Cloud Computing 3 Unit QB
Cloud Computing 3 Unit QB
Unit 3
Ans :-
Benefits of Visualization :-
• Increases flexibility
Virtualization when deployed offers several benefits to build a cloud infrastructure. It enables consolidation of
IT resources that helps service providers to optimize their utilization of infrastructure resource. Improving the
utilization of IT assets can help service providers to reduce the costs associated with the purchasing of a new
hardware. It also reduces space and energy costs associated with maintaining the resources. Moreover, less
people are required to administer these resources, which further lower the cost. Virtual resources are created
using software that enables service providers to deploy infrastructure faster as compared to deploying physical
resources. Virtualization increases flexibility by allowing to create and reclaim the logical resources that are
based on business requirements.
Virtual Layer :- This module focuses on the entities of the virtual layer of the cloud
computing reference model. This module focuses on virtualization software, resource
pool, and virtual resources. Virtual layer is deployed on the physical layer. It specifies
the entities that operate at this layer, such as virtualization software, resource pools,
and virtual resources. The key function of this layer is to abstract physical resources,
such as compute, storage, and network, and making them appear as virtual resources.
Other key functions of this layer include executing the requests generated by control
and forwarding requests to the physical layer to get them executed. Examples of
requests generated by control layers include creating pools of resources and creating
virtual resources.
– Resource pooling
– Rapid elasticity
– Virtualization software
– Resource pools
– Virtual resources
While building cloud infrastructure, virtual layer is deployed on physical layer. This layer
enables fulfilling two key characteristics of cloud infrastructure: resource pooling and
rapid elasticity. Virtual layer specifies the entities that operate at this layer, such as
virtualization software, resource pools, and virtual resources. Virtual layer is built by
deploying virtualization software on compute systems, network devices, and storage
devices.
Cloud Computing Reference Model
Q3. Explain in detail the common types of virtual networks. 10 Marks Ans
:-
Virtual Networks :-
A private VLAN (PVLAN) is an extension of the VLAN standard and further segregates
the nodes within a VLAN into sub-VLANs. A PVLAN is made up of a primary VLAN and
one or more secondary (or private) VLANs. The primary VLAN is the original VLAN
that is being segregated into smaller groups. Each secondary PVLAN exists only inside
the primary VLAN. It has a unique VLAN ID and isolates the OSI Layer 2 traffic from
the other PVLANs. Primary VLANs are promiscuous, which means that ports on the
PVLANs can communicate with ports configured as the primary VLAN. Routers are
typically attached to promiscuous ports.
There are two types of secondary PVLANs within a primary VLAN: Isolated and
Community.
3. Stretched VLAN :- A VLAN that spans multiple sites and enables Layer 2
communication between a group of nodes over a Layer 3 WAN infrastructure,
independent of their physical location.
• VXLAN header is added to a Layer 2 frame, which is placed in a UDP-IP packet and
tunnelled over a Layer 3 network
– Enables transparent Layer 2 communication between nodes over physical
networks spanning Layer 3 boundaries
– Encapsulation and decapsulation are performed by Virtual Tunnel Endpoints
(VTEPs)
• 24-bit VXLAN ID provides up to 16 million VXLANs
A VXLAN is a OSI Layer 2 overlay network built on a OSI Layer 3 network. An overlay
network is a virtual network that is built on top of existing network. VXLANs, unlike
stretched VLANs, are based on LAN technology. VXLANs use the MAC Address-
inUser Datagram Protocol (MAC- in-UDP) encapsulation technique. In this scheme, a
VXLAN header is added to the original Layer 2 (MAC) frame, which is then placed in
a UDP-IP packet and tunneled over a Layer 3 network. Communication is established
between two tunnel end points called Virtual Tunnel Endpoints (VTEPs). At the
transmitting node, a VTEP encapsulates the network traffic into a VXLAN header and
at the destination node, a VTEP removes the encapsulation before presenting the
original Layer 2 packet to the node. VXLANs enable the creation of a logical network
of nodes across different networks. In case of VM communication, the VTEP is built
into the hypervisor on the compute system hosting the VMs.
first assigns physical ports to VSANs and then configures independent zones for each
VSAN. A VSAN has its own independent fabric services, but the fabric services are
not available on a per-zone basis.
Q4. What is a Virtual Network? Enlist the common types of virtual networks. 5
Marks .
Ans :-
Virtual Networks :-
Also, multiple physical networks can be consolidated into a single virtual network. A virtual
network utilizes the underlying physical network only for simple packet forwarding. It appears
as a physical network to the nodes connected to it, because existing network services are
reproduced in the logical space. Nodes with a common set of requirements can be functionally
grouped in a virtual network, regardless of the geographic location of the nodes.
• Configuring a VLAN:
– Define VLAN on physical and virtual switches and assign VLAN ID
– Configure VLAN membership based on port, MAC address, protocol, IP subnet
address, or application
A virtual LAN (VLAN) is a virtual network consisting of virtual and/or physical switches,
which divides a LAN into smaller logical segments. A VLAN groups the nodes with a
common set of functional requirements, independent of the physical location of the
nodes. In a multi-tenant cloud environment, the provider typically creates and assigns
a separate VLAN to each consumer. This provides a private network and IP address
space to a consumer, and ensures isolation from the network traffic of other
consumers.
2. Private VLAN (PVLAN) : - A sub-VLAN that segregates the nodes within a
standard VLAN, called as primary VLAN. A PVLAN can be configured as either
isolated or community.
• Enables a provider to support larger number of
consumers
• Provides security betweennodes on the same VLAN
• Simplifies network
A private VLAN (PVLAN) is an extension of the VLAN standard and further segregates
the nodes within a VLAN into sub-VLANs. A PVLAN is made up of a primary VLAN and
one or more secondary (or private) VLANs. The primary VLAN is the original VLAN
that is being segregated into smaller groups. Each secondary PVLAN exists only inside
the primary VLAN. It has a unique VLAN ID and isolates the OSI Layer 2 traffic from
the other PVLANs. Primary VLANs are promiscuous, which means that ports on the
PVLANs can communicate with ports configured as the primary VLAN. Routers are
typically attached to promiscuous ports.
There are two types of secondary PVLANs within a primary VLAN: Isolated and
Community.
3. Stretched VLAN :- A VLAN that spans multiple sites and enables Layer 2
communication between a group of nodes over a Layer 3 WAN infrastructure,
independent of their physical location.
• A stretched VLAN is a VLAN that spans across multiple sites over a WAN connection.
In a typical multi-site environment, two sites are connected over an OSI Layer 3 WAN
connection and all network traffic between them is routed. Because of the routing, it
is not possible to transmit OSI Layer 2 WAN traffic between the nodes in the two
sites. A stretched VLAN extends a VLAN across the sites and enables nodes in the
two different sites to communicate over a WAN as if they are connected to the same
network.
Stretched VLANs also allow the movement of VMs between sites without having to
change their network configurations. This enables the creation of high-availability
clusters, VM migration, and application and workload mobility across sites. For
example, in the event of a disaster or during the maintenance of one site, a provider
typically moves VMs to an alternate site. Without a stretched VLAN, the IP addresses
of the VMs must be changed to match the addressing scheme at the other site.
• VXLAN header is added to a Layer 2 frame, which is placed in a UDP-IP packet and
tunnelled over a Layer 3 network
– Enables transparent Layer 2 communication between nodes over physical
networks spanning Layer 3 boundaries
– Encapsulation and decapsulation are performed by Virtual Tunnel Endpoints
(VTEPs)
• 24-bit VXLAN ID provides up to 16 million VXLANs
A VXLAN is a OSI Layer 2 overlay network built on a OSI Layer 3 network. An overlay
network is a virtual network that is built on top of existing network. VXLANs, unlike
stretched VLANs, are based on LAN technology. VXLANs use the MAC Address-
inUser Datagram Protocol (MAC- in-UDP) encapsulation technique. In this scheme, a
VXLAN header is added to the original Layer 2 (MAC) frame, which is then placed in
a UDP-IP packet and tunneled over a Layer 3 network. Communication is established
between two tunnel end points called Virtual Tunnel Endpoints (VTEPs).
Hypervisor :- Software that is installed on a compute system and enables multiple OSs
to run concurrently on a physical compute system.
• Hypervisor kernel
– Provides functionality similar to an OS kernel
The software used for compute virtualization is known as the hypervisor. The
hypervisor is a software that is installed on a compute system and enables multiple
operating systems to run concurrently on a physical compute system. The hypervisor
along with hypervisor management software (also known as control software, which
is discussed in ‘Control Layer’ module) is the fundamental component for deploying
software defined compute environment. The hypervisor abstracts the physical
compute hardware to create multiple virtual machine, which to the operating
systems look and behave like physical compute systems. The hypervisor provides
standardized hardware resources, such as processor, memory, network, and disk to
all the virtual machines.
A hypervisor has two key components: kernel and virtual machine manager (VMM).
A hypervisor kernel provides the same functionality like the kernel of any other
operating system, including process creation, file system management, and process
scheduling. It is designed and optimized to run multiple virtual machines
concurrently. A VMM abstracts hardware and appears as a physical compute system
with processor, memory, I/O devices, and other components that are essential for
operating systems and applications to run. Each virtual machine is assigned a VMM
that gets a share of the processor, memory, I/O devices, and storage from the
physical compute system to successfully run the virtual machine
Bare-metal Hypervisor
• It is an operating system
• Installed on a bare-metal hardware
• Requires certified hardware
• Suitable for enterprise data centers and cloud infrastructure
Hosted Hypervisor
• Installed as an application on an OS
• Relies on OS, running on physical machine for device support
• Suitable for development, testing, and training purposes
Q6. Write a brief note on resource pool with an example. 5Marks Ans
:-
Resource Pool :-
A logical abstraction of the aggregated computing resources, such as processing
power, memory capacity, storage, and network bandwidth that are managed
collectively.
Resource pools are designed and sized according to the service requirements. A cloud
administrator can create, remove, expand, or contract a resource pool as needed. In a cloud
infrastructure, multiple pools of same or different resource types may be configured to provide
various cloud services. For example, two independent storage pools in a cloud having different
performance characteristics can provide resources to a high-end and a mid-range storage
service. Another example is an application service, which can obtain processing power from a
processor pool and network bandwidth from a network bandwidth pool.
Ans :-
In some cases, the VMs residing on different compute systems may need to
communicate either with each other, or with other physical compute systems, such
as a client machines. To transfer these types of network traffic, the VM network must
be connected to the network of physical compute systems. In this case, the VM
traffic travels over both the VM network and the network of physical compute
systems. The figure on the slide shows two physical compute systems, each with a
VM network and both the VM networks connected to a network of physical compute
systems.
The storage virtualization software is either built into the operating environment of a storage
device, installed on an independent compute system (discussed in ‘Control Layer’ module), or
available as hypervisor’s capability. The storage virtualization software abstracts physical
storage resources to create virtual resources, such as virtual volumes or virtual arrays.
The storage virtualization software built into the array operating environment has the ability to
pool and abstract the physical storage devices and present it as a logical storage.
Ans :- A logical compute system that, like a physical compute system, runs an OS
and applications.
• Created by a hypervisor installed on a physical compute system
• Comprises virtual hardware, such as virtual processor, memory, storage, and
network resources
– Appears as a physical compute system to the guest OS
– Hypervisor maps the virtual hardware to the physical hardware
• Provider provisions VMs to consumers for deploying applications VMs on the same
compute system or cluster run in isolation.
A virtual machine (VM) is a logical compute system that, like a physical compute
system, runs an operating system (OS) and applications. A VM is created by a hosted
or a bare-metal hypervisor installed on a physical compute system. A VM has a
selfcontained operating environment, comprising OS, applications, and virtual
hardware, such as a virtual processor, memory, storage, and network resources.
An OS, called— a ‘guest’ OS—is installed on a VM in the same way like it is installed on
a physical compute system. From the perspective of the guest OS, the VM appears as
a physical compute system. As discussed in lesson 1, a virtual machine monitor
(VMM) is responsible for the execution of a VM. Each VM has a dedicated VMM. Each
VM has its own configuration for hardware, software, network, security, and so on.
The VM behaves like a physical compute system, but does not have direct access
either to the underlying host OS (when a hosted hypervisor is used) or to the
hardware of the physical compute system on which it is created. The hypervisor
translates the VM’s resource requests and maps the virtual hardware of the VM to the
hardware of the physical compute system. For example, a VM’s I/O requests to a
virtual disk drive are translated by the hypervisor and mapped to a file on the physical
compute system’s disk drive.
20