Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
397 views63 pages

1 - Cloud Computing Basics

Uploaded by

SWR Automação
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
397 views63 pages

1 - Cloud Computing Basics

Uploaded by

SWR Automação
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 63

Cloud Computing Basics

Foreword

 Enterprises in the fast-growing ICT industry are posing higher


requirements on compute, storage, and networking resources. Within
this context, a new architecture - cloud computing - has emerged to
meet the need for on-demand resources and accelerate business
innovation.

2 Huawei Confidential
Objectives

 Upon completion of this course, you will be able to:


 Understand what cloud computing is, what runs on the cloud, and what you
can achieve with the cloud.
 Understand cutting-edge cloud technologies, future cloud trends,
application scenarios, and cases.
 Understand the benefits and future breakthroughs of cloud computing.

3 Huawei Confidential
Contents

1. Cloud Computing Basics


 Background of Cloud Computing
 Definition of Cloud Computing
 Cloud Computing Is Around Us
 Cloud Computing Models
 Benefits of Cloud Computing

2. Cloud Computing Technologies

4 Huawei Confidential
The Information Explosion Is Coming
 With the prevalence of the mobile Internet and fully connected era, more terminal
devices are being used and data is exploding every day, posing unprecedented
challenges on conventional ICT infrastructure.

PC era Mobile Internet era IoT era


Computers of the Mobile phones of the ARM x86, ARM, DSP, MIPS, FPGA, etc.
x86 architecture architecture

Windows/Linux Android/iOS IoT OS


5 Huawei Confidential
Challenges Faced by Conventional IT Architecture
 The Internet era has brought a large amount of traffic, users, and data to enterprises, but
conventional IT architecture cannot meet the requirements for rapid enterprise development.

Slow service rollout

Difficult expansion

Low reliability

Complex lifecycle management

Latency caused by I/O bottlenecks

High TCO

6 Huawei Confidential
Discussion:
 How can IT enterprises overcome these challenges?

 IT infrastructure transformation

 Resource integration and comprehensive


utilization

 Business collaboration and continuous


?
optimization

7 Huawei Confidential
Enterprises Are Migrating To the Cloud Architecture

Conventional IT
Virtualized architecture Cloud architecture
architecture

App 1 App 2
App 1 App 2

OS OS OS OS
App 1 App 2

OS OS Virtualization Cloud OS

8 Huawei Confidential
Contents

1. Cloud Computing Basics


 Background of Cloud Computing
 Definition of Cloud Computing
 Cloud Computing Is Around Us
 Cloud Computing Models
 Benefits of Cloud Computing

2. Cloud Computing Technologies

9 Huawei Confidential
Cloud Computing Definition
 Cloud computing is a model for enabling ubiquitous, convenient, on-demand network
access to a shared pool of configurable computing resources (e.g., networks, servers,
storage, applications, and services) that can be rapidly provisioned and released with
minimal management effort or service provider interaction.

--National Institute of Standards and Technology (NIST)

 Simply put, the term "cloud" is a metaphor for networks and the Internet, and refers to
an abstraction of the Internet and the infrastructure that underpins it. Computing refers
to computing services provided by a powerful computer with a range of functionalities,
resources, and storage. As such, cloud computing can be viewed as the delivery of on-
demand, measured computing services over the Internet.

10 Huawei Confidential
Contents

1. Cloud Computing Basics


 Background of Cloud Computing
 Definition of Cloud Computing
 Cloud Computing Is Around Us
 Cloud Computing Models
 Benefits of Cloud Computing

2. Cloud Computing Technologies

11 Huawei Confidential
Cloud Services and Applications Around Us (Individuals)

Cloud albums Cloud


music

Cloud Cloud documents


videos
12 Huawei Confidential
Cloud Services and Applications Around Us (Enterprises)
 HUAWEI CLOUD Meeting allows interactive video and voice communications
between people in two or more locations.

Videoconference Livestream

13 Huawei Confidential
E-Gov Cloud - Online Services
 The e-Government cloud enables access to comprehensive public services through the Internet and serves as
an extensive service platform with software, application, and information resources provisioned for
governmental bodies. It utilizes the compute, storage, network, security, and application resources in existing
equipment rooms and leverages cloud computing to offer high reliability, availability, and elasticity.

24/7 e-Gov services:


1 Public services are available to citizens Centralized portal
and enterprises online.
E-Gov: official websites, apps, applets, official accounts, self-
One-stop shop for all services service terminals, etc.
2

Unified user authentication


The e-Gov cloud allows information sharing Basic capabilities Industry applications
and makes collaborative approval possible.

communication
RTC audio and

AI algorithms

automation
Capability Intelligent Intelligent Intelligent

platform
Openness guidance filling pre-review

video

RPA
Virtual lobby managers
3 Virtual lobby managers are always ready to Governmental Intelligent Remote
provide assistance. affairs connectivity interview

Permission H5/Applet Application


AI & RPA robots: management containers management
4 AI robots assist with intelligent pre-review
and RPA robots assist with system data Application base
synchronization, reducing the pressure on
staff and improving service efficiency.

14 Huawei Confidential
Public Cloud
 Simply put, the public cloud enables IT resources to be as accessible as electricity
and water through the Internet.

User Public Cloud


Unified architecture
Unified APIs
Unified ecosystem
Enterprise cloud

15 Huawei Confidential
Contents

1. Cloud Computing Basics


 Background of Cloud Computing
 Definition of Cloud Computing
 Cloud Computing Is Around Us
 Cloud Computing Models
 Benefits of Cloud Computing

2. Cloud Computing Technologies

16 Huawei Confidential
Deployment Models for Cloud Computing

Private cloud

Enterprise firewall
Hybrid cloud

Public cloud

Private cloud: The cloud infrastructure is provisioned for exclusive use by a single organization.
Public cloud: The cloud infrastructure is owned and managed by a third-party provider and shared with
multiple organizations using the public Internet.
Hybrid cloud: This is a combination of public and private clouds, viewed as a single cloud externally.

17 Huawei Confidential
Service Models for Cloud Computing

User-side management
Traditional IT IaaS PaaS SaaS

User-side management
Application Application Application Application

Data Data Data Data


User-side management

Runtime environment Runtime environment Runtime environment Runtime environment

Cloud platform
management
Middleware Middleware Middleware Middleware

Cloud platform
management
OS OS OS OS

Cloud platform
Virtualization Virtualization Virtualization Virtualization

management
Server Server Server Server

Storage Storage Storage Storage

Network Network Network Network

18 Huawei Confidential
Contents

1. Cloud Computing Basics


 Background of Cloud Computing
 Definition of Cloud Computing
 Cloud Computing Is Around Us
 Cloud Computing Models
 Benefits of Cloud Computing

2. Cloud Computing Technologies

19 Huawei Confidential
Benefits of Cloud Computing

On-demand self-service

Broad network access

Resource pooling

Quick deployment and auto scaling

Metered services

20 Huawei Confidential
Eight Common Characteristics of Cloud Computing
 Massive scale
 Homogeneity
 Virtualization
 Resilient computing
 Low-cost software
 Advanced security technologies
 Geographical distribution
 Service orientation

21 Huawei Confidential
Contents

1. Cloud Computing Basics

2. Cloud Computing Technologies


 Compute
 Network
 Storage

23 Huawei Confidential
Overview

Block File Object


Virtualization Container Classic Virtual
storage storage storage
network network

Compute Network Storage

24 Huawei Confidential
What Is Virtualization?
 The virtualization technology refers to the process of creating multiple VMs that share
the hardware resources of a physical server.
 A VM consists of disk files and description files, which are encapsulated in the same folder.
 Multiple VMs running on the server are separately encapsulated in multiple folders and
mutually isolated.
 These folders can be stored in the file system provided by the underlying
storage. Therefore, multiple VMs can be stored or run on a shared medium.

 The key concept behind virtualization involves separating software from hardware by converting "physical"
devices into "logical" folders or files.

25 Huawei Confidential
Virtualization vs. Cloud Computing
 Virtualization is the fundamental technology that powers cloud computing. It transforms
physical hardware into virtual resources. On the other hand, the cloud is an environment
that delivers virtualized resources on-demand through the internet.

Cloud
computing

26 Huawei Confidential
Main Features of Virtualization

Guest OS Guest OS Guest OS

Host OS

Partitioning Isolation
Encapsulation Independence
VM VM

27 Huawei Confidential
Important Virtualization Concepts

Physical server Guest machine


 Guest OS: Virtual machine (VM) OS

Applications
 Guest Machine: VM

Applications  Hypervisor: Virtualization software

Guest OS layer/Virtual machine monitor (VMM)

 Host OS: OS running on a physical machine

Host OS Hypervisor  Host machine: physical machine

Host machine Host machine

28 Huawei Confidential
Computing Resources Around Us
 Computing essentially refers to the process of obtaining information. In the ICT
industry, several resources are needed to calculate data and obtain information.

3 32 GB
GB RAM

Memory

x86

GPU CPU

29 Huawei Confidential
HUAWEI CLOUD Compute Services

Elastic Cloud Server (ECS)


VMs in essence

Auto Scaling (AS)


Increases or decreases the
number of ECSs dynamically
HUAWEI
CLOUD

Image Management
Service (IMS)
Provide OS images for ECSs

30 Huawei Confidential
What Is a Container?
 A container is a lightweight, portable technology for application packaging. It is a
standard unit that packages an application's code and all its dependencies, enabling the
application to run across different computing environments. Simply put, containers are
like standardized boxes that can hold different types of things and be put into different
cabinets.

31 Huawei Confidential
Container Technology Development
 Two challenges in the development of container technology:
 Unified platform
 Usability

1979 2001 2016


2005 2007 2011 2013
Unix Linux Windows
OpenVZ Cgroups Warden Docker
Chroot Vserver Containers

2000 2004 2006


2008 2014
FreeBSD Solaris Process
LXC Rocket
Jails Containers Containers

Container development panorama

32 Huawei Confidential
Difference Between Containers and VMs (1)

Containerized Applications

Application D
Application A

Application C
Application B

Application E

Application F
A c A A A A A

p
p a p
p
p
l
p
p
l
p
p
l
p
p
l
VM VM VM
i i i i i
l
o
i n t p c
a
c
a
c
a
c
a
n
c
a
i l
t
i
t
i
t
i
t
i Application A Application B Application C
o o o o

t o i n n n n

Guest OS Guest OS Guest OS


Containers

Host OS Hypervisor

Infrastructure Infrastructure

Container architecture Virtualization architecture

34 Huawei Confidential
Difference Between Containers and VMs (2)
Item Container VM
Startup speed Seconds Minutes

Virtualization type OS virtualization Hardware virtualization

OS dependency All containers share the host OS. Each VM runs in its own guest OS.

Process isolation with security


Security Complete isolation, which is more secure
risks
Isolation strategy Hypervisor Cgroups

Image size KB to MB GB to TB
Virtualization
On par with physical servers Limited
performance
Per-machine Over 1,000 containers for each
Dozens of VMs
capacity physical machine

35 Huawei Confidential
HUAWEI CLOUD Container Services

Cloud Container CCE


Engine (CCE)
A container instance Node 1 Node N
Pod 1 Pod N Pod 1...N
... Container ... Container
Container

Cloud Container
Instance (CCI)
HUAWEI A container instance Pulls images
CLOUD
CCI
Software Repository for
Container (SWR) Pod 1 SWR
Provides images for Container
container instances ...
Pod N
Container

36 Huawei Confidential
Contents

1. Cloud Computing Basics

2. Cloud Computing Technologies


 Compute
 Network
 Storage

37 Huawei Confidential
What Does a Network Do?

How do
networks work?

38 Huawei Confidential
Basic Concepts of Conventional Networks

VM In network
segment A

VM In network
VM VM VM Source VM
segment B

In network
VM
segment C
Broadcast and Unicast Router
Default Gateway VLAN

VM In network Trunk
segment A

Access Access Access Access Access Access


VM In network
Source VM
segment B

VM VM VM VM VM VM
In network
VM segment C VLAN 1 VLAN 2 VLAN 3 VLAN 1 VLAN 2 VLAN 3

39 Huawei Confidential
Conventional Network Devices

Router Layer 3 switch

Layer 2 switch Network interface card (NIC)

40 Huawei Confidential
What Does a Router Do?

Internet

41 Huawei Confidential
What Does a Layer 2 Switch Do?

Management
Storage switch Service switch
switch

VM VM VM

Physical servers Storage devices Users

42 Huawei Confidential
What Does a Layer 3 Switch Do?

VM VM VM

VMs Storage devices

Physical servers Users

43 Huawei Confidential
What Does a NIC Do?
 NICs are mainly used to connect different devices. Like a telephone card, they
ensure devices can communicate. In addition, NICs can be bound to deliver
higher reliability and better network performance.

44 Huawei Confidential
Basic Concepts of Virtual Networks

Application A Application A Application A

Bins/Libs Bins/Libs Bins/Libs

Guest OS Guest OS Guest OS

Guest machine Guest machine Guest machine

Bridge NAT

Virtual switch

Host machine

45 Huawei Confidential
What Do Bridge and NAT do?

Bridge NAT

Source Source

TAP 0 TAP 1 TAP 2 TAP 0 TAP 1 TAP 2

Source
VM
Source VM

VM VM
Host machine Host machine

46 Huawei Confidential
What Does a Virtual Switch Do?
 Like the bridge and NAT, virtual switches are used to transmit the internal traffic
of VMs to the external network through the network port of the physical server
where the VMs reside. The common virtual switch models include OVS and EVS.

VM 1 VM 2 VM 3 VM 4 VM 5 VM 6

EulerOS EulerOS EulerOS EulerOS EulerOS EulerOS


FusionCompute

Virtual Switch 1 (Web)

Virtual Switch 2 (App)

Server A Server B

47 Huawei Confidential
HUAWEI CLOUD Network Services

Virtual Private Cloud (VPC)


Isolated, private virtual networks
on HUAWEI CLOUD

NAT Gateway
Network address translation
HUAWEI
CLOUD

Elastic IP (EIP)
Independent public IP
resources for ECSs

48 Huawei Confidential
Contents

1. Cloud Computing Basics

2. Cloud Computing Technologies


 Compute
 Network
 Storage

49 Huawei Confidential
How Does Cloud Storage Work?

How do VMs use


the storage
resources?

50 Huawei Confidential
Mainstream Storage Types

Block File Object


storage storage storage

0 1 0 0 0
0 0 1 0 1 Object Object Object
1 0 1 0 0
0 1 1 0 0
1 0 1 0 1 Object Object

0 1 0 1 0

51 Huawei Confidential
Block Storage

 Block storage maps the entire raw disk space to a


server. For example, five disks in a disk array can be
divided into several logical disks, which are then
Definition
mapped to the server. After partitioning, formatting, Partitioning and formatting OS
and mounting on the server, the data is successfully
stored.
Logical disks

Logical partitioning, RAID, and LVM


 Block storage is ideal for most data storage Physical
Application disks
Scenario scenarios.

52 Huawei Confidential
File Storage

 File storage is like a shared folder in a -...


file system. Users can directly store data -…
-…
Definition on the file storage device over file
Host (client)
system access protocols, such as NFS
and CIFS. LAN CIFS/NFS

File system

 File storage is widely used in scenarios


Application
Scenario such as data backup and archive, image Logical partitioning, RAID, and LVM

and video data storage, and file sharing.

53 Huawei Confidential
Object Storage
Client Client

 Object storage leverages both block


storage and file storage. It offers fast,
Definition direct disk access, and distributed file
sharing. Generally, object storage LAN

outperforms file storage.

Object storage Object storage


 Object storage is widely used in scenarios software
Application Objects software
Scenario such as data backup, image and video data

storage, and website hosting. Storage
Object storage pool
management SSD SSD
software

Server 1 Server N

54 Huawei Confidential
Enterprise Storage
Disks in a server External disk array (DAS) Storage area network (SAN/NAS)
CPU Server

RAM App App


Server Multiple
servers server app
CPU File File servers
Disks system system
RAM
SCSI card SAN LAN
RAID
Disks File
RAID
system
RAID
JBOD (Just a Bunch Of Disk)

JBOD combines multiple physical disks into a Resolved issues:


Known issues:
logical unit to increase capacity, without • Disks have become a system
• Disks have become a system performance
providing any data protection. performance bottleneck.
bottleneck.
• The number of disk slots is limited,
• The number of disk slots is limited,
resulting in small capacity.
resulting in small capacity.
• Data is stored on a single disk,
• Data is stored on a single disk, lowering Resolved issues:
lowering data reliability.
data reliability. • The number of disk slots is limited, resulting
• Storage utilization is low.
• Storage utilization is low. in small capacity.
• Data is scattered in local storage
• Data is scattered in local storage systems. • Data is stored on a single disk, lowering data
systems.
reliability.

55 Huawei Confidential
Distributed Storage
 Distributed storage systems virtualize the available storage resources across all hosts of
an enterprise to a virtual storage device. This way, data is stored in different locations on
the storage network, improving system reliability, availability, and access efficiency.

56 Huawei Confidential
HUAWEI CLOUD Storage Services

Elastic Volume Service (EVS)


Provides block storage for
ECSs

Scalable File Service (SFS)


Stores shared files for ECSs
HUAWEI
CLOUD

Object Storage Service (OBS)


Stores unstructured data

57 Huawei Confidential
Quiz

1. (Single-answer question) Do the bridge and NAT have the same working
principles?
A. Yes

B. No

2. (Single-answer question) Which of the following is NOT a mainstream storage type?


A. Block storage

B. Object storage

C. Tape library

D. File storage

58 Huawei Confidential
Summary

This chapter described:


 Cloud computing basics
 Compute, network, and storage technologies
 HUAWEI CLOUD services

59 Huawei Confidential
Recommendations

 Huawei iLearning
 https://e.huawei.com/en/talent/#/search?productTags=&productName=&n
avType=learningNavKey
 Huawei Technical Support Website
 https://support.huaweicloud.com/intl/en-us/help-novicedocument.html

 HUAWEI CLOUD Academy


 https://e.huawei.com/en/talent/#/ict-academy/home

60 Huawei Confidential
Acronyms and Abbreviations
APP: Application

AS: Auto Scaling

CPU: Central Processing Unit

CCE: Cloud Container Engine

CCI: Cloud Container Instance

CIFS: Common Internet File System

ECS: Elastic Cloud Server

EIP: Elastic IP

EVS: Elastic Volume Service

61 Huawei Confidential
Acronyms and Abbreviations
GPU: Graphics Processing Unit

ICT: Information and Communications Technology

I/O: Input/Output

IaaS: Infrastructure as a Service

IBM: International Business Machines Corporation

KVM: Kernel-based Virtual Machine

IMS: Image Management Service

LXC: Linux Container

LVM: Logical Volume Manager

62 Huawei Confidential
Acronyms and Abbreviations
NAT: Network Address Translation

NFS: Network File System

NIST: National Institute of Standards and Technology

OS: Operation System

OBS: Object Storage Service

PC: Personal Computer

PaaS: Platform as a Service

RAID: Redundant Arrays of Independent Disks

SFS: Scalable File Service

63 Huawei Confidential
Acronyms and Abbreviations

SWR: SoftWare Repository for Container

SaaS: Software as a Service

TCO: Total Cost of Ownership

TAP: Test Access Point

VM: Virtual Machine

VLAN: Virtual Local Area Network

VPC: Virtual Private Cloud

64 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界.
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2021 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors
that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.

You might also like