Practical FileFormat1938
Practical FileFormat1938
PGCA-1938
Cloud Computing Lab
Submitted to
I. K. G. Punjab Technical University, Kapurthala
Submitted by Submitted To
Pakhi Mr. Amanpartap Singh Pall
2229833 Faculty, School of IT
MCA Semester IV
.
1. Various company providing cloud business 8 to 10 1
company.Explain?
2. Explain the Different Service of cloud computing. 2 to 6
A)IAAS
B)PAAS
C)SAAS
3. Introduction to VMware? 7 to 8
here are some of the major companies providing cloud business platforms:
1. Amazon Web Services (AWS): One of the largest cloud service providers offering a
wide range of services including computing power, storage, and databases.
1
2. Different services provided under cloud computing.
a. SAAS b. PAAS c. IAAS
Cloud Computing can be defined as the practice of using a network of remote servers
hosted on the Internet to store, manage, and process data, rather than a local server or
a personal computer. Companies offering such kinds of cloud computing services are
called cloud providers and typically charge for cloud computing services based on
usage. Grids and clusters are the foundations for cloud computing.
Types of Cloud Computing
Most cloud computing services fall into five broad categories:
Software as a Service(SaaS)
2
Advantages of SaaS
1. Cost-Effective: Pay only for what you use.
2. Reduced time: Users can run most SaaS apps directly from their web browser
without needing to download and install any software. This reduces the time spent in
installation and configuration and can reduce the issues that can get in the way of
the software deployment.
3. Accessibility: We can Access app data from anywhere.
4. Automatic updates: Rather than purchasing new software, customers rely on a SaaS
provider to automatically perform the updates.
5. Scalability: It allows the users to access the services and features on-demand.
The various companies providing Software as a service are Cloud9 Analytics,
Salesforce.com, Cloud Switch, Microsoft Office 365, Big Commerce, Eloqua, dropBox,
and Cloud Tran.
Disadvantages of Saas :
1. Limited customization: SaaS solutions are typically not as customizable as on-
premises software, meaning that users may have to work within the constraints of
the SaaS provider’s platform and may not be able to tailor the software to their
specific needs.
2. Dependence on internet connectivity: SaaS solutions are typically cloud-based,
which means that they require a stable internet connection to function properly.
This can be problematic for users in areas with poor connectivity or for those who
need to access the software in offline environments.
3. Security concerns: SaaS providers are responsible for maintaining the security of
the data stored on their servers, but there is still a risk of data breaches or other
security incidents.
Platform as a Service
3
place independent of the hardware.
The consumer does not manage or control the underlying cloud infrastructure including
network, servers, operating systems, or storage, but has control over the deployed
applications and possibly configuration settings for the application-hosting
environment.
Advantages of PaaS:
1. Simple and convenient for users: It provides much of the infrastructure and other IT
services, which users can access anywhere via a web browser.
2. Cost-Effective: It charges for the services provided on a per-use basis thus
eliminating the expenses one may have for on-premises hardware and software.
The various companies providing Platform as a service are Amazon Web services Elastic
Beanstalk, Salesforce, Windows Azure, Google App Engine, cloud Bees and IBM smart
cloud.
Disadvantages of Paas:
1. Limited control over infrastructure: PaaS providers typically manage the
underlying infrastructure and take care of maintenance and updates, but this can
also mean that users have less control over the environment and may not be able to
make certain customizations.
2. Dependence on the provider: Users are dependent on the PaaS provider for the
availability, scalability, and reliability of the platform, which can be a risk if the
provider experiences outages or other issues.
Infrastructure as a Service
Advantages of IaaS:
1. Cost-Effective: Eliminates capital expense and reduces ongoing cost and IaaS
customers pay on a per-user basis, typically by the hour, week, or month.
2. Website hosting: Running websites using IaaS can be less expensive than traditional
web hosting.
4
3. Security: The IaaS Cloud Provider may provide better security than your existing
software.
4. Maintenance: There is no need to manage the underlying data center or the
introduction of new releases of the development or underlying software. This is all
handled by the IaaS Cloud Provider.
The various companies providing Infrastructure as a service are Amazon web services,
Bluestack, IBM, Openstack, Rackspace, and Vmware.
Disadvantages of laaS :
1. Limited control over infrastructure: IaaS providers typically manage the underlying
infrastructure and take care of maintenance and updates, but this can also mean
that users have less control over the environment and may not be able to make
certain customizations.
2. Security concerns: Users are responsible for securing their own data and
applications, which can be a significant undertaking.
Anything as a Service
It is also known as Everything as a Service. Most of the cloud service providers nowadays
offer anything as a service that is a compilation of all of the above services including some
additional services.
Advantages of XaaS:
1. Scalability: XaaS solutions can be easily scaled up or down to meet the changing
needs of an organization.
2. Flexibility: XaaS solutions can be used to provide a wide range of services, such as
storage, databases, networking, and software, which can be customized to meet the
specific needs of an organization.
3. Cost-effectiveness: XaaS solutions can be more cost-effective than traditional on-
premises solutions, as organizations only pay for the services.
Function as a Service :
FaaS is a type of cloud computing service. It provides a platform for its users or
customers to develop, compute, run and deploy the code or entire application as
functions. It allows the user to entirely develop the code and update it at any time
without worrying about the maintenance of the underlying infrastructure. The
5
developed code can be executed with response to the specific event. It is also as same as
PaaS.
FaaS, provides auto-scaling up and scaling down depending upon the demand. PaaS
also provides scalability but here users have to configure the scaling parameter
depending upon the demand.
In FaaS, users only have to pay for the number of execution time happened. In PaaS,
users have to pay for the amount based on pay-as-you-go price regardless of how much
or less they use.
Advantages of FaaS :
Highly Scalable: Auto scaling is done by the provider depending upon the demand.
Cost-Effective: Pay only for the number of events executed.
Code Simplification: FaaS allows the users to upload the entire application all at
once. It allows you to write code for independent functions or similar to those
functions.
Maintenance of code is enough and no need to worry about the servers.
The various companies providing Function as a Service are Amazon Web Services –
Firecracker, Google – Kubernetes, Oracle – Fn, Apache OpenWhisk – IBM, OpenFaaS,
Disadvantages of FaaS :
1. Cold start latency: Since FaaS functions are event-triggered, the first request to a
new function may experience increased latency as the function container is created
and initialized.
2. Limited control over infrastructure: FaaS providers typically manage the
underlying infrastructure and take care of maintenance and updates, but this can
also mean that users have less control over the environment and may not be able to
make certain customizations.
3. Security concerns: Users are responsible for securing their own data and
applications, which can be a significant undertaking.
6
3. Introduction to VMware.
7
build, run, and manage modern applications across multiple clouds and Kubernetes
environments.
4. Customer Base: VMware's solutions are widely adopted across various industries,
including finance, healthcare, government, education, and more. Its customer base
includes enterprises of all sizes, from small businesses to Fortune 500 companies.
5. Acquisitions: Over the years, VMware has expanded its product portfolio through
strategic acquisitions. Notable acquisitions include Nicira (for NSX), AirWatch (for
mobility management), and Pivotal Software (for cloud-native application
development).
6. Partnerships: VMware has established partnerships with leading technology
companies, including Dell Technologies (which owns a majority stake in VMware),
AWS, Google Cloud, and Microsoft Azure, among others, to offer integrated solutions
and services.
7. Innovation: VMware continues to innovate and evolve its product portfolio to address
the changing needs of the digital enterprise. It invests heavily in research and
development to stay at the forefront of cloud infrastructure and digital workspace
technology.
8
4. Installing VMware server on pc.
9
to use the entire disk or create separate partitions for the operating system, data, and
swap space (if using Linux).
7. Configure Server Settings:
Follow the prompts to configure various server settings, including:
- Language and localization settings
- Network configuration (IP address, subnet mask, gateway, DNS)
- Administrator/root password
- Time zone and date/time settings
8. Install Server Software:
Once the base operating system is installed, you may need to install additional server
software depending on your requirements. This could include:
- Web server software (e.g., Apache, Nginx)
- Database servers (e.g., MySQL, PostgreSQL)
- Other specific server applications
9. Configure Firewall and Security:
After installing the necessary server software, configure your firewall to allow access to
the required ports and services. Implement security best practices to protect your server
from unauthorized access, such as:
- Enabling a firewall
- Disabling unnecessary services
- Regularly updating software
- Setting up user accounts with appropriate permissions
10. Test and Verify:
Once the installation and configuration are complete, test the server to ensure
everything is working correctly. You can do this by:
- Accessing the server remotely via SSH or Remote Desktop
- Testing website access if hosting a web server
- Verifying database connectivity if using a database server
11. Regular Maintenance:
Finally, perform regular maintenance tasks to ensure optimal performance and security
of your server. This includes:
- Installing software updates and security patches
- Monitoring server performance and resource usage
- Backing up data regularly
10
- Troubleshooting and resolving any issues that arise
11
deduplication, compression, and RAID protection, all while leveraging the benefits of
server-side storage and hyper-converged infrastructure.
6. VMware NSX: VMware NSX is a network virtualization and security platform that
enables the creation of virtual networks and micro-segmentation in vSphere
environments. It abstracts network services from underlying hardware, allowing for
greater flexibility, agility, and security in network provisioning and management.
7. VMware Horizon: VMware Horizon is a desktop and application virtualization
solution that allows organizations to deliver virtual desktops and applications to end-
users on any device, anywhere. It provides features such as centralized management,
automated provisioning, and remote access, enhancing productivity and flexibility for
both users and IT administrators.
12
6. Explanation of basic environment of VMware.
The basic environment of VMware typically consists of the following components:
1. Physical Hardware:
- Servers: These are physical machines that host the virtualization platform, such as
VMware ESXi hosts.
- Storage: Physical storage devices (such as hard disk drives and solid-state drives) that
provide storage capacity for virtual machines and other data.
- Networking: Physical network infrastructure, including switches, routers, and
network cables, that connects servers and storage devices.
2. VMware ESXi Hypervisor:
- ESXi is VMware's bare-metal hypervisor that runs directly on physical server
hardware without the need for a host operating system. It abstracts and virtualizes
server resources, allowing multiple virtual machines to run on a single physical host.
- ESXi provides a secure and efficient platform for hosting virtual machines, with
features such as memory overcommitment, CPU and memory hot add, and hardware-
assisted virtualization.
3. Virtual Machines (VMs):
- VMs are the primary units of virtualization in VMware environments. Each VM
represents a complete virtualized computer system, including virtual CPU, memory,
storage, and network interfaces.
- VMs run guest operating systems, such as Windows Server, Linux distributions, or
other operating systems supported by VMware.
- VMs can be provisioned, managed, and migrated using VMware vSphere tools and
APIs.
4. VMware vCenter Server:
- vCenter Server is a centralized management platform for VMware environments,
providing a single point of control for managing ESXi hosts and virtual machines.
- It enables administrators to perform tasks such as VM provisioning, migration,
resource allocation, and monitoring from a single interface.
- vCenter Server also provides advanced features such as high availability, distributed
13
resource scheduling, and vMotion for live VM migration.
5. Virtual Networking:
- VMware virtual networking allows administrators to create, configure, and manage
virtual networks within the VMware environment.
- Virtual switches (vSwitches) provide connectivity between virtual machines and
between VMs and physical networks.
- Network services such as VLANs, DHCP, and firewalling can be implemented using
VMware NSX or other networking solutions.
6. Virtual Storage:
- VMware virtual storage abstracts physical storage devices and aggregates them into
shared storage pools that can be accessed by multiple hosts and virtual machines.
- Storage features such as thin provisioning, snapshots, and replication enhance data
management and protection within the VMware environment.
- VMware vSAN is a software-defined storage solution that integrates with vSphere to
provide hyper-converged storage capabilities.
7. Management and Monitoring Tools:
- VMware provides a suite of management and monitoring tools, including vSphere
Client, vRealize Suite, and vCenter Operations Manager, to help administrators manage
and monitor their VMware environments.
- These tools offer capabilities such as performance monitoring, capacity planning,
resource optimization, and automation to streamline operations and improve efficiency.
In summary, the basic environment of VMware consists of physical hardware running
VMware ESXi hypervisor, virtual machines hosted on ESXi hosts, centralized
management with vCenter Server, virtual networking and storage, and management
and monitoring tools for administration and optimization of the VMware environment.
14
7. Install Linux in VMware.
15
Enter the required information then click Next.
16
- Click "Next" to continue.
17
and usability.
- In the VMware Workstation Player menu, go to Player > Manage > Install VMware
Tools.
- Follow the on-screen instructions to install VMware Tools in the Linux virtual
machine.
After successfully installing the driver, your new virtual machine should be fully set up!
We will test our virtual machine by using Ubuntu to communicate with the
‘maegrad’ server.
That's it! You've successfully installed Linux in VMware Workstation Player. You can
now use the virtual machine to run Linux applications, experiment with different
configurations, and explore Linux without affecting your host operating system.
18
8. Setting up a private cloud using open-source tools (Eucalyputs/Open -
Stack etc).
19
- Eucalyptus installation:
- Download and install Eucalyptus packages: Follow the installation instructions
provided by Eucalyptus documentation.
- Configure Eucalyptus components: Set up Eucalyptus services such as Cloud
Controller (CLC), Cluster Controller (CC), Walrus (object storage), and Node
Controller (NC).
6. Networking Configuration:
- Configure Neutron (OpenStack) or networking settings (Eucalyptus) to manage
network resources, including virtual networks, subnets, routers, and security
groups.Integrate with existing network infrastructure: Implement VLANs, VXLANs, or
other network technologies to connect the private cloud to external networks or
services.
7. Storage Configuration:
- Set up block storage: Configure Cinder (OpenStack) or EBS (Eucalyptus) to provide
persistent block storage volumes for VMs. Implement object storage: Set up Swift
(OpenStack) or Walrus (Eucalyptus) to store and retrieve large-scale data objects.
8. Security Implementation:
- Secure access: Configure SSL certificates, SSH keys, and authentication mechanisms
(such as LDAP or Active Directory) to control access to the cloud infrastructure.
Implement security groups and firewall rules to restrict network traffic and protect
against unauthorized access.
9. Monitoring and Management:
- Set up monitoring tools: Deploy monitoring solutions like Nagios, Zabbix, or
Prometheus to track the health, performance, and availability of cloud resources.
Implement management tools: Use tools like Ansible, Puppet, or Chef for automated
configuration management and deployment.
10. Testing and Validation:
- Perform thorough testing: Validate the functionality of the private cloud setup by
deploying VMs, creating networks, attaching storage volumes, and testing network
connectivity.
- Conduct performance testing: Assess the performance and scalability of the cloud
infrastructure under various workload scenarios.
11. Documentation and Training:
- Document the installation and configuration process, including network diagrams,
20
server configurations, and troubleshooting procedures.Provide training for
administrators and users on how to use and manage the private cloud environment
effectively.
12. Ongoing Maintenance and Optimization:
- Regularly update and patch software components to address security vulnerabilities
and performance issues. Monitor resource usage and optimize configurations to ensure
efficient utilization of hardware resources.Plan for capacity growth and expansion by
periodically assessing workload demands and scaling the infrastructure accordingly.
21
9. Creating two other environments in VMware.
22
Tools.
6. Configure Networking:
- Create virtual switches: Set up virtual switches within VMware to manage network
connectivity for the VMs.
- Assign port groups: Associate VM network adapters with appropriate port groups to
connect to the desired network segments.
- Configure VLANs: If necessary, configure VLANs for segregating network traffic
within the VMware environment.
7. Set Up Storage:
- Allocate virtual disks: Create virtual disk files (VMDKs) to serve as storage for the
VMs.
- Attach virtual disks: Add the virtual disks to the VMs and configure disk partitions
and filesystems within the guest operating systems.
8. Security Configuration:
- Implement security best practices within the guest operating systems, such as
enabling firewalls, configuring antivirus software, and applying OS-level security
updates.
- Implement VMware security features such as vSphere encryption, vSphere
Distributed Switch (VDS) security policies, and VM encryption where applicable.
9. Backup and Disaster Recovery:
- Set up backup solutions to protect VM data and configurations. Consider using
VMware's native backup tools or third-party backup solutions.
- Implement disaster recovery strategies such as replication, failover, and recovery
plans to ensure business continuity in case of VM or infrastructure failures.
10. Testing and Validation:
- Validate the functionality of the VMs by performing basic tasks within the guest
operating systems and testing network connectivity.
- Conduct performance testing to ensure that VMs meet performance requirements
for their intended workloads.
11. Documentation and Training:
- Document VM configurations, networking settings, and security configurations for
reference and troubleshooting purposes.
- Provide training to administrators and users on how to access and utilize the VM
environments effectively.
23
12. Monitoring and Management:
- Set up monitoring tools to track VM performance metrics, resource utilization, and
health status.
24
VMs to share physical resources such as CPU, memory, and storage. This results in
lower hardware procurement and maintenance expenses.
- Physical Environment: Physical environments require dedicated hardware for each
server, leading to higher upfront costs for purchasing servers, networking equipment,
and storage devices. Additionally, ongoing maintenance and upgrade costs contribute to
higher total cost of ownership (TCO).
5. Management and Administration:
- VMware Environment: Virtualized environments offer centralized management
through tools like VMware vSphere, which provides features for VM provisioning,
monitoring, and automation. This simplifies administration tasks and improves
operational efficiency.
- Physical Environment: Managing a physical environment involves manually
configuring and maintaining each server, which can be time-consuming and error-
prone. Tasks such as software updates, patching, and backup management are more
complex and decentralized.
6. High Availability and Disaster Recovery:
- VMware Environment: Virtualization platforms like VMware vSphere offer built-in
features for high availability (HA) and disaster recovery (DR), such as vSphere HA and
vSphere Replication. These features enhance uptime and data protection by
automatically restarting VMs on alternate hosts and replicating VMs to remote sites.
- Physical Environment: Achieving high availability and disaster recovery in a
physical environment typically requires implementing redundant hardware, backup
solutions, and manual failover processes. This approach is often less reliable and more
labor-intensive than virtualized solutions.
7. Security:
- VMware Environment: Virtualized environments provide robust security features
such as virtual firewalls, intrusion detection/prevention systems, and VM encryption.
Segmentation and isolation of VMs can be implemented more effectively to minimize
the impact of security breaches.
- Physical Environment: Securing a physical environment involves securing individual
servers and network devices, which can be challenging to manage at scale. Physical
access controls are critical for preventing unauthorized access to servers and data
centers.
Overall, while both VMware environments and physical environments have their
25
advantages and limitations, virtualization offers greater flexibility, efficiency, and cost
savings for modern IT infrastructures. Organizations can leverage virtualization
technologies to optimize resource utilization, streamline management, and enhance
business agility.
26