Foundations of Cloud Computing and Virtualization
Foundations of Cloud Computing and Virtualization
What is IT?
Encompasses software, hardware, communications, and related services for
information processing.
Examples: taxi‑hailing apps (Uber, DiDi), online hotels (Airbnb), messaging
(WeChat, Viber), e‑retail (Taobao, Amazon).
Challenges to Traditional IT
Slow service rollout – long procurement cycles.
High total cost of ownership (TCO) – low device utilization.
Limited scalability – centralized architecture cannot easily expand.
Latency & reliability issues – I/O lifecycle bottlenecks, heterogeneous devices
hard to manage.
NIST definition:
*“Cloud computing is a model for enabling ubiquitous, convenient, on‑demand network
access to a shared pool of configurable computing resources … that can be rapidly
provisioned and released with minimal management effort or interaction with service
providers.”
Wikipedia:
“On‑demand availability of computer system resources, especially data storage
and computing power, without direct active management by the user.”
Core Features
Feature Description
On‑demand self‑service Users provision compute, storage,
network resources automatically.
Broad network access Services reachable via Internet from
laptops, mobiles, tablets.
Resource pooling Multi‑tenant model; physical/virtual
resources allocated dynamically.
Rapid elasticity Resources scale up/down instantly;
pay‑as‑you‑go.
Measured service Usage metered (CPU hrs, GB storage,
bandwidth) for billing.
Service Models
Model What is provided User responsibility
IaaS (Infrastructure as a Virtual servers, storage, OS, middleware,
Service) networking applications
PaaS (Platform as a Compute + OS + Applications & data
Service) middleware + runtime
SaaS (Software as a Full applications None (just use the app)
Service)
Deployment Models
Model Ownership Access
Public cloud Third‑party provider, Internet
shared
Private cloud Single organization, Internal network
exclusive
Hybrid cloud Combination of public & Both
private, appears as a single
cloud
The timeline shows key events: IBM’s 1964 mainframe experiments, 1999 VMware launch,
2002 Xen open‑source, 2006 KVM introduction, 2013 Docker, 2014 Rocket, etc. These
milestones illustrate how virtualization matured into a core cloud technology.
What Is Virtualization?
Virtualization Characteristics
Partitioning: Multiple VMs share a physical server’s resources.
Isolation: Faults in one VM do not affect others.
Encapsulation: VM state stored in files → easy migration.
Hardware independence: VMs run on any compatible server.
I/O Virtualization
Approach How it works Advantages Disadvantages
Full emulation Device fully No host driver Poor performance
simulated in needed. (many VM‑Exits).
software (e.g.,
QEMU).
Virtio (paravirtual) Front‑end driver in High throughput, Requires guest
guest ↔ back‑end low CPU usage. driver support.
driver in host via
shared memory.
PCI device Physical PCI(e) Near‑bare‑metal Limited number of
assignment (VT‑d device passed performance. devices; hardware
/ IOMMU) through to guest. cost.
Supporting Tools
QEMU: User‑space emulator for CPU, memory, and full I/O devices. Works with
KVM for accelerated performance.
Libvirt: C‑based API/daemon providing a unified management layer for KVM,
Xen, VMware, Hyper‑V, etc. Enables commands like virsh, virt-manager.
2. Storage Virtualization
Abstracts physical storage into datastores (logical containers).
Supports SAN, NAS, Huawei Distributed Block Storage, and local disks.
Features: thin provisioning, incremental snapshots, live/cold migration, linked
clone, volume expansion.
Definition – Datastore: A logical storage pool that hides underlying device details,
presenting a unified file‑system‑like view for VM disks.
3. Network Virtualization
Implements Distributed Virtual Switch (DVS) with VLAN isolation.
Each Virtual NIC (VNIC) has its own MAC and IP, behaving like a physical NIC.
QoS policies allow bandwidth shaping, priority control, and uplink
aggregation.
5. Security
Network Access Control: VLAN‑based segmentation, dynamic port‑group
changes.
Platform Security: Role‑based access, log management, host hardening, patch
management.
Best Practice: Deploy switches in stacking mode and bind NICs of the same model to
the same plane to avoid single‑NIC failures.
Illustrates two clusters with active/standby VRMs running as VMs, connected to CNAs on
three physical servers. Emphasizes HA design where VRMs reside on separate hosts.
Shows two VMs sharing a single physical GPU that is partitioned into virtual GPUs (vGPU).
This enables high‑performance graphics for multiple tenants while reducing hardware
cost.
🎮 Advanced VM Resource Management
1. Online CPU/Memory Adjustment
vCPU/vRAM can be added online (memory) or offline (CPU).
No VM reboot required for memory; CPU changes take effect after a restart.
✅ Quiz
1. Products in the FusionCompute suite
A. FusionCompute ✅
C. eBackup ✅
D. UltraVR ✅
2. Benefits of FusionCompute
A. Improving resource utilization ✅
B. Improve system availability✅
C. Reduced TCO ✅
D. Green and energy saving ✅
📚 Acronyms & Abbreviations
Acronym Meaning
KVM Kernel‑based Virtual Machine
VMM Virtual Machine Monitor
CNA Compute Node Agent
VRM Virtual Resource Management
DVS Distributed Virtual Switch
HA High Availability
DR Disaster Recovery
CBT Changed Block Tracking
QoS Quality of Service
vGPU Virtual GPU
BMC Baseboard Management Controller
These notes capture the core concepts, architecture, deployment, and operational
features of Huawei FusionCompute, enabling quick reference and study for exams or
📂
practical implementation.## FusionCompute Storage Virtualization Architecture
Key Components
User VMs – run on the host.
Kernel space of the host – driver layer connects to SAN/NAS.
Host user space – hosts file systems, disk drivers, disk tools.
Storage components – NAS, local storage, SAN.
🗂️ Datastore Types
Datastore Virtualized? Features
Virtualized storage ✅ Thin provisioning,
advanced utilization,
security, reliability.
Non‑virtualized storage ❌ Used for Huawei
distributed block storage
or eVol (no virtualization by
default).
Raw Device Mapping
(RDM)
✅ (as whole disk) Direct LUN attachment, no
virtualized features.
The diagram shows VMs with stacked disks connected to FusionCompute, which in turn
links to VIMS and SAN devices, illustrating the storage hierarchy.
Supported File System Formats
VIMS – optimized for VM storage.
NFS (v3) – NAS‑based.
EXT4 – local disk virtualization.
Distributed Lock Manager (DLM)
Implements distributed full‑symmetric lock.
Multiple masters, each handles one lock resource.
Master election: first requester or smallest VIMS node ID; re‑elected on failure.
Heartbeat Types
Disk heartbeat – verifies read/write capability on shared storage.
Network heartbeat – checks inter‑host communication.
Snapshot Lifecycle
1. Create → delta disk generated; source disk becomes read‑only.
2. Rollback → delete delta, revert to source.
3. Delete → merge delta into source, producing a new consolidated disk.
🌐 Network Virtualization
Linux Bridge
Layer‑2 virtual switch; bridges physical NIC (eth0) with tap interfaces (tap0,
tap1).
Shows VMs connected via tap interfaces to a bridge (br0) which binds to the physical NIC,
providing transparent L2 forwarding.
Open vSwitch (OVS)
Software‑based virtual Ethernet switch.
Supports OpenFlow, NetFlow, sFlow, SPAN, RSPAN, LACP, 802.1ag.
Can run in kernel mode or user‑mode with DPDK for high‑performance packet
processing.
Distributed Virtual Switch (DVS)
Acts as a single logical switch across multiple hosts.
Port groups define common attributes (QoS, security) and share a VLAN.
Uplink connects DVS to physical NICs; uplink aggregation provides
load‑balancing.
Two hosts with VMs connected to separate DVS instances, which then link to a hardware
switch, illustrating cross‑host VM communication.
VM Communication on FusionCompute
Depicts VMs (VM1‑VM7) communicating via CNAs and VLANs through a DVS, highlighting
isolation and traffic flow.
🔐 Security Features
Layer‑2 Security Policies
IP‑MAC binding – prevents spoofing; enables IP Source Guard & DAI.
DHCP server quarantine – blocks unauthorized DHCP services.
Security Groups
Collections of VMs sharing the same access rules.
Each VM NIC belongs to one security group.
Trunk Port
Illustrates tagging/untagging of traffic: untagged packets receive PVID 10; tagged packets
for VLAN 10 or 20 are forwarded accordingly.
Access port – single VLAN.
Trunk port – multiple VLANs; used when a VM NIC needs multi‑VLAN tagging.
💻 VM Lifecycle Management
Creation Options
Bare VM – no OS; install later.
Template‑based VM – inherits OS, disks, NICs from template.
Clone – copy of existing VM; can modify attributes during creation.
👤 Account Management
Login Mode Default User / Password Permissions
Common admin / XXXXX System administrator (full
rights).
System sysadmin / XXXXX Service management.
Security secadmin / XXXXX Role‑based security admin
(no user creation).
Auditor secauditor / XXXXX Read‑only log access.
Login mode set at installation; cannot be changed later.
Daily automated backup at 02:00; hourly management data backup; retention
of two backup files.
🛠️ System Configuration
Domain authentication, license updates, logo change.
Login timeout, resource scheduling interval, SNMP station.
VRM deployment mode switch (standalone ↔ active/standby).
📋 Task Management
View task progress, logs, and status via the Task Center.
📚 FusionAccess Overview
Architecture Highlights
Shows TCM/TC, FusionAccess Web Client, LiteAS/AD/DNS/DHCP, vLB/vAG, and cloud
infrastructure (hybrid/public, Kunpeng & x86). Service flow (solid red) and control flow
(dotted red) are distinguished.
VDI vs. IDV – VDI centralizes compute/storage in the data center; IDV uses
local resources on terminals.
Benefits – cloud data storage, automated resource management, high
availability (99.9 %), mobile office support, reduced noise/power, high‑fidelity
display & audio via HDP protocol.
FusionAccess Advantages
Central “Leading HDP Protocol” node points to four benefit boxes: high‑fidelity display,
high‑fidelity audio, peripheral compatibility, multiple virtual channels with flexible control.
High‑fidelity display & audio – superior user experience.
Peripheral compatibility – supports diverse devices.
Multiple virtual channels – flexible control and resource allocation.
Key Takeaways
FusionCompute integrates compute, storage, and network virtualization
through VIMS, DVS, and RDM.
Storage options include virtualized datastores, raw device mapping, and eVol
pools, each with distinct features.
Network virtualization leverages Linux bridge, OVS, and DVS to provide
flexible, secure L2 connectivity, VLAN tagging, QoS, and security policies.
FusionAccess builds on FusionCompute to deliver a cloud‑based desktop
solution with centralized data, high availability, and HDP‑driven high‑fidelity
🖥️
experience. ## HDP Overview & Virtual Channels
Up to 64 virtual channels; each carries a distinct upper‑layer application
protocol.
QoS priorities ensure critical channels (e.g., keyboard & mouse) receive top
priority, enhancing security and user experience.
Compression strategies: lossless for text & UI elements, lossy for natural
images, balancing bandwidth and display quality.
Intelligent bandwidth saving: HDP detects unchanged image regions and
transmits only changed data.
Definition: Virtual channel – a logical pathway within HDP that isolates traffic for
different application types, allowing independent QoS handling.
🔌 Peripheral Compatibility
Supports a wide range of peripherals: USB devices, printers, cameras, TWAIN
scanners, etc.
Port redirection (USB, serial, parallel) maps hardware ports to the remote
desktop.
Device redirection (camera, TWAIN) compresses data before transmission,
reducing bandwidth by up to 10×.
🛡️ High‑Reliability Solution
Hardware reliability: redundant cabinets, power, cooling; servers with
component redundancy & intelligent fault detection.
Network reliability: separate management, service, and storage planes;
stacked switches with redundancy; NICs in active‑standby mode.
Cloud desktop reliability: automatic session reconnection, anti‑collision port
handling, self‑healing agents, and self‑service maintenance console.
Audio Technology
Feature Description
Music compression Uses high‑fidelity codecs for music
streams.
Voice compression VoIP‑optimized codec with denoising.
Latency Transparent transmission on TCs to avoid
buffering.
Sampling Fixed 44.1 kHz, stereo mixing enabled.
Peripheral Redirection
Port redirection: USB, serial, parallel ports forwarded unchanged to VM (high
compatibility, higher bandwidth).
Device redirection: e.g., camera data compressed (H.264) on client, sent to
VM, reducing bandwidth 10×.
The client manager interface lists client groups, showing status, IP, agent version, and
system build date, facilitating centralized thin‑client administration.
📚 Comparison of Common Desktop Protocols
Feature PCoIP ICA/HDX RDP/RemoteFX SPICE HDP
Transmission High Low High Low Low
bandwidth
Image High Medium Low High High
quality
Two‑way Low High Medium High High
audio
Video Low Medium Medium High High
support
Peripheral Low High High Medium High
support
Security High High Medium High High
🏢 Application Scenarios
Secure Office (Intranet/Extranet Isolation)
Logical & physical isolation via dual‑NIC TCs.
One NIC connects to the office network, the other to the service network;
dual‑screen support enables simultaneous access to two desktops.
Branch Offices
Centralized management at HQ; only management traffic traverses WAN
(≈2 Mbit/s, < 50 ms latency).
Local VM traffic stays on‑premises, reducing bandwidth needs and ensuring
continuity during WAN outages.
Office Automation
Integrates with existing AD, DNS, DHCP for seamless authentication and IP
assignment.
Zone‑based data security (red/yellow/green) isolates information by
confidentiality level.
🗂️ Deployment Schemes
Scheme Users Components per Key Specs
VM
All‑in‑one < 500 All components on EulerOS 2.8 (ARM)
a single VM (ITA, / 2.5 (x86),
GaussDB, HDC, 16 vCPU, 16 GB
Cache, WI, License, RAM, 60 GB
LiteAS) sys‑disk, 2 NICs
Standard 500 – 10 000 Split across multiple Similar OS, 8 vCPU,
VMs (e.g., VAG, 4 GB RAM, 40 GB
VLB, VNCProxy sys‑disk per
separate) component VM
Dual‑node Any Same components First NIC = service
(active/standby) as above, deployed plane, second NIC =
on two CNA nodes management plane
for HA (added post‑install)
AD Objects
Domain Controller – hosts the AD database; multiple controllers synchronize
data.
User, Computer, Group, Organizational Unit (OU) – fundamental objects
organized in a hierarchical tree.
Shows the “Move” operation for a user account (tsdadmin) from one container to another
OU, preserving permissions while adopting the target OU’s group policies.
Common AD Operations
Add/Remove users to/from groups.
Enable/disable accounts, reset passwords.
Move objects between OUs.
Rename or delete objects.
🌐 DNS Overview
Distributed database that maps IP addresses ↔ domain names.
Advantages:
Users type easy‑to‑remember names instead of numeric IPs.
Works with the domain controller; the DC registers its role so other
computers can locate it.
The diagram shows the hierarchical DNS tree: Root → Top‑Level Domains (com, edu, gov,
etc.) → Second‑Level Domain (hcia.edu) → Subdomain (fa.hcia.edu) → Host (host‑a, www).
This visual clarifies how domain names are structured from the root down to individual
hosts.
DNS Domain Name Structure
Level Example
Root domain . (implicit)
Top‑Level domain com, edu, gov, int, mil, net, org
Second‑Level domain hcia.edu
Subdomain fa.hcia.edu
Host name host-a (laptop) or www (server)
Definition: Recursive query – the DNS server does all the work to resolve the name for
the client.
Definition: Iterative query – the DNS server points the client to a next‑closest server.
🗂️ DNS Records
Forward lookup zone – resolves domain name → IP address.
Reverse lookup zone – resolves IP address → domain name (creates a PTR
record).
Creating a forward‑lookup host record
Example FQDN: host.vdesktop.huawei.com → IP 192.168.105.0.
Optionally select “Create associated PTR record” to also generate a reverse
entry.
Creating a reverse‑lookup zone
Define the network ID (e.g., 192.168.105) and the zone name becomes
105.168.192.in‑addr.arpa.
📶 DHCP Overview
Protocol at the application layer (uses UDP).
Functions:
Automatically assign IP address, subnet mask, default gateway,
DNS server.
Centralize IP management for the entire network.
Definition: DHCP lease – the time period for which an IP address is allocated to a
client.
The diagram shows a Source VM (CPU, Memory, Disk) cloned into a Target VM. The
Target shares the Disk with the Source, illustrating the “share” relationship of linked
clones.
Comparison Table
Feature Full Copy Linked Clone QuickPrep
System Disk Independent per Shared base + delta Independent (no
VM (thin) Sysprep)
Provisioning Slow Fast Medium
Speed
Storage Use High (duplicate Low (shared base) Medium
disks)
Update Method Update each VM Update base Update each VM
individually template once (no template)
Data Persistence Saves user changes Delta cleared on Saves changes (like
reboot (optional) full copy)
SID Handling Requires Sysprep No Sysprep needed No Sysprep needed
Definition: Sysprep – a Microsoft tool that removes system‑specific data (e.g., SID)
from a Windows image to allow safe cloning.
The flowchart illustrates the four‑step quick‑provision process: create → assign → confirm
→ finish.
The flowchart details the four stages of creating a protocol policy: create group → specify
policies → specify target → finish.
Common Policy Types
Peripherals – USB, printer redirection.
Audio – enable/disable audio redirection, set volume.
Display – resolution, bandwidth, compression.
File & Clipboard – copy‑paste restrictions.
Access Control – IP‑based restrictions, time‑based login limits.
Watermark – overlay for data protection.
The diagram shows the step‑by‑step process for adding a user to a computer in
FusionAccess.
Key Acronyms
AD – Active Directory
OU – Organizational Unit
DNS – Domain Name System
DHCP – Dynamic Host Configuration Protocol
VM – Virtual Machine
SID – Security Identifier
Sysprep – System Preparation Tool (Microsoft)
VAG / VLB – Virtual Access Gateway / Virtual Load Balancer
These notes capture the essential concepts, processes, and configurations needed to
work with Active Directory, DNS/DHCP, and Huawei FusionAccess virtualization
🔐
environments.## Access Control Policies
Access Time Control – restricts VM access during specified time periods.
Gateway Authentication Policy – enables encrypted client‑server connections
using Chinese cryptographic algorithms.
Terminal‑User Binding – a user can log in only from the bound terminal; other
devices are denied.
Terminal‑Desktop Binding – a desktop can be accessed only from its bound
terminal.
Restore Process
1. Go to System → Tasks and Logs → Task Tracing.
2. Locate the Restore task, select the computers, and click Restore.
3. Wait for the task status to become Completed.
Notes
Computers with Assign to multiple users or Assign to a desktop group cannot
be reassigned after unassignment.
Restored computers become available after a ~3‑minute startup delay.
Tip: IP synchronization is allowed only when the computer is in the Running state.
📦 VM Template Management
Updating a Full‑Copy VM Template
1. In FusionCompute, Create → VM → Choose Resource → Install Application
Template.
2. Convert the VM to a Full Copy template.
3. On FusionAccess, select the template and choose Update Template.
The flowchart illustrates the four steps for converting a VM into a template, configuring it,
and cloning it back to a VM.
Post‑Update Actions
After updating a linked‑clone template, delete old VMs and provision new ones,
or recompose system disks.
Prepare services beforehand, as live network traffic may be affected.
🔄 Self‑Service Backup
Enable on end‑user computers via Resources → Desktops → Operation → Set
Backup.
Prerequisites: Assignment status must be Assigned; supported desktop types
are 1:1 dedicated desktops and static pool desktops.
Backup Mode Schedule Storage Location
Local 03:00 daily /var/desktop/backup/
Remote 01:00 daily /var/ftpsite/<component>/
on backup server
Only one backup per desktop is kept; a new backup overwrites the previous
one.
Restoration uses the latest backup prior to the fault.
Weekly Tasks
User VM Restart – recommended every 3–5 days (or weekly for long‑running
VMs).
Backup Function Check – ensure backup data exists according to the backup
policy.
🚫 Forbidden Operations
Category Prohibited Action Risk
Service Delete virtual desktops Users lose access
Network Disable VM NICs, modify Service disruption
routes, delete firewall ports
28511, 28512, 28521,
28522
Process Change default services in System instability
msconfig, disable HDP
services, kill
Local/Network/System
processes
Others Delete files in C:\Program Data loss / security breach
Files\Huawei, enable VM
hibernation, modify HDP
client config, run registry
cleaners
⚠️ Critical Operations
Operation Risk Mitigation
Bulk VM Service interruption if done Perform in low‑traffic
creation/association during peak hours periods
Recompose System Disk Potential data loss (system Only for linked‑clone VMs;
disk) backup data disks first
Restore System Disk Same data‑loss risk as Ensure backup of data
recomposition disks
Adjust VM clock source Service interruption if Adjust during maintenance
changed during active use windows
Concurrent VM updates CPU overload, I/O storms Stagger updates, monitor
alarms
🛡️ O&M Tools
Windows O&M Tool – provides connection inspection, log collection,
peripheral assistance, and process monitoring. Pre‑installed on provisioned
desktops.
Linux Log Collection Tool – auto‑installed on Linux workspaces for log
gathering.
Linux Maintenance Tool – checks workspace status and auto‑rectifies faults.
🔐 Account Management
Password Rotation – change default passwords for all FusionAccess accounts.
Lockout Threshold – set a reasonable login‑failure limit via System → System
Authentication → Lockout Threshold to balance security and usability.
Core Services
Service Function
Nova Compute instance lifecycle management
Neutron Network provisioning and management
Cinder Block storage for instances
Swift Object storage for unstructured data
Glance VM image catalog
Keystone Identity, authentication, and service
catalog
Heat Orchestration (templates, stacks)
Ceilometer Telemetry and metering
Illustrates how devices connect to edge nodes, which in turn integrate with cloud services
(IEF) for processing and management.
🖥️ Edge Computing
Definition: Distributed architecture moving compute, storage, and services
from central data centers to network‑edge nodes.
Advantages
Data privacy (local processing)
Lower latency & faster processing
Cost reduction (less data transfer)
Offline operation capability
Decentralized resilience
Edge‑Cloud Relationship
Edge handles real‑time processing; cloud stores long‑term data and performs
heavy analytics.
Application Scenarios
Smart Campus, Quality Inspection, Smart Mining, Smart Transport.
⛓️ Blockchain Basics
Blockchain = tamper‑proof distributed ledger using cryptographic hashing and
consensus.
Core Concepts
Concept Description
Distributed Ledger Replicated, synchronized database across
participants
Hash Algorithm Verifies data integrity; any change alters
the hash
Consensus Majority agreement on transaction validity
Smart Contract Automated, immutable code triggered by
conditions
Benefits
Higher efficiency, reduced costs, lower risk, stronger trust, transparent audit.
☁️ Cloud Native
Cloud Native = building & running scalable applications that fully exploit cloud
environments (containers, microservices, immutable infrastructure, declarative
APIs).
Components
Container – OS‑level virtualization (e.g., Docker).
Microservice – Small, independent services communicating via APIs.
Service Mesh – Decouples service communication, provides observability &
security.
Immutable Infrastructure – Replace rather than modify running instances.
Declarative APIs – Describe desired state; system converges to it.
Development Pipeline
1. Determine Objective
2. Prepare Data
3. Train Model
4. Evaluate Model
5. Deploy Model
ModelArts Platform
One‑stop AI development (data prep, auto‑labeling, distributed training, model
deployment).
Supports TensorFlow, PyTorch, MindSpore, and custom frameworks.
Enables one‑click model building, shared AI deployment across cloud, edge,
and devices.