SlideShare una empresa de Scribd logo
1 de 112
IT19741
Cloud and Big Data
Analytics
Dr G Geetha
Dean innovation and Professor CSE
Women Scientist, Qualified Patent agent
UNIT-I CLOUD
ENABLING
TECHNOLOGIES
Technologies for Network-Based Systems -
System Models for Distributed and Cloud
Computing - Implementation Levels of
Virtualization - Virtualization Structures/Tools
and Mechanisms - Virtualization of CPU,
Memory, and I/O Devices - Virtual Clusters
and Resource Management - Virtualization for
Data-Center Automation.
1.1 Technologies for Network-Based Systems
1. Multicore CPUs and Multithreading Technologies
2. GPU Computing to Exascale and Beyond
3. Memory, Storage, and Wide-Area Networking
4. Virtual Machines and Virtualization Middleware
5. Data Center Virtualization for Cloud Computing
4
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 4
Data Deluge Enabling New Challenges
(Courtesy of Judy Qiu, Indiana University, 2011)
5
From Desktop/HPC/Grids to Internet Clouds
in 30 Years
• HPC moving from centralized supercomputers to geographically distributed
desktops, desksides, clusters, and grids to clouds over last 30 years
• R/D efforts on HPC, clusters, Grids, P2P, and virtual machines has laid the
foundation of cloud computing that has been greatly advocated since 2007
• Location of computing infrastructure in areas with lower costs in hardware,
software, datasets, space, and power requirements – moving from desktop
computing to datacenter-based clouds
6
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 6
Interactions among 4 technical challenges :Data Deluge, Cloud
Technology, eScience,and Multicore/Parallel Computing
(Courtesy of Judy Qiu, Indiana University, 2011)
7
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 7
Clouds and Internet of Things
HPC: High-Performance
Computing
HTC: High-Throughput Computing
P2P: Peer to Peer
MPP: Massively Parallel
Processors
Source: K. Hwang, G. Fox, and J. Dongarra,Distributed and Cloud Computing,
Morgan Kaufmann, 2012.
8
Computing Paradigm Distinctions
• Centralized Computing
• All computer resources are centralized in one physical system.
• Parallel Computing
• All processors are either tightly coupled with central shard memory or loosely coupled with
distributed memory
• Distributed Computing
• Field of CS/CE that studies distributed systems. A distributed system consists of multiple
autonomous computers, each with its own private memory, communicating over a network.
• Cloud Computing
• An Internet cloud of resources that may be either centralized or decentralized. The cloud
apples to parallel or distributed computing or both. Clouds may be built from physical or
virtualized resources.
9
Technology Convergence toward HPC for Science and HTC for
Business: Utility Computing
(Courtesy of Raj Buyya, University of Melbourne, 2011)
Copyright © 2012, Elsevier Inc. All rights reserved.
10
2011 Gartner “IT Hype Cycle” for Emerging Technologies
2007
2008
2009
2010
2011
Copyright © 2012, Elsevier Inc. All rights reserved.
11
33 year Improvement in Processor and Network Technologies
Technologies for Network-based Systems
12
Modern Multi-core CPU Chip
13
14
Multi-threading Processors
• Four-issue superscalar (e.g. Sun Ultrasparc I)
• Implements instruction level parallelism (ILP) within a single processor.
• Executes more than one instruction during a clock cycle by sending multiple
instructions to redundant functional units.
• Fine-grain multithreaded processor
• Switch threads after each cycle
• Interleave instruction execution
• If one thread stalls, others are executed
• Coarse-grain multithreaded processor
• Executes a single thread until it reaches certain situations
• Simultaneous multithread processor (SMT)
• Instructions from more than one thread can execute in any given pipeline stage
at a time.
15
5 Micro-architectures of CPUs
Each row represents the issue slots for a single execution cycle:
• A filled box indicates that the processor found an instruction to execute in that
issue slot on that cycle;
• An empty box denotes an unused slot.
16
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 16
33 year Improvement in Memory and Disk Technologies
17
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 17
Architecture of A Many-Core Multiprocessor GPU
interacting with a CPU Processor
18
NVIDIA Fermi GPU
19
GPU Performance
Bottom – CPU - 0.8 Gflops/W/Core (2011)
Middle – GPU - 5 Gflops/W/Core (2011)
Top - EF – Exascale computing (10^18 Flops)
20
Interconnection Networks
• SAN (storage area network) - connects servers with disk arrays
• LAN (local area network) – connects clients, hosts, and servers
• NAS (network attached storage) – connects clients with large storage
systems
21
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 21
Datacenter and Server Cost Distribution
22
Virtual Machines
• Eliminate real machine constraint
• Increases portability and flexibility
• Virtual machine adds software to a physical machine to give it the
appearance of a different platform or multiple platforms.
• Benefits
• Cross platform compatibility
• Increase Security
• Enhance Performance
• Simplify software migration
23
Initial Hardware Model
 All applications access hardware resources (i.e. memory, i/o)
through system calls to operating system (privileged
instructions)
 Advantages
 Design is decoupled (i.e. OS people can develop OS
separate of Hardware people developing hardware)
 Hardware and software can be upgraded without notifying
the Application programs
 Disadvantage
 Application compiled on one ISA will not run on another
ISA.
 Applications compiled for Mac use different operating
system calls then application designed for windows.
 ISA’s must support old software
 Can often be inhibiting in terms of performance
 Since software is developed separately from hardware…
Software is not necessarily optimized for hardware.
24
Virtual Machine Basics
• Virtual software placed between underlying
machine and conventional software
• Conventional software sees different ISA from the
one supported by the hardware
• Virtualization process involves:
• Mapping of virtual resources (registers and
memory) to real hardware resources
• Using real machine instructions to carry out the
actions specified by the virtual machine
instructions
25
Three VM Architectures
1.2 System Models for Distributed and Cloud
Computing
1. Clusters of Cooperative Computers
2. Grid Computing Infrastructures
3. Peer-to-Peer Network Families
4. Cloud Computing over the Internet .
27
System Models for Distributed and Cloud
Computing
28
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 28
A Typical Cluster Architecture
29
Computational or Data Grid
30
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 30
A Typical Computational Grid
31
Peer-to-Peer (P2P) Network
• A distributed system architecture
• Each computer in the network can act as a client or server for other netwpork
computers.
• No centralized control
• Typically many nodes, but unreliable and heterogeneous
• Nodes are symmetric in function
• Take advantage of distributed, shared resources (bandwidth, CPU, storage) on
peer-nodes Fault-tolerant, self-organizing Operate in dynamic environment,
frequent join and leave is the norm
32
Peer-to-Peer (P2P) Network
Overlay network - computer network built on top of another network.
• Nodes in the overlay can be thought of as being connected by virtual or logical links, each of which
corresponds to a path, perhaps through many physical links, in the underlying network.
• For example, distributed systems such as cloud computing, peer-to-peer networks, and client-server
applications are overlay networks because their nodes run on top of the Internet.
33
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 33
Peer-to-Peer (P2P) Network
34
The Cloud
• Historical roots in today’s Internet apps
• Search, email, social networks
• File storage (Live Mesh, Mobile Me, Flicker, …)
• A cloud infrastructure provides a framework to manage
scalable, reliable, on-demand access to applications
• A cloud is the “invisible” backend to many of our mobile
applications
• A model of computation and data storage based on “pay
as you go” access to “unlimited” remote data center
capabilities
Copyright © 2012, Elsevier Inc. All rights reserved.
35
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 35
Basic Concept of Internet Clouds
• Cloud computing is the use of computing resources (hardware and software) that are
delivered as a service over a network (typically the Internet).
• The name comes from the use of a cloud-shaped symbol as an abstraction for the
complex infrastructure it contains in system diagrams.
• Cloud computing entrusts remote services with a user's data, software and computation.
36
The Next Revolution in IT
Cloud Computing
 Classical Computing
 Buy & Own
 Hardware, System
Software, Applications
often to meet peak needs.
 Install, Configure, Test, Verify,
Evaluate
 Manage
 ..
 Finally, use it
 $$$$....$(High CapEx)
 Cloud Computing
 Subscribe
 Use
 $ - pay for what you use,
based on QoS
Every
18
months?
Copyright © 2012, Elsevier Inc. All rights reserved.
(Courtesy of Raj Buyya, 2012)
37
Cloud Service Models (1)
Infrastructure as a service (IaaS)
• Most basic cloud service model
• Cloud providers offer computers, as physical or more often as virtual machines,
and other resources.
• Virtual machines are run as guests by a hypervisor, such as Xen or KVM.
• Cloud users deploy their applications by then installing operating system images
on the machines as well as their application software.
• Cloud providers typically bill IaaS services on a utility computing basis, that is,
cost will reflect the amount of resources allocated and consumed.
• Examples of IaaS include: Amazon Cloud Formation (and underlying services
such as Amazon EC2), Rackspace Cloud, Terre mark, and Google Compute
Engine.
38
Cloud Service Models (2)
Platform as a service (PaaS)
• Cloud providers deliver a computing platform typically including operating system,
programming language execution environment, database, and web server.
• Application developers develop and run their software on a cloud platform without
the cost and complexity of buying and managing the underlying hardware and
software layers.
• Examples of PaaS include: Amazon Elastic Beanstalk, Cloud Foundry, Heroku,
Force.com, EngineYard, Mendix, Google App Engine, Microsoft Azure and
OrangeScape.
39
Cloud Service Models (3)
Software as a service (SaaS)
• Cloud providers install and operate application software in the cloud and cloud
users access the software from cloud clients.
• The pricing model for SaaS applications is typically a monthly or yearly flat fee
per user, so price is scalable and adjustable if users are added or removed at
any point.
• Examples of SaaS include: Google Apps, innkeypos, Quickbooks Online,
Limelight Video Platform, Salesforce.com, and Microsoft Office 365.
40
Service-oriented architecture (SOA)
• SOA is an evolution of distributed computing based on the request/reply design
paradigm for synchronous and asynchronous applications.
• An application's business logic or individual functions are modularized and
presented as services for consumer/client applications.
• Key to these services - their loosely coupled nature;
• i.e., the service interface is independent of the implementation.
• Application developers or system integrators can build applications by composing
one or more services without knowing the services' underlying implementations.
• For example, a service can be implemented either in .Net or J2EE, and the
application consuming the service can be on a different platform or language.
41
SOA key characteristics:
• SOA services have self-describing interfaces in platform-independent XML documents.
• Web Services Description Language (WSDL) is the standard used to describe the services.
• SOA services communicate with messages formally defined via XML Schema (also called
XSD).
• Communication among consumers and providers or services typically happens in
heterogeneous environments, with little or no knowledge about the provider.
• Messages between services can be viewed as key business documents processed in an
enterprise.
• SOA services are maintained in the enterprise by a registry that acts as a directory listing.
• Applications can look up the services in the registry and invoke the service.
• Universal Description, Definition, and Integration (UDDI) is the standard used for service
registry.
• Each SOA service has a quality of service (QoS) associated with it.
• Some of the key QoS elements are security requirements, such as authentication and
authorization, reliable messaging, and policies regarding who can invoke services.
42
Layered Architecture for Web Services
43
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 43
Cloud Computing Challenges:
Dealing with too many issues (Courtesy of R. Buyya)
Billing
Utility & Risk
Management
Scalability
Reliability
Software Eng.
Complexity
Programming Env.
& Application Dev.
44
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 44
The Internet of Things (IoT)
Internet of
Things
Smart Earth
Smart
Earth:
An
IBM
Dream
45
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 45
Opportunities of IoT in 3 Dimensions
(courtesy of Wikipedia, 2010)
46
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 46
Virtualization for Datacenter Automation
to serve millions of clients, simultaneously
• Server Consolidation in Virtualized Datacenter
• Virtual Storage Provisioning and Deprovisioning
• Cloud Operating Systems for Virtual Datacenters
• Trust Management in virtualized Datacenters
1.3 Implementation Levels of Virtualization
1. Levels of Virtualization Implementation
2. VMM Design Requirements and Providers
3. Virtualization Support at the OS Level
4. Middleware Support for Virtualization
48
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 48
Difference between Traditional Computer and Virtual machines
(Courtesy of VMWare, 2008)
49
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 49
Virtual Machine, Guest Operating System,
and VMM (Virtual Machine Monitor) :
The Virtualization layer is the middleware between the underlying hardware and
virtual machines represented in the system, also known as virtual machine
monitor (VMM) or hypervisor.
50
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 50
(Courtesy of VMWare, 2008)
51
Virtualization Ranging from Hardware to Applications in
Five Abstraction Levels
52
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 52
Virtualization at ISA (Instruction Set Architecture) level
Emulating a given ISA by the ISA of the host machine.
• e.g, MIPS binary code can run on an x-86-based host machine with the help of ISA emulation.
• Typical systems: Bochs, Crusoe, Quemu, BIRD, Dynamo
Advantage:
• It can run a large amount of legacy binary codes written for various processors on any given
new hardware host machines
• best application flexibility
Shortcoming & limitation:
• One source instruction may require tens or hundreds of native target instructions to perform its
function, which is relatively slow.
• V-ISA requires adding a processor-specific software translation layer in the complier.
53
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 53
Virtualization at Hardware Abstraction level
Virtualization is performed right on top of the hardware.
• It generates virtual hardware environments for VMs, and manages the underlying
hardware through virtualization.
• Typical systems: VMware, Virtual PC, Denali, Xen
Advantage:
• Has higher performance and good application isolation
Shortcoming & limitation:
• Very expensive to implement (complexity)
54
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 54
Virtualization at OS Level
55
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 55
Virtualization at Operating System (OS) level
It is an abstraction layer between traditional OS and user applications.
• This virtualization creates isolated containers on a single physical server and the OS-instance
to utilize the hardware and software in datacenters.
• Typical systems: Jail / Virtual Environment / Ensim's VPS / FVM
Advantage:
• Has minimal starup/shutdown cost, low resource requirement, and high scalability;
synchronize VM and host state changes.
Shortcoming & limitation:
• All VMs at the operating system level must have the same kind of guest OS
• Poor application flexibility and isolation.i
56
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 56
Virtualization for Linux and Windows NT Platforms
57
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 57
58
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 58
Advantages of OS Extension for Virtualization
1. VMs at OS level has minimum startup/shutdown costs
2. OS-level VM can easily synchronize with its
environment
Disadvantage of OS Extension for Virtualization
All VMs in the same OS container must have the same or similar guest OS,
which restrict application flexibility of different VMs on the same physical
machine.
59
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 59
Library Support level
It creates execution environments for running alien programs on a platform
rather than creating VM to run the entire operating system.
• It is done by API call interception and remapping.
• Typical systems: Wine, WAB, LxRun , VisualMainWin
Advantage:
• It has very low implementation effort
Shortcoming & limitation:
• poor application flexibility and isolation
60
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 60
Virtualization with Middleware/Library Support
61
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 61
The vCUBE for Virtualization of GPGPU
62
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 62
User-Application level
It virtualizes an application as a virtual machine.
• This layer sits as an application program on top of an operating system and
exports an abstraction of a VM that can run programs written and compiled to a
particular abstract machine definition.
• Typical systems: JVM , NET CLI , Panot
Advantage:
• has the best application isolation
Shortcoming & limitation:
• low performance, low application flexibility and high implementation complexity.
63
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 63
More Xs mean higher merit
1.4 Virtualization Structures/Tools and
Mechanisms
• Hypervisor and Xen Architecture
• Binary Translation with Full Virtualization
• Para-Virtualization with Compiler Support
65
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 65
Hypervisor
A hypervisor is a hardware virtualization technique allowing multiple operating systems, called
guests to run on a host machine. This is also called the Virtual Machine Monitor (VMM).
Type 1: bare metal hypervisor
• sits on the bare metal computer hardware like the CPU, memory, etc.
• All guest operating systems are a layer above the hypervisor.
• The original CP/CMS hypervisor developed by IBM was of this kind.
Type 2: hosted hypervisor
• Run over a host operating system.
• Hypervisor is the second layer over the hardware.
• Guest operating systems run a layer over the hypervisor.
• The OS is usually unaware of the virtualization
66
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 66
Major VMM and Hypervisor Providers
67
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 67
The XEN Architecture (1)
68
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 68
The XEN Architecture (2)
69
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 69
The XEN Architecture (3)
70
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 70
Full virtualization
It is the first software solution for server virtualization and
uses binary translation and direct approach techniques. In
full virtualization, guest OS is completely isolated by the
virtual machine from the virtualization layer and hardware.
• Para virtualization
Paravirtualization is the category of CPU virtualization
which uses hypercalls for operations to handle
instructions at compile time. In paravirtualization, guest
OS is not completely isolated but it is partially isolated by
the virtual machine from the virtualization layer and
hardware. VMware and Xen are some examples of
paravirtualization.
Full Virtualization vs. Para-Virtualization
71
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 71
Binary
Translation
of Guest OS
Requests
using a
VMM:
72
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 72
73
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 73
Full virtualization
• Does not need to modify guest OS, and critical instructions are emulated by software through the
use of binary translation.
• VMware Workstation applies full virtualization, which uses binary translation to automatically modify
x86 software on-the-fly to replace critical instructions.
• Advantage: no need to modify OS.
• Disadvantage: binary translation slows down the performance.
Para virtualization
• Reduces the overhead, but cost of maintaining a para virtualized OS is high.
• The improvement depends on the workload.
• Para virtualization must modify guest OS, non-virtualizable instructions are replaced by hypercalls
that communicate directly with the hypervisor or VMM.
• Para virtualization is supported by Xen, Denali and VMware ESX.
Full Virtualization vs. Para-Virtualization
74
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 74
Full Virtualization
75
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 75
Para- Virtualization with Compiler Support.
The KVM builds offers kernel-based VM on the Linux
platform, based on para-virtualization
76
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 76
VMWare ESX Server for Para-Virtualization
77
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 77
1.5 Virtualization of CPU, Memory, and I/O
Devices
• Hardware Support for Virtualization
• CPU Virtualization
• Memory Virtualization
• I/O Virtualization
• Virtualization in Multi-Core Processors
79
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 79
80
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 80
CPU, Memory and I/O Virtualization
• CPU virtualization demands hardware-assisted traps of sensitive
instructions by the VMM
• Memory virtualization demands special hardware support (shadow page
tables by VMWare or extended page table by Intel) to help translate virtual
address into physical address and machine memory in two stages.
• I/O virtualization is the most difficult one to realize due to the complexity if
I/O service routines and the emulation needed between the guest OS and
host OS.
81
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 81
Multi-Core Virtualization:
VCPU vs. traditional CPU
Figure 3.16 Four VCPUs are exposed to the software, only three cores are actually present. VCPUs V0, V1, and V3 have
been transparently migrated, while VCPU V2 has been transparently suspended. (Courtesy of Wells, et al., “Dynamic
Heterogeneity and the Need for Multicore Virtualization”, ACM SIGOPS Operating Systems Review, ACM Press, 2009 [68] )
1.6 Virtual Clusters and Resource
Management
• Physical versus Virtual Clusters
• Live VM Migration Steps and Performance Effects
• Migration of Memory, Files, and Network Resources
• Dynamic Deployment of Virtual Clusters
83
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 83
Virtual Cores vs. Physical Processor Cores
Physical cores Virtual cores
The actual physical cores present in the
processor.
There can be more virtual cores
visible to a single OS than there are
physical cores.
More burden on the software to write
applications which can run directly on
the cores.
Design of software becomes easier as
the hardware assists the software in
dynamic resource utilization.
Hardware provides no assistance to the
software and is hence simpler.
Hardware provides assistance to the
software and is hence more complex.
Poor resource management. Better resource management.
The lowest level of system software has
to be modified.
The lowest level of system software
need not be modified.
84
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 84
(Courtesy of Marty and Hill, 2007)
85
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 85
Virtual Clusters in Many Cores
Space Sharing of VMs -- Virtual Hierarchy
(Courtesy of Marty and Hill, 2007)
86
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 86
• The virtual cluster nodes can be either physical or virtual machines. Multiple VMs running with
different OSs can be deployed on the same physical node.
• A VM runs with a guest OS, which is often different from the host OS, that manages the
resources in the physical machine, where the VM is implemented.
• The purpose of using VMs is to consolidate multiple functionalities on the same server. This will
greatly enhance the server utilization and application flexibility.
• VMs can be colonized (replicated) in multiple servers for the purpose of promoting distributed
parallelism, fault tolerance, and disaster recovery.
• The size (number of nodes) of a virtual cluster can grow or shrink dynamically, similarly to the
way an overlay network varies in size in a P2P network.
• The failure of any physical nodes may disable some VMs installed on the failing nodes. But the
failure of VMs will not pull down the host system.
Virtual Cluster Characteristics
87
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 87
Virtual Clusters vs. Physical Clusters
88
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 88
89
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 89
Live Migration of Virtual Machines
90
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 90
Live Migration of Virtual Machines
91
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 91
92
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 92
Virtual Cluster Projects
93
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 93
94
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 94
Cluster-on-Demand (COD Project) at Duke University
95
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 95
96
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 96
VIOLIN Project at Purdue University
97
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 97
1.7 Virtualization for Data-Center Automation
• Server Consolidation in Data Centers
Server consolidation is the process of migrating network services and applications
from multiple computers to a singular computer. This consolidation can include
multiple physical computers to multiple virtual computers on one host computer
• Virtual Storage Management
Virtual Storage Management provides end-to-end view of the storage assigned to
client logical partition.
• Cloud OS for Virtualized Data Centers
vSphere is primarily intended to offer virtualization support and resource
management of data-center resources in building private clouds.
• Trust Management in Virtualized Data Centers
assures secure data access through trustworthy cloud service provider
99
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 99
Parallax for VM Storage Management
100
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 100
Cloud OS for Building Private Clouds
101
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 101
102
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 102
Eucalyptus : An Open-Source OS for Setting
Up and Managing Private Clouds
103
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 103
104
Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 104
Trusted Zones for VM Insulation
Tenant #2
APP
OS
APP
OS
Virtual Infrastructure
Physical Infrastructure
Cloud Provider
APP
OS
APP
OS
Virtual Infrastructure
Tenant #1
Insulate
information
from cloud
providers’
employees
Insulate
information
from other
tenants
Insulate
infrastructure from
Malware, Trojans
and cybercriminals
Segregate and
control user
access
Control and
isolate VM in
the virtual
infrastructure
Federate
identities with
public clouds
Identity
federation
Virtual
network
security
Access
Mgmt
Cybercrime
intelligence
Strong
authentication
Data loss
prevention
Encryption
& key mgmt
Tokenization
Enable end to end view of security events
and compliance across infrastructures
Security Info. &
Event Mgmt GRC
Anti-malware
(Courtesy of L. Nick, EMC 2008)
1.1 Technologies for Network-Based Systems
1. Multicore CPUs and Multithreading Technologies
2. GPU Computing to Exascale and Beyond
3. Memory, Storage, and Wide-Area Networking
4. Virtual Machines and Virtualization Middleware
5. Data Center Virtualization for Cloud Computing
1.2 System Models for Distributed and Cloud
Computing
1. Clusters of Cooperative Computers
2. Grid Computing Infrastructures
3. Peer-to-Peer Network Families
4. Cloud Computing over the Internet .
1.3 Implementation Levels of Virtualization
1. Levels of Virtualization Implementation
2. VMM Design Requirements and Providers
3. Virtualization Support at the OS Level
4. Middleware Support for Virtualization
1.4 Virtualization Structures/Tools and
Mechanisms
• Hypervisor and Xen Architecture
• Binary Translation with Full Virtualization
• Para-Virtualization with Compiler Support
1.5 Virtualization of CPU, Memory, and I/O
Devices
• Hardware Support for Virtualization
• CPU Virtualization
• Memory Virtualization
• I/O Virtualization
• Virtualization in Multi-Core Processors
1.6 Virtual Clusters and Resource
Management
• Physical versus Virtual Clusters
• Live VM Migration Steps and Performance Effects
• Migration of Memory, Files, and Network Resources
• Dynamic Deployment of Virtual Clusters
1.7 Virtualization for Data-Center Automation
• Server Consolidation in Data Centers
• Virtual Storage Management
• Cloud OS for Virtualized Data Centers
• Trust Management in Virtualized Data Centers
Test
• https://forms.gle/GkzouAN2ChrPCdmc9

Más contenido relacionado

La actualidad más candente

Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloud
sagaroceanic11
 
Survey on cloud simulator
Survey on cloud simulatorSurvey on cloud simulator
Survey on cloud simulator
Habibur Rahman
 

La actualidad más candente (20)

Task programming
Task programmingTask programming
Task programming
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
CLOUD COMPUTING UNIT-1
CLOUD COMPUTING UNIT-1CLOUD COMPUTING UNIT-1
CLOUD COMPUTING UNIT-1
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Scheduling in cloud
Scheduling in cloudScheduling in cloud
Scheduling in cloud
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
cluster computing
cluster computingcluster computing
cluster computing
 
5. IO virtualization
5. IO virtualization5. IO virtualization
5. IO virtualization
 
Cloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computingCloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computing
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
Datacenter overview
Datacenter overviewDatacenter overview
Datacenter overview
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed system
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloud
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperability
 
HPC in the Cloud
HPC in the CloudHPC in the Cloud
HPC in the Cloud
 
Survey on cloud simulator
Survey on cloud simulatorSurvey on cloud simulator
Survey on cloud simulator
 

Similar a CLOUD ENABLING TECHNOLOGIES.pptx

Week 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdfWeek 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdf
John422973
 
Cloud white paper v3.0
Cloud white paper v3.0Cloud white paper v3.0
Cloud white paper v3.0
CK Toh
 

Similar a CLOUD ENABLING TECHNOLOGIES.pptx (20)

00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf
 
_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdf_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdf
 
Week 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdfWeek 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdf
 
Week 1 lecture material cc
Week 1 lecture material ccWeek 1 lecture material cc
Week 1 lecture material cc
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Material
 
Cloud & Data Center Networking
Cloud & Data Center NetworkingCloud & Data Center Networking
Cloud & Data Center Networking
 
CCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptxCCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptx
 
Cloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptxCloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
vssutcloud computing.pptx
vssutcloud computing.pptxvssutcloud computing.pptx
vssutcloud computing.pptx
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
 
introduction to cloud computing for college.pdf
introduction to cloud computing for college.pdfintroduction to cloud computing for college.pdf
introduction to cloud computing for college.pdf
 
CCUnit1.pdf
CCUnit1.pdfCCUnit1.pdf
CCUnit1.pdf
 
e-Infrastructure available for research, using the right tool for the right job
e-Infrastructure available for research, using the right tool for the right jobe-Infrastructure available for research, using the right tool for the right job
e-Infrastructure available for research, using the right tool for the right job
 
Elements of Systems Design.ppt
Elements of Systems Design.pptElements of Systems Design.ppt
Elements of Systems Design.ppt
 
Grid computing notes
Grid computing notesGrid computing notes
Grid computing notes
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
oracle.pptx
oracle.pptxoracle.pptx
oracle.pptx
 
Cloud white paper v3.0
Cloud white paper v3.0Cloud white paper v3.0
Cloud white paper v3.0
 
Presentation-1.ppt
Presentation-1.pptPresentation-1.ppt
Presentation-1.ppt
 

Más de Dr Geetha Mohan

Más de Dr Geetha Mohan (13)

INTRODUCTION TO BIG DATA AND HADOOP
INTRODUCTION TO BIG DATA AND HADOOPINTRODUCTION TO BIG DATA AND HADOOP
INTRODUCTION TO BIG DATA AND HADOOP
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptx
 
IPR in Academic Research:Dr G Geetha
IPR in Academic Research:Dr G GeethaIPR in Academic Research:Dr G Geetha
IPR in Academic Research:Dr G Geetha
 
How to file a patent
How to file a patentHow to file a patent
How to file a patent
 
Design and analysis of algorithms
Design and analysis of algorithmsDesign and analysis of algorithms
Design and analysis of algorithms
 
Machine learning
Machine learningMachine learning
Machine learning
 
Resource management techniques
Resource management techniquesResource management techniques
Resource management techniques
 
Ge6075 professional ethics in engineering unit 1
Ge6075 professional ethics in engineering  unit 1Ge6075 professional ethics in engineering  unit 1
Ge6075 professional ethics in engineering unit 1
 
Cp7101 design and management of computer networks-flow analysis
Cp7101 design and management of computer networks-flow analysisCp7101 design and management of computer networks-flow analysis
Cp7101 design and management of computer networks-flow analysis
 
Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2 Cp7101 design and management of computer networks-requirements analysis 2
Cp7101 design and management of computer networks-requirements analysis 2
 
Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysis
 
Cp7101 design and management of computer networks-design concepts
Cp7101 design and management of computer networks-design conceptsCp7101 design and management of computer networks-design concepts
Cp7101 design and management of computer networks-design concepts
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
 

Último

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 

CLOUD ENABLING TECHNOLOGIES.pptx

  • 1. IT19741 Cloud and Big Data Analytics Dr G Geetha Dean innovation and Professor CSE Women Scientist, Qualified Patent agent
  • 2. UNIT-I CLOUD ENABLING TECHNOLOGIES Technologies for Network-Based Systems - System Models for Distributed and Cloud Computing - Implementation Levels of Virtualization - Virtualization Structures/Tools and Mechanisms - Virtualization of CPU, Memory, and I/O Devices - Virtual Clusters and Resource Management - Virtualization for Data-Center Automation.
  • 3. 1.1 Technologies for Network-Based Systems 1. Multicore CPUs and Multithreading Technologies 2. GPU Computing to Exascale and Beyond 3. Memory, Storage, and Wide-Area Networking 4. Virtual Machines and Virtualization Middleware 5. Data Center Virtualization for Cloud Computing
  • 4. 4 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 4 Data Deluge Enabling New Challenges (Courtesy of Judy Qiu, Indiana University, 2011)
  • 5. 5 From Desktop/HPC/Grids to Internet Clouds in 30 Years • HPC moving from centralized supercomputers to geographically distributed desktops, desksides, clusters, and grids to clouds over last 30 years • R/D efforts on HPC, clusters, Grids, P2P, and virtual machines has laid the foundation of cloud computing that has been greatly advocated since 2007 • Location of computing infrastructure in areas with lower costs in hardware, software, datasets, space, and power requirements – moving from desktop computing to datacenter-based clouds
  • 6. 6 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 6 Interactions among 4 technical challenges :Data Deluge, Cloud Technology, eScience,and Multicore/Parallel Computing (Courtesy of Judy Qiu, Indiana University, 2011)
  • 7. 7 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 7 Clouds and Internet of Things HPC: High-Performance Computing HTC: High-Throughput Computing P2P: Peer to Peer MPP: Massively Parallel Processors Source: K. Hwang, G. Fox, and J. Dongarra,Distributed and Cloud Computing, Morgan Kaufmann, 2012.
  • 8. 8 Computing Paradigm Distinctions • Centralized Computing • All computer resources are centralized in one physical system. • Parallel Computing • All processors are either tightly coupled with central shard memory or loosely coupled with distributed memory • Distributed Computing • Field of CS/CE that studies distributed systems. A distributed system consists of multiple autonomous computers, each with its own private memory, communicating over a network. • Cloud Computing • An Internet cloud of resources that may be either centralized or decentralized. The cloud apples to parallel or distributed computing or both. Clouds may be built from physical or virtualized resources.
  • 9. 9 Technology Convergence toward HPC for Science and HTC for Business: Utility Computing (Courtesy of Raj Buyya, University of Melbourne, 2011) Copyright © 2012, Elsevier Inc. All rights reserved.
  • 10. 10 2011 Gartner “IT Hype Cycle” for Emerging Technologies 2007 2008 2009 2010 2011 Copyright © 2012, Elsevier Inc. All rights reserved.
  • 11. 11 33 year Improvement in Processor and Network Technologies Technologies for Network-based Systems
  • 13. 13
  • 14. 14 Multi-threading Processors • Four-issue superscalar (e.g. Sun Ultrasparc I) • Implements instruction level parallelism (ILP) within a single processor. • Executes more than one instruction during a clock cycle by sending multiple instructions to redundant functional units. • Fine-grain multithreaded processor • Switch threads after each cycle • Interleave instruction execution • If one thread stalls, others are executed • Coarse-grain multithreaded processor • Executes a single thread until it reaches certain situations • Simultaneous multithread processor (SMT) • Instructions from more than one thread can execute in any given pipeline stage at a time.
  • 15. 15 5 Micro-architectures of CPUs Each row represents the issue slots for a single execution cycle: • A filled box indicates that the processor found an instruction to execute in that issue slot on that cycle; • An empty box denotes an unused slot.
  • 16. 16 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 16 33 year Improvement in Memory and Disk Technologies
  • 17. 17 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 17 Architecture of A Many-Core Multiprocessor GPU interacting with a CPU Processor
  • 19. 19 GPU Performance Bottom – CPU - 0.8 Gflops/W/Core (2011) Middle – GPU - 5 Gflops/W/Core (2011) Top - EF – Exascale computing (10^18 Flops)
  • 20. 20 Interconnection Networks • SAN (storage area network) - connects servers with disk arrays • LAN (local area network) – connects clients, hosts, and servers • NAS (network attached storage) – connects clients with large storage systems
  • 21. 21 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 21 Datacenter and Server Cost Distribution
  • 22. 22 Virtual Machines • Eliminate real machine constraint • Increases portability and flexibility • Virtual machine adds software to a physical machine to give it the appearance of a different platform or multiple platforms. • Benefits • Cross platform compatibility • Increase Security • Enhance Performance • Simplify software migration
  • 23. 23 Initial Hardware Model  All applications access hardware resources (i.e. memory, i/o) through system calls to operating system (privileged instructions)  Advantages  Design is decoupled (i.e. OS people can develop OS separate of Hardware people developing hardware)  Hardware and software can be upgraded without notifying the Application programs  Disadvantage  Application compiled on one ISA will not run on another ISA.  Applications compiled for Mac use different operating system calls then application designed for windows.  ISA’s must support old software  Can often be inhibiting in terms of performance  Since software is developed separately from hardware… Software is not necessarily optimized for hardware.
  • 24. 24 Virtual Machine Basics • Virtual software placed between underlying machine and conventional software • Conventional software sees different ISA from the one supported by the hardware • Virtualization process involves: • Mapping of virtual resources (registers and memory) to real hardware resources • Using real machine instructions to carry out the actions specified by the virtual machine instructions
  • 26. 1.2 System Models for Distributed and Cloud Computing 1. Clusters of Cooperative Computers 2. Grid Computing Infrastructures 3. Peer-to-Peer Network Families 4. Cloud Computing over the Internet .
  • 27. 27 System Models for Distributed and Cloud Computing
  • 28. 28 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 28 A Typical Cluster Architecture
  • 30. 30 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 30 A Typical Computational Grid
  • 31. 31 Peer-to-Peer (P2P) Network • A distributed system architecture • Each computer in the network can act as a client or server for other netwpork computers. • No centralized control • Typically many nodes, but unreliable and heterogeneous • Nodes are symmetric in function • Take advantage of distributed, shared resources (bandwidth, CPU, storage) on peer-nodes Fault-tolerant, self-organizing Operate in dynamic environment, frequent join and leave is the norm
  • 32. 32 Peer-to-Peer (P2P) Network Overlay network - computer network built on top of another network. • Nodes in the overlay can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. • For example, distributed systems such as cloud computing, peer-to-peer networks, and client-server applications are overlay networks because their nodes run on top of the Internet.
  • 33. 33 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 33 Peer-to-Peer (P2P) Network
  • 34. 34 The Cloud • Historical roots in today’s Internet apps • Search, email, social networks • File storage (Live Mesh, Mobile Me, Flicker, …) • A cloud infrastructure provides a framework to manage scalable, reliable, on-demand access to applications • A cloud is the “invisible” backend to many of our mobile applications • A model of computation and data storage based on “pay as you go” access to “unlimited” remote data center capabilities Copyright © 2012, Elsevier Inc. All rights reserved.
  • 35. 35 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 35 Basic Concept of Internet Clouds • Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). • The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. • Cloud computing entrusts remote services with a user's data, software and computation.
  • 36. 36 The Next Revolution in IT Cloud Computing  Classical Computing  Buy & Own  Hardware, System Software, Applications often to meet peak needs.  Install, Configure, Test, Verify, Evaluate  Manage  ..  Finally, use it  $$$$....$(High CapEx)  Cloud Computing  Subscribe  Use  $ - pay for what you use, based on QoS Every 18 months? Copyright © 2012, Elsevier Inc. All rights reserved. (Courtesy of Raj Buyya, 2012)
  • 37. 37 Cloud Service Models (1) Infrastructure as a service (IaaS) • Most basic cloud service model • Cloud providers offer computers, as physical or more often as virtual machines, and other resources. • Virtual machines are run as guests by a hypervisor, such as Xen or KVM. • Cloud users deploy their applications by then installing operating system images on the machines as well as their application software. • Cloud providers typically bill IaaS services on a utility computing basis, that is, cost will reflect the amount of resources allocated and consumed. • Examples of IaaS include: Amazon Cloud Formation (and underlying services such as Amazon EC2), Rackspace Cloud, Terre mark, and Google Compute Engine.
  • 38. 38 Cloud Service Models (2) Platform as a service (PaaS) • Cloud providers deliver a computing platform typically including operating system, programming language execution environment, database, and web server. • Application developers develop and run their software on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. • Examples of PaaS include: Amazon Elastic Beanstalk, Cloud Foundry, Heroku, Force.com, EngineYard, Mendix, Google App Engine, Microsoft Azure and OrangeScape.
  • 39. 39 Cloud Service Models (3) Software as a service (SaaS) • Cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients. • The pricing model for SaaS applications is typically a monthly or yearly flat fee per user, so price is scalable and adjustable if users are added or removed at any point. • Examples of SaaS include: Google Apps, innkeypos, Quickbooks Online, Limelight Video Platform, Salesforce.com, and Microsoft Office 365.
  • 40. 40 Service-oriented architecture (SOA) • SOA is an evolution of distributed computing based on the request/reply design paradigm for synchronous and asynchronous applications. • An application's business logic or individual functions are modularized and presented as services for consumer/client applications. • Key to these services - their loosely coupled nature; • i.e., the service interface is independent of the implementation. • Application developers or system integrators can build applications by composing one or more services without knowing the services' underlying implementations. • For example, a service can be implemented either in .Net or J2EE, and the application consuming the service can be on a different platform or language.
  • 41. 41 SOA key characteristics: • SOA services have self-describing interfaces in platform-independent XML documents. • Web Services Description Language (WSDL) is the standard used to describe the services. • SOA services communicate with messages formally defined via XML Schema (also called XSD). • Communication among consumers and providers or services typically happens in heterogeneous environments, with little or no knowledge about the provider. • Messages between services can be viewed as key business documents processed in an enterprise. • SOA services are maintained in the enterprise by a registry that acts as a directory listing. • Applications can look up the services in the registry and invoke the service. • Universal Description, Definition, and Integration (UDDI) is the standard used for service registry. • Each SOA service has a quality of service (QoS) associated with it. • Some of the key QoS elements are security requirements, such as authentication and authorization, reliable messaging, and policies regarding who can invoke services.
  • 43. 43 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 43 Cloud Computing Challenges: Dealing with too many issues (Courtesy of R. Buyya) Billing Utility & Risk Management Scalability Reliability Software Eng. Complexity Programming Env. & Application Dev.
  • 44. 44 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 44 The Internet of Things (IoT) Internet of Things Smart Earth Smart Earth: An IBM Dream
  • 45. 45 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 45 Opportunities of IoT in 3 Dimensions (courtesy of Wikipedia, 2010)
  • 46. 46 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 46 Virtualization for Datacenter Automation to serve millions of clients, simultaneously • Server Consolidation in Virtualized Datacenter • Virtual Storage Provisioning and Deprovisioning • Cloud Operating Systems for Virtual Datacenters • Trust Management in virtualized Datacenters
  • 47. 1.3 Implementation Levels of Virtualization 1. Levels of Virtualization Implementation 2. VMM Design Requirements and Providers 3. Virtualization Support at the OS Level 4. Middleware Support for Virtualization
  • 48. 48 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 48 Difference between Traditional Computer and Virtual machines (Courtesy of VMWare, 2008)
  • 49. 49 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 49 Virtual Machine, Guest Operating System, and VMM (Virtual Machine Monitor) : The Virtualization layer is the middleware between the underlying hardware and virtual machines represented in the system, also known as virtual machine monitor (VMM) or hypervisor.
  • 50. 50 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 50 (Courtesy of VMWare, 2008)
  • 51. 51 Virtualization Ranging from Hardware to Applications in Five Abstraction Levels
  • 52. 52 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 52 Virtualization at ISA (Instruction Set Architecture) level Emulating a given ISA by the ISA of the host machine. • e.g, MIPS binary code can run on an x-86-based host machine with the help of ISA emulation. • Typical systems: Bochs, Crusoe, Quemu, BIRD, Dynamo Advantage: • It can run a large amount of legacy binary codes written for various processors on any given new hardware host machines • best application flexibility Shortcoming & limitation: • One source instruction may require tens or hundreds of native target instructions to perform its function, which is relatively slow. • V-ISA requires adding a processor-specific software translation layer in the complier.
  • 53. 53 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 53 Virtualization at Hardware Abstraction level Virtualization is performed right on top of the hardware. • It generates virtual hardware environments for VMs, and manages the underlying hardware through virtualization. • Typical systems: VMware, Virtual PC, Denali, Xen Advantage: • Has higher performance and good application isolation Shortcoming & limitation: • Very expensive to implement (complexity)
  • 54. 54 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 54 Virtualization at OS Level
  • 55. 55 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 55 Virtualization at Operating System (OS) level It is an abstraction layer between traditional OS and user applications. • This virtualization creates isolated containers on a single physical server and the OS-instance to utilize the hardware and software in datacenters. • Typical systems: Jail / Virtual Environment / Ensim's VPS / FVM Advantage: • Has minimal starup/shutdown cost, low resource requirement, and high scalability; synchronize VM and host state changes. Shortcoming & limitation: • All VMs at the operating system level must have the same kind of guest OS • Poor application flexibility and isolation.i
  • 56. 56 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 56 Virtualization for Linux and Windows NT Platforms
  • 57. 57 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 57
  • 58. 58 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 58 Advantages of OS Extension for Virtualization 1. VMs at OS level has minimum startup/shutdown costs 2. OS-level VM can easily synchronize with its environment Disadvantage of OS Extension for Virtualization All VMs in the same OS container must have the same or similar guest OS, which restrict application flexibility of different VMs on the same physical machine.
  • 59. 59 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 59 Library Support level It creates execution environments for running alien programs on a platform rather than creating VM to run the entire operating system. • It is done by API call interception and remapping. • Typical systems: Wine, WAB, LxRun , VisualMainWin Advantage: • It has very low implementation effort Shortcoming & limitation: • poor application flexibility and isolation
  • 60. 60 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 60 Virtualization with Middleware/Library Support
  • 61. 61 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 61 The vCUBE for Virtualization of GPGPU
  • 62. 62 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 62 User-Application level It virtualizes an application as a virtual machine. • This layer sits as an application program on top of an operating system and exports an abstraction of a VM that can run programs written and compiled to a particular abstract machine definition. • Typical systems: JVM , NET CLI , Panot Advantage: • has the best application isolation Shortcoming & limitation: • low performance, low application flexibility and high implementation complexity.
  • 63. 63 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 63 More Xs mean higher merit
  • 64. 1.4 Virtualization Structures/Tools and Mechanisms • Hypervisor and Xen Architecture • Binary Translation with Full Virtualization • Para-Virtualization with Compiler Support
  • 65. 65 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 65 Hypervisor A hypervisor is a hardware virtualization technique allowing multiple operating systems, called guests to run on a host machine. This is also called the Virtual Machine Monitor (VMM). Type 1: bare metal hypervisor • sits on the bare metal computer hardware like the CPU, memory, etc. • All guest operating systems are a layer above the hypervisor. • The original CP/CMS hypervisor developed by IBM was of this kind. Type 2: hosted hypervisor • Run over a host operating system. • Hypervisor is the second layer over the hardware. • Guest operating systems run a layer over the hypervisor. • The OS is usually unaware of the virtualization
  • 66. 66 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 66 Major VMM and Hypervisor Providers
  • 67. 67 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 67 The XEN Architecture (1)
  • 68. 68 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 68 The XEN Architecture (2)
  • 69. 69 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 69 The XEN Architecture (3)
  • 70. 70 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 70 Full virtualization It is the first software solution for server virtualization and uses binary translation and direct approach techniques. In full virtualization, guest OS is completely isolated by the virtual machine from the virtualization layer and hardware. • Para virtualization Paravirtualization is the category of CPU virtualization which uses hypercalls for operations to handle instructions at compile time. In paravirtualization, guest OS is not completely isolated but it is partially isolated by the virtual machine from the virtualization layer and hardware. VMware and Xen are some examples of paravirtualization. Full Virtualization vs. Para-Virtualization
  • 71. 71 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 71 Binary Translation of Guest OS Requests using a VMM:
  • 72. 72 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 72
  • 73. 73 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 73 Full virtualization • Does not need to modify guest OS, and critical instructions are emulated by software through the use of binary translation. • VMware Workstation applies full virtualization, which uses binary translation to automatically modify x86 software on-the-fly to replace critical instructions. • Advantage: no need to modify OS. • Disadvantage: binary translation slows down the performance. Para virtualization • Reduces the overhead, but cost of maintaining a para virtualized OS is high. • The improvement depends on the workload. • Para virtualization must modify guest OS, non-virtualizable instructions are replaced by hypercalls that communicate directly with the hypervisor or VMM. • Para virtualization is supported by Xen, Denali and VMware ESX. Full Virtualization vs. Para-Virtualization
  • 74. 74 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 74 Full Virtualization
  • 75. 75 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 75 Para- Virtualization with Compiler Support. The KVM builds offers kernel-based VM on the Linux platform, based on para-virtualization
  • 76. 76 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 76 VMWare ESX Server for Para-Virtualization
  • 77. 77 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 77
  • 78. 1.5 Virtualization of CPU, Memory, and I/O Devices • Hardware Support for Virtualization • CPU Virtualization • Memory Virtualization • I/O Virtualization • Virtualization in Multi-Core Processors
  • 79. 79 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 79
  • 80. 80 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 80 CPU, Memory and I/O Virtualization • CPU virtualization demands hardware-assisted traps of sensitive instructions by the VMM • Memory virtualization demands special hardware support (shadow page tables by VMWare or extended page table by Intel) to help translate virtual address into physical address and machine memory in two stages. • I/O virtualization is the most difficult one to realize due to the complexity if I/O service routines and the emulation needed between the guest OS and host OS.
  • 81. 81 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 81 Multi-Core Virtualization: VCPU vs. traditional CPU Figure 3.16 Four VCPUs are exposed to the software, only three cores are actually present. VCPUs V0, V1, and V3 have been transparently migrated, while VCPU V2 has been transparently suspended. (Courtesy of Wells, et al., “Dynamic Heterogeneity and the Need for Multicore Virtualization”, ACM SIGOPS Operating Systems Review, ACM Press, 2009 [68] )
  • 82. 1.6 Virtual Clusters and Resource Management • Physical versus Virtual Clusters • Live VM Migration Steps and Performance Effects • Migration of Memory, Files, and Network Resources • Dynamic Deployment of Virtual Clusters
  • 83. 83 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 83 Virtual Cores vs. Physical Processor Cores Physical cores Virtual cores The actual physical cores present in the processor. There can be more virtual cores visible to a single OS than there are physical cores. More burden on the software to write applications which can run directly on the cores. Design of software becomes easier as the hardware assists the software in dynamic resource utilization. Hardware provides no assistance to the software and is hence simpler. Hardware provides assistance to the software and is hence more complex. Poor resource management. Better resource management. The lowest level of system software has to be modified. The lowest level of system software need not be modified.
  • 84. 84 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 84 (Courtesy of Marty and Hill, 2007)
  • 85. 85 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 85 Virtual Clusters in Many Cores Space Sharing of VMs -- Virtual Hierarchy (Courtesy of Marty and Hill, 2007)
  • 86. 86 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 86 • The virtual cluster nodes can be either physical or virtual machines. Multiple VMs running with different OSs can be deployed on the same physical node. • A VM runs with a guest OS, which is often different from the host OS, that manages the resources in the physical machine, where the VM is implemented. • The purpose of using VMs is to consolidate multiple functionalities on the same server. This will greatly enhance the server utilization and application flexibility. • VMs can be colonized (replicated) in multiple servers for the purpose of promoting distributed parallelism, fault tolerance, and disaster recovery. • The size (number of nodes) of a virtual cluster can grow or shrink dynamically, similarly to the way an overlay network varies in size in a P2P network. • The failure of any physical nodes may disable some VMs installed on the failing nodes. But the failure of VMs will not pull down the host system. Virtual Cluster Characteristics
  • 87. 87 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 87 Virtual Clusters vs. Physical Clusters
  • 88. 88 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 88
  • 89. 89 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 89 Live Migration of Virtual Machines
  • 90. 90 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 90 Live Migration of Virtual Machines
  • 91. 91 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 91
  • 92. 92 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 92 Virtual Cluster Projects
  • 93. 93 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 93
  • 94. 94 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 94 Cluster-on-Demand (COD Project) at Duke University
  • 95. 95 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 95
  • 96. 96 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 96 VIOLIN Project at Purdue University
  • 97. 97 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 97
  • 98. 1.7 Virtualization for Data-Center Automation • Server Consolidation in Data Centers Server consolidation is the process of migrating network services and applications from multiple computers to a singular computer. This consolidation can include multiple physical computers to multiple virtual computers on one host computer • Virtual Storage Management Virtual Storage Management provides end-to-end view of the storage assigned to client logical partition. • Cloud OS for Virtualized Data Centers vSphere is primarily intended to offer virtualization support and resource management of data-center resources in building private clouds. • Trust Management in Virtualized Data Centers assures secure data access through trustworthy cloud service provider
  • 99. 99 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 99 Parallax for VM Storage Management
  • 100. 100 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 100 Cloud OS for Building Private Clouds
  • 101. 101 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 101
  • 102. 102 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 102 Eucalyptus : An Open-Source OS for Setting Up and Managing Private Clouds
  • 103. 103 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 103
  • 104. 104 Copyright © 2012, Elsevier Inc. All rights reserved. 1 - 104 Trusted Zones for VM Insulation Tenant #2 APP OS APP OS Virtual Infrastructure Physical Infrastructure Cloud Provider APP OS APP OS Virtual Infrastructure Tenant #1 Insulate information from cloud providers’ employees Insulate information from other tenants Insulate infrastructure from Malware, Trojans and cybercriminals Segregate and control user access Control and isolate VM in the virtual infrastructure Federate identities with public clouds Identity federation Virtual network security Access Mgmt Cybercrime intelligence Strong authentication Data loss prevention Encryption & key mgmt Tokenization Enable end to end view of security events and compliance across infrastructures Security Info. & Event Mgmt GRC Anti-malware (Courtesy of L. Nick, EMC 2008)
  • 105. 1.1 Technologies for Network-Based Systems 1. Multicore CPUs and Multithreading Technologies 2. GPU Computing to Exascale and Beyond 3. Memory, Storage, and Wide-Area Networking 4. Virtual Machines and Virtualization Middleware 5. Data Center Virtualization for Cloud Computing
  • 106. 1.2 System Models for Distributed and Cloud Computing 1. Clusters of Cooperative Computers 2. Grid Computing Infrastructures 3. Peer-to-Peer Network Families 4. Cloud Computing over the Internet .
  • 107. 1.3 Implementation Levels of Virtualization 1. Levels of Virtualization Implementation 2. VMM Design Requirements and Providers 3. Virtualization Support at the OS Level 4. Middleware Support for Virtualization
  • 108. 1.4 Virtualization Structures/Tools and Mechanisms • Hypervisor and Xen Architecture • Binary Translation with Full Virtualization • Para-Virtualization with Compiler Support
  • 109. 1.5 Virtualization of CPU, Memory, and I/O Devices • Hardware Support for Virtualization • CPU Virtualization • Memory Virtualization • I/O Virtualization • Virtualization in Multi-Core Processors
  • 110. 1.6 Virtual Clusters and Resource Management • Physical versus Virtual Clusters • Live VM Migration Steps and Performance Effects • Migration of Memory, Files, and Network Resources • Dynamic Deployment of Virtual Clusters
  • 111. 1.7 Virtualization for Data-Center Automation • Server Consolidation in Data Centers • Virtual Storage Management • Cloud OS for Virtualized Data Centers • Trust Management in Virtualized Data Centers