Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
100%
(4)
100% found this document useful (4 votes)
9K views
Quantum - Cloud Computing
Quantum sem 6and 7
Uploaded by
Hemant Upadhyah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Quantum - Cloud Computing For Later
Download
Save
Save Quantum - Cloud Computing For Later
100%
100% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
100%
(4)
100% found this document useful (4 votes)
9K views
Quantum - Cloud Computing
Quantum sem 6and 7
Uploaded by
Hemant Upadhyah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Quantum - Cloud Computing For Later
Carousel Previous
Carousel Next
Save
Save Quantum - Cloud Computing For Later
100%
100% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 89
Search
Fullscreen
* Topic-wise cover ‘age of entire syllabus in Question-Answer form. * Short Questions (2 Marks) We, ‘sesst on = t = “gaa seme “yp = Wn SYwww.askbooks.net A.S.|K. Always.Seek.Knowledge All AKTU QUANTUMS are available * An initiative to provide free ebooks to students. * Hub of educational books. PRU CR UC me I CSCC Ct ACO CER Ce ER ei Or Lon UCC oe 2. We don't intend to infringe any copyrighted material. MT ir acu eu ku website you can kindly report us, we will remove it asap. 4. All the logos, trademarks belong to their respective owners.QUANTUM SERIES Se For B.Tech Students of Fourth Year of All Engineering Colleges Affiliated to Dr. A.P.J. Abdul Kalam Technical University, Uttar Pradesh, Lucknow (Formerly Uttar Pradesh Technical University) Cloud Computing By Kanika Dhama uantum a Page — QUANTUM PAGE PVT. LTD. Ghaziabad m New Delhi 4BY: ApramSingh PUBLISHED | Quantum Publications® (A Unit of Quantum Page Pvt, Lta,) Plot No, 59/2/7, Site - 4, Industrial Arey Sahibabad, Ghaziabad-201 010 RCS 075 loud Comp. Phone :0120-4160479 . UNIT-1 : INTRODUCTION (1-1 Eto 1-26 E) Email: pagequantum@gmailcom Website: www.quantumpage.coin Introduction to Cloud Computing ~ Definition of Cloud - Evolution Debi Once: 0 Fat Rabin Near, Sabo, Debitionsg | Barat pg“ Ces Phy Cloud - On-demand Provisioning, (© Au Ricurs Resenven No part ofthis pubhoation may be reproduced or transmitted, UNTT: in any form or by any sans, scithout permission ‘CLOUD ENABLING TECHNOLOGIES (2-1 Et02-33E) ‘Service Oriented Architecture ~ REST and Systems of Systems ~ ‘Web Services - PublishSubscribe Model - Basics of Virtualization = Types of Virtualization ~ Implementation Levels of Virtualization Virtualization Structures - Tools and Mechanisms ~ Information contained inthis work is derived from sources Virtualization of CPU ~ Memory ~ 1/0 Devices -Vistualization believed tobe reliable. Every efforthas been made to ensure Suppot ane Disasit Rewovery. accuracy, however neither the publisher nor the authors UNIT : CLOUD ARCHITECTURE, SERVICES & STORAGE ‘guarantee the accuracy or completeness of any information (G1 Et03-32E) published herein, and neither the publisher nor the authors Layered Cloud Architecture Design ~ NIST Cloud Computing Reference Architecture ~ Public, Private and Hybrid Clouds ~laaS arising out of use of thi i. = Pax SaaS ~ Architectural Design Challenges ~ Cloud Storage 15 out of use of this information. = Storage-as-aService ~ Advantages of Cloud Storage ~ Cloud Storage Providers ~ $3. shall be responsible for any errors, omissions, or damages Cloud Computing (CST : Sem-7) UNIT-# : RESOURCE MANAGEMENT (-1E 104258) 1* Edition : 2011-12 Inter Cloud Resource Mergen eee Provisioning and i Resouree Provisioning Methods ~ Global Exchange of Clow 2% Baition : 2019-20 (Thoroughly Revised Ealtion) Reso Pe eB orviow ~ Cloud Security Crallenges ~ 3” Edition : 2020-21 Software-as-aService Security ~ Security Governance ~ Vistual Machine Security = JAM™= Security Standards. LUNIT:S : CLOUD TECHNOLOGIES & ADVANCEMENTS (5-1 Eto 5-21 E) Hadoop - MapResiuce ~ Virtual Box — Google App Engine Progranuning Environment for Google App Engine ~ Open Stsck— Federation in the Cloud ~ Four Levels of Federation ~ Federated Services and Applications ~ Future of Federation. SHORT QUESTIONS (GQLE10SQ-20E) SOLVED PAPERS (2019-20) (9P-1 Eto SPAZE)Introduction ee * 1-2E(C8IT-Som-7) Introduetion f ‘ PART-1 Introduction to Cloud Computing, Definit i of Cloud Computing. ee CONTENTS Part-1 : Introduction to Cloud. Computing, Definition of Cloud, Evolution of Cloud Computing -2E to 1-17E Underlying Principles of.. Parallel and Distributed Computing, Cloud Characteristics, Elasticity in Cloud, On-Demand Provisioning seve I-ATE 80 1-268, 1-1E(CSAT-Sem-7) Que 1:1. | What do you mean by cloud computing ? Also, give its Properties. ‘Answer 1. Cloud computing is the means of delivering all IT from computer applications software, business processes, messoging, and collaboration to.end users as a service wherever and whenever they need i 2. Cloud computing is paradigm for delivering IT where ropid provisioning isan important characteristic for eomputing resources, data applications and IT. 3. Cloud computing helps us to face the challeages such as i. Decreasing the capex and opex cost. i Enhancing the service quality. iii, Maintaining the desired and right level of security, eompliances, regulations, and policies across the different functions of enterprise. jv. Rapid provisioning, agility, and business transparency for consistent self-service delivery. 4. Thus, cloud computingis the service and deployment model using large resource pool based provisioning of virtual or physical resources in a service model using the internet (public cloud) or intranet (private cloud). Properties of cloud computing are: 1. User centric : This means once a user is connected to cloud any’ data, such as images, videos, applications, becomes his property. Not only the data but the devices connected to it and the user can share itwith other users. 2 Task centric : Cloud computing focus on what one need and how application can do it, Here documents are given more priority than the applications which create them.Cloud Computing iF (CST Som.7) sagen setfhedling, bickups are available for every doce a atten, tone document crashes there will be its duptiggt reve Multis Sf tenaney and intelligence : Multi-tenancy refers to shar inane vaca eet Ita and costs across a AFR At data og and analjsi are necessary for accessing informaticn inanintelligent manner. Many processes in cloud computing shall be automate . Pl crahed data with its duplicate, Hence, p 2 aewciated withcloud computing, OfTamming Flexible: Flexible asthe users may be of different vari ithas tomatch with theirneeds. QaslZ | What are the advantages and disadvantages of cloud computing ? ‘Answer Advantages of cloud computing : 1. Cost saving: It helps us to save substantial capital cost as it does not ‘eed any physical hardware investments. 2 Strategic edge : Cloud computing helps us to access the latest applications any time without spending our time and money on installations 3. High speed: Cloud computing allows us to deploy our service quickly in fewer clicks. This faster deployment allows us to get the resources required for our system within fewer minutes. 4 Reliability : Through cloud computing we can always get instant ‘updated about the changes mee ° 5 Mobility: Employees who are working on the premises or atthe remote locations can easily access all the cloud services. All they need is internet connectivity. 6 Calimited storage capacity: Cloud computing offers initless storage Disadvantages of cloud computin, L Performance can vary : When we are working in aloud environment, “ Application running on the server which simultaneously provides Shared resgtbet businesses that ean affect the performance of oUF 2 Technic 2 os sical Jere Cloud technology is always prone to an outage and ‘and heneo AE (CSAT-Sem-7) Introduction 3. Security threat in the cloud : Before adopting cloud technology, we should be well aware ofthe fact that we will be sharing all our company’s sensitive information to third-party cloud computing service provider. Hackers might access this information. 4. Internet connectivity : Good internet connectivity is must in cloud ‘computing. We cannot aecess cloud without an internet connection. 5 Lack of support : Cloud computing companies fail to provide proper support to the customers. Moreover, they want their user to depend on FAQsor online help, which ean be a tedious ob for non-technical persons. Que 13. | Explain vision of cloud computing. “Answer 1, Cloud computing provides the facility to provision virtual hardware, runtime environment and services to a person having money. ‘These all things can be used as long as they are needed by the user. 3. The whole collection of computing system is transformed into collection of utilities, which can be provisioned and composed together to deploy systems in hours rather than days, with no maintenance costs. 4. The long term vision of acloud computing is that IT services are traded ‘as utilities in an open market without technological and legal barriers. 5. Inthe future, we ean imagine that it will be possible to find the solution that matches with our requirements by simply entering out request in 2 ‘plobal digital market that trades with cloud computing services: 6. The existence of such market will enable the automation of discovery process and its integration into its existing software systems. 7. Ductotheexistence ofa global platform for trading cloud services will, also help service providers to potentially increase their revenue. 8.” Acloud provider ean also become a consumer of a competition service in order to fulfill ts promises to customers. ‘Que 1.42] List the major categories of parallel computing systems. Categories of parallel computing systems: i. Bit level parallelism : It is a form of parallelism which {s based on increasing processors word size. It shortens the number of instructions that the system must run in order to perform a task on variables which are greater in size. ii, Instruction level parallelism : It isa form of parallel computing in ‘which we can caleulate the amount of operation carried out by an operating system at same time. For exampleCloud Computing {Instruction pipelii 2 Out of order exceution 3 Register renaming 4L_ Speculative execution Branch prediction oe TH] Discuss the issues related to cloud computing anower | ‘Several issues related to cloud computing are : Issues in clouds ‘Security issues Security issues : Some of th ro i osdeanpating are asfolowes. ) PoUem™ which are faced by the L Data integrity : When a data is on. cloud, E ison a cloud, anyone from any loa Seeenn a bya the cloud. Cloud does not diferentiate ‘2.8 sensitive data from a common data thus enabliny ‘Bocess those sensi integrity in loud copa ensi ‘ive data. Thus there is a lack of data integrity in eloud 2 : Data theft : Most of the, ‘cloud vendors instead. of acquiring a server try to lease a server fom other service providers b other service pr etn dee are Broviders because they ae cost 2 Securit
1. | Anopplication that provides ‘An arplication that snot bang interoperability between | the principle of REST. - computer systems on the | internet 2 | Use REST. Use SOAP, 3. | Support various data format | Support XMI formar } such as HTML, JSON, ete. 4 | Pee URLto expose business | Use tho service intercom 1 Togic. business logie = 5.__|Easierand Nexibie. Not easy and flexible, 6. | Inherits security measures | Defines itsown security layer and’) from the underlying is more secure. transport protocols, 7 | Consume lessbandidthand | Consume more bandwidth and Tesources, Fesources. Que 2.44)] What are the advantages of REST? lAaewer The advantages of REST are 1, Separation between the elt & The REST protocol total server and the data storage Fer cxample it improves the portability ofthe intedface to other Mowe nttfrms, i increaes the seaability of the recs val allows the die developments tobe valved lent and the server ; 'y Separates the user interface from the Tent components of the independently, 2. Visibility, reliability and Scalability: and server has one ‘evident "team can seale the product ‘without problem, fim can seale the pr The at brat to other servers or make all kinds oe esi the dan cr make all kinds of changes is rovided that the data from each re se it data ta from each request is seat 0B (CSAT-Sem-7) Cloud Enabling Technolog The separation makes it easicr to have the font andthe back on different servers, and this makes the a »PPS more flexible to work, with. 3, The REST API is always independent ofthe type of platform or languages : a. The REST API always adapts to the type of being used, which gives considerable fr testing new environments within the des ‘syntax or platforms feedom when changing or velopment. With a REST API we can have PHP, Java, Python Servers, (Que 2.15.] Write a short note on web services. haw b 1 Aweb service is a software package that is used for communicating between two devices or web entities lying on the network. 2 They involve a service provider along with a service requester, iz, the client, Since web services are advantagcous as they ae language transparent, so there inno lanue whether We lundemega system is providing the service developed in Java, PHP or any other language while the client application is written in Python, Ruby, Perl or JavaSeript, 4. Task performed by web services : i. Webservices are searched for over ‘the network as well ascall upon accordingly. il Asawebservice is called, it would! be capable of providing operation for theclient that has invoked t the web service. Que 2:16.| What are types of web services ? ‘Tuo abbreviation of SOAP is Service Oriented Architecture Protec tis an XML based protocol having the main benef of implementing the SOAP webservice as its security vice based messages SOAP offers a wrapper for sending a web service over the Internet by thehelp of HTTP protocol All its messages are ‘usually inXML format.“ny ciiciving PALE (CSI Se5,4 ix. The SOAP message consists of: SOAP document has a root clement termed as the «Bn, Jement. This clement isthe initial element used if aa ) document Teen next the “Envelope” which is categorized into two ‘The former isthe header, and the late is the body” € The header includes the routing data that is essentially information telling the XML document to whom or for. ‘Whiet| the client needs tobe sent to, ‘4 Lastly the body ineludes the actual message, 2 REST (Representational State Transfer) web services: i. REST service isnot a collection of paradigm or specific rules ii instead the style architecture for software. my ji, Those apps that are designed using this architecture are collect termed as RESTYul web services. a 1 establishes the resources through the use of URL as well a depends on the nature ofthe transport protocol (like HTTP: GE PUT, POST, DELETE, ete.) used to perform the resources, | iv. Allocation of resources in REST depends on the URL. Itis: li coaventions based application. a ft Que 2.17. Explain architectural constraints of web services, > | Architectural constraints of web service are: 1. Uniform interface : i Itisakey constraint that differ Non-REST APL suggests that there should be a uniform: it eau sho ‘uniform way of interacting with mae eanctivespetive of device or type of aplication (web rentintes between a REST API and| There are four guidelines principle of uniform interface : | Resource-based : Indivi Feeneueebased : Individual resources are identified it Manipulation of resoures through representations eee representation of resource and it contains enough tion to modify or delete the resource on the Provided that it has Permission todo go, = b 212 E(CSIT-Sem-7) Cloud Enabling Technologies ce. Self-descriptive messages: Each message includes enough information to describe how to process the message 20 that server can easily analyse the request. @ Hypermedia As The Engine of Application State (HATEOAS) : It need to include links for each response so that elientcan discover other resources easily. 2 Stateles: i. It moans that the necessary state used t» handle the request is contained within the request itself and server would not store ‘anything related to the session. i In REST, the client must include all information for the server to fulfill the request whether as a part of headers or URI. 3. Cacheable: i Bvery response should include whether the response is cacheable ‘or not and for how much duration responses can be cached at the client side. ii. Client will return the data from its eache or any subsequent request ‘and there would be no need to send the request again to the server. 4, Client Server: i. REST application should have client-server architecture. ii A client is someone who is requesting resources and are not concerned with data storage, which remairs internal tocach server, ‘and server is someone who holds the resources and are not concerned with the user interface or user state. 5. Layered system: i An application architecture needs to be composed of multiple layers, {i Bach layer does not know anything about any layer other than that ‘of immediate layer and there can be lot of intermediate servers between client and the end server. iii Intermediary servers may improve system availability by enabling load-balancing and by providing shared exches. 6 Codeon demand: i. Itisan optional feature. According to this servers can also provide executable code to the client. (Que2.18. | Differentinte between REST and SOAP. | i |Cont Computing 2A3E(CSIT-Sem, ‘Answer SNol REST ; ‘SOAP 1. | REST is Representational | SOAP’ is Service Orienteg State Transfer. Architecture Protocol 2 [Iisanarchitecturestyle. | It isa protocol. ‘3 | Husessimple HTTP protocol. | It uses SOAP envelop and then HTTPto transfer the data. 4 [1 supports many different | Tt supports only XML format, data format like JSON, XML, YaMLete. 8 | Performance, scalability,and | Slower performance and caching is high, sealability is bit eemplex, caching not possible, 6 [It is used widely and | It is used where REST is not frequently, possible. (Que218:] Expinin briefly publish-subscribe model. eases 1. Tnsoftware architecture, publish-subscribe pattern is amessage pattern, ‘2 network oriented architectural pattern, which describes how two different parts of a message passing system connect and communicate with each other. 2 Inmodern cloud architecture, applications are decoupled into smaller, independent building blocks that are easier to develop, deploy and maintain. 3. Publish/Subscribe (Pub/Sub) messaging provides instant event notifications for these distributed applications, ‘The publish-subscribe made! allows messages tobe broadcast to different parts ofa system. 5. Publish-subseribe isa sibling of the message queue paradigm, and is one part of a larger message-oriented middleware system. 6. Messaging systems support both the pub/suband message queue models in their API. For example, Java Message Service (JMS). 2 ‘This pattern provides greater network scalability and adynamie network: topology, with a resulting decreased flexibility to modify the publisher tnd the structure ofthe published data, ASE (CSAT-Som-7) Cloud Enabling Technologies ‘Quo 220, | Explain how publish-subscribe model works, Working of publish-subscribe model ; Message Mesuage [ se |e me Lind sutsenber eta 1. Publisher Publishes messages tothe communication ingrastructre. 2 Subscriber : Subseribes toa category of messages. Communication infrastructure (channel, classes) : Receives ‘Geesages from publishers and maintains subscriber subseription. 44. Tho publisher wil categorize published messages int classes where subscribers will receive the message. 5. A publisher has one input channel that splits into multiple output channels, one for each subseriber. 6. Subscribers ean express interest in one or more classes and only receive interested message. os in pubvoub mode! the publisher and subscriber are unaware of ea: 7 pene puaber senda manages to suber, wot haowisg about subscriber. ceriber receives messages, without having knowledge of the Sateen thee arooouerer rounders te ped information, the message is dropped. asi] What are the benefits of publish-subseribe model? [Answor Following are the benefits of | publish-st 1. Tedecouples subsystems that need toc ; ‘managed independently, and messages an be properly enema ether ae ges Te increases salabilty and improves rexponsie scar Te eae ta qiely sed singe emessage toe iat es ibseribe model: smmunicate, Subsystems —Ga 2 The virtualization PASE (CSI S95 a) reuurn wo itv core processing responsibilities. Tho: megg retary Meeure is responsible for ensuring Messages deliver cae interested subseribers ete a teinproves reliability. Asynchronous messaging helps applica Kcinprvtely run smoothly under increased loads and he {neermittent failures more effectively. |{ Itallows scheduled processing, Subseribers can wait to pick up mes, Tea ent hours, oF messages canbe routed or processed arse toaspocife sehedule. ing 5. Ieenabes simpler integration between systems using different plato programming languages, or eommunication protocols, as well as betwen on-premises systems and applications running in the cloud, - 6 Ie facilitates asynchronous workflows across an enterprise, Itimproves testability. Channels canbe monitored and messay 8 inspected or logged as part of on overall integration Lost strategy. Cloud Computing nde PARTS a Basics of Virtualization, Types of Virtualization, Im ic ; 5 » Implementati Levels of Virtualization. aie Long Answer Type aiid Medium Answer Type Qiiestions®, Que 2.22. | Define virtualization. Why it is needed ? ‘Answer Miittilisetien te ‘rtualization is an abstraction layer (hypervisor) that decouples the physical hardware from the Oper i th rire rom the Ope ating System (OS) to deliver greater platform provides the isolation of platform and allows multiple’ ile businesses to run multiple virtual machines on the same physical machine, Following are the ben efits iat i Moncey sate provided by virtualization : With virtualization t can be reduced. b. Therefore, the on going pr i ‘ongoing operational eae wil aleore et aintenence, and technology, the number of physical servers 2-16 E (CBIT-Sem-7) Cloud Enabling Technologies jc increase in control : 1. Drom 9... Virtualization provides flexible foundation to provide ea according to the demand for an organization. mew b, _ Newserversean be quickly deployed. Therefore, services ean be provided within minutes, e Itis also easy to ship the infrastructure when itis deployed ‘using virtualization techniques. iti, Simplified disaster recovery: ‘a. More efficient and cost effective disaster recovery solutions can be realized with virtualization technologies. b. Servers and online business can be transferred to an alternate site within minutes with the help of virtualization, iv. Business readiness assessment = 4. Virtualization introduces a shared computing model to an enterprise and it is easy to understand infrastructure requirements in a virtualized environment. Virtualization can help to: 1.“ Reduce the cost ofthe existing infrastructure by reducing operational find aystems management cost while maintaining the needed capacity. 2, Reduce the complexity of adding to the infrastructure, 3, Gather information und collaboration across the organization to increase both the utilization of information and its effective use. 4. Deliver on-Service Level Agreement (SLA) response time during spikes in production and test scenarios. 5. Build a heterogencous infrastructure’across the organization that is more responsive to the organization's needs. @ue223:| Explain various current virtualization initiatives. Answer Various current virtualization initiatives are = 1. Virtual CPU and memory: i Physical CPUsand RAM can be: dedicated or dynamically allocated to virtual machines. ii’ As there is no OS dependency on the physical hardware, with the CPU checking off, virtual machines can ‘be migrated to different hosts, with background changes to the physical CPU and jmemory resourees being transparent to the guest OSs running en virtual machines.. LITE (CST. © Views newer . ‘4 virtual ‘network in a bor’ solution that allows eet virtual machine network traffic through hypervisor to manage’ IO ade OURA he physical Network Interface Controller allows each of thy ‘irtual machines to have a unique identity on the network from ‘the physical host. Vidi: rape Newt SAN bu eons press rag, targets to the physical host, which in turn used to host virtue Bestel conoid manages {The performance and health of virtual machines and gueit OS can be monitored and console access to all of the servers can be Sangean Vaca wee: i Active virtual machines ean be transparently transferred across physical hosts with no down-ime and ne los of service availabilty rte ‘The virtual machine's execution state, active memory, network Periaperprareeentecnomnnpnearons source and destination hosts 60 that the guest OS and running Splnicmccammeeatirmotnn & Storage van mechine tly Crea a eee, ‘cara econ nace aro nero tng 7. Dynamic load balancing i. Dynamically load balances virtual machines across the most optimal clin een ease oon aa = a mainte ean cate toa less busy host if particular host ina resouree pool is ina high eee Different resource pools can be defined for different business needs, For instance, production pools can be defined with more demanding. srl geared as el ‘theoretical ae & Logical Partitions (LPARs) : ‘ pater arb tng tsa town ompetig donate oS ee ‘address space and VO interface, with each domain capable of housing ® z 18k (CHTBem-7 Cloud Baabling Technologies LLPAR& can share CPUs or have dedicated physical CPU Likewise, an LPAR ean be a dedicated physical mem sce or memory addresses canbe dynamically allocated sae LPARs as needed. = ‘9, Logical Domains (LDOMs): i. Operating systems running tach logical domain can be independently managed, that is, stopped, started, and rebosey without impacting other LDOMs running on the host, ii A Type 1 bare-metal hypervisor isolates computing environments from physical resourees, iii Forexample, domains across distinct threads can be separated the mallithreading techoology, Because the Rrereae dynamically managing and encapsulating the allocation of physica resources. 10, Zones: (Que224,| What are the advantages and disadv: i. Zones an O3-level virtualization solution rather than a hardware- level hypervisor solution. i Each zone is an eneapsulated virtual server environment running within a single OS instance. iii, As such, zones share a common kernel, through a global zone, ‘although ‘non-native’ zones ean emulate an OSenvironment other than that ofthe host's native OS, virtualization 7 ‘Answer Advantages 1 2 a 4 8 Virtualization sofware reduces VMI complexity Improves functionality. Increase performance. Provides server consolidation, testing and development, the provision of ‘dynamic load balancing and the disaster recovery and also improves the system reliability and security Conservation of energy, maintenance of legacy appli Supporting acress-platform office Disadvantages : L 2 3 igh risk inthe physical fault, tis alsonot easy, quite complicated. Not supported by all applications.Cloud Computing 4 6 ehas single point of failures say lead to lower performances 7 ‘Applicaton identified tobe awaysnot possible, LIVE (CST Sem.7, ——————" demnands power machines, visualizatign 2-208 (CSATSorn-D Cloud Bnabing Technologies ‘realization technologien: Two major types of sechologie are ypiyed nserver virtualization ce. Hardware virtualization : Goes | Weite a short note on server virtualization. ‘Answer : Server virtualization works as a sasking of the server computer that the count and identity of resourees with Servers, storage, processors and OS from the end user. 2 Administrators divide the physical server into multiple isolated Vij talking to same resource pools f Virtualization of servers provides an abstraction of the physical server SFFimaintaining resource pool for server users (Fig. 2.25.1), ‘applston ‘Application Operating stem CPU, Memes, Disk ‘Virwaliationiypervcor ‘oPU Wenery Disk Fig. 225.1. Server virtualization. | Virtual machine : 1 Viral machine can be termed as a virtual environment, partition, or container, In a server environment, a server that does not physically exist but is created on a different server is called ‘guest ‘The instance where a virtual machine runs is termed as ‘host’ ‘These hosts ean have multiple VMs running on the physical server. ‘Was asigoed oa pol of esorcevcanbedjmieall assigned o Pool-based available resources. . renee pee ‘When a user talks to this VM, hefshe is privileged to use his/her VM as ‘a physical server with all functionalities such as accessing the" OSS, CPU, memory, and hard disk from the common pool. ‘The hypervisor virtualize oe multiple virtual servers based on supported achvirtual machines bundled with an OS,CPU, hard disk, and memory. i. Hardware virtualization is also known as hypeevisor-hased virtualization, bare-metal hypervisor, type Ivirvalization, or simply hypervisor. ii, This virtualization technology has virtuaizction layer runing immediately onthe hardware which divides the server machine into several , virtual machines or partitions, with a guest OS running in each of these machines iii, Thebinary transparency is provided by avirtualized approach and products enable the transparency for 2Ss, middleware, ‘and applications, 08 virtualization : i. This type of server virtualization is also known as OS-based virtualization, OS-level virtualization, or type 2 virtualization, i, OS virtualization ereates virtualization environments within @ single instance of an OS. iid Vietual environments created by OS virtualization are often called ‘containers. ‘Because all virtualization environaients must share resources ‘ofasingle OS while having a private virtual OS eovironment, 1 particular implerentation ofthe technology may alter the filesystem orientation and often introduce ceess restrictions toglabal system configuration or settings. [Anplication]} | [Application Guest OS]| | [Guest 08] Apliaton ] [__Fapeniior Hest 05, Hariware (ig 228.2. Que 2.26, | What are the types of ‘newer Types of virtuali 1.08 virtualization iL Virtuidizing an operating system enviroaments the most commen form of virtualizationClove Computing 226 CST Sem-7 aE ee —___ Cloud Enabling Techoologien It involves patting a second . instances operating system, lke Window on a single machine, a This cnpoerebusneies to reduc the AMOUR of hg hardware required torun their sofware by cutting down the ‘ of actual machines. we | Instruction St Architecture UISAN level : ix, Itsavescompanies cash on energy cabling, hardware, ack i Atthe ISA level, virtualisation prtrmed by emulating and more, while il allng them run these quan aa eae . ve applications. di Thebasic emulation method i through code interpretation 2 Application-server virtualization : gi. Aninterpreter program interprets the i Application-server virtunlization i also referred to as ingtruetions one by one. Toad balancing, a it spreads applications across servers an yarious implementation level of virtuslizatio source instructions to target va sdvane iw. One souree instruction may require tens or hs undreds of natin ini St ne oo This enables IT departments to balance the workload of spe slow. software in an agile way that doesnot overlud a specie sens v. For better performance, dynamic binary translation is desired, ‘nderload a specific application in the event of a arge projec vi. Thisapproach translates base blocks of éynamie ure sine tana change. totarget instructions. ‘ii It also allows for easicr management of servers and aj since we can manage them as a single instance. ‘2 Application virtualization : Sica ‘vi, The basic blocks ean also be extended to Petcotions, blocks to increase translation efficiency. vill, A Virtual Instruction Set Architceture(V-ISA) thus requires Program traces or super i. Application virtualization operates application on computersasit ‘a processor-specifie software translation layer to the compiler. they reside naturally on the hard drive, but instead are runningog | 2 Hardware abstraction level : aserver. i. Wisperformed right on topof the bare harcvare and generates a & Theabilty touse RAM and CPU torrun the programs while string vistanl hardware cevironument for 8 VBL them on a server, like through Microsoft terminal services and ii, The idea is to virtualize a computer's resources, such as its cloud-based software, improves how software security updates ae processors, memory, and LO devices so'as hardware utilization pushed, and how software is rolled out. Fate by multiple users concurrently may be upgraded. ‘Administrative virtualization : Operating system level : i Administrative virtualization is one of the least-known forms of i 0S-level virtualization ereates isolated containers on a single Virtualization, likely due to the fact that its primarily used in data physical server and the OS instances to utilize the hardware and bison software in data centers. & The concept of administration, or ‘management,’ virtualization i The containers behave like real servers. OS-level virtualization is ‘means segmented admin roles through group and user policies. ‘commonly used in creating virtual hosting environments to alloeate Network virtualization : Network virtualization involves virtually hardware resources among a large number of mutually distrusting ‘managing IPs, and is accomplished through tools ike routing tables, users. NICs, switches, and VLAN tags, {ii Library Support Level Virtualization with library interfaces is Hardware virtualization : Refer Q. 2.25, Page 2-198, Unit-2 possible by controlling the communication link between applications Storage virtualization + and the rest of eystem through API books. 4 Storage virtualizationis an array of servers that are managed by virtual storage system, ik Theserversare not aware of exactly where their datais stored: Que227. | Explain the implementation level of virtualization. Library support level: 1 Virtualization with libeary interfaces is possible by contrlling the communication link between applications and the rest ofa system through API hooks, {i The software tool WINE bas implemented this appreach to support Windows applications ontop of UNIX hosts.2-29E (CST Sem Cloud Enabling Technologies Clovd Computing & User-application level : =~
You might also like
Cloud Computing Quantum Koe 081
PDF
100% (1)
Cloud Computing Quantum Koe 081
79 pages
Renewable Energy Resources
PDF
100% (6)
Renewable Energy Resources
83 pages
Compiler Design Quantum PDF
PDF
100% (1)
Compiler Design Quantum PDF
211 pages
Quality Management Koe 085 Quantum
PDF
100% (2)
Quality Management Koe 085 Quantum
77 pages
Quantum Data Warehousing Data Mining Koe 093
PDF
No ratings yet
Quantum Data Warehousing Data Mining Koe 093
67 pages
Object Oriented System Design Quantum
PDF
70% (10)
Object Oriented System Design Quantum
253 pages
Data Analytics Quantum
PDF
100% (1)
Data Analytics Quantum
148 pages
Software Engineering Quantum
PDF
50% (2)
Software Engineering Quantum
85 pages
CN Quantum
PDF
80% (5)
CN Quantum
188 pages
Design and Analysis of Algorithm Quantum
PDF
100% (14)
Design and Analysis of Algorithm Quantum
359 pages
Cloud Computing RGPV (Sem 8th)
PDF
100% (4)
Cloud Computing RGPV (Sem 8th)
123 pages
Data Structure Quantum Series
PDF
67% (3)
Data Structure Quantum Series
127 pages
Mobile Computing Quantum (Motivationbank - In)
PDF
50% (2)
Mobile Computing Quantum (Motivationbank - In)
97 pages
TAFL Quantum
PDF
100% (1)
TAFL Quantum
78 pages
Aktu Computer Network Quantum Rotated 6th Sem
PDF
50% (4)
Aktu Computer Network Quantum Rotated 6th Sem
84 pages
Theory of Automata and Formal Languages
PDF
0% (1)
Theory of Automata and Formal Languages
79 pages
Data Analytics Quantum
PDF
75% (4)
Data Analytics Quantum
142 pages
Operating System Quantum Book For Aktu Students
PDF
100% (5)
Operating System Quantum Book For Aktu Students
96 pages
Soft Computing Quantum
PDF
80% (5)
Soft Computing Quantum
84 pages
AI Quantum
PDF
0% (1)
AI Quantum
58 pages
Data Warehouse and Data Mining Quantum
PDF
No ratings yet
Data Warehouse and Data Mining Quantum
69 pages
Cloud Computing All Unit More at QuantumSupply
PDF
100% (5)
Cloud Computing All Unit More at QuantumSupply
89 pages
Artificial Intelligence KCS - 071 (7TH)
PDF
100% (5)
Artificial Intelligence KCS - 071 (7TH)
60 pages
Big Data Quantum
PDF
100% (1)
Big Data Quantum
78 pages
SPM Latest Quantum
PDF
No ratings yet
SPM Latest Quantum
91 pages
Software Engineering Quantum
PDF
86% (7)
Software Engineering Quantum
85 pages
Database Management Quantum Seb
PDF
50% (4)
Database Management Quantum Seb
284 pages
Hci Quantum
PDF
67% (3)
Hci Quantum
63 pages
Renewable Energy Resources Quantum
PDF
50% (2)
Renewable Energy Resources Quantum
83 pages
Data Compression
PDF
0% (1)
Data Compression
75 pages
DAA Quantum PDF
PDF
62% (26)
DAA Quantum PDF
111 pages
OOSD Quantum (Unit 2,3,4,5)
PDF
67% (3)
OOSD Quantum (Unit 2,3,4,5)
136 pages
Data Compression Quantum
PDF
100% (1)
Data Compression Quantum
82 pages
Quantum Web Technology Kcs 602
PDF
No ratings yet
Quantum Web Technology Kcs 602
338 pages
Compiler Design Quantum For AKTU
PDF
67% (9)
Compiler Design Quantum For AKTU
78 pages
Dbms Quantum
PDF
87% (23)
Dbms Quantum
97 pages
DATA WAREHOUSE AKTU QUESTION PAPERS
PDF
100% (1)
DATA WAREHOUSE AKTU QUESTION PAPERS
7 pages
Rural Devlopment Administration and Planning Quantum
PDF
100% (2)
Rural Devlopment Administration and Planning Quantum
65 pages
Project Management Entrepreneurship Quantum Aktu
PDF
No ratings yet
Project Management Entrepreneurship Quantum Aktu
68 pages
Constitution of India Law & Engineering (Ask)
PDF
No ratings yet
Constitution of India Law & Engineering (Ask)
64 pages
Cloud Computing Quantum Koe 081 Compress
PDF
No ratings yet
Cloud Computing Quantum Koe 081 Compress
79 pages
Software Testing Aktu
PDF
0% (1)
Software Testing Aktu
106 pages
Unit 1 DBMS Aktu Notes
PDF
100% (1)
Unit 1 DBMS Aktu Notes
21 pages
ITCS Unit 1 Notes knc552
PDF
100% (1)
ITCS Unit 1 Notes knc552
23 pages
Renewable Energy Resource (KOE-074)
PDF
No ratings yet
Renewable Energy Resource (KOE-074)
83 pages
Artificial Intelligence KCS - 071 (7TH)
PDF
100% (1)
Artificial Intelligence KCS - 071 (7TH)
60 pages
Cryptography and Network Security Quantum PDF
PDF
No ratings yet
Cryptography and Network Security Quantum PDF
44 pages
Quantum Design and Analysis of Algorithms Full PDF
PDF
100% (1)
Quantum Design and Analysis of Algorithms Full PDF
196 pages
Software Testing Cam Scanned Quantum Aktu
PDF
No ratings yet
Software Testing Cam Scanned Quantum Aktu
105 pages
MLT Quantum Aktu PDF
PDF
33% (3)
MLT Quantum Aktu PDF
160 pages
NLP Quantum
PDF
No ratings yet
NLP Quantum
126 pages
DSTL Quantum
PDF
No ratings yet
DSTL Quantum
134 pages
IT8075-UNIT-5-Best-methods-of-staff-selection-Motivation SPM
PDF
No ratings yet
IT8075-UNIT-5-Best-methods-of-staff-selection-Motivation SPM
35 pages
Cloud Computing
PDF
No ratings yet
Cloud Computing
88 pages
Cloud Computing - Rotated
PDF
No ratings yet
Cloud Computing - Rotated
88 pages
Cloudcomputing
PDF
No ratings yet
Cloudcomputing
70 pages
Cloud Computing
PDF
No ratings yet
Cloud Computing
137 pages
Cloud-Computing Quantum
PDF
No ratings yet
Cloud-Computing Quantum
137 pages
Quantum Cloud Computing
PDF
No ratings yet
Quantum Cloud Computing
70 pages
Quantum
PDF
No ratings yet
Quantum
137 pages