Sie sind auf Seite 1von 40

Virtualization

and
Cloud Computing

© 2010 Wipro Ltd - Confidential


Agenda

1 Virtualization Overview

2 Virtualization Products and Features

3 Cloud Computing

4 Cloud Computing Deployment Models

5 Cloud Computing Challenges

2 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
The Traditional Server Concept


Web Server App Server DB Server EMail

3 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Challenges

The x86 computer hardware was designed to run a single operating system

Low Utilization - on average servers utilization rates of <15%

 Multiple test / dev environments need multiple machines

 Data centers needing huge power, high operating expenses and under utilized
processing power

 Inability to scale resources for apps needing more resources during peak
loads

4 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Consolidation Approaches

– Data Consolidation Logical Consolidation


Combination of data from different sources into
a single repository and format Data
Integration

Application
– Application Consolidation Integration
Reducing the number of applications

Addressing Platform
Dissimilarity

Physical Consolidation
– Physical Consolidation
Hosting multiple application on one server Storage
Consolidation

– Centralization Server
Consolidation
Consolidation of management control and
system to a central location
Leverage
Server
technology
Centralization
enhancements !!

5 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Virtualization

Virtualization - Pooling and sharing


of technology resources, including servers,
storage and networking.

Server Virtualization - Ability to run multiple


OS on a single machine

6 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Server Virtualization Architecture

GUEST APPS1 GUEST APPS2

GUEST OS1 GUEST OS2


• Hypervisor
 Thin layer between hardware & OS which allows to share multi OS
GUEST DRIVERS GUEST DRIVERS
on same hardware same time
• Guest
Controls allocation of resources ( cpu, memory etc.) to multiple OS OS
GUEST ENVIRONMENT1 GUEST ENVIRONMENT2
OS installed in virtual environment
 interface with hardware through
Hypervisor
Hypervisor

HOST DRIVERS HOST ENVIRONMENT

HOST HARDWARE

8 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Server Virtualization
Without Virtualization With Virtualization

Applicatio
n
Operating System

Hardwar
e

Presents a complete hardware platform as virtual machines


Allows multiple applications to run in isolation within virtual machines on
the same physical machine
Can use different software versions and service pack levels for various
OS on a single hardware.

9 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Without Virtualization

All require same power


All emit same heat
All require physical space
Setup, (re-)configuration
Maintenance, support…
Costs per-hardware to add new servers

10 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
With Virtualization

11 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Virtualization Products

 VMware vSphere

 Microsoft Hyper-V

 Oracle VM

 Citrix Xen

 RedHat KVM

 IBM Power VM

 Solaris Containers

12 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Virtual Machine

• A tightly isolated software container

• Has its own operating systems and


applications as if it were a physical computer.

• Behaves exactly like a physical computer

• Contains it own virtual (ie, software-based)


CPU, RAM, Hard disk and NIC.

13 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Key Features of Virtualization

Partitioning Isolation

Run multiple virtual machines Each virtual machine is isolated


simultaneously on a from other virtual machines
single physical server on the same server

Simplifying Hardware Independence


………
…. ………
..
…… …. ………
..
…… …. ..
……

Virtualization converts entire


systems (hardware configuration,
operating system, apps) in files Run a virtual machine on any
server without modification

14 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Instant Provisioning in a Virtualized Environment

• Provisioning time reduced to minutes, not days to


Physical

weeks!
Configure Install Configure Assign Configure Test Apps
hardware OS OS & IP Addr Network
Tools
20-40 hrs
<1 hr of of work
Deploy Power
work
from on VM
4-6 week
Template 1-2 days lead time
lead time
Virtual

15 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Virtual Machine Movement

• Live migration of
virtual machines

16 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Non-Disruptive Capacity on Demand

17 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Dynamic Resource Management

Business Demand

• Dynamic and
intelligent allocation of
hardware resources

Resource Pool

18 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
High availability

• Automatically restarts
the virtual machines,
when a physical server

X Resource Pool
fails

19 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Storage VMotion

– Storage independent live


migration of virtual machine
disks
• Zero downtime to virtual
machines
• LUN independent
• Supported for Fibre channel
SANs

20 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Disaster Recovery

Primary Datacenter Recovery Site

Virtual Infrastructure
Replication Virtual Infrastructure

FC SAN FC SAN

21 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Virtualization Benefits

Optimum
Resource
Utilization

Reduce
 Disaster
Management
Recovery
Cost
and Load
Balancing

Advantages of
Virtualization

Improve ability
to handle Improved
growth and Manageability
mergers & Security

Faster
Deployment

22 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Key Decision Factors for Virtualization

• Application •Scalability and


compatibility on Availability Requirements
virtualization •Centralized Management
Requirements
• Specific hardware
requirements •Business Continuity
Requirements
Non-
Application
Functional
Profiling
Requirements

Product Capacity
Evaluation Planning

•Product Features •Utilization Analysis


•License Model & Cost •Avoid application
•Application which are IO / cpu
Compatibilities intensive
•ROI

23 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Cloud Computing

24 © 2010 Wipro Ltd - Confidential


Today‟s Technology Requirements

• Real time information Work


Anywhere
at any
• Dynamic, ad hoc sharing and collaboration time
Sharing
Collaboration
• Work wherever you are – at home, traveling, etc. Work
wherever
you are

To meet these requirements, a delivery model is required with features:

• Flexible
• On-Demand Service Model
• Always on and Global

25 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
“The Cloud”

Cloud computing is a model for enabling convenient,


on-demand network access to a shared pool of
configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can
be rapidly provisioned and released with minimal
management effort or service provider interaction.

What’s new?
Acquisition Model: Business Model: Access Model: Technical Model:
Based on Based on pay for Over the Internet Scalable, elastic,
purchasing of use to ANY device dynamic, multi-
services tenant, & sharable

26 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Origin of the term “Cloud Computing”

 Comes from the early days of the Internet where we


drew the network as a cloud

 First cloud around Telecom networking

27 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Foundational Elements of Cloud Computing

 Virtualization

 Distributed Computing

 Service Oriented Architectures

 Broadband Networks

 Browser as a platform

 Blade Servers

 SAN/NAS

 Free and Open Source Software

29 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Typical Cloud Setup

Service Portal Service Monitoring and Management

Metering and SLA


Reports
Self Service Catalog Chargeback Management

User Approval Patch Trouble Alerts /


Management Workflow Management Ticketing Events

Provisioning Policies Provisioning


Inventory
and Rules Engine
Management and
Provisioning

Service
Virtual Network Management Templates

Virtual Storage Management Virtual Machine Management


Physical Layer

Virtualization Layer Virtualization Layer

SAN NAS

30 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
VMware vCloud

31 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Cloud Service Models

User Level
Salesforce.com,
“Software-as-a-service” A complete application stack being Google Docs, Windows
(SaaS) offered as end-user application Office Live

Developer Level
Google Apps Engine,
“Platform-as-a-service” A completer platform to Design, Build, Windows Azure
(PaaS) Test and Deliver applications Services Platform

IT Level Obtain processing, storage, network


“Infrastructure-as-a- capacity, and other fundamental Amazon Web Services
service computing resources and pay only
what is used
(IaaS)

32 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Cloud Deployment Models

 Private cloud
– enterprise owned or leased

 Community Cloud
– For specific communities e.g Google “Gov Cloud”

 Public cloud
– Sold to the public, mega-scale infrastructure

 Hybrid cloud
– composition of two or more clouds

33 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
The Cloud Framework
Hybrid
Clouds

Private Community
Deployment Public Cloud
Models Cloud Cloud

Service Software as a Platform as a Infrastructure as


Models Service (SaaS) Service (PaaS) a Service (IaaS)

On Demand Self-Service
Essential Broad Network Access Rapid Elasticity
Characteristics
Resource Pooling Measured Service

Massive Scale Resilient Computing


Homogeneity Geographic Distribution
Common
Characteristics Virtualization Service Orientation
Low Cost Software Advanced Security
Source : NIST
34 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Amazon Cloud EC2

 Amazon cloud components


– Elastic Compute Cloud (EC2)
– Simple Storage Service (S3)
– SimpleDB

 Key Features
– Availability zones
• Place applications in multiple locations for failovers
– Elastic IP addresses
• Static IP addresses that can be dynamically remapped to point to different instances
(not a DNS change)

35 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Microsoft Azure Services

36
36 © Source: Microsoft Presentation
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Cloud Computing Challenges

37 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
General Security Challenges

 Trusting vendor‟s security model

 Loss of physical control

 Obtaining support for investigations

 Indirect administrator accountability

 Proprietary implementations can‟t be examined

38 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Cloud Adaptation Considerations

 Understand the origination's needs


– Quantify the needs (Current and Future, Pain points)
– Analyze Requirements
 Security Requirements
 Data Compliance Requirements
 Data integration requirements
 Vendor offering‟s assessment
 Charging Model
 Determine ROI
 Service Level Agreements (SLA)

39 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
The „Why‟ and „How‟ of Cloud Migration

 There are many benefits that explain why to migrate to


clouds
– Cost savings,
– power savings
– green savings
– increased agility in software deployment

 Cloud security issues may drive and define how we adopt and
deploy cloud computing solutions
 Startup business can greatly benefit from public clouds by
“testing the waters” without making risky hardware purchase
decisions

40 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Balancing Threat Exposure and Cost Effectiveness

 Private clouds may have less threat exposure than


community clouds which have less threat exposure than
public clouds.

 Massive public clouds may be more cost effective than large


community clouds which may be more cost effective than
small private clouds.

41 ©
© 2010
2010 Wipro
Wipro Ltd
Ltd -- Confidential
Confidential
Thank You

© 2010 Wipro Ltd - Confidential

Das könnte Ihnen auch gefallen