550 likes | 568 Views
Cloud Computing. Cross 11, Tapovan Enclave Nala pani Road, Dehradun 248001 Email: info@iskd.in Contact : +918979066357, +919027669947. INDEX. Cloud Computing.
E N D
Cloud Computing Cross 11, Tapovan Enclave Nalapani Road, Dehradun 248001 Email: info@iskd.inContact : +918979066357, +919027669947
Cloud Computing Cloud computing means on demand delivery of IT resources via the internet with pay-as-you-go pricing. It provides a solution of IT infrastructure
Why Cloud Computing To overcome all the IT problems and to reduce the IT infrastructure cost, Cloud Computing comes into existence.
Characteristics of Cloud Computing *Agility It shares resources among users and works very fast. *High availability and reliability *High Scalability *Multi-Sharing Multiple users and applications can work more efficiently
*Device and Location Independence Cloud computing enables the users to access systems using a web browser regardless of their location * Maintenance Maintenance of cloud computing applications is easier So, it reduces the cost also. *Low Cost
Advantages of Cloud Computing *Lower cost computer for users *Lower IT infrastructure cost * Fewer maintenance cost * Lower Software Cost *Instant software updates *Increased computing Power * Unlimited storage capacity
Disadvantages of Cloud Computing * Require a constant Internet Connection *Require High Speed Internet connection *Stored Data Might Not Be Secure
History of Cloud Computing Internet, finally got enough computers attached to it and the connection of those machines together create a massive, interconnected shared pool of storage that won't be possible by a single organization or institution to afford. There comes the concept of "grid". The term 'grid' has a misinterpretation as a synonym for 'cloud computing' as both of the technology is formed from a lot of computers connected. 'Grid Computing' requires the usage of application programs to divide one large system processing to several thousands of machines. But there lies the disadvantage; that if a single part of a software node fails the processing or working, other pieces of that software nodes may also fail to process. So, this 'grid'-based working concept didn't become so fruitful.
How does cloud computing work Instead of installing a suite of software for each computer, We just need to load one application. That application will allow the employees to log-in into a Web-based service which hosts all the programs for the user that is required for his/her job. Remote servers owned by another company and that will run everything from e-mail to word processing to complex data analysis programs. It is how cloud computing works.
Types of Cloud computing • Public cloud • Private cloud • Hybrid cloud Public Cloud Public cloud allows the accessibility of systems and services easily to general public. Eg: Amazon, IBM, Microsoft, Google, etc.
Advantages of Public Cloud Low Cost Public cloud is having low cost as compared to private or hybrid cloud Reliable Public cloud provides large number of resources from different locations
3) Flexible 4) Location Independent 5) High Scalability Disadvantages of Public Cloud Model 1) Low security 2) Less customizable
Private CloudThe Private cloud allows the accessibility of systems and services within the organization.
Advantages of Private Cloud *High security and privacy * More Control Disadvantages of Private Cloud Model *Restriction * More Cost * Inflexible price * Less Scalability
Hybrid Cloud The Hybrid cloud is the mixture of public and private cloud. Non-critical activities are performed by public cloud while critical activities are performed by private cloud. Advantages of Hybrid Cloud Model *Scalable-It provides both the features of public and private cloud scalability. * Flexible and secure *Cost effective Disadvantages of Hybrid Cloud Model * Networking issues * Security Compliance It is necessary to ensure that cloud services are compliant with the security policies of an organization
Cloud Service Models 1. SaaS Layer 2. IaaS Layer 3. PaaS Layer Software as a Service | SaaS SaaS is a software distribution model in which applications are hosted by a cloud service provider and made available to customers over internet. SaaS is also known as "On-Demand Software". Advantages of SaaS cloud computing layer * SaaS is easy to buy *No special software or hardware versions required *Low Maintenance required for SaaS
Disadvantages of SaaS cloud computing layer *Security- Actually data is stored in cloud, so security may be an issue for some users. *Latency issue-SaaSmodel is not suitable for applications whose demand response times are in milliseconds. *Total Dependency on Internet * Switching between SaaS vendors is difficult
IaaS IaaSis one of the layers of cloud computing platform wherein the customer organization outsources its IT infrastructure such as servers, networking, processing, storage, virtual machines and other resources. Customers access these resources over internet i.e. cloud computing platform, on a pay-per-use model.IaaSis offered in three models: public, private, and hybrid cloud. Private cloud Advantages of IaaS cloud computing layer *You can dynamically choose a CPU, memory and storage configuration as per your needs. *You easily access the vast computing power available on IaaS cloud platform. *You can eliminate the need of investment in rarely used IT hardware. *IT infra will be handled by the IaaS cloud computing platform vendors.
Disadvantages of IaaS cloud computing layer *There is a risk of IaaS cloud computing platform vendor by gaining the access to the organization?s data. But it can be avoided by opting for private cloud. * IaaS cloud computing platform model is dependent on internet availability. * It is also dependent on the availability of virtualization services. * IaaS cloud computing platform can limit the user privacy and customization options.
PaaS PaaS cloud computing platform is a developer programming platform which is created for the programmer to develop, test, run and manage the applications. A developer is able to write the application as well as deploy it directly into this layer easily. In PaaS cloud computing platform, back end scalability is handled by the cloud service provider and the end user does not have to worry about to manage the infrastructure. Advantages of PaaS cloud computing layer * Simplified Development * Lower risk * Prebuilt business functionality * Instant community * Scalability
Disadvantages of PaaS cloud computing layer * Vendor lock-in *Data Privacy *Integration with the rest of the systems applications Top vendors who are providing PaaS cloud computing platform • Google Apps Engine (GAE) • SalesFroce.com • Windows Azure • AppFog • Openshift • Cloud Foundary from VMware
Virtualization in Cloud Computing Virtualization is the "creation of a virtual (rather than actual) version of something, such as a server, a desktop, a storage device, an operating system or network resources". What is the concept behind the Virtualization? Creation of a virtual machine over existing operating system and hardware is known as Hardware Virtualization. A Virtual machine provides an environment that is logically separated from the underlying hardware.Themachine on which the virtual machine is going to create is known as Host Machine and that virtual machine is referred as a Guest Machine
Types of Virtualization: • Hardware Virtualization. • Operating system Virtualization. • Server Virtualization. • Storage Virtualization. Hardware Virtualization When the virtual machine software or virtual machine manager (VMM) is directly installed on the hardware system is known as hardware virtualization.
UsageHardware virtualization is mainly done for the server platforms, because controlling virtual machines is much easier than controlling a physical server. The main job of hypervisor is to control and monitoring the processor, memory and other hardware resources. Operating System Virtualization: (VMM) is installed on the Host operating system instead of directly on the hardware system is known as operating system virtualization. Usage Operating System Virtualization is mainly used for testing the applications on different platforms of OS.
3) Server Virtualization When the virtual machine software or virtual machine manager (VMM) is directly installed on the Server system is known as server virtualization. UsageServer virtualization is done because a single physical server can be divided into multiple servers on the demand basis and for balancing the load. 4) Storage Virtualization: Storage virtualization is the process of grouping the physical storage from multiple network storage devices so that it looks like a single storage device. UsageStorage virtualization is mainly done for back-up and recovery purposes.
How does virtualization work in cloud computing? • Actually with the help of virtualization users share the Infrastructure. • The main usage of Virtualization Technology is to provide the applications with the standard versions to their cloud users, suppose if the next version of that application is released, then cloud provider has to provide the latest version to their cloud users and practically it is possible because it is more expensive. • By using virtualization, all severs and the software application which are required by other cloud providers are maintained by the third party people, and the cloud providers has to pay the money on monthly or annual basis.
Advantages of Hardware Virtualization *used by other virtual machines if the need exists. * Lower Overall Costs Because Of Server Consolidation * Increased Uptime Because Of Advanced Hardware * Increased IT Flexibility Software Virtualization Software virtualization is just like a virtualization able to abstract the software installation procedure and create virtual software installations Example of software virtualization is VMware software, virtual box etc .
Advantages of Software Virtualization • Client Deployments Become Easier • Easy to manage • Software Migration
Server Virtualization In this virtualization, the resources of the server are itself hidden from the users, and a software is used to partition the physical server into several virtual environments, called as virtual servers or private servers Server virtualization technology is mainly used in web servers. Server virtualization is used To centralize the server administration Advantages of Server Virtualization • Can be independently rebooted • Pocket friendly
Storage Virtualization Storage virtualization is a major component for storage servers. Operating systems and applications with device can access the disks directly by themselves for writing Advantages of Storage Virtualization • Data is stored in the more convenient locations away from the specific host • The storage devices can perform advanced functions like replication, reduplication, and disaster recovery functionality. • By doing abstraction of the storage level, IT operations become more flexible in how storage is provided, partitioned, and protected.
OS Virtualization Everything runs from the network using a kind of virtual disk. This virtual disk is actually a disk image file stored on a remote server, SAN (Storage Area Network) or NAS (Non-volatile Attached Storage). The client will be connected by the network to this virtual disk and will boot with the Operating System installed on the virtual disk.
How to create new virtual machine for linux OS? • Click on create new virtual machine 2) In welcome window, choose custom option and click next button.
3) In choose the virtual machine hardware compatibility window, click on next button. 4) In the Guest operating system window, choose iso image file from the disk or any drive. I have put the iso file of ubuntu in e: drive. So browse your iso image and click on next button.
In the easy install information window, provide full name, username, password and confirm password then click on next button. You can see the given information.
In the processor configuration information, you can select number of processors, number of processor per core. If you don't want to change the default settings, click on next only. 7) In the memory of the virtual machine window, you can set the memory limit. Click on the next button.
8) In the specify disk capacity window, you can set the disk size. Click on the next button. 9) In the specify disk file window, you can specify the disk file then click on the next button.
10) In the ready to create virtual machine window, click on the finish button.
How to create amazon EC2 window instances Launch a Windows Instance • You can launch a Windows instance using the AWS Management Console as described following. An instance is a virtual server in the AWS cloud. With the help of Amazon EC2, you can set up and configure the operating system and applications that run on your instance. To launch an instance • Sign in to the AWS Console and open the Amazon EC2 console. • From the navigation bar, select the region for the instance. Here we are going to choose Singapore data region. Otherwise, this choice is important because some Amazon EC2 resources can be shared between regions, while others can't be.
3.On console dashboard, click Launch Instance. 4. To Choose an Amazon Machine Image (AMI) page displays a list of basic configurations called Amazon Machine Images (AMIs) that serve as templates for your instance. Select the 64-bit version of Microsoft Windows Server 2008 R2. Notice that this configuration is marked as Free tier eligible
5. To Choose an Instance Type page, you can select the hardware configuration for your instance. The t1.micro instance will be selected by default. Click Review and Launch to let the wizard complete or not with other configuration settings for you, so you can get started quickly. 6. To Review Instance Launch page, you need to go to the settings for your instance. • Under Security Groups, you will see that the wizard will be created and selected a security group for you. The security group includes basic firewall rules that will enable you to connect to your instance. For a Windows instance, you connect through Remote Desktop Protocol (RDP) on port 3389. • If you have an existing security group then you need to use by clicking Edit security groups, and select your group on the Configure Security Group page. When done, click Review and Launch to return to the Review Instance Launch page.
In the Select an existing key pair or create a new key pair dialog box, you can select Choose an existing key pair, to select a key pair you already created. • Alternatively, you can create a new key pair. Select Create a new key pair, enter a name for the key pair, and then click Download Key Pair. • This is the only chance for you to save the private key file, so be sure to download it. Save the private key file in a safe place. You'll need to provide the name of your key pair when you launch an instance and the corresponding private key each time you connect to the instance.
it will be downloaded in the form of .pem file and save it for future purpose. • Attention • Don't select the Proceed without a key pair option. If you launch your instance without a key pair, then you can't connect to it. • When you are ready, select the acknowledgement check box, and then click Launch Instances.
9. A confirmation page will open to know that your instance is launching. Click View Instances to close the confirmation page and return to the console.
10. On the Instances page, you can view the status of the launch. It takes a short time for an instance to launch. When you launch an instance, its initial state is pending. After the instance starts, its state changes to running and it receives a public DNS name. 11. Record the public DNS name for your instance because you'll need it for the next step. 12.(Optional) After your instance is launched, you can view its security group rules. From the Instances page, select the instance. In the Description tab, find Security groups and click view rules.
As you can see, if you used the security group the wizard created for you, it contains one rule that allows RDP traffic from any IP source to port 3389. If you launch a Windows instance running IIS and SQL, the wizard creates a security group that contains additional rules to allow traffic to port 80 for HTTP (for IIS) and port 1433 for MS SQL Connect to Your Windows Instance • To connect to a Windows instance, you must retrieve the initial administrator password and then specify this password when you connect to your instance using Remote Desktop. • To connect to your Windows instance • In the Amazon EC2 console, select the instance, and then click Connect • In the Connect To Your Instance dialog box, click Get Password (it will take a few minutes after the instance is launched before the
Click Browse and navigate to the private key file you created when you launched the instance. Select the file and click Opento copy the entire contents of the file into contents box. 4. Click Decrypt Password. The console displays the default administrator password for the instance in the Connect To Your Instance dialog box, replacing the link to Get Password shown previously with the actual password.
Click Download Remote Desktop File. Your browser prompts you to either open or save the .rdp file. Either option is fine. When you have finished, you can click Close to dismiss the Connect To Your Instance dialog box. 6. If you opened the .rdp file, you will see the Remote Desktop Connection dialog box. If you saved the .rdp file then navigate to your downloads directory, and double-click the .rdp file to display the dialog box. You will get a warning that the publisher of the remote connection is unknown. Click Connect to connect to your instance. You may get a warning that the security certificate could not be authenticated. Click Yes to continue.
Log in to the instance as prompted, using the default Administrator account and the default administrator password that you recorded or copied previously. After you connect, we recommend that you do the following: • Change the Administrator password from the default value. You change the password while logged on to the instance itself, just as you would on any other Windows Server. • Create another user account with administrator privileges on the instance. Another account with administrator privileges is a safeguard if you forget the Administrator password or have a problem with the Administrator account.