SlideShare a Scribd company logo
CLOUD COMPUTING
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
UNIT-II
Understanding Services and Virtualization
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Defining Infrastructure as a Service (IaaS)
 Infrastructure as a Service (IaaS) is a
cloud computing service model in which
hardware is virtualized in the cloud.
 In this particular model, the service
vendor owns the equipment: servers,
storage, network infrastructure, and so
forth.
 The developer creates virtual hardware
on which to develop applications and
services. Essentially, an IaaS vendor has
created a hardware utility service where
the user provisions virtual resources as
required.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
IaaS workloads
 The fundamental unit of virtualized client in an IaaS deployment is called a
workload. A workload simulates the ability of a certain type of real or physical server
to do an amount of work. The work done can be measured by the number of
Transactions Per Minute (TPM) or a similar metric against a certain type of system.
 In addition to throughput, a workload has certain other attributes such as Disk I/Os
measured in Input/Output Per Second IOPS, the amount of RAM consumed under load
in MB, network throughput and latency, and so forth.
 In a hosted application environment, a client’s application runs on a dedicated server
inside a server rack or perhaps as a standalone server in a room full of servers. In
cloud computing, a provisioned server called an instance is reserved by a customer,
and the necessary amount of computing resources needed to achieve that type of
physical server is allocated to the client’s needs.
 Figure shows how three virtual private server instances are partitioned in an IaaS
stack. The three workloads require three different sizes of computers: small,
medium, and large.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
IaaS workloads
Consider a transactional eCommerce system, for which a typical stack contains the following components:
 Web server
 Application server
 File server
 Database
 Transaction engine
This eCommerce system has several different workloads that are operating: queries against the database,
processing of business logic, and serving up clients’ Web pages.
 The classic example of an IaaS service model is Amazon.com’s Amazon Web Services (AWS). AWS has
several data centers in which servers run on top of a virtualization platform (Xen) and may be
partitioned into logical compute units of various sizes. Developers can then apply system images
containing different operating systems and applications or create their own system images. Storage may
be partitions, databases may be created, and a range of services such a messaging and notification can
be called upon to make distributed application work correctly.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Pods, aggregation, and silos
 Workloads support a certain number of users, at which point you exceed the
load that the instance sizing allows. When you reach the limit of the largest
virtual machine instance possible, you must make a copy or clone of the
instance to support additional users. A group of users within a particular
instance is called a pod. Pods are managed by a Cloud Control System (CCS). In
AWS, the CCS is the AWS Management Console.
 Sizing limitations for pods need to be accounted for if you are building a large
cloud-based application. Pods are aggregated into pools within an IaaS region
or site called an availability zone. In very large cloud computing networks,
when systems fail, they fail on a pod-by-pod basis, and often on a zone-by-zone
basis.
 For AWS’ IaaS infrastructure, the availability zones are organized around the
company’s data centers in Northern California, Northern Virginia, Ireland, and
Singapore. A failover system between zones gives IaaS private clouds a very
high degree of availability.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Pods, aggregation, and silos
 When a cloud computing infrastructure isolates user clouds from each other so the
management system is incapable of interoperating with other private clouds, it creates
an information silo, or simply a silo.
 Most often, the term silo is applied to PaaS offerings such as Force.com or QuickBase,
but silos often are an expression of the manner in which a cloud computing
infrastructure is architected.
 Silos are the cloud computing equivalent of compute islands: They are processing
domains that are sealed off from the outside.
 When you create a private virtual network within an IaaS framework, the chances are
high that you are creating a silo. Silos impose restrictions on interoperability that runs
counter to the open nature of build-componentized service-oriented applications.
 However, that is not always a bad thing. A silo can be its own ecosystem; it can be
protected and secured in ways that an open system can’t be. Silos just aren’t as
flexible as open systems and are subject to vendor lock-in.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Pods, aggregation, and silos
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Defining Platform as a Service (PaaS)
 The Platform as a Service model describes a software environment in which a developer can create
customized solutions within the context of the development tools that the platform provides.
Platforms can be based on specific types of development languages, application frameworks, or
other constructs. A PaaS offering provides the tools and development environment to deploy
applications on another vendor’s application. Often a PaaS tool is a fully integrated development
environment; that is, all the tools and services are part of the PaaS service.
 To be useful as a cloud computing offering, PaaS systems must offer a way to create user
interfaces, and thus support standards such as HTLM, JavaScript, or other rich media technologies.
In a PaaS model, customers may interact with the software to enter and retrieve data, perform
actions, get results, and to the degree that the vendor allows it, customize the platform involved.
 The customer takes no responsibility for maintaining the hardware, the software, or the
development of the applications and is responsible only for his interaction with the platform. The
vendor is responsible for all the operational aspects of the service, for maintenance, and for
managing the product(s) lifecycle.
 The one example that is most quoted as a PaaS offering is Google’s App Engine platform.
Developers program against the App Engine using Google’s published APIs. The tools for working
within the development framework, as well as the structure of the file system and data stores, are
defined by Google.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Defining Software as a Service (SaaS)
 The most complete cloud computing service model is one in which the computing hardware and
software, as well as the solution itself, are provided by a vendor as a complete service offering. It
is referred to as the Software as a Service (SaaS) model. SaaS provides the complete
infrastructure, software, and solution stack as the service offering. A good way to think about SaaS
is that it is the cloud-based equivalent of shrink-wrapped software.
 Software as a Service (SaaS) may be succinctly described as software that is deployed on a hosted
service and can be accessed globally over the Internet, most often in a browser. With the
exception
 of the user interaction with the software, all other aspects of the service are abstracted away.
 Every computer user is familiar with SaaS systems, which are either replacements or substitutes
for
 locally installed software. Examples of SaaS software for end-users are Google Gmail and Calendar,
 QuickBooks online, Zoho Office Suite, and others that are equally well known. SaaS applications
 come in all shapes and sizes, and include custom software such as billing and invoicing systems,
 Customer Relationship Management (CRM) applications, Help Desk applications, Human
 Resource (HR) solutions, as well as myriad online versions of familiar applications.
SaaS characteristics
All Software as a Service (SaaS) applications share the following characteristics:
1. The software is available over the Internet globally through a browser on demand.
2. The typical license is subscription-based or usage-based and is billed on a recurring basis. In a small
number of cases a flat fee may be changed, often coupled with a maintenance fee. Table 4.1 shows how
different licensing models compare.
3. The software and the service are monitored and maintained by the vendor, regardless of where all the
different software components are running. There may be executable client-side code, but the user isn’t
responsible for maintaining that code or its interaction with the service.
4. Reduced distribution and maintenance costs and minimal end-user system costs generally make SaaS
applications cheaper to use than their shrink-wrapped versions.
5. Such applications feature automated upgrades, updates, and patch management and much faster
rollout of changes.
6. SaaS applications often have a much lower barrier to entry than their locally installed competitors, a
known recurring cost, and they scale on demand (a property of cloud computing in general).
7. All users have the same version of the software so each user’s software is compatible with another’s.
8. SaaS supports multiple users and provides a shared data model through a single-instance, multi-
tenancy model.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Open SaaS and SOA
 A considerable amount of SaaS software is based on open source
software. When open source software is used in a SaaS, you may
hear it referred to as Open SaaS. The advantages of using open
source software are that systems are much cheaper to deploy
because you don’t have to purchase the operating system or
software, there is less vendor lock-in, and applications are more
portable.
 The popularity of open source software, from Linux to APACHE,
MySQL, and Perl (the LAMP platform) on the Internet, and the
number of people who are trained in open source software make
Open SaaS an attractive proposition.
 The impact of Open SaaS will likely translate into better
profitability for the companies that deploy open source software in
the cloud, resulting in lower development costs and more robust
solutions.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
A mature SaaS implementation based on SOA
Mashup
 A web page or web application that uses content from more than one source to create a single new service displayed in a
single graphical interface. The componentized nature of SaaS solutions enables many of these solutions to support a
feature
Mashup in Cloud
 An application that can display a Web page that shows data and supports features from two or more sources.
 Annotating a map such as Google maps is an example of a mashup.
 Mashups are considered one of the premier examples of Web 2.0
Open Mashup Alliance (OMA)
 Supporting technologies that implement enterprise mashups Group supports the developing standard, the Enterprise
Mashup Markup Language (EMML)
EMML
 An XML markup language for creating enterprise mashups, which are software applications that consume and mash data
from variety of sources
 Ex: Domain Specific Language (DSL) programming language with a higher level of abstraction optimized for a specific
class of problems
 Ex: HTML-It is a language for the web application domain.
Enterprise Mashup
 An Enterprise Mashup is a Web-based resource that combines existing resources content, data or application
functionality from more than one resource in enterprise environments by empowering the actual end users to create and
adapt individual information centric and situational applications
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Mashup
A mashup requires three separate components:
 An interactive user interface, which is usually created with HTML/XHTML,
Ajax, JavaScript, or CSS.
 Web services that can be accessed using an API, and whose data can be bound
and transported by Web service protocols such as SOAP
, REST, XML/HTTP,
XML/RPC, and JSON/RPC.
 Data transfer in the form of XML, KML (Keyhole Markup Language), JSON
(JavaScript Object Notation), or the like.
Mashups are an incredibly useful hybrid Web application, one that SaaS is a great
enabler for. The Open Mashup Alliance (OMA; see http://www.openmashup.org/)
is a non-profit industry group dedicated to supporting technologies that
implement enterprise mashups. This group supports the developing standard, the
Enterprise Mashup Markup Language (EMML), which is a Domain Specific Language
(DSL). This group predicts that the use of mashups will grow by a factor of 10
within just a few years.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Salesforce.com and CRM SaaS
 Perhaps the best-known example of
Software as a Service (SaaS) is the
Customer Relationship Management
software offered by Salesforce.com
whose solution offers sales, service,
support, marketing, content,
analytical analysis, and even
collaboration through a platform
called Chatter.
 Salesforce.com was founded in 1999
by a group of Oracle executives and
early adopters of many of the
technologies that are becoming
cloud computing staples.
Defining Identity as a Service (IDaaS)
 Application delivery model (like software-as-a-service, or SaaS) allows users
to connect to and use identity management services from the cloud.
 Ensures the right people in an organization have the right access to the right
resources Identity and access management (IAM) computing uses online
computer power, database storage, and other IT resources.
 Identity service is one that stores the information associated with a digital
entity in a form that can be queried managed for use in electronic
transactions.
Why IDaaS?
 Deliver access services efficiently and cost-effectively
 Protect against internal and external security threats
 Meet regulatory compliance requirements around security and privacy
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Examples
 Single Sign-on (SSO)
authentication service allowing a user to access multiple applications and
sites using one set of credentials.
 Multi-Factor Authentication (MFA)
multi-step account login process that requires users to enter more
information than just a password
 Identity Management
To ensure that only the right people can access the appropriate data
and resources —at the right times and for the right reasons.
 Provisioning
When a worker is assigned a role through your system, they would be
automatically provisioned access with a role-based IAM solution.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Defining Identity as a Service (IDaaS)
 IDaaS servers
.COM, .ORG, .EDU, .MIL, .TV, .RU
 Core functions
–A data stores
–Query Engine
–Policy Engine
 Identity
A set of characteristics or traits that make something recognizable or
known
 A digital identity
Attributes and metadata of an object along with a set of relationships
with other objects that makes an object identifiable
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
An identity can belong to a person and may include the
following
Things you are
 Biological characteristics such as age, race, gender, appearance
Things you know
 Biography, personal data such as social security numbers, PINs, where you went to
school
Things you have
 A pattern of blood vessels in your eye, your fingerprints, a bank account you can
access, a security key you were given, objects and possessions
Things you relate to
 Your family and friends, a software license, beliefs and values, activities and
endeavors, personal selections and choices, habits and practices, an iGoogle
account
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Digital Identities
 For user and machine accounts, Identities are created and stored in domain
security Databases that are the basis for any network domain, In directory
services, and in data stores in federated systems.
Network interface
 the point of interconnection between a computer and a private or public network
 Network interfaces are identified uniquely by Media Access Control (MAC)
addresses, Alternatively are referred to as Ethernet Hardware Addresses (EHAs).
EHAs-(HW Address) is your Ethernet card's unique identity
 It is the assignment of a network identity to a specific MAC address that allows
systems to be found on networks.
Media Access Control
 Network data transfer policy that determines how data is transmitted between
two computer terminals through a network cable.
Windows Product Activation
Microsoft validates your installation During Activation it Creates an identification index or profile of your system
 A 25-character software product key and product ID
 The uniquely assigned Global Unique Identifier or GUID
 PC manufacturer
 CPU type and serial number
 BIOS checksum
 Network adapter and its MAC address
 Display adapter
 SCSCI and
 DE adapters
 RAM amount
 Hard drive and volume serial number
 Optical drive
 Region and language settings and user locale
From the above information, a code is calculated, checked, and entered into the registration database. Each of
these uniquely identified hardware attributes is assigned a weighting factor such that an overall sum may be
calculated.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Networked identity service classes
 Forms of identity services
To validate Web sites, transactions, transaction participants, clients, and
network services.
Identity as a Service (IDaaS) offers
 Authentication services (identity verification)
 Directory services
 Federated identity
 Identity governance
 Identity and profile management
 Policies, roles, and enforcement
 Provisioning (external policy administration)
 Registration
 Risk and event monitoring, including audits
 Single sign-on services (pass-through authentication)
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Identity System Codes of Conduct
IDaaSis cloud-based authentication built and operated by a third-party provider.
Working with IDaaS software, evaluate IDaaS applications on the following basis
 User control for consent
Users control their identity and must consent(to agree to
something) to the use of their information.
 Minimal Disclosure
The minimal amount of information should be disclosed for an
intended use.
 Justifiable access
Only parties who have a justified use of the information
contained in a digital identity and have a trusted identity relationship with the
owner of the information may be given access to that information.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
 Directional Exposure
An ID system must support bidirectional identification for a public entity
so that it is discoverable and a unidirectional identifier for private entities, thus
protecting the private ID.
 Interoperability
A cloud computing ID system must interoperate with other identity
services from other identity providers.
 Unambiguous human identification
An IDaaS application must provide an unambiguous mechanism for
allowing a human to interact with a system while protecting that user against an
identity attack.
 Consistency of Service
An IDaaS service must be simple to use, consistent across all its uses, and
able to operate in different contexts using different technologies.
Identity System Codes of Conduct
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
IDaaS interoperability
 Cloud computing IDaaS applications must rely on a set of developing
industry standards to provide interoperability
 User centric authentication(usually in the form of information cards)
The OpenID and CardSpace specifications support this type of data
object.
 The XACML Policy Language
A general-purpose authorization policy language Allows a distributed
ID system to write and enforce custom policy expressions. XACML can work
with SAML when SAML presents a request for ID authorization, XACML checks
the ID request against its policies and either allows or denies the request.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
IDaaS interoperability
 The SPML Provisioning Language
This is an XML request/response language that is used to
integrate and interoperate service provisioning requests. SPML is a standard of
OASIS’s Provision Services Technical Committee (PSTC) that conforms to the
SOA architecture.
 The XDAS Audit System
The Distributed Audit Service provides accountability for
users accessing a system, and the detection of security policy violations when
attempts are made to access the system by unauthorized users or by users
accessing the system in an unauthorized way
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Networked identity service classes
 The Identity Governance Framework
(IGF) is a standards initiative of the
Liberty Alliance.
 Exchange and control of identity
information using standards such as
WS-Trust, ID-WSF, SAML, and LDAP
directory services.
 Client Attribute Requirements Markup
Language (CARML)
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
User Authentication
OpenID
 –Developing industry standard for authenticating “end users” by storing their
digital identity in a common format.
 –An identity is created in an OpenID system,
 –Information is stored in the system of any OpenID service provider
 –Translated into a unique identifier.
 –Identifiers take the form of a Uniform Resource Locator (URL) or as an
Extensible Resource Identifier (XRI)
 –Authenticated by that OpenID service provider
 –unique identity of the URL;
Identity providers
 AOL, Facebook, Google, IBM, Microsoft, MySpace, Orange, PayPal, VeriSign,
LiveJournal, Ustream, Yahoo!
Trusted providers and their URL formats
 Blogger: .blogger.com or .blogspot.com
 MySpace: myspace.com/
 Google: https://www.google.com/accounts/o8/id l Google Profile: google.com/profiles/
 Microsoft: accountservices.passport.net/
 MyOpenID: .myopenid.com
 Orange: openid.orange.fr/username or simply orange.fr/ Verisign: .pip.verisinglabs.com
 WordPress: .wordpress.com
 Yahoo!: openid.yahoo.com
CardSpace
 Microsoft software client The company’s Identity Meta system and built into the Web Services
Protocol Stack.
 This stack is built on the OASIS standards (WS-Trust, WS-Security, WS-Security Policy, and WS-
Metadata Exchange)
 A CardSpace object called an Identity Selector stores a digital identity Making it available to
Windows applications in the form of a visual Information Card Can be accepted by complying
applications and Web sites
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Authorization markup languages Information
 Information requests and replies in cloud computing are nearly always in the form of XML replies or
requests
 XML files are text files and are self-describing.
 XML files contain a schema that describes the data it contains or contains a point to another text file
with its schema
 XACML and SAML -specialized XML files are in the identity framework.
XACML
 Extensible Access Control Markup Language
 Separates access control functionality into several components
 An attribute-based access control policy language or XML-based language.
 Designed to express security policies and access requests to information.
 Used for web services, digital rights management, and enterprise security applications
SAML
 Security Assertion Markup Language
 open federation standard that allows an identity provider (IdP) to authenticate users and then pass
an authentication token to another application known as a service provider
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
SAML integrates with XACML to implement a policy engine in a Service
Oriented Architecture to support identity services authorization
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Networked identity service classes
Policy Administration Point (PAP)
 location at which policy is managed
Policy Decision Point (PDP)
 Policy requests are passed through to the location(PAP) where the policy logic can be executed.
 The result of the policy is transmitted through the PAP
 Evaluates policies against access requests provided by Policy Enforcement Points(PEP).
Deciding authority
Policy Enforcement Point (PEP)
 Enforces the PDP policy decision.
 Protects an enterprise's data by enforcing access control.
 Responsible for receiving authorization requests that are sent to the policy decision point (PDP)
for evaluation.
 Data and resources must be protected
Policy Information Point (PIP)
 Provides additional information that can be used to determine policy logic
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Security Assertion Markup Language
 XML-basedmarkup language for security assertions
 statements that service providers use to make access-control decisions
 The statements an identity provider sends to a service provider that contain
authentication
attribute
authorization decision information
 Allows people to sign in once using one set of credentialsand access multiple
applications.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Defining Compliance as a Service (CaaS)
 Cloud computing by its very nature spans different jurisdictions. The laws of the country of a
request’s origin may not match the laws of the country where the request is processed, and it’s
possible that neither location’s laws match the laws of the country where the service is provided.
 Compliance is much more than simply providing an anonymous service token to an identity so
they can obtain access to a resource. Compliance is a complex issue that requires considerable
expertise.
 In order to implement CaaS, some companies are organizing what might be referred to as
“vertical clouds,” clouds that specialize in a vertical market. Examples of vertical clouds that
advertise CaaS capabilities include the following:
 athenahealth (http://www.athenahealth.com/) for the medical industry
 bankserv (http://www.bankserv.com/) for the banking industry
 ClearPoint PCI Compliance-as-a-Service for merchant transactions under the Payment Card
Industry Data Security Standard
 FedCloud (http://www.fedcloud.com/) for government
 Rackserve PCI Compliant Cloud (http://www.rackspace.com/; another PCI CaaS service)
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Virtualization
Creation of a virtual (rather than actual) version of something, such as
 ❖ a server,
 ❖ a desktop,
 ❖ a storage device,
 ❖ an operating system or network resources
Allows to share a single physical instance of a resource or an application among multiple
customers and organizations
 Hardware Virtualization
Creation of a virtual machine over existing operating system and hardware
 Host Machine
The machine on which the virtual machine is going to create
 Guest Machine
virtual machine
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Virtualization - Hardware
Hardware Virtualization
 When the virtual machine software or virtual machine manager
(VMM) is directly installed on the hardware system
 Hypervisor is to control and monitoring the processor, memory and
other hardware resources.
 After virtualization of hardware system the user can install different
operating system on it and run different applications on those OS.
Usage
 Done for the server platforms, because controlling virtual machines is
much easier than controlling a physical server.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Virtualization- OS
Operating System Virtualization
 When the virtual machine software or virtual machine manager
(VMM) is installed on the Host operating system instead of
directly on the hardware system
 creates virtual servers at the operating system or kernel level.
 Each virtual server is running in its own virtual environment
(VE) as a virtual private server (VPS).
Usage
 mainly used for testing the applications on different platforms
of OS.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Virtualization- Server
Server Virtualization
 When the virtual machine software or virtual machine
manager (VMM) is directly installed on the Server system
 Masking of server resources takes place.
 The central-server(physical server) is divided into multiple
different virtual servers by changing the identity number,
processors
Usage
 Done because a single physical server can be divided into
multiple servers on the demand basis and for balancing
the load.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Virtualization - Storage
Storage Virtualization
The process of grouping the physical storage from multiple
network storage devices so that it looks like a single storage device.
Usage
❖ Storage virtualization is mainly done for back-up and recovery
purposes.
❖ Running multiple operating systems on a single machine but
sharing all the hardware resources.
❖ it helps us to provide the pool of IT resources
❖ we can share these IT resources in order get benefits in the
business.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Hypervisor
 A form of virtualization software used in Cloud hosting to divide and
allocate the resources on various pieces of hardware.
 A process or a function to help admins isolate operating system and
applications from the underlying hardware.
 The program which provides partitioning, isolation or abstraction is
called virtualization hypervisor.
 A hardware virtualization technique that allows multiple guest
operating systems (OS) to run on a single host system at the same
time.
 A hypervisor is sometimes also called a virtual machine
manager(VMM).
 Administrators can use the resources efficiently by dividing computing
resources (RAM, CPU, etc.) between multiple VMs.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Hypervisor
 server management as VMs are independent of the host environment.
 The operation of one VM doesn’t affect other VMs or the underlying hardware
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
TYPES OF HYPERVISORS - Type 1
 The native or bare metal hypervisor.
 Deployed directly over the host hardware.
 Direct access to the hardware resource without any
underlying OS or device drivers makes such
hypervisors highly efficient for enterprise
computing.
 Direct access to CPU, Memory, Network, Physical
storage.
 Requires a dedicated physical machine.
 It replaces the host operating system the hypervisor
schedules VM services directly to the hardware.
 Examples of Type 1 hypervisors include VMware
ESXi, Citrix XenServer and Microsoft Hyper-V
hypervisor.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
TYPES OF HYPERVISORS - Type 2
 Known as a hosted hypervisor.
 Requires an operating system to run on a physical host
 Hypervisors run as an application in a host
system(physical machine).
 A software layer or framework that runs on a traditional
operating system.
 Hypervisor asks the operating system to make hardware
calls
 The host operating system schedules VM services, which
are then executed on the hardware.
 Individual users who wish to operate multiple operating
systems on a personal computer should use a form 2
hypervisor.
 Example: KVM, VMware Server and Workstation,
Microsoft Virtual PC, Oracle VM VirtualBox, and QEMU
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Type 1 Vs Type 2
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Emulation
 The emulator is a hardware or software that
enables one device (named Host) to function
like other systems (named Guest).
 A technique in which Virtual machines
simulates complete hardware in software.
 Many virtualization techniques that were
developed in or inherited from emulation
technique.
 Useful when designing software for various
systems.
 It simply allows us to use current platform to
access an older application, data, or
operating system.
 To allow subsystem to present same interface
and characteristics as another.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Paravirtualization
 CPU virtualization which uses hypercalls for
operations to handle instructions at compile
time.
 Enables the Guest OS to interact with the
hypervisor
 Guest OS is not completely isolated but it is
partially isolated by the virtual machine from
the virtualization layer and hardware
 The hypervisor is installed on the device. Then,
the guest operating systems are installed into
the environment. Here, the virtualization
method modifies the guest operating system to
communicate with the hypervisor.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Paravirtualization
 Virtual machines can be accessed
through interfaces that are similar to the
underlying hardware.
 Guest OS is not completely isolated but
it is partially isolated by the VM from the
virtualization layer and hardware.
 Guest os does not have direct access to
hardware.
 When guest os wants to communicate to
hardware it goes through host os
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Full Virutalization
 Software solution for server virtualization and uses
binary translation and direct approach techniques
 Enables the Guest operating system to run
independently
 Guest OS is completely isolated by the virtual
machine from the virtualization layer and
hardware.
 The guest operating system is unaware that it is in
a virtualized environment, and therefore
hardware is virtualized by the host operating
system
 Microsoft and Parallels systems are examples of
full virtualization.
 Allowed multiple guest operating systems to run
on a single host OS in full isolation
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Machine Imaging
 A process that is used to provide system portability, and provision and deploy
systems in the cloud.
 Through capturing the state of systems using a system image.
 A system image makes a copy or a clone of the entire
 computer system inside a single file.
 Machine imaging is mostly run on virtualization
 platform due to this it is also called as Virtual Appliances and running virtual
machines are called instances.
 A Compute Engine resource that stores all the configuration, metadata,
permissions, and data from one or more disks required to create a virtual
machine (VM) instance.
 Use a machine image in many system maintenance scenarios, such as instance
creation, backup and recovery, and instance cloning.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Machine Imaging
Example
 Amazon Machine Image (AMI) is a system image that is used in the cloud
computing.
 The Amazon Web Services uses AMI to store copies of a virtual machine
 An AMI is a file system image that contains an operating system, all device
drivers, and any applications and state information that the working virtual
machine.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
VMware vSphere
 A server virtualization software application from VMware.
 VMware is a virtualization and cloud computing software vendor.
 Serves as a complete platform for implementing and managing
virtual machine (VM) infrastructure on a large scale.
 Management infrastructure framework that virtualizes system,
storage, and networking hardware to create cloud computing
infrastructures.
 Referred to as a cloud operating system or virtualized data center
platform.
 vSphere is the branding for a set of management tools and a set of
products
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
VMware vSphere
vSphere provides a set of services that applications can use to access cloud resources
vSphere includes the following components
VMware vCompute
A service that aggregates servers into an assignable pool
VMware vStorage
A service that aggregates storage resources into an assignable pool
VMware vNetwork
A service that creates and manages virtual network interfaces
Application services
Such as HA (High Availability) and Fault Tolerance
vCenter Server
A provisioning, management, and monitoring console for VMware
cloud infrastructures
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
VMware vSphere Products
Virtual Machine File System (VMFS)
A high-performance cluster file system for an ESX/ESXi cluster.
VMotion
A service that allows for the migration of a virtual machine from
one physical server to another physical server while the virtual server
runs continuously and without any interruption of ongoing transactions.
Storage VMotion
A product that can migrate files from one datastore to another
datastore while the virtual machine that uses the datastore continues to
run.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
VMware vSphere Products
 Virtual SMP
A feature that allows a virtual machine to run on two or more physical
processors at the same time.
 Distributed Resource Scheduler (DRS)
A system for provisioning virtual machines and load balancing processing
resources dynamically across the different physical systems that are in use.
A part of the DRS called the distributed power management (DPM) module
can manage the power consumption of systems.
 vNetwork Distributed Switch (DVS)
A capability to maintain a network runtime state for virtual machines as
they are migrated from one physical system to another. DVS also monitors network
connections, provides firewall services, and enables the use of third party switches
such as the Cisco Nexus 1000V to manage virtual networks.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Virtual Infrastructure Elements
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Porting Applications
 Build an application on a platform such as Microsoft
Azure.
 Porting that application to Amazon Web Services or
GoogleApps may be difficult.
 To create an interoperability standard.
 Zend Technologies has started an open source initiative
to create a common application program interface
 it will allow applications to be portable.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
Simple Cloud API - Goal a set of common
interfaces
File Storage Services
Currently Amazon S3, Windows Azure Blob Storage, Nirvanix, and
Local storage is supported by the Storage API. There are plans to extend this
API to Rackspace Cloud Files and GoGrid Cloud Storage.
Document Storage Services
Amazon SimpleDB and Windows Azure Table Storage are currently
supported. Local document storage is planned.
Simple Queue Services
Amazon SQS, Windows Azure Queue Storage, and Local queue
services are supported.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
AppZero Virtual Application Appliance
 Moving an application from one platform to another isn’t nearly as simple as
moving a machine image from one system to another.
 When the application loads, it often loads or uses different Dynamic Link Libraries
(DLL).
 AppZero – company
 To make applications easily portable.
 Its solution is called the Virtual Application Appliance (VAA).
 The AppZero solution creates a virtual application appliance as an architectural
layer between the Windows or the UNIX operating system and applications.
 The virtualization layer serves as the mediator for file I/O, memory I/O, and
application calls and response to DLLs, which has the effect of sandboxing the
application.
M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
VAA
 VAA creates a container that encapsulates the application and all the
application’s dependencies within a set of files
 It is essentially an Application Image for a specific OS.
 Dependencies include DLL, service settings, necessary configuration files,
registry entries, and machine and network settings.

More Related Content

PPTX
Services Saas,Pass,Iaas
PDF
Cloud Computing Introduction
PDF
Cloud computing stack and service models.pdf
PPTX
CLOUD COMPUTING FUNDAMENTALS, ARCHITECTURE
PPTX
Cloud-Computing basic introduction chap 1 pptx
PPTX
CLOUD ARCHITECTURE AND SERVICES.pptx
PDF
Chapter 2 Service Model
PPT
Lecture 10.ppt
Services Saas,Pass,Iaas
Cloud Computing Introduction
Cloud computing stack and service models.pdf
CLOUD COMPUTING FUNDAMENTALS, ARCHITECTURE
Cloud-Computing basic introduction chap 1 pptx
CLOUD ARCHITECTURE AND SERVICES.pptx
Chapter 2 Service Model
Lecture 10.ppt

Similar to Understanding Services and Virtualization (20)

PPTX
1.Service Models of Cloud Computing .pptx
PPTX
Coud discovery chap 3
PPTX
cloud services model by Group 6.pptx
PPTX
Introduction to Cloud Computing
PPT
Chapter 2 Cloud Computing Architecture_Part2.ppt
PPTX
Unit 2 part 1.pptx
PPTX
Cloud Computing:An Economic Solution for Libraries
PDF
Cloud Computing
DOCX
Unit iv
PDF
My aws cp study (autosaved)
PPTX
Chapter 2 Cloud Computing and Databases.pptx
PPTX
UNIT III - ppt.pptx
PPTX
cloud computing and its service models.pptx
PPTX
Cloud computing
PPT
Cloud computing
PPTX
Cloud computing-its usage, working and advantages
PPTX
Unit II Cloud Delivery Models.pptx
PPT
Cloud computing 2
PPTX
Cloud-mod1-chap1.pptx
PDF
Cloud computing
1.Service Models of Cloud Computing .pptx
Coud discovery chap 3
cloud services model by Group 6.pptx
Introduction to Cloud Computing
Chapter 2 Cloud Computing Architecture_Part2.ppt
Unit 2 part 1.pptx
Cloud Computing:An Economic Solution for Libraries
Cloud Computing
Unit iv
My aws cp study (autosaved)
Chapter 2 Cloud Computing and Databases.pptx
UNIT III - ppt.pptx
cloud computing and its service models.pptx
Cloud computing
Cloud computing
Cloud computing-its usage, working and advantages
Unit II Cloud Delivery Models.pptx
Cloud computing 2
Cloud-mod1-chap1.pptx
Cloud computing
Ad

More from Sindhu M (7)

PPTX
Google Web Services in cloud platform- Essential
PPTX
Software Testing - Unit 5(Test-Driven Development)
PPTX
Software Testing - Unit - 4 (Life Cycle Based Testing)
PPTX
Software Testing - Unit 3 (Performance, Regression and Ad-hoc Testing)
PPTX
Software Testing - Unit 2 (Black Box Testing and Levels of Testing)
PPTX
Software Testing- Unit -1(Fundamentals of Software Testing)
PPTX
Entity-Relationship Model in Database Technology
Google Web Services in cloud platform- Essential
Software Testing - Unit 5(Test-Driven Development)
Software Testing - Unit - 4 (Life Cycle Based Testing)
Software Testing - Unit 3 (Performance, Regression and Ad-hoc Testing)
Software Testing - Unit 2 (Black Box Testing and Levels of Testing)
Software Testing- Unit -1(Fundamentals of Software Testing)
Entity-Relationship Model in Database Technology
Ad

Recently uploaded (20)

PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Institutional Correction lecture only . . .
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Complications of Minimal Access Surgery at WLH
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Cell Types and Its function , kingdom of life
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
master seminar digital applications in india
PDF
Computing-Curriculum for Schools in Ghana
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Pre independence Education in Inndia.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Institutional Correction lecture only . . .
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Module 4: Burden of Disease Tutorial Slides S2 2025
O5-L3 Freight Transport Ops (International) V1.pdf
RMMM.pdf make it easy to upload and study
Complications of Minimal Access Surgery at WLH
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Cell Types and Its function , kingdom of life
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
master seminar digital applications in india
Computing-Curriculum for Schools in Ghana
Sports Quiz easy sports quiz sports quiz
Pre independence Education in Inndia.pdf
Microbial diseases, their pathogenesis and prophylaxis

Understanding Services and Virtualization

  • 1. CLOUD COMPUTING M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. UNIT-II Understanding Services and Virtualization
  • 2. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Defining Infrastructure as a Service (IaaS)  Infrastructure as a Service (IaaS) is a cloud computing service model in which hardware is virtualized in the cloud.  In this particular model, the service vendor owns the equipment: servers, storage, network infrastructure, and so forth.  The developer creates virtual hardware on which to develop applications and services. Essentially, an IaaS vendor has created a hardware utility service where the user provisions virtual resources as required.
  • 3. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. IaaS workloads  The fundamental unit of virtualized client in an IaaS deployment is called a workload. A workload simulates the ability of a certain type of real or physical server to do an amount of work. The work done can be measured by the number of Transactions Per Minute (TPM) or a similar metric against a certain type of system.  In addition to throughput, a workload has certain other attributes such as Disk I/Os measured in Input/Output Per Second IOPS, the amount of RAM consumed under load in MB, network throughput and latency, and so forth.  In a hosted application environment, a client’s application runs on a dedicated server inside a server rack or perhaps as a standalone server in a room full of servers. In cloud computing, a provisioned server called an instance is reserved by a customer, and the necessary amount of computing resources needed to achieve that type of physical server is allocated to the client’s needs.  Figure shows how three virtual private server instances are partitioned in an IaaS stack. The three workloads require three different sizes of computers: small, medium, and large.
  • 4. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
  • 5. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. IaaS workloads Consider a transactional eCommerce system, for which a typical stack contains the following components:  Web server  Application server  File server  Database  Transaction engine This eCommerce system has several different workloads that are operating: queries against the database, processing of business logic, and serving up clients’ Web pages.  The classic example of an IaaS service model is Amazon.com’s Amazon Web Services (AWS). AWS has several data centers in which servers run on top of a virtualization platform (Xen) and may be partitioned into logical compute units of various sizes. Developers can then apply system images containing different operating systems and applications or create their own system images. Storage may be partitions, databases may be created, and a range of services such a messaging and notification can be called upon to make distributed application work correctly.
  • 6. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Pods, aggregation, and silos  Workloads support a certain number of users, at which point you exceed the load that the instance sizing allows. When you reach the limit of the largest virtual machine instance possible, you must make a copy or clone of the instance to support additional users. A group of users within a particular instance is called a pod. Pods are managed by a Cloud Control System (CCS). In AWS, the CCS is the AWS Management Console.  Sizing limitations for pods need to be accounted for if you are building a large cloud-based application. Pods are aggregated into pools within an IaaS region or site called an availability zone. In very large cloud computing networks, when systems fail, they fail on a pod-by-pod basis, and often on a zone-by-zone basis.  For AWS’ IaaS infrastructure, the availability zones are organized around the company’s data centers in Northern California, Northern Virginia, Ireland, and Singapore. A failover system between zones gives IaaS private clouds a very high degree of availability.
  • 7. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Pods, aggregation, and silos  When a cloud computing infrastructure isolates user clouds from each other so the management system is incapable of interoperating with other private clouds, it creates an information silo, or simply a silo.  Most often, the term silo is applied to PaaS offerings such as Force.com or QuickBase, but silos often are an expression of the manner in which a cloud computing infrastructure is architected.  Silos are the cloud computing equivalent of compute islands: They are processing domains that are sealed off from the outside.  When you create a private virtual network within an IaaS framework, the chances are high that you are creating a silo. Silos impose restrictions on interoperability that runs counter to the open nature of build-componentized service-oriented applications.  However, that is not always a bad thing. A silo can be its own ecosystem; it can be protected and secured in ways that an open system can’t be. Silos just aren’t as flexible as open systems and are subject to vendor lock-in.
  • 8. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Pods, aggregation, and silos
  • 9. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Defining Platform as a Service (PaaS)  The Platform as a Service model describes a software environment in which a developer can create customized solutions within the context of the development tools that the platform provides. Platforms can be based on specific types of development languages, application frameworks, or other constructs. A PaaS offering provides the tools and development environment to deploy applications on another vendor’s application. Often a PaaS tool is a fully integrated development environment; that is, all the tools and services are part of the PaaS service.  To be useful as a cloud computing offering, PaaS systems must offer a way to create user interfaces, and thus support standards such as HTLM, JavaScript, or other rich media technologies. In a PaaS model, customers may interact with the software to enter and retrieve data, perform actions, get results, and to the degree that the vendor allows it, customize the platform involved.  The customer takes no responsibility for maintaining the hardware, the software, or the development of the applications and is responsible only for his interaction with the platform. The vendor is responsible for all the operational aspects of the service, for maintenance, and for managing the product(s) lifecycle.  The one example that is most quoted as a PaaS offering is Google’s App Engine platform. Developers program against the App Engine using Google’s published APIs. The tools for working within the development framework, as well as the structure of the file system and data stores, are defined by Google.
  • 10. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Defining Software as a Service (SaaS)  The most complete cloud computing service model is one in which the computing hardware and software, as well as the solution itself, are provided by a vendor as a complete service offering. It is referred to as the Software as a Service (SaaS) model. SaaS provides the complete infrastructure, software, and solution stack as the service offering. A good way to think about SaaS is that it is the cloud-based equivalent of shrink-wrapped software.  Software as a Service (SaaS) may be succinctly described as software that is deployed on a hosted service and can be accessed globally over the Internet, most often in a browser. With the exception  of the user interaction with the software, all other aspects of the service are abstracted away.  Every computer user is familiar with SaaS systems, which are either replacements or substitutes for  locally installed software. Examples of SaaS software for end-users are Google Gmail and Calendar,  QuickBooks online, Zoho Office Suite, and others that are equally well known. SaaS applications  come in all shapes and sizes, and include custom software such as billing and invoicing systems,  Customer Relationship Management (CRM) applications, Help Desk applications, Human  Resource (HR) solutions, as well as myriad online versions of familiar applications.
  • 11. SaaS characteristics All Software as a Service (SaaS) applications share the following characteristics: 1. The software is available over the Internet globally through a browser on demand. 2. The typical license is subscription-based or usage-based and is billed on a recurring basis. In a small number of cases a flat fee may be changed, often coupled with a maintenance fee. Table 4.1 shows how different licensing models compare. 3. The software and the service are monitored and maintained by the vendor, regardless of where all the different software components are running. There may be executable client-side code, but the user isn’t responsible for maintaining that code or its interaction with the service. 4. Reduced distribution and maintenance costs and minimal end-user system costs generally make SaaS applications cheaper to use than their shrink-wrapped versions. 5. Such applications feature automated upgrades, updates, and patch management and much faster rollout of changes. 6. SaaS applications often have a much lower barrier to entry than their locally installed competitors, a known recurring cost, and they scale on demand (a property of cloud computing in general). 7. All users have the same version of the software so each user’s software is compatible with another’s. 8. SaaS supports multiple users and provides a shared data model through a single-instance, multi- tenancy model. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
  • 12. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
  • 13. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Open SaaS and SOA  A considerable amount of SaaS software is based on open source software. When open source software is used in a SaaS, you may hear it referred to as Open SaaS. The advantages of using open source software are that systems are much cheaper to deploy because you don’t have to purchase the operating system or software, there is less vendor lock-in, and applications are more portable.  The popularity of open source software, from Linux to APACHE, MySQL, and Perl (the LAMP platform) on the Internet, and the number of people who are trained in open source software make Open SaaS an attractive proposition.  The impact of Open SaaS will likely translate into better profitability for the companies that deploy open source software in the cloud, resulting in lower development costs and more robust solutions.
  • 14. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. A mature SaaS implementation based on SOA
  • 15. Mashup  A web page or web application that uses content from more than one source to create a single new service displayed in a single graphical interface. The componentized nature of SaaS solutions enables many of these solutions to support a feature Mashup in Cloud  An application that can display a Web page that shows data and supports features from two or more sources.  Annotating a map such as Google maps is an example of a mashup.  Mashups are considered one of the premier examples of Web 2.0 Open Mashup Alliance (OMA)  Supporting technologies that implement enterprise mashups Group supports the developing standard, the Enterprise Mashup Markup Language (EMML) EMML  An XML markup language for creating enterprise mashups, which are software applications that consume and mash data from variety of sources  Ex: Domain Specific Language (DSL) programming language with a higher level of abstraction optimized for a specific class of problems  Ex: HTML-It is a language for the web application domain. Enterprise Mashup  An Enterprise Mashup is a Web-based resource that combines existing resources content, data or application functionality from more than one resource in enterprise environments by empowering the actual end users to create and adapt individual information centric and situational applications M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
  • 16. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Mashup A mashup requires three separate components:  An interactive user interface, which is usually created with HTML/XHTML, Ajax, JavaScript, or CSS.  Web services that can be accessed using an API, and whose data can be bound and transported by Web service protocols such as SOAP , REST, XML/HTTP, XML/RPC, and JSON/RPC.  Data transfer in the form of XML, KML (Keyhole Markup Language), JSON (JavaScript Object Notation), or the like. Mashups are an incredibly useful hybrid Web application, one that SaaS is a great enabler for. The Open Mashup Alliance (OMA; see http://www.openmashup.org/) is a non-profit industry group dedicated to supporting technologies that implement enterprise mashups. This group supports the developing standard, the Enterprise Mashup Markup Language (EMML), which is a Domain Specific Language (DSL). This group predicts that the use of mashups will grow by a factor of 10 within just a few years.
  • 17. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Salesforce.com and CRM SaaS  Perhaps the best-known example of Software as a Service (SaaS) is the Customer Relationship Management software offered by Salesforce.com whose solution offers sales, service, support, marketing, content, analytical analysis, and even collaboration through a platform called Chatter.  Salesforce.com was founded in 1999 by a group of Oracle executives and early adopters of many of the technologies that are becoming cloud computing staples.
  • 18. Defining Identity as a Service (IDaaS)  Application delivery model (like software-as-a-service, or SaaS) allows users to connect to and use identity management services from the cloud.  Ensures the right people in an organization have the right access to the right resources Identity and access management (IAM) computing uses online computer power, database storage, and other IT resources.  Identity service is one that stores the information associated with a digital entity in a form that can be queried managed for use in electronic transactions. Why IDaaS?  Deliver access services efficiently and cost-effectively  Protect against internal and external security threats  Meet regulatory compliance requirements around security and privacy M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
  • 19. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Examples  Single Sign-on (SSO) authentication service allowing a user to access multiple applications and sites using one set of credentials.  Multi-Factor Authentication (MFA) multi-step account login process that requires users to enter more information than just a password  Identity Management To ensure that only the right people can access the appropriate data and resources —at the right times and for the right reasons.  Provisioning When a worker is assigned a role through your system, they would be automatically provisioned access with a role-based IAM solution.
  • 20. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Defining Identity as a Service (IDaaS)  IDaaS servers .COM, .ORG, .EDU, .MIL, .TV, .RU  Core functions –A data stores –Query Engine –Policy Engine  Identity A set of characteristics or traits that make something recognizable or known  A digital identity Attributes and metadata of an object along with a set of relationships with other objects that makes an object identifiable
  • 21. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. An identity can belong to a person and may include the following Things you are  Biological characteristics such as age, race, gender, appearance Things you know  Biography, personal data such as social security numbers, PINs, where you went to school Things you have  A pattern of blood vessels in your eye, your fingerprints, a bank account you can access, a security key you were given, objects and possessions Things you relate to  Your family and friends, a software license, beliefs and values, activities and endeavors, personal selections and choices, habits and practices, an iGoogle account
  • 22. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Digital Identities  For user and machine accounts, Identities are created and stored in domain security Databases that are the basis for any network domain, In directory services, and in data stores in federated systems. Network interface  the point of interconnection between a computer and a private or public network  Network interfaces are identified uniquely by Media Access Control (MAC) addresses, Alternatively are referred to as Ethernet Hardware Addresses (EHAs). EHAs-(HW Address) is your Ethernet card's unique identity  It is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. Media Access Control  Network data transfer policy that determines how data is transmitted between two computer terminals through a network cable.
  • 23. Windows Product Activation Microsoft validates your installation During Activation it Creates an identification index or profile of your system  A 25-character software product key and product ID  The uniquely assigned Global Unique Identifier or GUID  PC manufacturer  CPU type and serial number  BIOS checksum  Network adapter and its MAC address  Display adapter  SCSCI and  DE adapters  RAM amount  Hard drive and volume serial number  Optical drive  Region and language settings and user locale From the above information, a code is calculated, checked, and entered into the registration database. Each of these uniquely identified hardware attributes is assigned a weighting factor such that an overall sum may be calculated. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
  • 24. Networked identity service classes  Forms of identity services To validate Web sites, transactions, transaction participants, clients, and network services. Identity as a Service (IDaaS) offers  Authentication services (identity verification)  Directory services  Federated identity  Identity governance  Identity and profile management  Policies, roles, and enforcement  Provisioning (external policy administration)  Registration  Risk and event monitoring, including audits  Single sign-on services (pass-through authentication) M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
  • 25. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Identity System Codes of Conduct IDaaSis cloud-based authentication built and operated by a third-party provider. Working with IDaaS software, evaluate IDaaS applications on the following basis  User control for consent Users control their identity and must consent(to agree to something) to the use of their information.  Minimal Disclosure The minimal amount of information should be disclosed for an intended use.  Justifiable access Only parties who have a justified use of the information contained in a digital identity and have a trusted identity relationship with the owner of the information may be given access to that information.
  • 26. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.  Directional Exposure An ID system must support bidirectional identification for a public entity so that it is discoverable and a unidirectional identifier for private entities, thus protecting the private ID.  Interoperability A cloud computing ID system must interoperate with other identity services from other identity providers.  Unambiguous human identification An IDaaS application must provide an unambiguous mechanism for allowing a human to interact with a system while protecting that user against an identity attack.  Consistency of Service An IDaaS service must be simple to use, consistent across all its uses, and able to operate in different contexts using different technologies. Identity System Codes of Conduct
  • 27. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. IDaaS interoperability  Cloud computing IDaaS applications must rely on a set of developing industry standards to provide interoperability  User centric authentication(usually in the form of information cards) The OpenID and CardSpace specifications support this type of data object.  The XACML Policy Language A general-purpose authorization policy language Allows a distributed ID system to write and enforce custom policy expressions. XACML can work with SAML when SAML presents a request for ID authorization, XACML checks the ID request against its policies and either allows or denies the request.
  • 28. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. IDaaS interoperability  The SPML Provisioning Language This is an XML request/response language that is used to integrate and interoperate service provisioning requests. SPML is a standard of OASIS’s Provision Services Technical Committee (PSTC) that conforms to the SOA architecture.  The XDAS Audit System The Distributed Audit Service provides accountability for users accessing a system, and the detection of security policy violations when attempts are made to access the system by unauthorized users or by users accessing the system in an unauthorized way
  • 29. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Networked identity service classes  The Identity Governance Framework (IGF) is a standards initiative of the Liberty Alliance.  Exchange and control of identity information using standards such as WS-Trust, ID-WSF, SAML, and LDAP directory services.  Client Attribute Requirements Markup Language (CARML)
  • 30. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. User Authentication OpenID  –Developing industry standard for authenticating “end users” by storing their digital identity in a common format.  –An identity is created in an OpenID system,  –Information is stored in the system of any OpenID service provider  –Translated into a unique identifier.  –Identifiers take the form of a Uniform Resource Locator (URL) or as an Extensible Resource Identifier (XRI)  –Authenticated by that OpenID service provider  –unique identity of the URL; Identity providers  AOL, Facebook, Google, IBM, Microsoft, MySpace, Orange, PayPal, VeriSign, LiveJournal, Ustream, Yahoo!
  • 31. Trusted providers and their URL formats  Blogger: .blogger.com or .blogspot.com  MySpace: myspace.com/  Google: https://www.google.com/accounts/o8/id l Google Profile: google.com/profiles/  Microsoft: accountservices.passport.net/  MyOpenID: .myopenid.com  Orange: openid.orange.fr/username or simply orange.fr/ Verisign: .pip.verisinglabs.com  WordPress: .wordpress.com  Yahoo!: openid.yahoo.com CardSpace  Microsoft software client The company’s Identity Meta system and built into the Web Services Protocol Stack.  This stack is built on the OASIS standards (WS-Trust, WS-Security, WS-Security Policy, and WS- Metadata Exchange)  A CardSpace object called an Identity Selector stores a digital identity Making it available to Windows applications in the form of a visual Information Card Can be accepted by complying applications and Web sites M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
  • 32. Authorization markup languages Information  Information requests and replies in cloud computing are nearly always in the form of XML replies or requests  XML files are text files and are self-describing.  XML files contain a schema that describes the data it contains or contains a point to another text file with its schema  XACML and SAML -specialized XML files are in the identity framework. XACML  Extensible Access Control Markup Language  Separates access control functionality into several components  An attribute-based access control policy language or XML-based language.  Designed to express security policies and access requests to information.  Used for web services, digital rights management, and enterprise security applications SAML  Security Assertion Markup Language  open federation standard that allows an identity provider (IdP) to authenticate users and then pass an authentication token to another application known as a service provider M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
  • 33. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. SAML integrates with XACML to implement a policy engine in a Service Oriented Architecture to support identity services authorization
  • 34. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Networked identity service classes Policy Administration Point (PAP)  location at which policy is managed Policy Decision Point (PDP)  Policy requests are passed through to the location(PAP) where the policy logic can be executed.  The result of the policy is transmitted through the PAP  Evaluates policies against access requests provided by Policy Enforcement Points(PEP). Deciding authority Policy Enforcement Point (PEP)  Enforces the PDP policy decision.  Protects an enterprise's data by enforcing access control.  Responsible for receiving authorization requests that are sent to the policy decision point (PDP) for evaluation.  Data and resources must be protected Policy Information Point (PIP)  Provides additional information that can be used to determine policy logic
  • 35. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Security Assertion Markup Language  XML-basedmarkup language for security assertions  statements that service providers use to make access-control decisions  The statements an identity provider sends to a service provider that contain authentication attribute authorization decision information  Allows people to sign in once using one set of credentialsand access multiple applications.
  • 36. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
  • 37. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Defining Compliance as a Service (CaaS)  Cloud computing by its very nature spans different jurisdictions. The laws of the country of a request’s origin may not match the laws of the country where the request is processed, and it’s possible that neither location’s laws match the laws of the country where the service is provided.  Compliance is much more than simply providing an anonymous service token to an identity so they can obtain access to a resource. Compliance is a complex issue that requires considerable expertise.  In order to implement CaaS, some companies are organizing what might be referred to as “vertical clouds,” clouds that specialize in a vertical market. Examples of vertical clouds that advertise CaaS capabilities include the following:  athenahealth (http://www.athenahealth.com/) for the medical industry  bankserv (http://www.bankserv.com/) for the banking industry  ClearPoint PCI Compliance-as-a-Service for merchant transactions under the Payment Card Industry Data Security Standard  FedCloud (http://www.fedcloud.com/) for government  Rackserve PCI Compliant Cloud (http://www.rackspace.com/; another PCI CaaS service)
  • 38. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Virtualization Creation of a virtual (rather than actual) version of something, such as  ❖ a server,  ❖ a desktop,  ❖ a storage device,  ❖ an operating system or network resources Allows to share a single physical instance of a resource or an application among multiple customers and organizations  Hardware Virtualization Creation of a virtual machine over existing operating system and hardware  Host Machine The machine on which the virtual machine is going to create  Guest Machine virtual machine
  • 39. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Virtualization - Hardware Hardware Virtualization  When the virtual machine software or virtual machine manager (VMM) is directly installed on the hardware system  Hypervisor is to control and monitoring the processor, memory and other hardware resources.  After virtualization of hardware system the user can install different operating system on it and run different applications on those OS. Usage  Done for the server platforms, because controlling virtual machines is much easier than controlling a physical server.
  • 40. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Virtualization- OS Operating System Virtualization  When the virtual machine software or virtual machine manager (VMM) is installed on the Host operating system instead of directly on the hardware system  creates virtual servers at the operating system or kernel level.  Each virtual server is running in its own virtual environment (VE) as a virtual private server (VPS). Usage  mainly used for testing the applications on different platforms of OS.
  • 41. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Virtualization- Server Server Virtualization  When the virtual machine software or virtual machine manager (VMM) is directly installed on the Server system  Masking of server resources takes place.  The central-server(physical server) is divided into multiple different virtual servers by changing the identity number, processors Usage  Done because a single physical server can be divided into multiple servers on the demand basis and for balancing the load.
  • 42. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Virtualization - Storage Storage Virtualization The process of grouping the physical storage from multiple network storage devices so that it looks like a single storage device. Usage ❖ Storage virtualization is mainly done for back-up and recovery purposes. ❖ Running multiple operating systems on a single machine but sharing all the hardware resources. ❖ it helps us to provide the pool of IT resources ❖ we can share these IT resources in order get benefits in the business.
  • 43. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Hypervisor  A form of virtualization software used in Cloud hosting to divide and allocate the resources on various pieces of hardware.  A process or a function to help admins isolate operating system and applications from the underlying hardware.  The program which provides partitioning, isolation or abstraction is called virtualization hypervisor.  A hardware virtualization technique that allows multiple guest operating systems (OS) to run on a single host system at the same time.  A hypervisor is sometimes also called a virtual machine manager(VMM).  Administrators can use the resources efficiently by dividing computing resources (RAM, CPU, etc.) between multiple VMs.
  • 44. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Hypervisor  server management as VMs are independent of the host environment.  The operation of one VM doesn’t affect other VMs or the underlying hardware
  • 45. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. TYPES OF HYPERVISORS - Type 1  The native or bare metal hypervisor.  Deployed directly over the host hardware.  Direct access to the hardware resource without any underlying OS or device drivers makes such hypervisors highly efficient for enterprise computing.  Direct access to CPU, Memory, Network, Physical storage.  Requires a dedicated physical machine.  It replaces the host operating system the hypervisor schedules VM services directly to the hardware.  Examples of Type 1 hypervisors include VMware ESXi, Citrix XenServer and Microsoft Hyper-V hypervisor.
  • 46. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. TYPES OF HYPERVISORS - Type 2  Known as a hosted hypervisor.  Requires an operating system to run on a physical host  Hypervisors run as an application in a host system(physical machine).  A software layer or framework that runs on a traditional operating system.  Hypervisor asks the operating system to make hardware calls  The host operating system schedules VM services, which are then executed on the hardware.  Individual users who wish to operate multiple operating systems on a personal computer should use a form 2 hypervisor.  Example: KVM, VMware Server and Workstation, Microsoft Virtual PC, Oracle VM VirtualBox, and QEMU
  • 47. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Type 1 Vs Type 2
  • 48. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Emulation  The emulator is a hardware or software that enables one device (named Host) to function like other systems (named Guest).  A technique in which Virtual machines simulates complete hardware in software.  Many virtualization techniques that were developed in or inherited from emulation technique.  Useful when designing software for various systems.  It simply allows us to use current platform to access an older application, data, or operating system.  To allow subsystem to present same interface and characteristics as another.
  • 49. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Paravirtualization  CPU virtualization which uses hypercalls for operations to handle instructions at compile time.  Enables the Guest OS to interact with the hypervisor  Guest OS is not completely isolated but it is partially isolated by the virtual machine from the virtualization layer and hardware  The hypervisor is installed on the device. Then, the guest operating systems are installed into the environment. Here, the virtualization method modifies the guest operating system to communicate with the hypervisor.
  • 50. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Paravirtualization  Virtual machines can be accessed through interfaces that are similar to the underlying hardware.  Guest OS is not completely isolated but it is partially isolated by the VM from the virtualization layer and hardware.  Guest os does not have direct access to hardware.  When guest os wants to communicate to hardware it goes through host os
  • 51. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Full Virutalization  Software solution for server virtualization and uses binary translation and direct approach techniques  Enables the Guest operating system to run independently  Guest OS is completely isolated by the virtual machine from the virtualization layer and hardware.  The guest operating system is unaware that it is in a virtualized environment, and therefore hardware is virtualized by the host operating system  Microsoft and Parallels systems are examples of full virtualization.  Allowed multiple guest operating systems to run on a single host OS in full isolation
  • 52. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
  • 53. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Machine Imaging  A process that is used to provide system portability, and provision and deploy systems in the cloud.  Through capturing the state of systems using a system image.  A system image makes a copy or a clone of the entire  computer system inside a single file.  Machine imaging is mostly run on virtualization  platform due to this it is also called as Virtual Appliances and running virtual machines are called instances.  A Compute Engine resource that stores all the configuration, metadata, permissions, and data from one or more disks required to create a virtual machine (VM) instance.  Use a machine image in many system maintenance scenarios, such as instance creation, backup and recovery, and instance cloning.
  • 54. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Machine Imaging Example  Amazon Machine Image (AMI) is a system image that is used in the cloud computing.  The Amazon Web Services uses AMI to store copies of a virtual machine  An AMI is a file system image that contains an operating system, all device drivers, and any applications and state information that the working virtual machine.
  • 55. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. VMware vSphere  A server virtualization software application from VMware.  VMware is a virtualization and cloud computing software vendor.  Serves as a complete platform for implementing and managing virtual machine (VM) infrastructure on a large scale.  Management infrastructure framework that virtualizes system, storage, and networking hardware to create cloud computing infrastructures.  Referred to as a cloud operating system or virtualized data center platform.  vSphere is the branding for a set of management tools and a set of products
  • 56. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. VMware vSphere vSphere provides a set of services that applications can use to access cloud resources vSphere includes the following components VMware vCompute A service that aggregates servers into an assignable pool VMware vStorage A service that aggregates storage resources into an assignable pool VMware vNetwork A service that creates and manages virtual network interfaces Application services Such as HA (High Availability) and Fault Tolerance vCenter Server A provisioning, management, and monitoring console for VMware cloud infrastructures
  • 57. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI.
  • 58. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. VMware vSphere Products Virtual Machine File System (VMFS) A high-performance cluster file system for an ESX/ESXi cluster. VMotion A service that allows for the migration of a virtual machine from one physical server to another physical server while the virtual server runs continuously and without any interruption of ongoing transactions. Storage VMotion A product that can migrate files from one datastore to another datastore while the virtual machine that uses the datastore continues to run.
  • 59. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. VMware vSphere Products  Virtual SMP A feature that allows a virtual machine to run on two or more physical processors at the same time.  Distributed Resource Scheduler (DRS) A system for provisioning virtual machines and load balancing processing resources dynamically across the different physical systems that are in use. A part of the DRS called the distributed power management (DPM) module can manage the power consumption of systems.  vNetwork Distributed Switch (DVS) A capability to maintain a network runtime state for virtual machines as they are migrated from one physical system to another. DVS also monitors network connections, provides firewall services, and enables the use of third party switches such as the Cisco Nexus 1000V to manage virtual networks.
  • 60. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Virtual Infrastructure Elements
  • 61. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Porting Applications  Build an application on a platform such as Microsoft Azure.  Porting that application to Amazon Web Services or GoogleApps may be difficult.  To create an interoperability standard.  Zend Technologies has started an open source initiative to create a common application program interface  it will allow applications to be portable.
  • 62. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. Simple Cloud API - Goal a set of common interfaces File Storage Services Currently Amazon S3, Windows Azure Blob Storage, Nirvanix, and Local storage is supported by the Storage API. There are plans to extend this API to Rackspace Cloud Files and GoGrid Cloud Storage. Document Storage Services Amazon SimpleDB and Windows Azure Table Storage are currently supported. Local document storage is planned. Simple Queue Services Amazon SQS, Windows Azure Queue Storage, and Local queue services are supported.
  • 63. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. AppZero Virtual Application Appliance  Moving an application from one platform to another isn’t nearly as simple as moving a machine image from one system to another.  When the application loads, it often loads or uses different Dynamic Link Libraries (DLL).  AppZero – company  To make applications easily portable.  Its solution is called the Virtual Application Appliance (VAA).  The AppZero solution creates a virtual application appliance as an architectural layer between the Windows or the UNIX operating system and applications.  The virtualization layer serves as the mediator for file I/O, memory I/O, and application calls and response to DLLs, which has the effect of sandboxing the application.
  • 64. M.SINDHU, ASSISTANT PROFESSOR,KONGU ENGINEERING COLLEGE,PERUNDURAI. VAA  VAA creates a container that encapsulates the application and all the application’s dependencies within a set of files  It is essentially an Application Image for a specific OS.  Dependencies include DLL, service settings, necessary configuration files, registry entries, and machine and network settings.