* Topic-wise cover
‘age of entire syllabus
in Question-Answer form.
* Short Questions (2 Marks)
We,
‘sesst on =
t
= “gaa seme
“yp
=
Wn
SYwww.askbooks.net
A.S.|K.
Always.Seek.Knowledge
All AKTU QUANTUMS are available
* An initiative to provide free ebooks to students.
* Hub of educational books.
PRU CR UC me I
CSCC Ct ACO CER Ce ER ei Or Lon UCC oe
2. We don't intend to infringe any copyrighted material.
MT ir acu eu ku
website you can kindly report us, we will remove it asap.
4. All the logos, trademarks belong to their respective owners.QUANTUM SERIES
Se
For
B.Tech Students of Fourth Year
of All Engineering Colleges Affiliated to
Dr. A.P.J. Abdul Kalam Technical University,
Uttar Pradesh, Lucknow
(Formerly Uttar Pradesh Technical University)
Cloud Computing
By
Kanika Dhama
uantum
a Page —
QUANTUM PAGE PVT. LTD.
Ghaziabad m New Delhi
4BY: ApramSingh
PUBLISHED | Quantum Publications®
(A Unit of Quantum Page Pvt, Lta,)
Plot No, 59/2/7, Site - 4, Industrial Arey
Sahibabad, Ghaziabad-201 010 RCS 075 loud Comp.
Phone :0120-4160479 . UNIT-1 : INTRODUCTION (1-1 Eto 1-26 E)
Email: pagequantum@gmailcom Website: www.quantumpage.coin Introduction to Cloud Computing ~ Definition of Cloud - Evolution
Debi Once: 0 Fat Rabin Near, Sabo, Debitionsg | Barat pg“ Ces Phy
Cloud - On-demand Provisioning,
(© Au Ricurs Resenven
No part ofthis pubhoation may be reproduced or transmitted, UNTT:
in any form or by any sans, scithout permission
‘CLOUD ENABLING TECHNOLOGIES (2-1 Et02-33E)
‘Service Oriented Architecture ~ REST and Systems of Systems ~
‘Web Services - PublishSubscribe Model - Basics of Virtualization
= Types of Virtualization ~ Implementation Levels of Virtualization
Virtualization Structures - Tools and Mechanisms ~
Information contained inthis work is derived from sources Virtualization of CPU ~ Memory ~ 1/0 Devices -Vistualization
believed tobe reliable. Every efforthas been made to ensure Suppot ane Disasit Rewovery.
accuracy, however neither the publisher nor the authors UNIT : CLOUD ARCHITECTURE, SERVICES & STORAGE
‘guarantee the accuracy or completeness of any information (G1 Et03-32E)
published herein, and neither the publisher nor the authors Layered Cloud Architecture Design ~ NIST Cloud Computing
Reference Architecture ~ Public, Private and Hybrid Clouds ~laaS
arising out of use of thi i. = Pax SaaS ~ Architectural Design Challenges ~ Cloud Storage
15 out of use of this information. = Storage-as-aService ~ Advantages of Cloud Storage ~ Cloud
Storage Providers ~ $3.
shall be responsible for any errors, omissions, or damages
Cloud Computing (CST : Sem-7) UNIT-# : RESOURCE MANAGEMENT (-1E 104258)
1* Edition : 2011-12 Inter Cloud Resource Mergen eee Provisioning and
i Resouree Provisioning Methods ~ Global Exchange of Clow
2% Baition : 2019-20 (Thoroughly Revised Ealtion) Reso Pe eB orviow ~ Cloud Security Crallenges ~
3” Edition : 2020-21 Software-as-aService Security ~ Security Governance ~ Vistual
Machine Security = JAM™= Security Standards.
LUNIT:S : CLOUD TECHNOLOGIES & ADVANCEMENTS (5-1 Eto 5-21 E)
Hadoop - MapResiuce ~ Virtual Box — Google App Engine
Progranuning Environment for Google App Engine ~ Open Stsck—
Federation in the Cloud ~ Four Levels of Federation ~ Federated
Services and Applications ~ Future of Federation.
SHORT QUESTIONS (GQLE10SQ-20E)
SOLVED PAPERS (2019-20) (9P-1 Eto SPAZE)Introduction
ee *
1-2E(C8IT-Som-7) Introduetion
f ‘ PART-1
Introduction to Cloud Computing, Definit
i of Cloud Computing.
ee
CONTENTS
Part-1 : Introduction to Cloud.
Computing, Definition
of Cloud, Evolution of
Cloud Computing
-2E to 1-17E
Underlying Principles of..
Parallel and Distributed
Computing, Cloud
Characteristics, Elasticity
in Cloud, On-Demand
Provisioning
seve I-ATE 80 1-268,
1-1E(CSAT-Sem-7)
Que 1:1. | What do you mean by cloud computing ? Also, give its
Properties.
‘Answer
1. Cloud computing is the means of delivering all IT from computer
applications software, business processes, messoging, and collaboration
to.end users as a service wherever and whenever they need i
2. Cloud computing is paradigm for delivering IT where ropid provisioning
isan important characteristic for eomputing resources, data applications
and IT.
3. Cloud computing helps us to face the challeages such as
i. Decreasing the capex and opex cost.
i Enhancing the service quality.
iii, Maintaining the desired and right level of security, eompliances,
regulations, and policies across the different functions of enterprise.
jv. Rapid provisioning, agility, and business transparency for consistent
self-service delivery.
4. Thus, cloud computingis the service and deployment model using large
resource pool based provisioning of virtual or physical resources in a
service model using the internet (public cloud) or intranet (private cloud).
Properties of cloud computing are:
1. User centric : This means once a user is connected to cloud any’ data,
such as images, videos, applications, becomes his property. Not only the
data but the devices connected to it and the user can share itwith other
users.
2 Task centric : Cloud computing focus on what one need and how
application can do it, Here documents are given more priority than the
applications which create them.Cloud Computing iF (CST Som.7)
sagen setfhedling, bickups are available for every doce
a atten, tone document crashes there will be its duptiggt
reve Multis Sf
tenaney and intelligence : Multi-tenancy refers to shar
inane vaca eet
Ita and costs across a AFR At
data og and analjsi are necessary for accessing informaticn
inanintelligent manner.
Many processes in cloud computing shall be automate
. Pl crahed data with its duplicate, Hence, p 2
aewciated withcloud computing, OfTamming
Flexible: Flexible asthe users may be of different vari
ithas tomatch with theirneeds.
QaslZ | What are the advantages and disadvantages of cloud
computing ?
‘Answer
Advantages of cloud computing :
1. Cost saving: It helps us to save substantial capital cost as it does not
‘eed any physical hardware investments.
2 Strategic edge : Cloud computing helps us to access the latest
applications any time without spending our time and money on
installations
3. High speed: Cloud computing allows us to deploy our service quickly in
fewer clicks. This faster deployment allows us to get the resources
required for our system within fewer minutes.
4 Reliability : Through cloud computing we can always get instant
‘updated about the changes mee °
5 Mobility: Employees who are working on the premises or atthe remote
locations can easily access all the cloud services. All they need is internet
connectivity.
6 Calimited storage capacity: Cloud computing offers initless storage
Disadvantages of cloud computin,
L Performance can vary : When we are working in aloud environment,
“ Application running on the server which simultaneously provides
Shared resgtbet businesses that ean affect the performance of oUF
2 Technic 2
os sical Jere Cloud technology is always prone to an outage and
‘and heneo
AE (CSAT-Sem-7) Introduction
3. Security threat in the cloud : Before adopting cloud technology, we
should be well aware ofthe fact that we will be sharing all our company’s
sensitive information to third-party cloud computing service provider.
Hackers might access this information.
4. Internet connectivity : Good internet connectivity is must in cloud
‘computing. We cannot aecess cloud without an internet connection.
5 Lack of support : Cloud computing companies fail to provide proper
support to the customers. Moreover, they want their user to depend on
FAQsor online help, which ean be a tedious ob for non-technical persons.
Que 13. | Explain vision of cloud computing.
“Answer
1, Cloud computing provides the facility to provision virtual hardware,
runtime environment and services to a person having money.
‘These all things can be used as long as they are needed by the user.
3. The whole collection of computing system is transformed into collection
of utilities, which can be provisioned and composed together to deploy
systems in hours rather than days, with no maintenance costs.
4. The long term vision of acloud computing is that IT services are traded
‘as utilities in an open market without technological and legal barriers.
5. Inthe future, we ean imagine that it will be possible to find the solution
that matches with our requirements by simply entering out request in 2
‘plobal digital market that trades with cloud computing services:
6. The existence of such market will enable the automation of discovery
process and its integration into its existing software systems.
7. Ductotheexistence ofa global platform for trading cloud services will,
also help service providers to potentially increase their revenue.
8.” Acloud provider ean also become a consumer of a competition service
in order to fulfill ts promises to customers.
‘Que 1.42] List the major categories of parallel computing systems.
Categories of parallel computing systems:
i. Bit level parallelism : It is a form of parallelism which {s based on
increasing processors word size. It shortens the number of instructions
that the system must run in order to perform a task on variables which
are greater in size.
ii, Instruction level parallelism : It isa form of parallel computing in
‘which we can caleulate the amount of operation carried out by an
operating system at same time. For exampleCloud Computing
{Instruction pipelii
2 Out of order exceution
3 Register renaming
4L_ Speculative execution
Branch prediction
oe TH] Discuss the issues related to cloud computing
anower |
‘Several issues related to cloud computing are :
Issues in clouds
‘Security issues
Security issues : Some of th ro i
osdeanpating are asfolowes. ) PoUem™ which are faced by the
L Data integrity : When a data is on. cloud,
E ison a cloud, anyone from any loa
Seeenn a bya the cloud. Cloud does not diferentiate
‘2.8 sensitive data from a common data thus enabliny
‘Bocess those sensi integrity in loud
copa ensi ‘ive data. Thus there is a lack of data integrity in eloud
2 :
Data theft : Most of the, ‘cloud vendors instead. of acquiring a server try
to lease a server fom other service providers b
other service pr
etn dee are Broviders because they ae cost
2 Securit
1. | Anopplication that provides ‘An arplication that snot bang
interoperability between | the principle of REST. -
computer systems on the |
internet
2 | Use REST. Use SOAP,
3. | Support various data format | Support XMI formar }
such as HTML, JSON, ete.
4 | Pee URLto expose business | Use tho service intercom 1
Togic. business logie =
5.__|Easierand Nexibie. Not easy and flexible,
6. | Inherits security measures | Defines itsown security layer and’)
from the underlying is more secure.
transport protocols,
7 | Consume lessbandidthand | Consume more bandwidth and
Tesources, Fesources.
Que 2.44)] What are the advantages of REST?
lAaewer
The advantages of REST are
1, Separation between the elt
& The REST protocol total
server and the data storage
Fer cxample it improves the portability ofthe intedface to other
Mowe nttfrms, i increaes the seaability of the recs val
allows the die developments tobe valved
lent and the server ;
'y Separates the user interface from the
Tent components of the
independently,
2. Visibility, reliability and Scalability:
and server has one ‘evident
"team can seale the product
‘without problem, fim can seale the pr
The at brat to other servers or make all kinds oe esi
the dan cr make all kinds of changes is
rovided that the data from each re se
it data ta from each request is seat
0B (CSAT-Sem-7) Cloud Enabling Technolog
The separation makes it easicr to have the font andthe back on
different servers, and this makes the a
»PPS more flexible to work,
with.
3, The REST API is always independent ofthe type of platform or
languages :
a. The REST API always adapts to the type of
being used, which gives considerable fr
testing new environments within the des
‘syntax or platforms
feedom when changing or
velopment.
With a REST API we can have PHP, Java, Python Servers,
(Que 2.15.] Write a short note on web services.
haw
b
1 Aweb service is a software package that is
used for communicating
between two devices or web entities lying on
the network.
2 They involve a service provider along with a service requester, iz, the
client,
Since web services are advantagcous as they ae language transparent,
so there inno lanue whether We lundemega system is providing the
service developed in Java, PHP or any other language while the client
application is written in Python, Ruby, Perl or JavaSeript,
4. Task performed by web services :
i. Webservices are searched for over
‘the network as well ascall upon
accordingly.
il Asawebservice is called, it would!
be capable of providing operation
for theclient that has invoked t
the web service.
Que 2:16.| What are types of web services ?
‘Tuo abbreviation of SOAP is Service Oriented Architecture Protec
tis an XML based protocol having the main benef of implementing
the SOAP webservice as its security
vice based messages
SOAP offers a wrapper for sending a web service
over the Internet by thehelp of HTTP protocol All its messages are
‘usually inXML format.“ny
ciiciving PALE (CSI Se5,4
ix. The SOAP message consists of:
SOAP document has a root clement termed as the «Bn,
Jement. This clement isthe initial element used if aa )
document
Teen next the “Envelope” which is categorized into two
‘The former isthe header, and the late is the body”
€ The header includes the routing data that is essentially
information telling the XML document to whom or for. ‘Whiet|
the client needs tobe sent to,
‘4 Lastly the body ineludes the actual message,
2 REST (Representational State Transfer) web services:
i. REST service isnot a collection of paradigm or specific rules ii
instead the style architecture for software. my
ji, Those apps that are designed using this architecture are collect
termed as RESTYul web services. a
1 establishes the resources through the use of URL as well a
depends on the nature ofthe transport protocol (like HTTP: GE
PUT, POST, DELETE, ete.) used to perform the resources, |
iv. Allocation of resources in REST depends on the URL. Itis: li
coaventions based application. a
ft
Que 2.17. Explain architectural constraints of web services,
> |
Architectural constraints of web service are:
1. Uniform interface :
i Itisakey constraint that differ
Non-REST APL
suggests that there should be a uniform: it
eau sho ‘uniform way of interacting with
mae eanctivespetive of device or type of aplication (web
rentintes between a REST API and|
There are four guidelines principle of uniform interface :
| Resource-based : Indivi
Feeneueebased : Individual resources are identified it
Manipulation of resoures through representations
eee representation of resource and it contains enough
tion to modify or delete the resource on the
Provided that it has Permission todo go, =
b
212 E(CSIT-Sem-7) Cloud Enabling Technologies
ce. Self-descriptive messages: Each message includes enough
information to describe how to process the message 20 that
server can easily analyse the request.
@ Hypermedia As The Engine of Application State
(HATEOAS) : It need to include links for each response so
that elientcan discover other resources easily.
2 Stateles:
i. It moans that the necessary state used t» handle the request is
contained within the request itself and server would not store
‘anything related to the session.
i In REST, the client must include all information for the server to
fulfill the request whether as a part of headers or URI.
3. Cacheable:
i Bvery response should include whether the response is cacheable
‘or not and for how much duration responses can be cached at the
client side.
ii. Client will return the data from its eache or any subsequent request
‘and there would be no need to send the request again to the server.
4, Client Server:
i. REST application should have client-server architecture.
ii A client is someone who is requesting resources and are not
concerned with data storage, which remairs internal tocach server,
‘and server is someone who holds the resources and are not
concerned with the user interface or user state.
5. Layered system:
i An application architecture needs to be composed of multiple layers,
{i Bach layer does not know anything about any layer other than that
‘of immediate layer and there can be lot of intermediate servers
between client and the end server.
iii Intermediary servers may improve system availability by enabling
load-balancing and by providing shared exches.
6 Codeon demand:
i. Itisan optional feature. According to this servers can also provide
executable code to the client.
(Que2.18. | Differentinte between REST and SOAP.
|
i
|Cont Computing 2A3E(CSIT-Sem,
‘Answer
SNol REST ; ‘SOAP
1. | REST is Representational | SOAP’ is Service Orienteg
State Transfer. Architecture Protocol
2 [Iisanarchitecturestyle. | It isa protocol.
‘3 | Husessimple HTTP protocol. | It uses SOAP envelop and then
HTTPto transfer the data.
4 [1 supports many different | Tt supports only XML format,
data format like JSON, XML,
YaMLete.
8 | Performance, scalability,and | Slower performance and
caching is high, sealability is bit eemplex, caching
not possible,
6 [It is used widely and | It is used where REST is not
frequently, possible.
(Que218:] Expinin briefly publish-subscribe model.
eases
1. Tnsoftware architecture, publish-subscribe pattern is amessage pattern,
‘2 network oriented architectural pattern, which describes how two
different parts of a message passing system connect and communicate
with each other.
2 Inmodern cloud architecture, applications are decoupled into smaller,
independent building blocks that are easier to develop, deploy and
maintain.
3. Publish/Subscribe (Pub/Sub) messaging provides instant event
notifications for these distributed applications,
‘The publish-subscribe made! allows messages tobe broadcast to different
parts ofa system.
5. Publish-subseribe isa sibling of the message queue paradigm, and is one
part of a larger message-oriented middleware system.
6. Messaging systems support both the pub/suband message queue models
in their API. For example, Java Message Service (JMS).
2
‘This pattern provides greater network scalability and adynamie network:
topology, with a resulting decreased flexibility to modify the publisher
tnd the structure ofthe published data,
ASE (CSAT-Som-7) Cloud Enabling Technologies
‘Quo 220, | Explain how publish-subscribe model works,
Working of publish-subscribe model ;
Message Mesuage
[ se |e me
Lind sutsenber
eta
1. Publisher Publishes messages tothe communication ingrastructre.
2 Subscriber : Subseribes toa category of messages.
Communication infrastructure (channel, classes) : Receives
‘Geesages from publishers and maintains subscriber subseription.
44. Tho publisher wil categorize published messages int classes where
subscribers will receive the message.
5. A publisher has one input channel that splits into multiple output
channels, one for each subseriber.
6. Subscribers ean express interest in one or more classes and only receive
interested message. os
in pubvoub mode! the publisher and subscriber are unaware of ea:
7 pene puaber senda manages to suber, wot haowisg
about subscriber.
ceriber receives messages, without having knowledge of the
Sateen thee arooouerer rounders te ped
information, the message is dropped.
asi] What are the benefits of publish-subseribe model?
[Answor
Following are the benefits of | publish-st
1. Tedecouples subsystems that need toc ;
‘managed independently, and messages an be properly
enema ether ae ges Te
increases salabilty and improves rexponsie scar Te
eae ta qiely sed singe emessage toe iat es
ibseribe model:
smmunicate, Subsystems —Ga
2 The virtualization
PASE (CSI S95
a)
reuurn wo itv core processing responsibilities. Tho: megg
retary Meeure is responsible for ensuring Messages deliver cae
interested subseribers ete
a teinproves reliability. Asynchronous messaging helps applica
Kcinprvtely run smoothly under increased loads and he
{neermittent failures more effectively.
|{ Itallows scheduled processing, Subseribers can wait to pick up mes,
Tea ent hours, oF messages canbe routed or processed arse
toaspocife sehedule. ing
5. Ieenabes simpler integration between systems using different plato
programming languages, or eommunication protocols, as well as betwen
on-premises systems and applications running in the cloud, -
6 Ie facilitates asynchronous workflows across an enterprise,
Itimproves testability. Channels canbe monitored and messay
8
inspected or logged as part of on overall integration Lost strategy.
Cloud Computing
nde
PARTS a
Basics of Virtualization, Types of Virtualization, Im ic ;
5 » Implementati
Levels of Virtualization. aie
Long Answer Type aiid Medium Answer Type Qiiestions®,
Que 2.22. | Define virtualization. Why it is needed ?
‘Answer
Miittilisetien te
‘rtualization is an abstraction layer (hypervisor) that decouples the
physical hardware from the Oper i
th rire rom the Ope ating System (OS) to deliver greater
platform provides the isolation of platform and allows
multiple’
ile businesses to run multiple virtual machines on the same physical
machine,
Following are the ben
efits iat
i Moncey sate provided by virtualization :
With virtualization t
can be reduced.
b. Therefore, the on
going pr i
‘ongoing operational eae wil aleore et aintenence, and
technology, the number of physical servers
2-16 E (CBIT-Sem-7) Cloud Enabling Technologies
jc increase in control :
1. Drom
9... Virtualization provides flexible foundation to provide ea
according to the demand for an organization. mew
b, _ Newserversean be quickly deployed. Therefore, services ean
be provided within minutes,
e Itis also easy to ship the infrastructure when itis deployed
‘using virtualization techniques.
iti, Simplified disaster recovery:
‘a. More efficient and cost effective disaster recovery solutions
can be realized with virtualization technologies.
b. Servers and online business can be transferred to an alternate
site within minutes with the help of virtualization,
iv. Business readiness assessment =
4. Virtualization introduces a shared computing model to an
enterprise and it is easy to understand infrastructure
requirements in a virtualized environment.
Virtualization can help to:
1.“ Reduce the cost ofthe existing infrastructure by reducing operational
find aystems management cost while maintaining the needed capacity.
2, Reduce the complexity of adding to the infrastructure,
3, Gather information und collaboration across the organization to increase
both the utilization of information and its effective use.
4. Deliver on-Service Level Agreement (SLA) response time during spikes
in production and test scenarios.
5. Build a heterogencous infrastructure’across the organization that is
more responsive to the organization's needs.
@ue223:| Explain various current virtualization initiatives.
Answer
Various current virtualization initiatives are =
1. Virtual CPU and memory:
i Physical CPUsand RAM can be: dedicated or dynamically allocated
to virtual machines.
ii’ As there is no OS dependency on the physical hardware, with the
CPU checking off, virtual machines can ‘be migrated to different
hosts, with background changes to the physical CPU and jmemory
resourees being transparent to the guest OSs running en virtual
machines.. LITE (CST.
© Views newer .
‘4 virtual ‘network in a bor’ solution that allows
eet virtual machine network traffic through
hypervisor to manage’ IO ade OURA he
physical Network Interface Controller allows each of thy
‘irtual machines to have a unique identity on the network from
‘the physical host.
Vidi:
rape Newt SAN bu eons press rag,
targets to the physical host, which in turn used to host virtue
Bestel
conoid manages
{The performance and health of virtual machines and gueit OS
can be monitored and console access to all of the servers can be
Sangean
Vaca wee:
i Active virtual machines ean be transparently transferred across
physical hosts with no down-ime and ne los of service availabilty
rte
‘The virtual machine's execution state, active memory, network
Periaperprareeentecnomnnpnearons
source and destination hosts 60 that the guest OS and running
Splnicmccammeeatirmotnn
& Storage van mechine
tly Crea a eee,
‘cara econ nace aro nero
tng
7. Dynamic load balancing
i. Dynamically load balances virtual machines across the most optimal
clin een ease oon aa
=
a mainte ean cate
toa less busy host if particular host ina resouree pool is ina high
eee
Different resource pools can be defined for different business needs,
For instance, production pools can be defined with more demanding.
srl geared as el
‘theoretical ae
& Logical Partitions (LPARs) : ‘
pater arb tng tsa
town ompetig donate oS ee
‘address space and VO interface, with each domain capable of housing
®
z
18k (CHTBem-7
Cloud Baabling Technologies
LLPAR& can share CPUs or have dedicated physical CPU
Likewise, an LPAR ean be a dedicated physical mem
sce or memory addresses canbe dynamically allocated sae
LPARs as needed. =
‘9, Logical Domains (LDOMs):
i. Operating systems running
tach logical domain can be
independently managed, that is, stopped, started, and rebosey
without impacting other LDOMs running on the host,
ii A Type 1 bare-metal hypervisor isolates computing environments
from physical resourees,
iii Forexample, domains across distinct threads can be separated
the mallithreading techoology, Because the Rrereae
dynamically managing and encapsulating the allocation of physica
resources.
10, Zones:
(Que224,| What are the advantages and disadv:
i. Zones an O3-level virtualization solution rather than a hardware-
level hypervisor solution.
i Each zone is an eneapsulated virtual server environment running
within a single OS instance.
iii, As such, zones share a common kernel, through a global zone,
‘although ‘non-native’ zones ean emulate an OSenvironment other
than that ofthe host's native OS,
virtualization 7
‘Answer
Advantages
1
2
a
4
8
Virtualization sofware reduces VMI complexity
Improves functionality.
Increase performance.
Provides server consolidation, testing and development, the provision of
‘dynamic load balancing and the disaster recovery and also improves the
system reliability and security
Conservation of energy, maintenance of legacy appli
Supporting acress-platform office
Disadvantages :
L
2
3
igh risk inthe physical fault,
tis alsonot easy, quite complicated.
Not supported by all applications.Cloud Computing
4
6
ehas single point of failures
say lead to lower performances 7
‘Applicaton identified tobe awaysnot possible,
LIVE (CST Sem.7,
——————"
demnands power machines, visualizatign
2-208 (CSATSorn-D Cloud Bnabing Technologies
‘realization technologien: Two major types of sechologie are
ypiyed nserver virtualization
ce. Hardware virtualization :
Goes | Weite a short note on server virtualization.
‘Answer :
Server virtualization works as a sasking of the server computer that
the count and identity of resourees with Servers, storage,
processors and OS from the end user.
2 Administrators divide the physical server into multiple isolated Vij
talking to same resource pools f
Virtualization of servers provides an abstraction of the physical server
SFFimaintaining resource pool for server users (Fig. 2.25.1),
‘applston ‘Application
Operating stem
CPU, Memes, Disk
‘Virwaliationiypervcor
‘oPU Wenery Disk
Fig. 225.1. Server virtualization. |
Virtual machine :
1 Viral machine can be termed as a virtual environment, partition, or
container,
In a server environment, a server that does not physically exist but is
created on a different server is called ‘guest
‘The instance where a virtual machine runs is termed as ‘host’
‘These hosts ean have multiple VMs running on the physical server.
‘Was asigoed oa pol of esorcevcanbedjmieall assigned o
Pool-based available resources. . renee
pee
‘When a user talks to this VM, hefshe is privileged to use his/her VM as
‘a physical server with all functionalities such as accessing the" OSS,
CPU, memory, and hard disk from the common pool.
‘The hypervisor virtualize
oe multiple virtual servers based on supported
achvirtual machines bundled with an OS,CPU, hard disk, and memory.
i. Hardware virtualization is also known as hypeevisor-hased
virtualization, bare-metal hypervisor, type Ivirvalization, or
simply hypervisor.
ii, This virtualization technology has virtuaizction layer runing
immediately onthe hardware which divides the server machine
into several , virtual machines or partitions, with a guest OS
running in each of these machines
iii, Thebinary transparency is provided by avirtualized approach
and products enable the transparency for 2Ss, middleware,
‘and applications,
08 virtualization :
i. This type of server virtualization is also known as OS-based
virtualization, OS-level virtualization, or type 2 virtualization,
i, OS virtualization ereates virtualization environments within @
single instance of an OS.
iid Vietual environments created by OS virtualization are often
called ‘containers.
‘Because all virtualization environaients must share resources
‘ofasingle OS while having a private virtual OS eovironment,
1 particular implerentation ofthe technology may alter the
filesystem orientation and often introduce ceess restrictions
toglabal system configuration or settings.
[Anplication]} | [Application
Guest OS]| | [Guest 08]
Apliaton ] [__Fapeniior
Hest 05,
Hariware
(ig 228.2.
Que 2.26, | What are the types of
‘newer
Types of virtuali
1.08 virtualization
iL Virtuidizing an operating system enviroaments the most commen
form of virtualizationClove Computing 226 CST Sem-7
aE ee —___
Cloud Enabling Techoologien
It involves patting a second . instances
operating system, lke Window on a single machine,
a This cnpoerebusneies to reduc the AMOUR of hg
hardware required torun their sofware by cutting down the ‘
of actual machines. we | Instruction St Architecture UISAN level :
ix, Itsavescompanies cash on energy cabling, hardware, ack i Atthe ISA level, virtualisation prtrmed by emulating
and more, while il allng them run these quan aa eae . ve
applications. di Thebasic emulation method i through code interpretation
2 Application-server virtualization : gi. Aninterpreter program interprets the
i Application-server virtunlization i also referred to as ingtruetions one by one.
Toad balancing, a it spreads applications across servers an
yarious implementation level of virtuslizatio
source instructions to target
va
sdvane iw. One souree instruction may require tens or hs
undreds of natin
ini St ne oo
This enables IT departments to balance the workload of spe slow.
software in an agile way that doesnot overlud a specie sens v. For better performance, dynamic binary translation is desired,
‘nderload a specific application in the event of a arge projec vi. Thisapproach translates base blocks of éynamie ure sine tana
change. totarget instructions.
‘ii It also allows for easicr management of servers and aj
since we can manage them as a single instance.
‘2 Application virtualization :
Sica ‘vi, The basic blocks ean also be extended to
Petcotions, blocks to increase translation efficiency.
vill, A Virtual Instruction Set Architceture(V-ISA) thus requires
Program traces or super
i. Application virtualization operates application on computersasit
‘a processor-specifie software translation layer to the compiler.
they reside naturally on the hard drive, but instead are runningog | 2 Hardware abstraction level :
aserver. i. Wisperformed right on topof the bare harcvare and generates a
& Theabilty touse RAM and CPU torrun the programs while string vistanl hardware cevironument for 8 VBL
them on a server, like through Microsoft terminal services and ii, The idea is to virtualize a computer's resources, such as its
cloud-based software, improves how software security updates ae processors, memory, and LO devices so'as hardware utilization
pushed, and how software is rolled out. Fate by multiple users concurrently may be upgraded.
‘Administrative virtualization : Operating system level :
i Administrative virtualization is one of the least-known forms of i 0S-level virtualization ereates isolated containers on a single
Virtualization, likely due to the fact that its primarily used in data physical server and the OS instances to utilize the hardware and
bison software in data centers.
& The concept of administration, or ‘management,’ virtualization i The containers behave like real servers. OS-level virtualization is
‘means segmented admin roles through group and user policies. ‘commonly used in creating virtual hosting environments to alloeate
Network virtualization : Network virtualization involves virtually hardware resources among a large number of mutually distrusting
‘managing IPs, and is accomplished through tools ike routing tables, users.
NICs, switches, and VLAN tags, {ii Library Support Level Virtualization with library interfaces is
Hardware virtualization : Refer Q. 2.25, Page 2-198, Unit-2 possible by controlling the communication link between applications
Storage virtualization + and the rest of eystem through API books.
4
Storage virtualizationis an array of servers that are managed by
virtual storage system,
ik Theserversare not aware of exactly where their datais stored:
Que227. | Explain the implementation level of virtualization.
Library support level:
1 Virtualization with libeary interfaces is possible by contrlling the
communication link between applications and the rest ofa system
through API hooks,
{i The software tool WINE bas implemented this appreach to support
Windows applications ontop of UNIX hosts.2-29E (CST Sem Cloud Enabling Technologies
Clovd Computing
& User-application level : =~