0% found this document useful (0 votes)
26 views25 pages

Unit-2 1

Uploaded by

mohanbabuv14
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views25 pages

Unit-2 1

Uploaded by

mohanbabuv14
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 25

Using Cloud Computing Platforms

Virtualization Technologies and Load Balancing


General Objective (GO):
• Students can able to apply virtualization techniques in cloud
environment with load balancing strategies.
Specific Objectives (SO):
SO1: Identify the network resources in cloud environment to be load
balanced. (U/C)

SO2: To compare and contrast the management with load balancing


and without load balancing strategy. (Ap/C)

SO3: Apply different algorithms in real time cloud environment. (Ap/C)


Virtualization Technologies

• Majority of cloud-based systems combine their resources into


pools that can be assigned on-demand to users.
• Without resource pooling, it is impossible to attain efficient
utilization, provide reasonable costs to users, and proactively
react to demand.

Ajith G.S: poposir.orgfree.com


Virtualization Technologies

• Pooled resources can be accessed using a technique called


virtualization.
• Virtualization assigns a logical name for a physical resource and
then provides a pointer to that physical resource when a
request is made.
• The mapping of virtual resources to physical resources can be
both dynamic and facile; which helps efficient resource
management.

Ajith G.S: poposir.orgfree.com


Virtualization Technologies

• Virtualized components for cloud computing:


• Access: A client can request access to a cloud service from any
location.
• Application: A cloud has multiple application instances and
directs requests to an instance based on conditions.

Ajith G.S: poposir.orgfree.com


Virtualization Technologies

• Virtualized components for cloud computing:


• CPU: Computers can be partitioned into a set of virtual
machines with each machine being assigned a workload.
• Alternatively, systems can be virtualized through load-
balancing technologies.
• Storage: Data is stored across storage devices and often
replicated for redundancy.
• To enable these characteristics, resources must be highly
configurable and flexible.

Ajith G.S: poposir.orgfree.com


Virtualization Technologies

• Mobility patterns for Cloud Computing:


• P2V: Physical to Virtual
• V2V: Virtual to Virtual
• V2P: Virtual to Physical
• P2P: Physical to Physical
• D2C: Datacenter to Cloud
• C2C: Cloud to Cloud
• C2D: Cloud to Datacenter
• D2D: Datacenter to Datacenter
Ajith G.S: poposir.orgfree.com
Virtualization Technologies

• Virtualization is a key enabler for the following attributes of


cloud computing:
• Service-based: A service-based architecture is where clients are
abstracted from service providers through service interfaces.
• Scalable and elastic: Services can be altered to affect capacity
and performance on demand.
• Shared services: Resources are pooled in order to create
greater efficiencies.
• Metered usage: Services are billed on a usage basis.

Ajith G.S: poposir.orgfree.com


Virtualization Technologies Load Balancing and Virtualization

• One characteristic of cloud computing is virtualized network


access to a service.
• No matter where you access the service, you are directed to the
available resources.
• Cloud Load Balancing is the process of distributing workloads and
computing resources in a cloud computing environment.
• It allows enterprises to manage application or workload demands
by allocating resources among multiple computers, networks or
servers.
• Load Balancing. It can be implemented in hardware or in software.

Ajith G.S: poposir.orgfree.com


Virtualization Technologies Load Balancing and Virtualization

• Load balancing is an optimization technique; it can be used to


increase utilization and throughput, lower latency, reduce
response time, and avoid system overload.
• The following network resources can be load balanced:
• Network interfaces and services such as DNS, FTP, and HTTP.
• Connections through intelligent switches.
• Processing through computer system assignment.
• Storage resources.
• Access to application instances.

Ajith G.S: poposir.orgfree.com


Virtualization Technologies Load Balancing and Virtualization

• Load balancing make a system reliable through managed redirection.


• It uses different types of algorithm to decide where the traffic is
routed.
• When a request from a client or service requester arrives, the load
balancer uses a scheduling algorithm to assign where the request is
sent.
• Typical scheduling algorithms in use are Round Robin, Weighted
Round Robin, Fastest Response Time, Least Connections and
weighted least connections
• It also creates a session so that subsequent traffic related to that
session is routed to the same resource.

Ajith G.S: poposir.orgfree.com


Hyper-threading
VM with VM with VM with
one two CPUs one
• Makes a physical CPU appear as CPU CPU
two Logical CPUs (LCPUs)
 Enables operating system (OS) to
schedule two or more threads
simultaneously
• Two LCPUs share the same
physical resources
 While the current thread is stalled,
CPU can execute another thread
• Hypervisor running on a hyper-
LCPU LCPU

threading-enabled CPU provides LCPU LCPU


improved performance and
utilization Thread 1 and 2 Dual – core Thread 1 and 2
Single – socket system
with hyperthreading

13
CPU Load Balancing
VM with VM with VM with
one one one
CPU CPU CPU

LCPU LCPU

LCPU LCPU

Hyperthreaded dual – core


Dual – socket system

14
Key Network Traffic Management Techniques

1. Balancing client workload: Hardware based


2. Balancing client workload: Software based
3. Storm control
4. NIC teaming
5. Limit and share
6. Traffic shaping
7. Multipathing

Copyright © 2011 EMC Corporation. All Rights Reserved. Virtualized Data Center – Networking 15
Technique 1 – Balancing Client Workload: Hardware
Based

• A device (physical switch/router) distributes client traffic across


multiple servers – physical or virtual machines
• Clients use IP address (virtual) of the load balancing device to
send requests
• Load balancing device decides where to forward request
• Decision making is typically governed by load balancing policy,
for example: Round robin, Weighted round robin, Least
connections

Copyright © 2011 EMC Corporation. All Rights Reserved. Virtualized Data Center – Networking 16
Technique 2 – Balancing Client Workload: Software
Based

• Performed by software running on a physical or virtual machine


 Example: DNS server load balancing
 Allows multiple IP addresses for a domain name
 Maps domain name to different IP addresses in a round robin
fashion
 Allows clients accessing a domain name to send requests to different
servers
 Example: Microsoft Network Load Balancing
 A special driver on each server in a cluster balances clients’ workload
 The driver presents a single IP address (virtual) to all clients – each IP
packet to reach each server
 The driver maps each request to a particular server – other servers in
the cluster drop the request

Copyright © 2011 EMC Corporation. All Rights Reserved. Virtualized Data Center – Networking 17
Technique 3 – Storm Control
• Prevents impact of storm on regular LAN/VLAN traffic
 Storm: Flooding of frames on a LAN/VLAN creating excessive traffic
and degrading network performance
• Counts frames of a specified type over 1-second and compares
with the threshold
• Switch port blocks traffic if threshold is reached and drops the
subsequent frames over the next time interval

Source: “Catalyst 3550


Multilayer Switch
Software
Configuration Guide” –
Cisco Systems, Inc.

Copyright © 2011 EMC Corporation. All Rights Reserved. Virtualized Data Center – Networking 18
Technique 4 – NIC Teaming
• Logically groups physical NICs connected to a virtual switch
 Creates NIC teams whose members can be active and
standby
 Balances traffic load across active NIC team members
 Provides failover in the event of an NIC/link failure
 Allows associating policies for load balancing and failover at a
virtual switch or a port group

Copyright © 2011 EMC Corporation. All Rights Reserved. Virtualized Data Center – Networking 19
Technique 5 – Limit and Share
• Are configurable parameters at distributed virtual switch
• Are configured to control different types of network traffic,
competing for a physical NIC or NIC team
• Ensure that business critical applications get required bandwidth
Configurable
Parameter Description

• Sets limit on maximum bandwidth per traffic type


 Traffic type will not exceed limit
Limit
• Is specified in Mbps
• Applies to an NIC team
• Specifies relative priority for allocating bandwidth to
different traffic types
Share • Is specified as numbers
• Applies to a physical NIC

Copyright © 2011 EMC Corporation. All Rights Reserved. Virtualized Data Center – Networking 20
Technique 6 – Traffic Shaping
• Controls network bandwidth at virtual/distributed virtual switch or port
group
• Prevents impact on business-critical application traffic by non-critical traffic
flow
Parameter Description
• Data transfer rate allowed over time
Average Bandwidth • Workload at a switch port can intermittently exceed av. Bandwidth
• Burst: When the workload exceeds the average bandwidth, it is called burst
Peak Bandwidth • Max data transfer rate without queuing/dropping frames
• Max amount of data allowed to transfer in a burst
Burst Size • Burst size = bandwidth × time
• Bandwidth in a burst can go up to peak bandwidth

Burst size = bandwidth x time Example:


Peak bandwidth Average bandwidth = 1 Kbps, Peak bandwidth =
Bandwidth

4Kbps, Burst size = 3 Kb


• Burst with data rate 3 Kbps can stay for 1
Average bandwidth second or,
• Burst with data rate 1.5 Kbps can stay for 2
Workload seconds, etc.
Time

Copyright © 2011 EMC Corporation. All Rights Reserved. Virtualized Data Center – Networking 21
Technique 7 – Multipathing
Physical server
Multipathing Hypervisor Kernel
Multipathing
A technique allowing a physical server to use
multiple physical paths for transferring data HBA 1 HBA 2
between the physical server and a LUN on a
storage system.

• Is built into hypervisor or provided by third-


party vendor
• Recognizes alternate I/O path to a LUN and SC 1 SC 2
enables failover
• Performs load balancing by distributing I/O to SC –
Storage
all available paths Controller

LUN 0 LUN 1

Storage array

Copyright © 2011 EMC Corporation. All Rights Reserved. Virtualized Data Center – Networking 22
Virtualization Technologies Advanced Load Balancing

• Workload managers are more sophisticated load balancers.


• They determine the current utilization of the resources in their
pool, the response time, the work queue length, connection
latency and capacity, and other factors in order to assign tasks
to each resource.
• An Application Delivery Controller (ADC) is a combination of
load balancer and application server.
• It is placed between a firewall/router and a data centre
providing the web services.

Ajith G.S: poposir.orgfree.com


Virtualization Technologies Advanced Load Balancing

• ADCs are also referred to as a content switch, multilayer


switch, or web switch.
• An ADC is assigned a virtual IP address (VIP) that it maps to a
pool of servers based on application specific criteria.
• An ADC is considered to be an advanced version of a load
balancer and lowers the workload of the Web servers.
• Services provided by an ADC include data compression,
content caching, security, server health monitoring, Secure
Sockets Layer[SSL] offload and advanced routing based on
current conditions.

Ajith G.S: poposir.orgfree.com


Thank You

You might also like