0% found this document useful (0 votes)
56 views13 pages

Cloud Unit 5

SOA and cloud, SOA and IAAS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views13 pages

Cloud Unit 5

SOA and cloud, SOA and IAAS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Chameli Devi Group of Institutions

Department of Information Technology


Subject: Cloud Computing (IT702 [B])

SOA and cloud, SOA and IAAS, cloud infrastructure benchmarks, OLAP, business intelligence, e-Business,
ISV, Cloud performance monitoring commands, issues in cloud computing. QoS issues in cloud, mobile
cloud computing, Inter cloud issues, Sky computing, Cloud Computing Platform, Xen Cloud Platform,
Eucalyptus, OpenNebula, Nimbus, TPlatform, Apache Virtual Computing Lab (vCL), Anomaly Elastic
Computing Platform.

UNIT V

SOA AND CLOUD


Cloud Computing and Service Orientated Architecture (SOA), cloud computing has many services that can
be viewed as a stack of service categories. These service categories include Infrastructure-as-a-Service
(laaS, Platform-asS-a-Service (PaaS), Storage-as-a-Service, Components-as-a-Service, Software-as-a-Service
(SaaS) and Cloud Clients.
PEOPLE PROCESS
01 Empower 02 Agn IT with
decision Makers tusiness operations

SOA
Service Oriented
Architecture

PLATFORM PRACTICE
03 Increase 04 Employ best
Operational efficiency pracioe methology
Figure 5.1: SOA framework
sOA is a framework that allows business processes to deliver interoperability and rapid delivery of
functionality. It helps system-to-system integration by creating loosely coupled services that can be reused
for multiple purposes. The concept of SOA is similar to Object-Orientated Programming where objects are
generalized so that they can be reused for multiple purposes.
Similarities between Cloud Computing and SOA:
Reuse - Conceptually speaking, the idea of reuse is inherent both in Cloud Computing and SOA.
As needed basis In Cloud Computing, the services are provided to the user are on-demand and as
needed. SOA is similar to this since the system-to-system services are on-demand and as needed as
well.
Network Dependency - Cloud Computing and SOA both require an available and reliable network.
If a network does not exist then the cloud services provided over the Internet would not be
possible. Similarly, if a network does not exist then the communications between systems would
not be possible. Thus, both Cloud Computing and SOA are dependent on a network.
Cloud Contracts In Cloud Computing, contracts entail the mutual agreement between an
organization and cloud service providers. In cloud contracts, there is a cloud service provider and a
cloud service consumer (the organization). In the case of SOA, contracts are important and can be
either external (e.g., Yahoo! Pipes) and/or internal (e.g., organizational system integration). In SOA

O Overview Q Find in PDF Rel

Download
contracts, there are service producer(s) and service consumer(s) that are conceptually similar to
cloud contracts.

Differences between Cloud Computing and sOA:


Despite the similarities between Cloud Computing and SOA, they are not the same. Following are some of
the differences between them:
Outcome vs. Technology - In Cloud Computing, we are paying for the outcome but in SOA we are
paying for technology.
" External vs. External and Internal Point-of-View - In Cloud Computing, the services that
organizations get are from external organization but in SOA these services can be either from
external organizations (e.g. Yahoo! Pipes) and internaly (e.g., system-to-system integration
between two or more systems).
laaS, PaaS, Saas vs. Software Components In Cloud Computing, the services provided can go up
and down the stack but in SOA the services are software components.
SOA AND IAAS
sOA principles of service are applied in case of laas. It provides infrastructure elements as a service. Cloud
Infrastructure has many service components. Services can be divided into four domains
Application Services
Information Services
Common IT services
Infrastructure Services
SOA based Cloud Infrastructure steps enterprises that intend to harness cloud computing must consider
the following steps
Analysis and Strategy
Planning
Implementation
Value-driven

CLOUD INFRASTRUCTURE BENCHMARKS


The Cloud benchmark measures the perfomance of infrastructure as-a-service (laaS) cloud
implementations. The benchmark stresses provisioning as well as runtime aspects of a cloud using i/0 and
CPU intensive cloud computing workloads.
The primary goal is to provide metrics that quantify not only the relative performance and capacities of a
cloud but also how typical cloud application workloads behave as the underlying cloud resources are
stretched and approach full capacity. The primary goals and objectives of the benchmark are:
Stress the provisioning, compute, storage, and network of acloud with multiple multi-instance workloads,
subject to strict Quality of Service (QoS) requirements.
Place limited requirements on the internal architecture of the cloud. Place no requirements for an instance
configuration. Acloud provider may utilize a physical machine, a virtual machine, or a container as an
instance type. A cloud provider is free to choose CPU (virtual CPU or core pinning), memory, disk
(ephemeral disk or block storage), and network configuration for an instance type.
Do not require a hypervisor or virtualization layer.
Use workloads that resemble those that typically run in Cloud such as social media applications and
big data analytics.
Support multi-tenancy.

The benchmark reports four primary metrics:


Replicated Application Instances reports the total number of valid Als that have completed at least
one application iteration at the point the test ends. The total copies reported is the sum of the Valid
Als for each workload (KMeans and YCSB) where the number of Valid Als for either workload
cannot exceed 60% of the total. The other primary metrics are calculated based on conditions when
this number of valid Als is achieved.
Performance Score aggregates the workload scores for all valid Als to represent the total work
done at the reported number of Replicated Application Instances. It is the sum of the KMeans and
YCSB workload perfomance scores normalized using the reference platfom. The reference
platform values used are a composite of baseline metrics from several different white-box and
black-box clouds. Since the Performance Score is normalized, it is a unit-less metric.
Relative Scalability measures whether the work performed by application instances scales linearly
in a cloud. In a perfect cloud, when multiple Als run concurrently each Al offer nearly the same level
of performance as that measured for an Al running similar work during the baseline phase when
the tester introduces no other load. Relative Scalability is expressed as a percentage (out of 100).
Mean Instance Provisioning Time averages the provisioning time for instances from all valid
application instances. Each instance provisioning time measurement is the time from the initial
instance provisioning request to connectivity on port 22 (ssh).

OLAP
OLAP (Online Analytical Processing) is the technology behind many Business Intelligence (BI) applications.
OLAP 0s a powerful technology for data discovery, including capabilities for limitless report viewing,
complex analytical calculations, and predictive "what if" scenario (budget, forecast) planning.
A Data warehouse would extract information from multiple data sources and formats like text files, excel
sheet, multimedia files, etc.
The extracted data is cleaned and transformed. Data is loaded into an OLAP server (or OLAP cube) where
information is pre-calculated in advance for further analysis.
Basic analytical operations of OLAP
Four types of analytical operations in OLAP are:
Roll-up
Drill-down
Slice and dice
" Pivot (rotate)
1) Roll-up: Roll-up is also known as "consolidation" or "aggregation." The Roll-up operation can be
performed in 2 ways
" Reducing dimensions
Climbing up concept hierarchy. Concept hierarchy is a system of grouping things based on their
order or level.
2) Drill-down: In drill-down data is fragmented into smaller parts. It is the opposite of the rollup process. It
can be done via
Moving down the concept hierarchy
Increasing a dimension
3) Slice: Here, one dimension is selected, and a new sub-cube is created.
Dice: This operation is similar a slice. The difference in dice is user select 2 or more dimensions that
result in the creation of a sub-cube.
4) Pivot: In Pivot, user rotate the data axes to provide a substitute presentation of data.

Types of OLAP:
Table 5.1: Types of OLAP
Type of OLAP Explanation

Relational OLAP(ROLAP): ROLAP is an extended RDBMS along with multidimensional data


mapping to perform the standard relational operation.

Multidimensional OLAP (MOLAP) MOLAP Implements operation in multidimensional data.


Hybrid Online Analytical Processing| In HOLAP approach the aggregated totals are
stored in a
(HOLAP) multidimensional database while the detailed data is stored in the
relational database. This offers both data efficiency of the ROLAP
model and the performance of the MOLAP model.

Desktop OLAP (DOLAP) In Desktop OLAP, a user downloads a part of the data from the
database locally, or on their desktop and analyze it.

DOLAP is relatively cheaper to deploy as it offers very few


functionalities compares to other OLAP systems.

Web OLAP (WOLAP) Web OLAP which is OLAP system accessible via the web browser.
WOLAP is a three-tiered architecture. It consists of three
components: client, middleware, and a database server.

Mobile OLAP: Mobile OLAP helps users to access and analyze OLAP data using
their mobile devices

Spatial OLAP : sOLAP is created to facilitate management of both spatial and


non-spatial data ina Geographic Information system (GIS)

BUSINESS INTELLIGENCE
Business intelligence (BI) combines business analytics, data mining, data visualization, data tools and
infrastructure, and best practices to help organizations to make more data-driven decisions. Business
intelligence (BI) comprises the strategies and technologies used by enterprises for the data analysis of
business information. BI technologies provide historical, curent, and predictive vievws of business
operations. Common functions of business intelligence technologies include reporting, online analytical
processing, analytics, data mining, process mining, complex event processing, business performance
management, benchmarking, text mining. predictive analytics, and prescriptive analytics. Bl technologies
can handle large amounts of structured and sometimes unstructured data to help identify, develop, and
otherwise create new strategic business opportunities. They aim to allow for the easy interpretation of
these big data. Identifying new opportunities and implementing an effective strategy based on insights can
provide businesses with a competitive market advantage and long-term stability.
Business intelligence can be used by enterprises to support a wide range of business decisions ranging
from operational to strategic. Basic operating decisions include product positioning or pricing. Strategic
business decisions involve priorities, goals, and directions at the broadest level. In all cases, BIis most
effective when it combines data derived from the market in which a company operates (external data) with
data from company sources internal to the business such as financial and operations data (internal data).
When combined, external and internal data can provide a complete picture which, in effect, creates an
"intelligence" that cannot be derived from any singular set of data. Among myriad uses, business
intelligence tools empower organizations to gain insight into new markets, to assess demand and
suitability of products and services for different market segments, and to gauge the impact of marketing
efforts.

E-BUSINESS
changing demand and scenarios of
Cloud Computing enables an e-commerce application to cater to the demand, traffic, and seasonal
to the
the market. It allows to upscale or downscale the services according
spikes. Cloud provides the few advantages that business needs as the business grows.
1. Scalability: Cloud hosting allows user to build his e-commerce presence as quickly
Provisioningmore servers
The scalability of the cloud perfectly complements the needs of the retail sector. the growth.
will slow down
on our own or securing the funds to build a bigger IT infrastructure
e-commerce site: traffic
2. Stability: New ad campaigns or a new product launch mean one thing for the
Prepare for those traffic
spikes. The power of cloud hosting provides superior stability for online retail.
of mind.
spikes by hosting the IT infrastructure in state-of-the-art data centers for peace on a
the e-commerce site is hosted
3. Speed: For any e-commnerce business, those are sobering statistics, if
infrastructure could
powerful cloud platform, then user will get benefited from speeds that no on-site
promise. A reliable e-commerce site will translate into positive sales for the business.
4. Savings: For SMEs who are beginning build their online presence and reputation, cloud computing
cloud hosting, profits can be
offers crucial savings. Because user only pays for what he need and use with
re-invested into creative ways to grow the business.
trusting that user
5. Security: Trust is foundational to the e-commerce model. Not only are customers
product, they are trust that their payment details and other information are
accurately describe the
transmitted securely.

ISV
run on one or more
An ISV (independent software vendor) makes and sells software products that
computer hardware or operating system (0S) platforms. ISVs typically provide software in conjunction
with
software producer builds
a hardware, software or cloud platform provider. In the case of hardware, a
software to run on a particular vendor or vendors' hardware platform and the OSes the platform supports.
embedding
An ISV may also incorporate software from a software platform provider into its offering by
database technology from Microsoft or Oracle.
Brand Legend
1 Brand App Stan or knd
Vendor Activity EMBT Acthvity Process

Use Brand for APP

Create [Link] App epckar 5. Review


App Feedback

+
Aprove
Reject
Sunit te Store APP Challenge
Reject
APP

3, Automated 4 Manual 6 Review


Tests
Tests Pas Review Challenge

Publish
7. Vendor App Besie
L Publish App
Rrdew Congleted

Figure 5.2: Process for ISV's to launch software


As the cloud computing mnodel has grown more pervasive, ISVs have increasingly targeted the cloud as a
vehicle for delivering software by offering products on software as a service (Saas) basis. In this delivery
method, an ISV may sell its software through a public cloud or cloud marketplace. Examples include
Amazon Web Services (AWS), Microsoft Azure and Salesforce AppExchange.
CLOUD PERFORMANCE MONITORING COMMANDS
Cloud Monitoring Tools
1. Amazon Cloudwatch
AWS. It lets
Amazon Web Services offers to monitor cloud resources and applications running on Amazon
such as Amazon EBS volumes
us view and track metrics on Amazon EC2 instances and other AWS resources
and statistics,
and Amazon RDS DB instances. We can also use it to set alarms, store log files, view graphs
and monitor or react to AWS resource changes.
can use this
Amazon Cloudwatch gives an insight into the system's overall health and performance. We
information to optimize our application's operations.

2. Microsoft Cloud Monitoring


Monitoring to monitor our
If we run user applications on Microsoft Azure, we can consider Microsoft Cloud
workload. MCM gives us immediate insights across our workloads by monitoring applications, analyzing log
files, and identifying security threats.
utilization,
Its built-in cloud monitoring tools are easy to set up. They provide a full view of the
performance, and health of our applications, infrastructure, and workloads.

3. AppDynamics
AppDynamics provides cloud-based network monitoring tools for assessing application performance and
of cloud
accelerating operations shift. User can use the system to maximize the control and visibility
applications in crucial laaS/PaaS platforms such as Microsoft Azure, Pivotal Cloud Foundry, and AWS.
AppDynamics competes heavily with other application management solutions such as SolarWinds,
Datadog, and New Relic.
The software enables users to learn the real state of their cloud applications down to the business
transaction and code level. It can effortlessly adapt to any software or infrastructure environment. The
new acquisition by Cisco Systems will only magnify AppDynamic's capabilities.

4. BMC TrueSight Pulse


BMC helps us boost our multi-cloud operations performance and cost management. It helps measure end
user experience, monitor infrastructure resources, and detect problems proactively. It gives us the chance
to develop an all-around cloud operations management solution. With BMC, user can plan, run, and
optimize multiple cloud platforms, including Azure and AWS, among others.
BMC can enable user to track and manage cloud costs, eliminate waste by optimizing resource usage, and
deploy the right resources at the right price. User can also use it to break down cloud costs and align cloud
expenses with business needs.

5. DX Infrastructure Manager (IM)


DX Infrastructure Manager is a unified infrastructure management platform that delivers intelligent
analytics to the task of infrastructure monitoring. DX IM provides a proactive method to troubleshooting
issues that affect the performance of cloud infrastructure. The platform manages networks, servers,
storage databases, and applications deployed using any configuration.
DX IM makes use of inteligent analytics to map out trends and patterns which simplify troubleshooting and
reporting activities. The platform is customizable, and enterprises can build personalized dashboards that
enhance visualization. The monitoring tool comes equipped with numerous probes for monitoring every
aspect of a cloud ecosystem. We can also choose to integrate DX IM into Incident Management Tools to
enhance their infrastructure monitoring capabilities.

ISSUES IN CLOUD COMPUTING


Some of the issues and challenges are discussed below:
Security: When we save our data or run our software into others hard disk using others CPU appears to be
very risky. Organization's data and software face serious risk of security issues like data loss, phishing,
botnet etc. Some security concerns are given below:
Security concern 1: Control on physical security is lost in cloud computing because resources
are shared with other companies and no one knows where the resources are run.
Security Concern 2: Laws are violated by the company which increase the risk of data seizure
by the foreign government.
Security Concern 3: There is storage incompatibility between different cloud services vendors
when the user wants to shift from one cloud to another type of cloud (Google cloud is
incompatible with Microsoft cloud).
Security concern 4: There is no common standard to ensure the data integrity till now.

Costing Issue: The tradeoffs amongst computation, communication and integration must be
considered by cloud consumer. Infrastructure cost is reduced significantly while migrating from one cloud
model to other, but it raises data communication cost. For example, transferring organization's data cost to
and from community cloud to public cloud and the cost per unit of computing resources used will be
higher. Particularly this problem is prominent when consumer uses the hybrid cloud deployment model,
because in this model data is distributed among number of public, private or community clouds.
SLA Issue: While shifting the core business from one cloud model to another consumer need to
make sure the quality, availability, reliability and performance of the underlying resources. The
consumer needs to get guarantee from the service provider on service delivery. This guarantee is
given through service level agreements (SLAs). The issue lies in defining the SLAs; The SLA should be
written in such a way that it satisfies the consumers' expectations. It must maintain a balance between
expressiveness and complicatedness. Another issue is the different type of cloud will need different SLA
meta-specifications. This also raises many implementation issues for the service providers.
Migration Issue: According to the IDC survey which was conducted in 2008, when data of
organizations is shifted from one cloud to another there are some security or privacy issues. IT system
IT management and personal application are most easily moved. But organizations are less like
moving from IAAS to SaaS cloud, because marginal functions are out sourced to the reluctant in
cloud and core
activities are kept in house.
Predictable and unpredictable workloads: CPU, storage and network are all
cloud computing. Less power is required by these virtualized resources when virtualized resources in
type of data centers. Virtualized environment is made available to the user withcompared to conventional
the help of these virtual
machines (VMs). Large fluctuating workloads get allotted to these VMs. The load may
on (VMs) due to the growing demand of application. The workloads of be hugely increase
these types can be classified as
predictable and unpredictable workloads.
Homogenous and Heterogeneous Workload: In cloud there are basically two types
homogeneous and heterogeneous. Workdoad with similar type of configuration (i.e. ofnoworkloads
of
namely
RAM, storage and execution time required etc.) is called CPU required,
heterogeneous workload is managed and hosted by different resource homogeneous workload. However,
at different levels of configuration. So we have to vendors at the same level or
develop cloud system in such a way that it can
accommodate both type of workload.
Transactional workload and Batch workload: Transaction workload is
we required user input in case of transactional workload different from Batch workload, as
but in batch workload there is no need of
user input. Online transactional system is an example of
are pre-emptive whereas batch workload is transactional workload. Transactional workloads
but batch workload fluctuates. An efficient non-pre-emptive. Transactional workloads do not fluctuate
resource allocation algorithm is required to handle both these
type of workloads.
Flexibility: Flexibility in cloud means how the fluctuation
be handled dynamically. As the time in the requirement of the resources can
increases, demand of the resources may grow, these
must be automatically perceive by the cloud and demands
efficient resource management facility. should be enhanced. Acloud should have an
Maximization of Resource and minimization of costs:
minimize overall cost of operation are the two important The maximization of resource utilization and
should be provided by a robust cloud to its constraints in cloud. An uninterrupted service
users. For this purpose the cost of the service
should be kept
18:37 3.90 IYe
KB/S 4 73%

[s] 8 /13

low. Efficient techniques should be adopted to monitor


the resource usages and minimize resource
cost. usage
Virtual Machine Migration: Insufficient resource
handling in cloud can be handled by using Virtual
machine migration method. In this method VMs can be
accommodate the resources. migrated from one host to another host to
Efficient Energy Allocation: Incloud data centre the carbon emission is too high, due
of large number of computing recourses. to processing
Therefore
reduce the carbon emission and are energy efficient. such techniques should be adopted which can
Handling Long Running Jobs: In cloud some types of jobs run for
resources should be available without any interruption or long hours. For these types of jobs
adopted to detect unavailability or failure and failure. Automatic techniques should be
then
available resources. This process must be carried out in suchautomatically transfer the workload to the
a less time so that user can not notice the
interruption or failure. un

QOS ISSUES IN CLOUD


It is a challenge to implement QoS in cloud
quality of service to the cloud applications. computing applications. There are many techniques to
provide
provisioning are some techniques used to achieve Scheduling,
that goal.
admission control and dynamic resource
1- Scheduling: Cloud service scheduling
categorized
user level scheduling deals with problems raised by into two categories: user level and system level. At
customer. Market based and auction based service providing between both service provider
schedulers and
resources. Market based resource allocation is powerful are fit for ruling the supply and demand
in cloud computing environment where
of cloud
are handed over to user as a service. resources
The system level scheduling handles with
the datacenter. Datacenter contain many resource management in
scheduling these requests to the physical physical machines
machines, Million request sent from user's side,
performance of datacenter. Service provisioning in cloud done in datacenter. This scheduling affect the
SLA is the contract between service systems based on Service Level Agreement
provider and customer (SLA).
the nonfunctional requirement mentioning the terms of agreement including
2- Admission Control: The main
represented as QoS.
purpose of admission control is to provide
admission control time, the Infrastructure Provider strong performance. At
fundamental computational and networking necessities (IP) must consider the extra
requirement
that may be required to be added toalong with the
become flexible. In many cases, these flexible
requirements. requirements may be very large comparing it toruntime so it
the normal
For example, if there are many users are
virtual machines are required more and that working on cloud application with high
of the basic ones. So that, may be added at runtime many divergence, the number of
the times multiple of the number
requirements and therefore the costnumber of flexible requirements plays
of hosting the service. important role in the total
3- Resource provisioning:
Dynamic
the cloud application. Resource resource provisioning is the process of assigning available
right way. Resource provisioning allocation will make services suffer resources to
will solve this problem by allowing if the allocation not managed in the
resources of modules individually. Resource the service providers to manage
the
provider services activities to allocate Allocation Strategy (RAS) is all about
insufficient resources within the limit of cloud integrating service
meets the needs of the cloud environment so that it
application.
complete the user task. The order and It need the demand and type
of resources for each
allocation time for resources are inputs application to
for optimal RAS.
MOBILE CLOUD COMPUTING
Mobile devices are constrained by
their processing power,
computing provides an illusion of infinite battery life and storage.
combining the mobile devices and cloudcomputing resources. Mobile cloud computing isHowever, cloud
a new platform
computing to create a new
infrastructure, whereby cloud
performs the heavy lifting of computing-intensive tasks and storing massive amounts of data. In this new
architecture, data processing and data storage happen outside of mobile devices.

Mobile applications leverage this IT architecture to generate the following advantages:


Extended battery life
Improvement in data storage capacity and processing power
Improved synchronization of data due to "store in one place, access from anywhere" policy
Improved reliability and scalability
Ease of integration

The following factors are fostering the adoption of mobile cloud computing:
Trends and demands: customers expect the convenience of using companies' websites or
application from anywhere and at anytime. Mobile devices can provide this convenience. Enterprise
users require always-on access to business applications and collaborative services so that they can
increase their productivity from anywhere, even when they are on the commute.
Improved and increased broadband coverage: 3G and 4G along with WiFi, femto-cells, fixed
wireless and so on are providing better connectivity for mobile devices.
Enabling technologies: HTML5, Css3, hypervisor for mobile devices, cloudlets and Web 4.0 will
drive adoption of mobile cloud computing
INTER CLOUD ISSUES
The common issues in inter cloud are:
Interoperability and Portability
High Performance Heterogeneous Cloud Infrastructures
Distribution across locations
Security Mechanisms Across clouds
Network Management
Service Discovery &Composition
Business Process Management
Dynamic Configuration, Provisioning, and Orchestration of Cloud Resources
SKY COMPUTING
Sky Computing is an emerging computing model where resources from multiple clouds providers are
leveraged to create large scale distributed infrastructures. The characteristics of sky computing are:
Control on Resources: Sky computing allows users to control resources on their own. So trust
relationships within sky computing are the same as those within a traditional non distributed site,
simplifying how remote resources interact.
Scalability: It is dynamically scalable as resources are distributed over several clouds.
Security: When in sky computing we deploy a single appliance with a specific provider, we rely on
basic seaurity and contextualization measures this provider - specific networking & security
context. So security relationships are more complex requires provider independent methods to
establish a security & configuration context.
Applications: Seasonal e-commerce web server, event based alert systems etc
Working of Sky Computing
When a remote user leases a resource, the service provider turns control of that resource over to the user.
This change was enabled when a free and efficient virtualization solution is available. To construct a sky
virtual cluster using user level virtual network - Vine following steps are required.
1. Preparation:-obtain a ViNe image is available from the science cloud marketplace. This image is capable
of providing and integrating context information.
2. Deployment: - Start a ViNe VM in each site which provides virtual routers used as gateways by nodes
that do not run ViNe software. Start the desired number of compute VMs at each provider site. The
contextualized images are configured to automatically (securely) contact the context broker to provide
use VRs to reach nodes
appropriate networking and security information and adjust network routes to
different provider sites so that all
crossing site boundaries. The configuration exchange includes VMs on
VMS can behave as a single virtual cluster.
into the virtual
3. Usage:-Upload inputs and start the desired application (typically, by simply logging
cluster and using a command-line interface).
describes the VN
4. Routing :- It requires two table as a) Local network description table (LNDT) - which
for which a VR is
membership of a node, b)GIlobal network description table - which describes sub network
responsible.

CLOUD COMPUTING PLATFORM


a range of
Cloud Platform is a suite of public cloud computing services offered. The platform includes
the popular
hosted services for compute, storage and application development. Figure represents some of
cloud platforms

NAEUS

ABICLOLI

PLATFOFE

EUCALT
PATFORN

OPEN
BSULA

Figure 5.3: Platforms of Cloud Computing

XEN CLOUD PLATFORM


not support full
Xen was launched in 2010 by Xen organization ([Link]) for laaS services. But it do
of cloud. It works as abstraction layer between hardware and OS. This platform is used by
architecture
there are XCP hosts that
many cloud vendors like Amazon EC2, Nimbus etc. In the architecture of XCP,
well as sharing of
works behind its working as shown in figure. These are used to host VM on server as It also sends the
resources. There is another host known as Master XCP which has all administrative rights.
messages to other XCP hosts

eed C? Host

Prhate Claul

SCP Host
Saster SCP

Shured Srage

Figure 5.4: XEN cloud platform

EUCALYPTUS
systems. It is
Eucalyptus stands by Elastic Utility Computing Architecture for linking the programs to useful
mainly based on private cloud and was developed by California University, Santa Barbara. Basically, it is an
to perform many
open source computing environment framework. By using eucalyptus, users are able
can be used without
functions like start, control, shut down, cleaning of virtual machines etc. Eucalyptus
requiring resources and further demands minimum modification and maximum extension. It also
virtual network that isolates network traffic of various users. Figure shows the Eucalyptus provides
architecture.
Cht APL

Cload Cool
Cut

Cuter Node Storae


Coralr Couteolle Coenol

Figure 5.5: Eucalyptus cloud platform

Eucalyptus platform has four basic components namely node controller, cluster controller, storage
controller and cloud controller. Node Controller runs on each and every node and is responsible for
handling queries requested by other users. It also stores the other information like state of instances of
VMs. Cluster Controller controls all the nodes that are interconnected form a virtual cluster and collects
the information from VM and schedule its extension. Storage Controller is responsible for storing images
stored on virtual machines so that these may be accessed in future. Cloud Controller is basically manager
of this cloud. It is responsible for all the queries i.e. making decisions and implementing them.

OPENNEBULA
This platform can be used on public, private as well as hybrid cloud. It follows the framework of open
source cloud service. The biggest advantage of using Open Nebula platform is that it can dynamically
extend the infrastructure of any user i.e. the data centers or clusters can be set to make them their
infrastructure property flexible. Storage, network and virtual techniques can easily by synchronize. It
basically includes three technologies i.e. virtualization, storage and network. Open Nebula offers various
advantages such as adjustable platform meeting the dynamic requirements of the users, centralized
management of virtually and physically distributed infrastructure, efficient energy consumption, cost
reduction and so on. The architecture of Open Nebula is shown below in figure.
Cloud Us

Arinie Toclh Clond frtfo

Maegemenr Layr

Claul Duvs

Storzge Nerwotk A Serem

Figure 5.6: Open Nebula cloud platform


NIMBUS
It is an open source computing that converts clusters into laas (Infrastructure as a Service). It permits the
users for leasing remote resources and building environment for computing. For deployment of an
application, Nimbus offers a "cloudkit" that further comprises of manager (used for hosting services) and a
repository for images. It also provides a
allocation and configuration of remotesolution namely VWS (Virtual Workspace Services) that can do
resources. Like Eucalyptus, Nimbus also works on
components shown in figure. some
Clovd Conrmer

Cloud Brokes

wakspace Workspace Worlrpace


Pilot Managemer Cozol

Workspace Seryces

Figure 5.7: NIMBUS cloud platform

Table 5.2: Description of Components of NIMBUS


S. No. Name of the component Function
Web Based.
1. Workspace Service Security with GSI authorization and authentication.
Supports Amazon EC2 and WSRF.
Controls VM instances.
Image reconstruction.
2 Workspace Control
Assigning IP and MAC addresses.
Can operate with KVM.
Workspace Resource Open Source.
3.
Management Manage VMs.
Provides virtualization.
4. Workspace Pilot
Handles administration and network signals.

TPLATFORM
This platform is based on PaaS and used to developed web mining applications. The architecture of
TPlatform comprises of three layers as shown in figure. PC Cluster layer supports the harcware
infrastructure being used in data processing.
Data Procesuns Applscatioris

Map Reduce

Big Table

TES

PC PC
Chustes Claste
Clustes Cluster

Figure 5.8: TPlatform cloud platform


While infrastructure consists of all technologies used in architecture i.e. TFS which is similar to GFS, Big
table and Programming model, the data processing application layer is for user only to develop his own
applications.

APACHE VIRTUAL COMPUTING LAB


VCL stands for Virtual Computing Lab. It is a free and open-source cloud computing platform with the
primary goal of delivering dedicated, custom compute environments to users. The computer environments
can range from something as simple as a virtual machine running productivity software to a cluster of
powerful physical servers running complex HPC simulations.
VCL supports provisioning several different types of compute resources including physical bare-metal
machines, virtual machines hosted on several different hypervisors, and traditional computing lab
computers would normally find on a university campus.
The user interface consists of a self-service web portal. Using the portal, users select from a list of
customized environments and make reservations.

VIRTUAL COMPUTINGLAB English C [Link]

HORNE
New Reservation
New Reservation
Current Reserations
Blcck Alocations
Peess sclect the esvicnnent ycu wert ie uas fronthe list
AA Workataton 64 SASEWForecast Wir200s
User Preferences Ceni00 G3 Base (G4 ot VI)
Stetistics AA VChstaton sé4 sASEMFOrecast Va2ncs
Documentation Vstab 0100 Wn/ VW)
Logoat Ubustu 12 10 (VM B4t)
WedoweT Base (54 ot VIt)

Duratoe:1hour

Create Resevaion

Figure 5.9: VLC user interface

Behind the scenes, the scheduling components built into the web portal determine which compute
resources to assign to the reservations. The requested environment is then dynamically provisioned,
secured, and configured allow remote access by the user. The user then remotely connects to the
remote compute environment using remote desktop, SSH, or any of the other supported protocols.
ANOMALY ELASTIC COMPUTING PLATFORM
Anomaly Elastic Cloud Computing Platform (ECP) allows its users to deliver infrastructure-as-a-Service
functionality. Equipped with an intuitive self-service interface, ECP is focused on helping its users build and
deploy applications instead of manage them.
Anomaly Elastic Cloud Computing Platform Key Features:
Self-service interface
Automated APl provisioning
Global scalability
Carrier-class architecture
Built-in firewalls
[Link] marketplace
Modifies offline VM images
Customer-facing API
Various hypervisors

You might also like