, such as vCenter Server, you can also use a numberof features that | = virtualization was pioneered on IBM mainframes in the 1970s, and then more recently | js pervisor hypervisor architectare isthe frst architecture is the frst layer of softwae installed sor is more efficent than hosted architectures, = Tnereased security isa regirement when dealing With unused code 2. Managed execution VRTUALBATON Tig BAA Fuoco enabled by managed eeuton of separate computing envionments within the similar st in viralzed data centers, where this as etre is wed eee) es all tchrigues which aim to emulate an execution cavonmn ht i ne hosting the vin — — came] ] [ome] | 3. Pontabity eh fremina-Poomomr] ] FES ~The concep of ponaity apes in vros ways scoring wo he specifi ype af vation z nae considered. | _ = In te case ofa hardware vitualntion soliton, the guests packaged into a vista image which, in go scenes] | [ Cera pf deen vil machines ert ns appes with these simply with which we candy picture image | = | ope | } 22 Taxonomy of Virtualization Technique Cae aennaie 4Q.22% Diu aseaton or ttonomy of virtualation a dione luk uq 22.2 Discus clesfiaton or taxonomy of virtual 0 223. Beplan verious Features of KVM. © 22:11 Machine Reterence Model os nerice Perwen ssa i fa a a oie acy elon of eyes and inte cl — om hs pepe, vi | are diced ond — EENGREGSO Wien OAT ceeWith tbe advancement of modern hypervisors highly ‘ofthe interfaces and a proper interaction withthe und hardware & ensure maximum uptime, and his 22.1.2 Hardwaretevel Virtualization ton set and provide ‘some high-level instructions that map some ofthe features of be languages compiled for hem ‘Application-level Vitualization i applications to be up in runime environs ht donot atively support al he scenario, aplicaons are no installed inthe expected runtime environment et re ana tough they = In genera, these echnigues are mostly concerned with parle sens, irre, and operating sytem "5 Benefits to application viualztion include, = Respiring fewer resources compared to sing sept vi |= _Allobing incompatible applications to run a local mae ig 2.22 Hardware vitwalzation == The advantages are z Lower Cost, eich may on ewe css = Lower Cost Because of server consoldation, the cost dcr — Basie ching fens ge, xs togeier in beapiptorate) sowing apts oh copie pre mei a wtb er econ, wit 0 md for loca isallition = Efficient resource utilization : Physical resources can be shared among virtual machines, The unuse! | resources allocate by One vinual machine canbe used by another vinaal machine ae case of 27 | require.“commerce, stock trading, and insurance sales and marketing. D 22.2 Other Types of Virtualization “xher types of vnwalizaton provide an abstract environment interact with, These manly Cover storage, ‘Storage Virtualization stem administration practice that allows decoupling the physical organization of the hardware frm presentation. Using this technique, users do not have to be worried about the specific location of their data, which canbe tge bandwidth connection to provide storage facilites storage to iffrent hardware. This allocation is done through network connection. The leader on storages SAN. A schemstic example is given below: RAD. ?O.RAD, and RAD, ets ig.2.2.3: Storage Virtualization example Te Pl Fe kl aps aig A SCN Sa Vt — ‘Taree ay valization is used ina wide variety of applications including banking, business scenarg centers where you havea big storage and it helps you to create, delete, allocated | ig 224: SNIA Storage Vietalznton Taxonomy sization Challenges king and feare-sch itliget sore er, viral dress and provided specific a valet the existing ston, vor should be capsble of adessing isves sch a sly, pct pe a aim Pie en= Greater care shouldbe exercised to ensure that storage devi requirements, > Functionality = Funetionaity is another challenge in storage viralization. Curent = This includes local replication, extended-distance remote pplication consistency across multiple volumes and arays. It processes, skills, ining, and human resources. 1 protect the existing investmeats in > Manageabity ~The management ofthe sore infrastructure ina viulized envionment san important considera | for storage administrators. | = Akey advantage of today's storage resource management tools in an environment without viralizatioo | is that they provide an end-o-nd view, which integrates all he resources inthe storage environmet. | ‘These ae provide efficient and effective monitoring, reporting, planning, and provisioning services © the storage environment > sopport : | = Virutntion s nota sandalone technology bit something that as to work within an exit vionmes. Ti envionment might conn mull vendor technologie, cha swich and so ray, ang to complet. = Addesing sch competes oie nnd agement tools and introduces iteropesilil es Wy 10 consolidate products from a sh | es ina virtualized heterogeneous environ ‘owodoce challenges in coordination and compatibility of products and solutions from differ! smanuscturers and vendors cota | ~ K combines hardware appiaces and specie softeare for the eration ment of a vi ory and management of | Fosical networks into a single logical twa | ‘ke functionality to an operating system partition: ~ ‘Res feu wort imation generally a init LAN VLAN) Newer virualizaton can aggregate diferent (enteral network virwalization or provide network FRPP nn enn aS St mm = AVLANisan aggregation of hss dat similar broadcasting domain, ‘communicate with each othe as though they were located unde be Intra nevorkvitilzaton i generally appl tgeter with hare aod operating yz virualzaton, in which be gues ~~ _ Iisa par of virulization infesucture, which usd especialy if you ae ging to visualize your server. __ Ithelps you in cresting multiple switching Vans, NATng tc. The following example shows the VMware a ig. 225: VOeare scheme s= ypes otto itutton ol eta ce coc oree anata tee ae a eon wes Alen 4 ta Se i ang cue ty fa eno ~ 2 Titeral software allows VMS to exchange information on « bout widow osing a8 > 22.22 Desttop vs ite desktop eevionmentavllabe 08 2 penceal compe ior 1 vive sarc : proven witeangeceaeme Fe Oe) » B cosermmg ms esccorsene a vironments (efficent sealing). ‘Desktop viewalization provides tbe same More productive IT em Hs Improved se recovery times. Faster in application delivery. Mog efficient networks. Rotucod overall costs Disadvantages 1. Increased upfront costs (investing in virwalizaton software). 2 Need to license software. 3. There may be a eaming curve iT manages are not experienced 4. Not every application and server will wrk ina virualized environment. ‘Availablity can bean issue ifn organization can't connect to their virwalized data addresses the problem of making the same deskiop environment accessible from
242 Cons ot Virtualization LS Ae I the advantage and disadvantages of vitualaaton? ~ Hardware and sofware are ea ‘manufactured, or purchase fr implement ‘st has limitations milion pene aot connect ii Gtr an eed ero fie they wil ste compte ts cooled by hi-prty provi, the ably os conectad in rein you san gow wesc ey QU hee faa YH Ae te abl o Bocome asarge 08 US HAS re be ager than you want to Be when fist starting out So, many ents owen creates ng within a vial nwo 7 nesses andere would be ating = One laze snyhody could do abot “Pcs Pi at ran4 & em requires: Vite, 1s Comping (M8 Se Comp Sem 8) 220 F cohestvel ‘several inks in a chain that must work together cohesively do, With virtualization, jou ae in fall conto of what you could eo cant be oe ork together to perform the same tsk. Let's using the of saving a docume ge device, a flash drive or HDD, you can save the file immediately and ey jou ISP connection would require tobe valid. Your LAN or Wi-Fi would requig be, If any of those aren't working to he working, Your online storage option would require to be ‘en you're not saving | © takes tne Even though you sve time during the implementation phases of virtualization, it costs users time ove, the long-run when compare to local systems. = Thats because there are extra steps which may be followed to generate the desired result, ) 25 Virtualization using KVM Virtualization solution for Linux on x86 hardware Tot AMD), kvm, that provides the core virtualization infrastructure ands $0 orkvm-amd ko, KVM alo requires a modified QEMU although works underway to get the required changes upsteam. ~ Using KYM, one can un mil vital machines running unmodified Linux of Windows images | ~ Each vinual machine has private vinnie hardware: «network card is, graphics adapter, et. ~ Wid) KVM, mutt vial machines can rn under te unmnifed Linux or Windows images. Every single vil machine has i's viraized hardware, conning fetwork interface card (NIC), So device graphial user itertase (GUD, ~ Wis compare with VMware and Hyper-V and KVMs open source software ~ Tee mel component f KVM is included in muinlie Linas, as of 2.620. ~ KVMis opensource software. "© Benefits (@)_ KYM supports any kind of guest Os, Etficint code. source and exible, User doesn't hve to pay for cence, Tak Palen Tor edn inp tang -——— PER corr rm The Pia i s, Y~ NX 1B cous cong (80.8.8. Com Sam 6) } 26 Creating Virtual Machine 'D 261 To Create Virtual Machine Using vieware Workstation Launch VMware Workstation, (Click onthe New Viral Machine (©) Select the typeof virtual machine you want to create and click Next. [> _Note: Your choice depends tual machi aha, etd arialy oe hardr esn you war your 4 you an pon Worstation 143, Wer Workstation 8, Worksaion 65°73. Wi ~ Topical: Tis cremesa vital machine whic has the same hardware version athe version of Workstation 4yo0 ae Using, Ifyou ae using Workstation, it make aviual machine with hawace version Ifyou ‘are using Workstation 6.5.x or7. a viru machine with hardware version Tis create, (@) Click on Nex 4 ictal machine and chose is hawae sommpaibiliy, You '%, Workstation 11x, Workstation 10x, Workstation 9, m6, Workstation 5, and Workstation 4 (©) Select your gues operating system (OS), and hen click Nex. You cn i ~ Aninsale dee (COIDVD) teh a mate i ik whe eb i a twin hin 208 cee a 0 Yer oberon tin ov Shere ene envy a i mh - change the number of processors, umber of cores per processor, and the vocal tis ron ve SLIDE Japter: congue ito bridge NAT, or HosLonly mode, or eusiomize where you can = Network adap chose between 00 9 adler = USB Conroe: Sound cid — Display: enbl 3 sis. “Te inp oon(Click on Finish (&) When the visual machine is powered on. restart your virtual machine once the Too Viralization, The moi supported an = So, we can use oVin Ne only te necessary pa } 2.7 oVirt- Management Tool for Virtu Gq. 27.3. Write a short note on oVire ‘open-source virtualization managemer ject on which Red Hat Enterprise Virt = allows centralized management f vital machines, com ‘eayto-ue web-based front-end wih platform independent cee “Theoveral citer of eVin; So we ned 10 krow the components of parm and their Purpose, | = ovine rage and networking resources, oma, images. Network devices, Ws especially important when troubleshooting. = virtconsiss of several components from which ech responsible fra pt ofthe work tions to anomaly restart viual machines om other noes if there is bardware or re ofthe source host. ge the moverent of VMS between ysl servers with forte implementation of los balancing of viral = System S sage potices “The oVin platform c > (a) oVint Engine perio, manager, GUI, API is set of software and services that implement the functionality of the <= ty reusable components for vimslzaon contol nrastctre, = ‘This contol units platform’ nits platforms core and provides an interac for oh ss Use Vit Brine nate o ~ 0 wih te belp of Vin Enpie. ve atte wep wen management ¥6 one of the ming > (b) oViet Nodes = Reomputesvitaliza on units that diet un the viral acines, t a ; 2 ii wit exception gst sport beyond Lins,) Be cmsscrnpng MBS 28 Open Challenges of Cloud Computing a PGSTES Ue lame of he ehlenges in ud compating Ga ned Utiame ofthe calenge includ comping. rom | ud ang an count whl, hae le ctalengsin vos aspects of ta an informa banding. ‘Coad computing is wed for enabling global servers, and computer networks. is done on ‘tab nd ‘ets + Challenges in Cloud competing (a) Security and Privacy Security and privacy of data ar the important —— i dg (Bl coud computing 2.5 cenp song brs leave, Access righ relted Feit to passwords alloted o tose who reqie tem. PF AM ave anyone able to incor services from the oer but to develop sach web services is complex. an be moved © new cloud platform and it must = ‘The xpenteoftansfering te data opubiclouds can rove to be a role fr sort Hived and small scale projects. Rellabilty and Availabilty Many ofthe businesses ae dependent on services provided by hi-party so itis mandatory For becows compas sccoesen 85 Tenantmode Operas OpenStack 60.351 Eon Tet ht ea pan, anes 28 Tome 0 Oe — —— 00.9641 Expin Quctas in Opens an ee aie 0.362 epi otto, ES anaes 361 pemearecttn — a ¥2.263 Spinach eon EERO a 282 Nowe Antne = eat aca sana) 00.364 Dpbinachire con SISSIES epee, Corp core png a uling Opera prado ervennents, Sena ‘evironment, Appcation crcestaion using Openstack Heat Expin Private coud building blocks. “ | Explcn Cortroer deployment in Openiack..... ~ ee «i wma wone _ 7 pines pment ol pS SESE, = 214 Unies au Comping ad Open # aa = 212 opnsuc campers a - GO, 3.1.1 What are the hey components of OpenSHACk ?sannnrnrnnnimmnmsiniue ll ao 95 vasa “ ee a ee en i core a ass 00.413 pnt taal Opeect Cau Soe = 32 Opensiack Testive. a €0.2.10.1 Esplan Block Storage deplymentin OpenStak. ho 324 ‘What is DevStack 7 a os — 3.11 Compute Deployment -w-ns-vr— . 0.821 What Dersick Ein the sps tins DeSack UREN ene? aol crosman in Production Emionment, Bulg 2 Production se 323 Tho Steps to Install DevStack... 7 a ae pore a = Conn nt rg a aes oes earn oe ESTED oe sus et ores ina ‘lan he Opansiack Conard Lin tetas (CL.... sing tm Opensiack A ae roel rarer3:1. Introduction to Openstack What is Openstack ? at of sofware sor king an taping ond comps HNO 6 Pb ay en tolmeta , e Opec ie fit of Cou rapa tt ovenes fr bh Severe public and. pe Aranages them, rough ool pnts built into te framework. = With an OpenStack cloud you can
Compatiiity ~ Sse AP we ip mm public cloud platforms soch as Amazon Web For peoy of business, this proves te option of pring ascent applcaons frm AWS 10 COpenstack-based aS providers with inna efor. > Sealaitiey “sclaityisbest ied as tbe propery of sem 0 continue fo work a ines sn ard jor end mange their eloud sa en ore mansgonent of rescse wge an een EN } 2.2. openstack Test-drive estat, # pid Open deploy oo ad swe thes — Intesedeve Openstack tu <= ai ti “Fe Re Plc Winer a eager‘espe te daunting sa and = In te Fig. 322 may lok the an ove i D321 Whats Devstack ? Ua.523 What i Derstack ? Explain the saps to install DevStac.Som emerenesscreane ‘This will tke around 18 - 29m os tees and packages willbe ines COpenStack tenant m0 In OpenStack ina viralization environment. youl uke wba you've ered and este a viual machine virtual ow OpenStack logically Separates, controls, ayy | re and project canbe used interchangeably, Ga ‘The Steps to Install DevStack a pts used o quickly bring up a complete OpenStack environment bd rom git master. meat environment and as the basis for lot of the OpenStack project’ Sebel ina dip msc tne making maay changes to your system, it should have sudo privileges $8 che bap igre orisha Sed dena, ‘The devStack repo contains a seri that installs OpenStck ad templates for configuration files. > () Create alocaLeont OT ‘Creae «local conf fle with four passwords preset atthe root ofthe dexStackgit repo. = Go head and secs te Pasion eens “You shouldbe presente wit te loin Set name and password: “aan ~ Ssi are Ted Pease —— Hw eipenne ort sce the fogin sree i's Tk } 3.3. Basic OpenStack Operations . he base Openstack operations task List and explain recreated by DevStak, bu tenants, users, networks, and other objects won't te {in manual deployment, Here we'll walkthrough the process of ereaing } 34 Openstack CLI and APIS 2 34.1 Using the Openstack CLL 0.543 Explain he Openstack Command Line interface (CLI. Environment variable {where to recognize you. CL how and where recognize you = You san provide np ee Setly tothe CLI, but forthe sake of clarity, all examples wil ‘own wat he aproprit environment variables in place. To set these variables, run the coramands bo in the ext Listing im your shell. Each fon, you'll have to set your envi Fach time you log into session, you" x your environ soe ou be you'l hi y - To these variables, rua the comman; a the nls shown inthe next isting in your shell. Each time you log i! 1 se yout conronnen varabee, Tein or kl nag —— ji re” = — ‘As sou cam run CLI commands, you must fst set the appropriate environment variables in your SH) Species
ie shown Me onan a Bard | Soniyarmed” | Spiirnamet eva roanpersia sts something lke the following: = You can do everthing with the OpenStack CLI that you can using the Dashboard, and more. In he preceding example, you performed the Nova boot command, which provisioned a new VM ith more-advanced Nova commands, use the following command: nova help COMMAND COMMAND withthe command you're interested in). There are similar command-Tine wis the OpenStack APIS © APIs interface with a number of sources, including other APIs and relation atabases, This also olds uve forthe Dashboard, ~ All Opensiack interactions eventually lead back to the OpenStack API layer. * that ll rods lead tothe OpenStack APIs. I you have further interest in = See the sidebar, “Debug CLUEpoge APL" xt A commend he de as St To ene egg eo cE comer, sos eager hte oe } 3.5 Tenant model Operations 2 (niet nr i 1 what o ‘Atenant ita group of were who ae ving common access wit speci a Sp of Oe OS ————___—_————— = Tenant model operations = Let's ake an example; A person cat be as tenants ot! 05 see a seat anda TV, Hotel Opensuck pois compton = Asan aematv to beds anda TV Hol OPES en ofa ote ules they ave a room, sou can think Tea Rbbaia tie hacia — SNS ' “eR Fina — Blo ch ir ot | ee cree sftSoftware images), and yy ms A single ser mighty is added to OpenStac, hy Ostet = Fit, though, you need to understand the ‘configured for virtual and physic = The term at refers tothe absence. ome neneiny coal ou tert 32 peau ei ~ rk, te OpenStack tenant network includes 1 asain ~ Hee your aces to Openstac resources is based on tenant configurations; you must understand setaepent e mns t lo create new tenants, wes oes, an quota, seme Lott | router hat esis wi : OO ASAIN SAH eto a Pana i aoe i a yews; | cious Compusng (MU Se.Comp-Sam 8) internal -network, shown | SS eee asiale | Oe ge On amt EEA ETON fn ec to xtemal network fr communication ouside the tenant. 2 36 Quota Ga 303 cata guts h Opestck a. 3442Enplin the concept of Quota n Opnstck. _ or = Whats Quota 7 stem capacities from being exhausted without notification, you can Set up quot. Quota, | 1 of gigabytes allowed per tenant can be controlled to ensure disk space, Quotas are currently enforeed atthe tenant (or pro | (Quotas are applied on the tenant and tenant-usr level to limit the amount of resources any one tens rs have the same quota as the tenant quota, but you have the option of reducing «ase where you have an application administrator and database administrator sharing te | | rescue 0 ech er On the ter ad ounce an gp te eat gut wl inease to mach ee | | cores | ram | floating_sps ‘To.modity quota settings, you'l need to know the tant ID you want to work with and a user ID ths’ | ant. Te folowing example shows bow you can list all tenants onthe system 4 | (CL, you can manage quotas forthe OpenStack Compute #208 |ane all loncome essonpsmg & ‘Updating the Compute quota for tenant “el Compute that you want Update quoca values an ~ A. assigns new quota valve ~ Species tenant whose ton speie quota item ‘gots you want to update = Aristof quota keys canbe obtained by displaying the quota values, as shown previously in listing 321, jy nove quota-update \ = Species 1 or General tenant You've now suocesfully updated your tenant quota, and your users can now start assigning additiond resources, I you rerun the command shovin i isting 3.21, you'l see thatthe quota has been updated, "© Tenantusor quotas = tn some eases, there might be ony a single user in a tenant. In these cases, you'd only need qx management on te tenant level. But what if there are multiple users in one tenant? OpenStack provi the ability to manage quotas fr individual users on a tenant level. This means that an individual ‘an have separate quotas fr each tenant of which they area member. ‘on a specific tenant is only responsible for Single instance tance, this user has on several occasions added addition! Seis serine fr query == ‘Species tenant 10 for query Sees
9st” 5 SEER ericince J ~The following example shows the user ID related “ User ID related to johndoe, which “Creating a use," and the tenant ID related tothe General tenant “cresting wnt" Yor a IDs wl ier om exam Tee Pili io fat plc og —— fakeropensiag, pndoe to runing a single instance. You might further wang raz foe thir nivioaTtastanc, such as limiting the numberof seting limits on esources such as number of instances or amount of CPt that a specific project or user can use, . ‘afore by making a claim, or reservation 5 the requests rejected. thea the operation progresses until such a point thatthe reservation is either 1 operation was sucessful) or oled back (the operation filed). ation is made in the nova-ap service and the usage or rollback is peiforned spe service, atleast when dealing with a server creation 0 move operation. = Quota mits and wsage can be retrieved via the limits REST APL a, on resources when a request is made, such wy "© Checking quota fen resource and tenn, the following checks are made in order on the resource in either the quotas or the limit, You can create these resources by spec quite p> = Check to see if there is a hard limit fr the given resource inthe quota classes table in the database ft ‘the default quota class. Iso, se tha asthe limit. You can modify the default quota init fora sous by doing oyenmack quota set cane asco 5 deta ~ Ifthe above does not provide a resource limit, chen rely on the quota_* configuration options for — as where the real magic bah i argc ie ek SC SHAE ae Monge Quti a) Pig. 261 Arete of Neto | = Lets discuss the roe ofthe diferent components in te deta "= The Neutron server ‘The funtion ofthis component is be he fx of teenie Newton envicoment othe outside word I essentially is made up of tee modules: = RPC service : The RPC service comuricats withthe messaging bus andi funtion ist enable a bidirectional agent communication. Proce i ee actin yn mes amps ari, eee connects with devices downstream. They can semen drives can psorm the Asam example, Modula Layer? centers. We wil se ML? cur same function aross ML2 sewer Instataion to work with O78 som imply ti si i meet ‘segments and also provides | ou acous covey 8 S- Come Se © Laagent “tee L)apns rm on te ntwork noe and are response for sai outing, F forwarding ander Ly features, such as DHCP. = Understanding the basic Neutron process at what happens when @ new VM is booed with Neutron. This shows ll he steps hy ring the Layer 2 stage 1, Boot VM start 2, Create a port and notify the DHCP ofthe new por. library ~ bv). the VM to the new por) = The novaapi daemon isthe heat of N ‘Nova. You may see strated and “Cloud Contlet” Se itllsrted on many picts of Nova as API D 362 Nova Architecture Ua. 3.64 Explain architecture of Nove In practice, however, this wil grow to be he most complex pies, 8 state ofthe ete eld ifrastacce and pl complied goths = To that end, novascheduler implements a paggbleaeiocare hates you ‘own algorithm fo scheduling "= Compute Worker “The novacompute ress is prim 2 wots aonb ha res and feria ial chine = vate mveomeeacig 4 mens fom He gee cae 4 nutty tsa new KYM sae se, vv nus ceo, aah, ad eng of i aly ty Amazons Else Block Sore). = Teean use volumes fo “TaN ine neroJ W ociconmavesscunsen® compute and nova-volume, Tt accep, fommands t0 manipulate the network (such addresses for an instance: Fixed IPs and Floating IPs, These cay ot as od) and (eating). : {ps are signed on iastance startup and remain the same during ther entie lifetimes. lating fa dynamacallyallatod and assviated 1 @ domain to allow outside connectivity. = Queue “The gucue provides a central hub for passing messages between daemons. Tis is currently implemented wah Ranh today, but done te any AMPQ message queue supported by the Python angi and caro ites. sates several types of messige QUEUES fo Se pice queues, fanout quedeS, Iproakast othe numberof parcular class of worker daemoas iiate communication berween the various daemaes, host queues. Topics queues allow messages to be guration and run-time state fora cloud infrastructure, This includes te fnscances in use, nerworks aailable, and projects. ¥ 3.7. Private Cloud Building Blocks QS72 expan Private cloud Pulding Wee = The ewe usa Puig Hosks which mura Ww Nut pve coud are foundation layer of the clo reference madel. The process of building a ch! lnvaated with the cloud service provider setting up the play sical hardware e500? ~ The subsequent lessons describe varios physical components and achitectures hat ar. ~ Motherboard : A mberbard i
You might also like
CS8087 - Software Defined Networks (Ripped From Amazon Kindle Ebooks by Sai Seena)
PDF
No ratings yet
CS8087 - Software Defined Networks (Ripped From Amazon Kindle Ebooks by Sai Seena)
68 pages
(TechNeo) Cyber Security and Digital Forensics U1-2 (2019 Pattern)
PDF
0% (1)
(TechNeo) Cyber Security and Digital Forensics U1-2 (2019 Pattern)
66 pages
Cloud Computing Notes
PDF
No ratings yet
Cloud Computing Notes
87 pages
Cloud Computing: Prof. Soumya Kanti Ghosh
PDF
No ratings yet
Cloud Computing: Prof. Soumya Kanti Ghosh
991 pages
Null 2
PDF
No ratings yet
Null 2
144 pages
Cloud Computing: (Common To CSE and IT) B.Tech IV-Year I-Sem (Professional Elective) (JNTU-Hyderabad)
PDF
100% (1)
Cloud Computing: (Common To CSE and IT) B.Tech IV-Year I-Sem (Professional Elective) (JNTU-Hyderabad)
108 pages
Cloud Storage
PDF
No ratings yet
Cloud Storage
12 pages
Cns Decode
PDF
No ratings yet
Cns Decode
142 pages
Compiler Design 6th Sem CSE Csvtu
PDF
No ratings yet
Compiler Design 6th Sem CSE Csvtu
136 pages
BCT Unit-2
PDF
No ratings yet
BCT Unit-2
37 pages
DBMS Lab Manual
PDF
No ratings yet
DBMS Lab Manual
155 pages
AI
PDF
No ratings yet
AI
101 pages
DBMS Lab Manual
PDF
No ratings yet
DBMS Lab Manual
103 pages
Database Management Systems EduEngg
PDF
No ratings yet
Database Management Systems EduEngg
306 pages
Compiler Design - (Book) .PDF 160
PDF
No ratings yet
Compiler Design - (Book) .PDF 160
165 pages
PHI LEARNING Computer Science IT Engineering Electrical Electronics Mechanical Civil Chemical Metallurgy and Agricultural Catalogue 2015 PDF
PDF
No ratings yet
PHI LEARNING Computer Science IT Engineering Electrical Electronics Mechanical Civil Chemical Metallurgy and Agricultural Catalogue 2015 PDF
316 pages
Artificial Intelligence MCSE-003
PDF
No ratings yet
Artificial Intelligence MCSE-003
223 pages
Unit 3
PDF
No ratings yet
Unit 3
77 pages
CF LAB Manual FINAL
PDF
No ratings yet
CF LAB Manual FINAL
66 pages
Unit 1
PDF
No ratings yet
Unit 1
77 pages
Ccs Module 123 Mu Cloud Computing Sem 7
PDF
No ratings yet
Ccs Module 123 Mu Cloud Computing Sem 7
100 pages
Project Management
PDF
No ratings yet
Project Management
207 pages
BCS - Compiler Construction - Notes
PDF
No ratings yet
BCS - Compiler Construction - Notes
60 pages
DF - Techknowledge - 3 Module
PDF
No ratings yet
DF - Techknowledge - 3 Module
37 pages
Blockchain Mannual
PDF
No ratings yet
Blockchain Mannual
32 pages
DF Notes Sem8 Comps BW
PDF
No ratings yet
DF Notes Sem8 Comps BW
83 pages
LPUNIT1 ppt1
PDF
No ratings yet
LPUNIT1 ppt1
41 pages
DF Module 2
PDF
No ratings yet
DF Module 2
44 pages
6 Module 3 09 06 2023
PDF
No ratings yet
6 Module 3 09 06 2023
55 pages
DCN Lab Manual
PDF
100% (1)
DCN Lab Manual
34 pages
Module 1-Introduction To Virtual Reality
PDF
No ratings yet
Module 1-Introduction To Virtual Reality
22 pages
BCT Techknowledge Want All Subjects Notes Pls
PDF
No ratings yet
BCT Techknowledge Want All Subjects Notes Pls
193 pages
Module 4
PDF
No ratings yet
Module 4
63 pages
Mcsl-045 Unix Lab Manual Solved
PDF
No ratings yet
Mcsl-045 Unix Lab Manual Solved
15 pages
Operating Systems Final Lab Manual
PDF
No ratings yet
Operating Systems Final Lab Manual
72 pages
GRT Institute of Engineering and Technology,: Tiruttani
PDF
No ratings yet
GRT Institute of Engineering and Technology,: Tiruttani
11 pages
Advanced Databases - Unit - V - PPT
PDF
No ratings yet
Advanced Databases - Unit - V - PPT
71 pages
Practical On RDBMS
PDF
No ratings yet
Practical On RDBMS
58 pages
Data Science
PDF
No ratings yet
Data Science
8 pages
Cloud Computing RGPV (Sem 8th)
PDF
100% (4)
Cloud Computing RGPV (Sem 8th)
123 pages
3-Module-2 (Part-1) - 19-05-2023
PDF
No ratings yet
3-Module-2 (Part-1) - 19-05-2023
41 pages
Module-3: Device Configuration
PDF
No ratings yet
Module-3: Device Configuration
22 pages
Sample 19608
PDF
No ratings yet
Sample 19608
16 pages
Mobile Computing Notes
PDF
100% (1)
Mobile Computing Notes
12 pages
Air Pollution Monitoring System: Project On Department of Electronics and Communication Engineering
PDF
No ratings yet
Air Pollution Monitoring System: Project On Department of Electronics and Communication Engineering
21 pages
GNITS - Broucher ICCCE - EEE Dept
PDF
No ratings yet
GNITS - Broucher ICCCE - EEE Dept
2 pages
AI and Ar Presentation
PDF
No ratings yet
AI and Ar Presentation
17 pages
Lab Manual FOR Unix Operating System: Ms. A.K. Ingale
PDF
No ratings yet
Lab Manual FOR Unix Operating System: Ms. A.K. Ingale
31 pages
New - Lab Manual 4 - Malware Hunting - Updated2022 - V2
PDF
No ratings yet
New - Lab Manual 4 - Malware Hunting - Updated2022 - V2
14 pages
Cs3551 Distributed Computing
PDF
No ratings yet
Cs3551 Distributed Computing
2 pages
AWS Architecting and SysOps - Session 12
PDF
No ratings yet
AWS Architecting and SysOps - Session 12
21 pages
System Models For Distributed and Cloud Computing
PDF
No ratings yet
System Models For Distributed and Cloud Computing
22 pages
Gujarat Technological University: Prerequisite
PDF
No ratings yet
Gujarat Technological University: Prerequisite
5 pages
Lab Manual: Department of Computer Engineering
PDF
No ratings yet
Lab Manual: Department of Computer Engineering
66 pages
Cyber Forsenic Practical - Journal-1
PDF
No ratings yet
Cyber Forsenic Practical - Journal-1
77 pages
CH 1
PDF
No ratings yet
CH 1
29 pages
Vigneshwaran's Resume
PDF
No ratings yet
Vigneshwaran's Resume
1 page
Distributed Databases: Course Code:13IT1109 L TPC 4 0 0 3
PDF
No ratings yet
Distributed Databases: Course Code:13IT1109 L TPC 4 0 0 3
3 pages
Btech Cs 7 Sem Cloud Computing rcs075 2022
PDF
No ratings yet
Btech Cs 7 Sem Cloud Computing rcs075 2022
1 page
Information Retrieval Journal
PDF
No ratings yet
Information Retrieval Journal
33 pages
Compiler Design
PDF
100% (1)
Compiler Design
2 pages
Ethical Hacking Journal
PDF
No ratings yet
Ethical Hacking Journal
38 pages
CC APR-19 Munotes Mumbai University
PDF
No ratings yet
CC APR-19 Munotes Mumbai University
2 pages