Upload
gurusodhii
View
232
Download
0
Embed Size (px)
Citation preview
7/31/2019 Cloud Computing Seminar 2012
1/32
IMPLEMENTATION OF PRIVATE CLOUD
A Seminar Presented to
the Faculty of Engineering and Technology
of the Punjabi University in Fulfilment of the Requirements
for the degree ofMASTER OF TECHNOLOGY
IN
COMPUTER ENGINEERING
Submitted By:
Er. Gurjot Singh Sodhi
(11171002)
Under the Supervision of
Dr. Himanshu Aggrawal
(Reader, CE, UCOE)
Department of Computer Engineering
University College of Engineering,
PUNJABI UNIVERSITY,PATIALA-147001
June-2012
7/31/2019 Cloud Computing Seminar 2012
2/32
ii
DECLARATION
I hereby affirm that the work presented in this seminar entitled IMPLEMENTATION OF
PRIVATE CLOUD in partial fulfillment of the requirements of the award of degree of M-Tech
(Computer Engineering), submitted at department of computer engineering at University College
of Engineering, Punjabi University, Patiala is an authentic record of my own work under the
guidance of Dr. Himanshu Aggrawal Reader, Department of Computer Engineering. The matter
presented in this dissertation has not been submitted in any other university/ institute for the award
of M-Tech degree or any degree / diploma.
Er. Gurjot Singh Sodhi
11171002
-------------------------------
(Signature of Guide)
7/31/2019 Cloud Computing Seminar 2012
3/32
iii
ACKNOWLEDGEMENT
Foremost, I would like to express my sincere gratitude to my supervisor Dr. Himanshu
Aggrawal, Reader, Computer Engineering Department, University College of Engineering,
Punjabi University, Patiala for his continuing interest, encouragement and valuable guidance
throughout the course of present work. His professional advice, sustained interest, comments and
ideas in gentle and caring manner, without which it would not have been possible to accomplish
and conclude this research work, are gratefully acknowledged.
Besides my supervisor, I am thankful to Dr. Amardeep Singh, Head, University college of
Engineering, Punjabi University, Patiala or their help, valuable suggestions and constantencouragement throughout the period of the research. I would like to thank the rest of my
dissertation committee for their encouragement, insightful comments, and hard questions.
I wish to express my sincere appreciation to my parents and friends for their patience and
encouragement during this work.
Last but not the least, I would like to thank Almighty God for providing me this opportunity
and granting me the capability to proceed successfully.
Er. Gurjot Singh Sodhi
7/31/2019 Cloud Computing Seminar 2012
4/32
7/31/2019 Cloud Computing Seminar 2012
5/32
7/31/2019 Cloud Computing Seminar 2012
6/32
vi
LIST OF ABBREVIATIONS
Abbreviation Full Form
IaaS Incorporates Infrastructure as a Service
SaaS Software as a Service
PaaS Platform as a Service
CapEx Capital Expenditure
GPL General Public License
SAP Special Assistance Plan
EC2 Elastic Compute
SQS Simple Queue Service
FPS Frames Per Second
HTML Hyper Text Markup Language
REST Representational State Transfer
BOINC Berkeley Open Infrastructure for Network Computing
UNIX Uniplexed Information Computing System
7/31/2019 Cloud Computing Seminar 2012
7/32
TABLE OF CONTENTS
Contents Page No.
Declaration iiAcknowledgement iiiAbstract iv
List of Figures vList of Abbreviations vi
Table of Contents viiChapter 1: Introduction 1
Chapter 2: Cloud Computing The Concept 2-4
2.1 Comparison 3
2.2 Implementation 3
2.3 Characteristics 3
2.4 Economics 3
2.5 Companies 4Chapter 3: History 5
Chapter 4: Political Issues 6
Chapter 5: Legal Issues 7
Chapter 6: Risk Mitigation 8
Chapter 7: Key Characteristics 9
Chapter 8: Components 10-12
8.1 Application 11
8.2 Client 11
8.3 Infrastructure 11
8.4 Platform 11
8.5 Service 12
8.6 Storage 12
7/31/2019 Cloud Computing Seminar 2012
8/32
7/31/2019 Cloud Computing Seminar 2012
9/32
Implementation of Private Cloud
Department of Computer Engg. 1 UCOE, Patiala
CHAPTER 1
INTRODUCTION
Imagine yourself in the world where the users of the computer of todays internet world dont have to run,
install or store their application or data on their own computers, imagine the world where every piece of your
information or data would reside on the Cloud (Internet).
As a metaphor for the Internet, "the cloud" is a familiar clich, but when combined with "computing"
the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as anupdated version of utility computing: basically virtual servers available over the Internet. Others go very
broad, arguing anything you consume outside the firewall is "in the cloud", including conventional
outsourcing.
Cloud computing comes into focus only when you think about what we always need: a way to increase
capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or
licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in
real time over the Internet, extends ICT's existing capabilities.
Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew
of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style
infrastructure providers are part of the mix, but so are SaaS (software as a service) providers such a
Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud
computing aggregators and integrators are already emerging.
Figure 1.1 : The Cloud
7/31/2019 Cloud Computing Seminar 2012
10/32Department of Computer Engg. 2 UCOE, Patiala
Implementation of Private Cloud
CHAPTER 2
CLOUD COMPUTING - THE CONCEPT
Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). I
is a style of computing in which dynamically scalable and often virtualized resources are provided as a service
over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure
"in the cloud" that supports them.
The conceptIncorporates Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as
a Service (SaaS) as well as Web 2.0 and other recent technology trends which have the common theme of
reliance on the Internet for satisfying the computing needs of the users. Examples of SaaS vendors include
Salesforce.com and Google Apps, which provide common business applications online that are accessed from
a web browser, while the software and data are stored on the servers.
The term cloud is used as a metaphor for the Internet, based on how the Internet is depicted in computer
network diagrams, and is an abstraction for the complex infrastructure it conceals.
Figure 2.1 :Cloud Computing Overview
7/31/2019 Cloud Computing Seminar 2012
11/32
Implementation of Private Cloud
Department of Computer Engg. 3 UCOE, Patiala
2.1 Comparison:
Cloud computing is often confused with grid computing ("a form of distributed computing whereby a 'super
and virtual computer' is composed of a cluster of networked, loosely-coupled computers, acting in concert to
perform very large tasks"), utility computing (the "packaging of computing resources, such as computation
and storage, as a metered service similar to a traditional public utility such as electricity") and autonomic
computing ("computer systems capable of self-management").
Indeed many cloud computing deployments as of 2009 depend on grids, have autonomic characteristics and
bill like utilities but cloud computing can be seen as a natural next step from the grid-utility model. Some
successful cloud architectures have little or no centralized infrastructure or billing systems whatsoever,
including peer-to-peer networks like Bit Torrent and Skype.
2.2 Implementation:
The majority of cloud computing infrastructure as of 2009 consists of reliable services delivered through data
centers and built on servers with different levels of virtualization technologies. The services are accessible
anywhere that has access to networking infrastructure. The Cloudappears as a single point of access for all the
computing needs of consumers. Commercial offerings need to meet the quality of service requirements o
customers and typically offer service level agreements. Open standards are critical to the growth of cloud
computing and open source software has provided the foundation for many cloud computing implementations.
2.3 Characteristics:
As customers generally do not own the infrastructure, they merely access or rent, they can avoid capitaexpenditure and consume resources as a service, paying instead for what they use. Many cloud-computing
offerings have adopted the utility computing model, which is analogous to how traditional utilities like
electricity are consumed, while others are billed on a subscription basis. Sharing "perishable and intangible"
computing power among multiple tenants can improve utilization rates, as servers are not left idle, which can
reduce costs significantly while increasing the speed of application development. A side effect of this
approach is that "computer capacity rises dramatically" as customers do not have to engineer for peak loads
Adoption has been enabled by "increased high-speed bandwidth" which makes it possible to receive the same
response times from centralized infrastructure at other sites.
2.4 Economics:
Cloud computing users can avoid capital expenditure (CapEx) on hardware, software and services, rathe
paying a provider only for what they use. Consumption is billed on a utility (e.g. resources consumed, like
electricity) or subscription (e.g. time based, like a newspaper) basis with little or no upfront cost. Other
benefits of this time sharing style approach are low barriers to entry, shared infrastructure and costs, low
management overhead and immediate access to a broad range of applications. Users can generally terminate
the contract at any time (thereby avoiding return on investment risk and uncertainty) and the services are often
covered by service level agreements with financial penalties.
7/31/2019 Cloud Computing Seminar 2012
12/32Department of Computer Engg. 4 UCOE, Patiala
Implementation of Private Cloud
According to Nicholas Carr the strategic importance of information technology is diminishing as it becomes
standardized and cheaper. He argues that the cloud computing paradigm shift is similar to the displacement of
electricity generators by electricity grids early in the 20th century.
Figure 2.2 : Cloud Computing Economics
2.5 Companies:
Providers including Amazon, Microsoft, Google, Sun and Yahoo exemplify the use of cloud computing. It i
being adopted by individual users through large enterprises including General Electric, L'Oral, and Procter &
Gamble.
7/31/2019 Cloud Computing Seminar 2012
13/32Department of Computer Engg. 5 UCOE, Patiala
Implementation of Private Cloud
CHAPTER 3
HISTORY
The Cloud is a term with a long history in telephony, which has in the past decade, been adopted as a
metaphor for internet based services, with a common depiction in network diagrams as a cloud outline.
The underlying concept dates back to 1960 when John McCarthy opined that "computation may someday be
organized as a public utility"; indeed it shares characteristics with service bureaus which date back to the
1960s. The term cloud had already come into commercial use in the early 1990s to refer to large ATM
networks. By the turn of the 21st century, the term "cloud computing" had started to appear, although most of
the focus at this time was on Software as a service (SaaS).
In 1999, Salesforce.com was established by Marc Benioff, Parker Harris, and his fellows. They applied many
technologies of consumer web sites like Google and Yahoo! to business applications. They also provided the
concept of "On demand" and "SaaS" with their real business and successful customers. The key for SaaS is
being customizable by customer alone or with a small amount of help. Flexibility and speed for application
development have been drastically welcomed and accepted by business users.
IBM extended these concepts in 2001, as detailed in the Autonomic Computing Manifesto -- which described
advanced automation techniques such as self-monitoring, self-healing, self-configuring, and self-optimizing in
the management of complex IT systems with heterogeneous storage, servers, applications, networks, security
mechanisms, and other system elements that can be virtualized across an enterprise.
Amazon.com played a key role in the development of cloud computing by modernizing their data centers after
the dot-com bubble and, having found that the new cloud architecture resulted in significant interna
efficiency improvements, providing access to their systems by way of Amazon Web Services in 2005 on a
utility computing basis.
2007 saw increased activity, with Google, IBM, and a number of universities embarking on a large scale
cloud computing research project, around the time the term started gaining popularity in the mainstream press
It was a hot topic by mid-2008 and numerous cloud computing events had been scheduled.
In August 2008, Gartner Research observed that "organizations are switching from company-owned hardware
and software assets to per-use service-based models" and that the "projected shift to cloud computing wil
result in dramatic growth in IT products in some areas and in significant reductions in other areas."
7/31/2019 Cloud Computing Seminar 2012
14/32Department of Computer Engg. 6 UCOE, Patiala
Implementation of Private Cloud
CHAPTER 4
POLITICAL ISSUES
The Cloudspans many borders and "may be the ultimate form of globalization." As such it becomes subject to
complex geopolitical issues: providers must satisfy myriad regulatory environments in order to deliver service
to a global market. This dates back to the early days of the Internet, where libertarian thinkers felt tha
"cyberspace was a distinct place calling for laws and legal institutions of its own"; author Neal Stephenson
envisaged this as a tiny island data haven called Kinakuta in his classic science-fiction novel Cryptonomicon.
Despite efforts (such as US-EU Safe Harbor) to harmonize the legal environment, as of 2009 providers such
as Amazon Web Services cater to the major markets (typically the United States and the European Union) by
deploying local infrastructure and allowing customers to select "availability zones." Nonetheless, there are
still concerns about security and privacy from individual through governmental level, e.g., the USA
PATRIOT Act and use of national security letters and the Electronic Communication Privacy Act's Stored
Communications Act.
7/31/2019 Cloud Computing Seminar 2012
15/32Department of Computer Engg. 7 UCOE, Patiala
Implementation of Private Cloud
CHAPTER 5
LEGAL ISSUE
In March 2007, Dell applied to trademark the term "cloud computing" (U.S. Trademark 77,139,082) in the
United States. The "Notice of Allowance" it received in July 2008 was canceled on August 6, resulting in a
formal rejection of the trademark application less than a week later.
On 30 September 2008, USPTO issued a "Notice of Allowance" to CGactive LLC (U.S. Trademark
77,355,287) for "CloudOS". A cloud operating system is a generic operating system that "manage[s] the
relationship between software inside the computer and on the Web", such as Microsoft Azure. Good OS LLC
also announced their "Cloud" operating system on 1 December 2008.
Richard Stallman, founder of the Free Software Foundation, believes that cloud computing endangers liberties
because users sacrifice their privacy and personal data to a third party. In November 2007, the Free Software
Foundation released the Affero General Public License, a version of GPLv3 designed to close a perceived
legal loophole associated with free software designed to be run over a network, particularly software as a
service. An application service provider is required to release any changes they make to Affero GPL open
source code
7/31/2019 Cloud Computing Seminar 2012
16/32Department of Computer Engg. 8 UCOE, Patiala
Implementation of Private Cloud
CHAPTER 6
RISK MITIGATION
Corporations or end-users wishing to avoid not being able to access their data or even losing it should
research vendors' policies on data security before using vendor services. One technology analyst and
consulting firm, Gartner, lists seven security issues which one should discuss with a cloud-computing vendor:
1. Privileged user accessinquire about who has specialized access to data and about the hiring and
management of such administrators.
2. Regulatory compliancemakes sure a vendor is willing to undergo external audits and/or security
certifications.
3. Data locationsask if a provider allows for any control over the location of data.
4. Data segregationmake sure that encryption is available at all stages and that these "encryption
schemes were designed and tested by experienced professionals".
5. Recoveryfind out what will happen to data in the case of a disaster; do they offer complete
restoration and, if so, how long that would take.
6. Investigative Supportinquire whether a vendor has the ability to investigate any inappropriate or
illegal activity.
7. Long-term viabilityask what will happen to data if the company goes out of business; how willdata be returned and in what format.
In practice, one can best determine data-recovery capabilities by experiment: asking to get back old data
seeing how long it takes, and verifying that the checksums match the original data. Determining data security
is harder. A tactic not covered by Gartner is to encrypt the data yourself. If you encrypt the data using a
trusted algorithm, then regardless of the service provider's security and encryption policies, the data will only
be accessible with the decryption keys. This leads to a follow-on problem: managing private keys in a pay-on
demand computing infrastructure.
7/31/2019 Cloud Computing Seminar 2012
17/32Department of Computer Engg. 9 UCOE, Patiala
Implementation of Private Cloud
CHAPTER 7
KEY CHARACTERISTICS
Cost is greatly reduced and capital expenditure is converted to operational expenditure. This lowers
barriers to entry, as infrastructure is typically provided by a third-party and does not need to be
purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is
fine-grained with usage-based options and minimal or no IT skills are required for implementation.
Device and location independence enable users to access systems using a web browser regardless o
their location or what device they are using, e.g., PC, mobile. As infrastructure is off-site (typically
provided by a third-party) and accessed via the Internet the users can connect from anywhere.
Multi-tenancy enables sharing of resources and costs among a large pool of users, allowing for:
o Centralization of infrastructure in areas with lower costs (such as real estate, electricity, etc.)
o Peak-load capacity increases (users need not engineer for highest possible load-levels)
o Utilization and efficiency improvements for systems that are often only 10-20% utilized.
Reliability improves through the use of multiple redundant sites, which makes it suitable for business
continuity and disaster recovery. Nonetheless, most major cloud computing services have suffered
outages and IT and business managers are able to do little when they are affected.
Scalability via dynamic ("on-demand") provisioning of resources on a fine-grained, self-service basis
near real-time, without users having to engineer for peak loads. Performance is monitored andconsistent and loosely-coupled architectures are constructed using web services as the system
interface.
Security typically improves due to centralization of data, increased security-focused resources, etc.
but raises concerns about loss of control over certain sensitive data. Security is often as good as or
better than traditional systems, in part because providers are able to devote resources to solving
security issues that many customers cannot afford. Providers typically log accesses, but accessing the
audit logs themselves can be difficult or impossible.
Sustainability comes about through improved resource utilization, more efficient systems, and carbon
neutrality. Nonetheless, computers and associated infrastructure are major consumers of energy.
7/31/2019 Cloud Computing Seminar 2012
18/32Department of Computer Engg. 10 UCOE, Patiala
Implementation of Private Cloud
CHAPTER 8
COMPONENTS
Cloud computing Components
Applications Facebook Google Apps SalesForce Microsoft Online
ClientBrowser(Chrome) Firefox Cloud Mobile (Android iPhone) Netbook (EeePC MSIWind) Nettop (CherryPal Zonbu)
Infrastructure BitTorrent EC2 GoGrid Sun Grid 3tera
Platforms App Engine Azure Mosso SalesForce
Services Alexa FPS MTurk SQS
Storage S3 SimpleDB SQL Services
Standards Ajax Atom HTML 5 REST
Figure 8.1 : Cloud Computing Components
7/31/2019 Cloud Computing Seminar 2012
19/32
7/31/2019 Cloud Computing Seminar 2012
20/32
7/31/2019 Cloud Computing Seminar 2012
21/32Department of Computer Engg. 13 UCOE, Patiala
Implementation of Private Cloud
CHAPTER 9
ARCHITECTURE
Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud
computing, comprises hardware and software designed by a cloud architectwho typically works for a cloud
integrator. It typically involves multiple cloud components communicating with each other over application
programming interfaces, usually web services.
This closely resembles the UNIX philosophy of having multiple programs doing one thing well and workingtogether over universal interfaces. Complexity is controlled and the resulting systems are more manageable
than their monolithic counterparts.
Cloud architecture extends to the client, where web browsers and/or software applications access cloud
applications.
Cloud storage architecture is loosely coupled, where metadata operations are centralized enabling the data
nodes to scale into the hundreds, each independently delivering data to applications or user.
Figure 9.1 : Cloud Computing Architecture
7/31/2019 Cloud Computing Seminar 2012
22/32
7/31/2019 Cloud Computing Seminar 2012
23/32Department of Computer Engg. 15 UCOE, Patiala
Implementation of Private Cloud
CHAPTER 11
ROLES
11.1 Provider
A cloud computing provider or cloud computing service provider owns and operates live cloud computing
systems to deliver service to third parties. The barrier to entry is also significantly higher with capital
expenditure required and billing and management creates some overhead. Nonetheless, significant operationa
efficiency and agility advantages can be realized, even by small organizations, and server consolidation and
virtualization rollouts are already well underway. Amazon.com was the first such provider, modernizing its
data centers which, like most computer networks, were using as little as 10% of its capacity at any one time
just to leave room for occasional spikes. This allowed small, fast-moving groups to add new features faste
and easier, and they went on to open it up to outsiders as Amazon Web Services in 2002 on a utility
computing basis.
11.2 User
A user is a consumer ofcloud computing. The privacy of users in cloud computing has become of increasing
concern. The rights of users are also an issue, which is being addressed via a community effort to create a bill
of rights.
11.3 Vendor
A vendor sells products and services that facilitate the delivery, adoption and use of cloud computing. For
example:
Computer hardware (Dell, HP, IBM, Sun Microsystems)
o Storage (Sun Microsystems, EMC, IBM)
o Infrastructure (Cisco Systems)
Computer software (3tera, Hadoop, IBM, RightScale)o Operating systems (Solaris, AIX, Linux including Red Hat)
o Platform virtualization (Citrix, Microsoft, VMware, Sun xVM, IBM)
7/31/2019 Cloud Computing Seminar 2012
24/32Department of Computer Engg. 16 UCOE, Patiala
Implementation of Private Cloud
CHAPTER 12
STANDARDS
Cloud standards, a number of existing, typically lightweight, open standards, have facilitated the growth of
cloud computing, including:
Application
o Communications (HTTP, XMPP)
o Security (OAuth, OpenID, SSL/TLS)
o Syndication (Atom)
Client
o Browsers (AJAX)
o Offline (HTML 5)
Implementations
o Virtualization (OVF)
Platform
o Solution stacks (LAMP)
Service
o Data (XML, JSON)
o Web Services (REST)
Storage
o Database(Amazon Simple DB, Google App Engine BigTable Datastore)
o Network attached storage (MobileMe iDisk, Nirvanix CloudNAS)
o Synchronization (Live MeshLive Desktop component, MobileMe push functions)
o Web service (Amazon Simple Storage Service, Nirvanix SDN)
7/31/2019 Cloud Computing Seminar 2012
25/32Department of Computer Engg. 17 UCOE, Patiala
Implementation of Private Cloud
CHAPTER 13
BUILDING A PRIVATE CLOUD
13.1 What do I need ?
For a Private Cloud or Customer Cloud, whichever name you prefer, to have an effective IT as a Servic
offering requires some key elements to be in-place.
First you need a management tool that allows you to monitor the servers providing the virtualizatioservices. The tool should also allow you to easily move services around the machines, and ideall
provide you with guidance on what actions to take should resource become over utilised.
Secondly, you need a tool that allows for the Business units in your organization to be self-sufficient irequesting and managing their services, while at the same time provide you with a method to calculat
charge-back costs.
Windows Server 2008 R2 out-of-the-box does not provide all of these. It does have a number of managemen
features you will need, but for the complete solution you need to add:-
System Center Virtual Machine Manager 2008 R2 (SCVMM) System Center Virtual Machine Manager Self Service Portal 2.0 (SSP)
These two System Center products provide the management, monitoring and self-service capabilities neede
to run an IT as a Service operation.
SCVMM provides the core management functionality. Allowing you to go beyond the Hyper-V managemen
console in R2, you can group your servers into host groups and monitor more than one host at a time
Intelligent placement built into SCVMM helps you make the best decisions about where virtual machines (VMs
should go. SCVMM also provides a library service where you hold template images, ISO images and scripts tha
can be easily deployed to meet different requirements. Finally Performance Resource Optimization (PRO
provides you with the ability to monitor and correct problems for VMs. PRO allows the administrator to set u
information that can be displayed when certain thresholds are reached. These Tips, can, for example, have
messaging saying Add another Web Server to Order Tracking Web Farm.
SSP provides the self-service functionality. At a high level, once enabled and configured by the I
Administrator, SSP allows registered Business Units to manage their own administrative team to reques
resources, start or stop VMs and be entirely self-sufficient in managing their resources. At the back end, the IT
Administrator can set charge back costs for both reserved resources and allocated resources.
7/31/2019 Cloud Computing Seminar 2012
26/32Department of Computer Engg. 18 UCOE, Patiala
Implementation of Private Cloud
13.2 Where to Start ?
There are requirements for the installation to work. First, there are additional roles and features that need to
be installed on Windows Server 2008 R2. These are primarily driven by SCVMM. So to install SCVMM, Window
Server must have:
Hyper-V. The SCVMM Setup Wizard automatically adds this role, which will work as long as the machinbeing used supports virtualization.
Windows Remote Management (WinRM). For SCVMM setup to work, the service must be installed anin a state other than disabled and stopped.
Internet Information Services (IIS) 7.0. You must add the Web Server (IIS) role and then install thfollowing server role services:
o IIS 6 Metabase Compatibilityo IIS 6 WMI Compatibilityo Static Contento Default Documento Directory Browsingo HTTP Errorso ASP.NETo .NET Extensibilityo ISAPI Extensionso ISAPI Filterso Request Filtering
In addition to these, the SSP also requires some additional features be installed:
Microsoft Message Queuing (MSMQ). Windows PowerShell 2.0. This requirement supersedes version 1.0 that SCVMM requires. Microsoft .NET Framework 3.5 SP1. R2 contains 3.5.1, so if this is installed then you have met thi
requirement.
The final requirement for both SCVMM and SSP is a database. When installed alone, SCVMM can use the SQ
Express edition, which it will install automatically if you do not provide it with an alternative. However, SS
requires either Standard or Enterprise editions of SQL Server 2008 or higher.
The other requirement for the solutions is Active Directory. Both SCVMM and SSP work best in a domai
environment. As we go through SSP, it will become clear why this is so.
In my test environment Ive mixed and matched. The base OS is R2 Enterprise edition, the database server i
SQL Server 2008 R2 Standard edition. At this point that you may consider installing the beta of Service Pack
for Windows Server 2008 R2 to take advantage of the Dynamic Memory feature. This is an extremely usefu
feature for maximizing the memory usage on Hyper-V hosts; the caveat here is that the SSP documentatio
doesnt yet have any recommendation on how this feature interacts with the Charge-back process. I didn
install SP1 beta for that very reason, but I do encourage you to evaluate it for potential use on productio
Hyper-V hosts.
7/31/2019 Cloud Computing Seminar 2012
27/32Department of Computer Engg. 19 UCOE, Patiala
Implementation of Private Cloud
Figure: 13.1 Basic Private Cloud Architecture
13.3 Configuring various Components ?
ConfiguringSCVMM
Im going to start with SCVMM, since this is the core of the environment. Basically, to create a self-servicePrivate Cloud environment you need to configure the following:-
User Role group for the portal Add any base images and ISO files to the library Create templates of the workloads you want to offer. Next step is the creation of your templates. The templates are just preconfigured images that have been
generalized for easy deployment. So you can either take an existing VHD, or install a new OS, configure
it the way it needs to be. Then prepare it. On the VM menu, selecting New Template will take the image
and do all the work needed to generalize it. When you start this process the source image is destroyed. Soif you need a copy, now is a good time to take one.
The New Template Wizard asks for some basic information and the location where you want to store thetemplate. When you configured SCVMMs Library component during setup you created a share for thelibrary, within that share you can create a folder for templates to help organizes these files.
7/31/2019 Cloud Computing Seminar 2012
28/32Department of Computer Engg. 20 UCOE, Patiala
Implementation of Private Cloud
Once a template is created you have the minimum need to try out the self-service portal, which is whatwe will now configure.
Figure 13.2 : Configuring SCVMM
Configuring the Self-Service Portal
As the administrator, the first task is to configure the portal. Connecting to website as the administrator, you
need to configure just two of the four options on the Settings link. The main one is the Configure Datacenter
Management link, here you configure these properties.
VMM Server. This is the FQDN of the machine you installed the VMM server role on. Device. Configure the names any SANS or Load Balancers you have. Networks. These map to the names of the networks you configured in Hyper-V. The names here must
match those in the Virtual Network Manager in the Hyper-V console.
Active Directory. Add any Domains you have. Quota Cost. Enter the default values for memory and storage. You can alter these on a template basis
later.
Environment. Enter the names of any environments you want to use to group infrastructures in. This ispurely process and organization.
Save and close and you are almost set.
Next part is to configure the Templates. On the Template page enter the library server where youd like to get
the templates from. If the Self-Service Portal service is not running, this is the point you find out as service willnot return any information from the library server.
http://blogs.technet.com/cfs-file.ashx/__key/CommunityServer-Blogs-Components-WeblogFiles/00-00-00-62-96-metablogapi/1423.clip_5F00_image002_5F00_013B7E6D.jpg7/31/2019 Cloud Computing Seminar 2012
29/32Department of Computer Engg. 21 UCOE, Patiala
Implementation of Private Cloud
Now you are ready to try out the configuration of Business Units, Infrastructures and Virtual Machines. As the
administrator you get to approve all requests, so while anyone could request a BU, you get the final say. Now, if
you are testing this, dont use really BU names because once you use than name you cant delete it later yet asI found setting up a demo.
So what do you configure? Ill run through the basics to get the system working on a test environment. On theBU registration, a lot of it is simply documentation; the administrators are the one area that interacts with VMM
Those names you enter here are added to the role we configured earlier. When submitted, the request appears as
an Onboarding request in the request queue.
Once approved, the BU can set up its infrastructures. From the first post, the diagram of what an infrastructure
consist of gives us a good idea of what the request process will cover. The request is a 3 step process:-
Configure the Infrastructure name. Configure the Service and Service Role Add Templates for the VMs.
Figure 13.3 : Configuring Self-Service Portal
http://blogs.technet.com/cfs-file.ashx/__key/CommunityServer-Blogs-Components-WeblogFiles/00-00-00-62-96-metablogapi/6765.clip_5F00_image008_5F00_2A935A7B.jpg7/31/2019 Cloud Computing Seminar 2012
30/32Department of Computer Engg. 22 UCOE, Patiala
Implementation of Private Cloud
Configurethe Infrastructure nameThe first part asks for the infrastructure name, the priority, how long the BU expects to keep it and the forecast
for the capacity it will use. The capacity you enter here is used when calculating free space when starting VMs
or when creating new Services and Service roles. If you exceed the capacity later, you will need to enter anInfrastructure change request to change the capacity.
Configure the Service and Service Role
In the Service and Service Roles we set out how the Infrastructure is set up. We provide the name of the service,add it to the environment. The environment is the list we added earlier when setting up the portal. The billing
code and datacenter are names you use internally. Its when you get to the Service Quota you start to useinformation from the other pages. As mentioned above, the Infrastructure capacity on the first page is used as the
cap for Services and Roles.
The networks are those setup earlier or you can be request them on this page. These have to match the name usein the Hyper-V Virtual Network Manager. The services can have their own access control; you can enter
additional admins to those for the BU, plus members who can access this service.
The service role is tucked away at the end, all you need to enter is the Role name and the number of images itneeds. The rest for our test environment can be left to their default.
Add Templates for the VMs
The final part of the infrastructure request is to assign the templates to this request. The list you get is the onefrom the template settings for the portal. Here selecting the templates available are the ones that will be available
when the BU tries to create VMs. If the template is not selected here and is needed later then a newInfrastructure change request needs to be created.
Once approved the virtual machine creation can begin and the billing starts.
Creating Virtual Machines
Weve now got to the point where BU can request Virtual Machines and manage their environment. The control
on resources comes in here, when requesting a VM you are asked for the number of machines, their names, the
infrastructure details and template to use. If they exceed the resources, the creation process stops. BUs cant sayone thing about capacity and do something else.
Once created the VMs are managed and controlled from the VM page, all members of the BU Roles can start orstop the VMs created. You can also monitor the jobs from the Jobs page or as a DC Administrator the SCVMM
console.
7/31/2019 Cloud Computing Seminar 2012
31/32Department of Computer Engg. 23 UCOE, Patiala
Implementation of Private Cloud
CHAPTER 14
CONCLUSION
Cloud Computing is a vast topic and the above report does not give a high level introduction to it. It is
certainly not possible in the limited space of a report to do justice to these technologies. What is in store for
this technology in the near future? Well, Cloud Computing is leading the industrys endeavor to bank on this
revolutionary technology.
Cloud Computing Brings Possibilities..
Increases business responsiveness
Accelerates creation of new services via rapid prototyping capabilities
Reduces acquisition complexity via service oriented approach
Uses IT resources efficiently via sharing and higher system utilization
Reduces energy consumption
Handles new and emerging workloads
Scales to extreme workloads quickly and easily
Simplifies IT management Platform for collaboration and innovation
Cultivates skills for next generation workforce
Today, with such cloud-based interconnection seldom in evidence, cloud computing might be more accurately
described as "sky computing," with many isolated clouds of services which IT customers must plug into
individually. On the other hand, as virtualization and SOA permeate the enterprise, the idea of loosely coupled
services running on an agile, scalable infrastructure should eventually make every enterprise a node in the
cloud. It's a long-running trend with a far-out horizon. But among big metatrends, cloud computing is the
hardest one to argue with in the long term.
Cloud Computing is a technology which took the software and business world by storm. The much deserved
hype over it will continue for years to come.
7/31/2019 Cloud Computing Seminar 2012
32/32