Cloud Computing Seminar 2012

Embed Size (px)

Citation preview

  • 7/31/2019 Cloud Computing Seminar 2012

    1/32

    IMPLEMENTATION OF PRIVATE CLOUD

    A Seminar Presented to

    the Faculty of Engineering and Technology

    of the Punjabi University in Fulfilment of the Requirements

    for the degree ofMASTER OF TECHNOLOGY

    IN

    COMPUTER ENGINEERING

    Submitted By:

    Er. Gurjot Singh Sodhi

    (11171002)

    Under the Supervision of

    Dr. Himanshu Aggrawal

    (Reader, CE, UCOE)

    Department of Computer Engineering

    University College of Engineering,

    PUNJABI UNIVERSITY,PATIALA-147001

    June-2012

  • 7/31/2019 Cloud Computing Seminar 2012

    2/32

    ii

    DECLARATION

    I hereby affirm that the work presented in this seminar entitled IMPLEMENTATION OF

    PRIVATE CLOUD in partial fulfillment of the requirements of the award of degree of M-Tech

    (Computer Engineering), submitted at department of computer engineering at University College

    of Engineering, Punjabi University, Patiala is an authentic record of my own work under the

    guidance of Dr. Himanshu Aggrawal Reader, Department of Computer Engineering. The matter

    presented in this dissertation has not been submitted in any other university/ institute for the award

    of M-Tech degree or any degree / diploma.

    Er. Gurjot Singh Sodhi

    11171002

    -------------------------------

    (Signature of Guide)

  • 7/31/2019 Cloud Computing Seminar 2012

    3/32

    iii

    ACKNOWLEDGEMENT

    Foremost, I would like to express my sincere gratitude to my supervisor Dr. Himanshu

    Aggrawal, Reader, Computer Engineering Department, University College of Engineering,

    Punjabi University, Patiala for his continuing interest, encouragement and valuable guidance

    throughout the course of present work. His professional advice, sustained interest, comments and

    ideas in gentle and caring manner, without which it would not have been possible to accomplish

    and conclude this research work, are gratefully acknowledged.

    Besides my supervisor, I am thankful to Dr. Amardeep Singh, Head, University college of

    Engineering, Punjabi University, Patiala or their help, valuable suggestions and constantencouragement throughout the period of the research. I would like to thank the rest of my

    dissertation committee for their encouragement, insightful comments, and hard questions.

    I wish to express my sincere appreciation to my parents and friends for their patience and

    encouragement during this work.

    Last but not the least, I would like to thank Almighty God for providing me this opportunity

    and granting me the capability to proceed successfully.

    Er. Gurjot Singh Sodhi

  • 7/31/2019 Cloud Computing Seminar 2012

    4/32

  • 7/31/2019 Cloud Computing Seminar 2012

    5/32

  • 7/31/2019 Cloud Computing Seminar 2012

    6/32

    vi

    LIST OF ABBREVIATIONS

    Abbreviation Full Form

    IaaS Incorporates Infrastructure as a Service

    SaaS Software as a Service

    PaaS Platform as a Service

    CapEx Capital Expenditure

    GPL General Public License

    SAP Special Assistance Plan

    EC2 Elastic Compute

    SQS Simple Queue Service

    FPS Frames Per Second

    HTML Hyper Text Markup Language

    REST Representational State Transfer

    BOINC Berkeley Open Infrastructure for Network Computing

    UNIX Uniplexed Information Computing System

  • 7/31/2019 Cloud Computing Seminar 2012

    7/32

    TABLE OF CONTENTS

    Contents Page No.

    Declaration iiAcknowledgement iiiAbstract iv

    List of Figures vList of Abbreviations vi

    Table of Contents viiChapter 1: Introduction 1

    Chapter 2: Cloud Computing The Concept 2-4

    2.1 Comparison 3

    2.2 Implementation 3

    2.3 Characteristics 3

    2.4 Economics 3

    2.5 Companies 4Chapter 3: History 5

    Chapter 4: Political Issues 6

    Chapter 5: Legal Issues 7

    Chapter 6: Risk Mitigation 8

    Chapter 7: Key Characteristics 9

    Chapter 8: Components 10-12

    8.1 Application 11

    8.2 Client 11

    8.3 Infrastructure 11

    8.4 Platform 11

    8.5 Service 12

    8.6 Storage 12

  • 7/31/2019 Cloud Computing Seminar 2012

    8/32

  • 7/31/2019 Cloud Computing Seminar 2012

    9/32

    Implementation of Private Cloud

    Department of Computer Engg. 1 UCOE, Patiala

    CHAPTER 1

    INTRODUCTION

    Imagine yourself in the world where the users of the computer of todays internet world dont have to run,

    install or store their application or data on their own computers, imagine the world where every piece of your

    information or data would reside on the Cloud (Internet).

    As a metaphor for the Internet, "the cloud" is a familiar clich, but when combined with "computing"

    the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as anupdated version of utility computing: basically virtual servers available over the Internet. Others go very

    broad, arguing anything you consume outside the firewall is "in the cloud", including conventional

    outsourcing.

    Cloud computing comes into focus only when you think about what we always need: a way to increase

    capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or

    licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in

    real time over the Internet, extends ICT's existing capabilities.

    Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew

    of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style

    infrastructure providers are part of the mix, but so are SaaS (software as a service) providers such a

    Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud

    computing aggregators and integrators are already emerging.

    Figure 1.1 : The Cloud

  • 7/31/2019 Cloud Computing Seminar 2012

    10/32Department of Computer Engg. 2 UCOE, Patiala

    Implementation of Private Cloud

    CHAPTER 2

    CLOUD COMPUTING - THE CONCEPT

    Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). I

    is a style of computing in which dynamically scalable and often virtualized resources are provided as a service

    over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure

    "in the cloud" that supports them.

    The conceptIncorporates Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as

    a Service (SaaS) as well as Web 2.0 and other recent technology trends which have the common theme of

    reliance on the Internet for satisfying the computing needs of the users. Examples of SaaS vendors include

    Salesforce.com and Google Apps, which provide common business applications online that are accessed from

    a web browser, while the software and data are stored on the servers.

    The term cloud is used as a metaphor for the Internet, based on how the Internet is depicted in computer

    network diagrams, and is an abstraction for the complex infrastructure it conceals.

    Figure 2.1 :Cloud Computing Overview

  • 7/31/2019 Cloud Computing Seminar 2012

    11/32

    Implementation of Private Cloud

    Department of Computer Engg. 3 UCOE, Patiala

    2.1 Comparison:

    Cloud computing is often confused with grid computing ("a form of distributed computing whereby a 'super

    and virtual computer' is composed of a cluster of networked, loosely-coupled computers, acting in concert to

    perform very large tasks"), utility computing (the "packaging of computing resources, such as computation

    and storage, as a metered service similar to a traditional public utility such as electricity") and autonomic

    computing ("computer systems capable of self-management").

    Indeed many cloud computing deployments as of 2009 depend on grids, have autonomic characteristics and

    bill like utilities but cloud computing can be seen as a natural next step from the grid-utility model. Some

    successful cloud architectures have little or no centralized infrastructure or billing systems whatsoever,

    including peer-to-peer networks like Bit Torrent and Skype.

    2.2 Implementation:

    The majority of cloud computing infrastructure as of 2009 consists of reliable services delivered through data

    centers and built on servers with different levels of virtualization technologies. The services are accessible

    anywhere that has access to networking infrastructure. The Cloudappears as a single point of access for all the

    computing needs of consumers. Commercial offerings need to meet the quality of service requirements o

    customers and typically offer service level agreements. Open standards are critical to the growth of cloud

    computing and open source software has provided the foundation for many cloud computing implementations.

    2.3 Characteristics:

    As customers generally do not own the infrastructure, they merely access or rent, they can avoid capitaexpenditure and consume resources as a service, paying instead for what they use. Many cloud-computing

    offerings have adopted the utility computing model, which is analogous to how traditional utilities like

    electricity are consumed, while others are billed on a subscription basis. Sharing "perishable and intangible"

    computing power among multiple tenants can improve utilization rates, as servers are not left idle, which can

    reduce costs significantly while increasing the speed of application development. A side effect of this

    approach is that "computer capacity rises dramatically" as customers do not have to engineer for peak loads

    Adoption has been enabled by "increased high-speed bandwidth" which makes it possible to receive the same

    response times from centralized infrastructure at other sites.

    2.4 Economics:

    Cloud computing users can avoid capital expenditure (CapEx) on hardware, software and services, rathe

    paying a provider only for what they use. Consumption is billed on a utility (e.g. resources consumed, like

    electricity) or subscription (e.g. time based, like a newspaper) basis with little or no upfront cost. Other

    benefits of this time sharing style approach are low barriers to entry, shared infrastructure and costs, low

    management overhead and immediate access to a broad range of applications. Users can generally terminate

    the contract at any time (thereby avoiding return on investment risk and uncertainty) and the services are often

    covered by service level agreements with financial penalties.

  • 7/31/2019 Cloud Computing Seminar 2012

    12/32Department of Computer Engg. 4 UCOE, Patiala

    Implementation of Private Cloud

    According to Nicholas Carr the strategic importance of information technology is diminishing as it becomes

    standardized and cheaper. He argues that the cloud computing paradigm shift is similar to the displacement of

    electricity generators by electricity grids early in the 20th century.

    Figure 2.2 : Cloud Computing Economics

    2.5 Companies:

    Providers including Amazon, Microsoft, Google, Sun and Yahoo exemplify the use of cloud computing. It i

    being adopted by individual users through large enterprises including General Electric, L'Oral, and Procter &

    Gamble.

  • 7/31/2019 Cloud Computing Seminar 2012

    13/32Department of Computer Engg. 5 UCOE, Patiala

    Implementation of Private Cloud

    CHAPTER 3

    HISTORY

    The Cloud is a term with a long history in telephony, which has in the past decade, been adopted as a

    metaphor for internet based services, with a common depiction in network diagrams as a cloud outline.

    The underlying concept dates back to 1960 when John McCarthy opined that "computation may someday be

    organized as a public utility"; indeed it shares characteristics with service bureaus which date back to the

    1960s. The term cloud had already come into commercial use in the early 1990s to refer to large ATM

    networks. By the turn of the 21st century, the term "cloud computing" had started to appear, although most of

    the focus at this time was on Software as a service (SaaS).

    In 1999, Salesforce.com was established by Marc Benioff, Parker Harris, and his fellows. They applied many

    technologies of consumer web sites like Google and Yahoo! to business applications. They also provided the

    concept of "On demand" and "SaaS" with their real business and successful customers. The key for SaaS is

    being customizable by customer alone or with a small amount of help. Flexibility and speed for application

    development have been drastically welcomed and accepted by business users.

    IBM extended these concepts in 2001, as detailed in the Autonomic Computing Manifesto -- which described

    advanced automation techniques such as self-monitoring, self-healing, self-configuring, and self-optimizing in

    the management of complex IT systems with heterogeneous storage, servers, applications, networks, security

    mechanisms, and other system elements that can be virtualized across an enterprise.

    Amazon.com played a key role in the development of cloud computing by modernizing their data centers after

    the dot-com bubble and, having found that the new cloud architecture resulted in significant interna

    efficiency improvements, providing access to their systems by way of Amazon Web Services in 2005 on a

    utility computing basis.

    2007 saw increased activity, with Google, IBM, and a number of universities embarking on a large scale

    cloud computing research project, around the time the term started gaining popularity in the mainstream press

    It was a hot topic by mid-2008 and numerous cloud computing events had been scheduled.

    In August 2008, Gartner Research observed that "organizations are switching from company-owned hardware

    and software assets to per-use service-based models" and that the "projected shift to cloud computing wil

    result in dramatic growth in IT products in some areas and in significant reductions in other areas."

  • 7/31/2019 Cloud Computing Seminar 2012

    14/32Department of Computer Engg. 6 UCOE, Patiala

    Implementation of Private Cloud

    CHAPTER 4

    POLITICAL ISSUES

    The Cloudspans many borders and "may be the ultimate form of globalization." As such it becomes subject to

    complex geopolitical issues: providers must satisfy myriad regulatory environments in order to deliver service

    to a global market. This dates back to the early days of the Internet, where libertarian thinkers felt tha

    "cyberspace was a distinct place calling for laws and legal institutions of its own"; author Neal Stephenson

    envisaged this as a tiny island data haven called Kinakuta in his classic science-fiction novel Cryptonomicon.

    Despite efforts (such as US-EU Safe Harbor) to harmonize the legal environment, as of 2009 providers such

    as Amazon Web Services cater to the major markets (typically the United States and the European Union) by

    deploying local infrastructure and allowing customers to select "availability zones." Nonetheless, there are

    still concerns about security and privacy from individual through governmental level, e.g., the USA

    PATRIOT Act and use of national security letters and the Electronic Communication Privacy Act's Stored

    Communications Act.

  • 7/31/2019 Cloud Computing Seminar 2012

    15/32Department of Computer Engg. 7 UCOE, Patiala

    Implementation of Private Cloud

    CHAPTER 5

    LEGAL ISSUE

    In March 2007, Dell applied to trademark the term "cloud computing" (U.S. Trademark 77,139,082) in the

    United States. The "Notice of Allowance" it received in July 2008 was canceled on August 6, resulting in a

    formal rejection of the trademark application less than a week later.

    On 30 September 2008, USPTO issued a "Notice of Allowance" to CGactive LLC (U.S. Trademark

    77,355,287) for "CloudOS". A cloud operating system is a generic operating system that "manage[s] the

    relationship between software inside the computer and on the Web", such as Microsoft Azure. Good OS LLC

    also announced their "Cloud" operating system on 1 December 2008.

    Richard Stallman, founder of the Free Software Foundation, believes that cloud computing endangers liberties

    because users sacrifice their privacy and personal data to a third party. In November 2007, the Free Software

    Foundation released the Affero General Public License, a version of GPLv3 designed to close a perceived

    legal loophole associated with free software designed to be run over a network, particularly software as a

    service. An application service provider is required to release any changes they make to Affero GPL open

    source code

  • 7/31/2019 Cloud Computing Seminar 2012

    16/32Department of Computer Engg. 8 UCOE, Patiala

    Implementation of Private Cloud

    CHAPTER 6

    RISK MITIGATION

    Corporations or end-users wishing to avoid not being able to access their data or even losing it should

    research vendors' policies on data security before using vendor services. One technology analyst and

    consulting firm, Gartner, lists seven security issues which one should discuss with a cloud-computing vendor:

    1. Privileged user accessinquire about who has specialized access to data and about the hiring and

    management of such administrators.

    2. Regulatory compliancemakes sure a vendor is willing to undergo external audits and/or security

    certifications.

    3. Data locationsask if a provider allows for any control over the location of data.

    4. Data segregationmake sure that encryption is available at all stages and that these "encryption

    schemes were designed and tested by experienced professionals".

    5. Recoveryfind out what will happen to data in the case of a disaster; do they offer complete

    restoration and, if so, how long that would take.

    6. Investigative Supportinquire whether a vendor has the ability to investigate any inappropriate or

    illegal activity.

    7. Long-term viabilityask what will happen to data if the company goes out of business; how willdata be returned and in what format.

    In practice, one can best determine data-recovery capabilities by experiment: asking to get back old data

    seeing how long it takes, and verifying that the checksums match the original data. Determining data security

    is harder. A tactic not covered by Gartner is to encrypt the data yourself. If you encrypt the data using a

    trusted algorithm, then regardless of the service provider's security and encryption policies, the data will only

    be accessible with the decryption keys. This leads to a follow-on problem: managing private keys in a pay-on

    demand computing infrastructure.

  • 7/31/2019 Cloud Computing Seminar 2012

    17/32Department of Computer Engg. 9 UCOE, Patiala

    Implementation of Private Cloud

    CHAPTER 7

    KEY CHARACTERISTICS

    Cost is greatly reduced and capital expenditure is converted to operational expenditure. This lowers

    barriers to entry, as infrastructure is typically provided by a third-party and does not need to be

    purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is

    fine-grained with usage-based options and minimal or no IT skills are required for implementation.

    Device and location independence enable users to access systems using a web browser regardless o

    their location or what device they are using, e.g., PC, mobile. As infrastructure is off-site (typically

    provided by a third-party) and accessed via the Internet the users can connect from anywhere.

    Multi-tenancy enables sharing of resources and costs among a large pool of users, allowing for:

    o Centralization of infrastructure in areas with lower costs (such as real estate, electricity, etc.)

    o Peak-load capacity increases (users need not engineer for highest possible load-levels)

    o Utilization and efficiency improvements for systems that are often only 10-20% utilized.

    Reliability improves through the use of multiple redundant sites, which makes it suitable for business

    continuity and disaster recovery. Nonetheless, most major cloud computing services have suffered

    outages and IT and business managers are able to do little when they are affected.

    Scalability via dynamic ("on-demand") provisioning of resources on a fine-grained, self-service basis

    near real-time, without users having to engineer for peak loads. Performance is monitored andconsistent and loosely-coupled architectures are constructed using web services as the system

    interface.

    Security typically improves due to centralization of data, increased security-focused resources, etc.

    but raises concerns about loss of control over certain sensitive data. Security is often as good as or

    better than traditional systems, in part because providers are able to devote resources to solving

    security issues that many customers cannot afford. Providers typically log accesses, but accessing the

    audit logs themselves can be difficult or impossible.

    Sustainability comes about through improved resource utilization, more efficient systems, and carbon

    neutrality. Nonetheless, computers and associated infrastructure are major consumers of energy.

  • 7/31/2019 Cloud Computing Seminar 2012

    18/32Department of Computer Engg. 10 UCOE, Patiala

    Implementation of Private Cloud

    CHAPTER 8

    COMPONENTS

    Cloud computing Components

    Applications Facebook Google Apps SalesForce Microsoft Online

    ClientBrowser(Chrome) Firefox Cloud Mobile (Android iPhone) Netbook (EeePC MSIWind) Nettop (CherryPal Zonbu)

    Infrastructure BitTorrent EC2 GoGrid Sun Grid 3tera

    Platforms App Engine Azure Mosso SalesForce

    Services Alexa FPS MTurk SQS

    Storage S3 SimpleDB SQL Services

    Standards Ajax Atom HTML 5 REST

    Figure 8.1 : Cloud Computing Components

  • 7/31/2019 Cloud Computing Seminar 2012

    19/32

  • 7/31/2019 Cloud Computing Seminar 2012

    20/32

  • 7/31/2019 Cloud Computing Seminar 2012

    21/32Department of Computer Engg. 13 UCOE, Patiala

    Implementation of Private Cloud

    CHAPTER 9

    ARCHITECTURE

    Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud

    computing, comprises hardware and software designed by a cloud architectwho typically works for a cloud

    integrator. It typically involves multiple cloud components communicating with each other over application

    programming interfaces, usually web services.

    This closely resembles the UNIX philosophy of having multiple programs doing one thing well and workingtogether over universal interfaces. Complexity is controlled and the resulting systems are more manageable

    than their monolithic counterparts.

    Cloud architecture extends to the client, where web browsers and/or software applications access cloud

    applications.

    Cloud storage architecture is loosely coupled, where metadata operations are centralized enabling the data

    nodes to scale into the hundreds, each independently delivering data to applications or user.

    Figure 9.1 : Cloud Computing Architecture

  • 7/31/2019 Cloud Computing Seminar 2012

    22/32

  • 7/31/2019 Cloud Computing Seminar 2012

    23/32Department of Computer Engg. 15 UCOE, Patiala

    Implementation of Private Cloud

    CHAPTER 11

    ROLES

    11.1 Provider

    A cloud computing provider or cloud computing service provider owns and operates live cloud computing

    systems to deliver service to third parties. The barrier to entry is also significantly higher with capital

    expenditure required and billing and management creates some overhead. Nonetheless, significant operationa

    efficiency and agility advantages can be realized, even by small organizations, and server consolidation and

    virtualization rollouts are already well underway. Amazon.com was the first such provider, modernizing its

    data centers which, like most computer networks, were using as little as 10% of its capacity at any one time

    just to leave room for occasional spikes. This allowed small, fast-moving groups to add new features faste

    and easier, and they went on to open it up to outsiders as Amazon Web Services in 2002 on a utility

    computing basis.

    11.2 User

    A user is a consumer ofcloud computing. The privacy of users in cloud computing has become of increasing

    concern. The rights of users are also an issue, which is being addressed via a community effort to create a bill

    of rights.

    11.3 Vendor

    A vendor sells products and services that facilitate the delivery, adoption and use of cloud computing. For

    example:

    Computer hardware (Dell, HP, IBM, Sun Microsystems)

    o Storage (Sun Microsystems, EMC, IBM)

    o Infrastructure (Cisco Systems)

    Computer software (3tera, Hadoop, IBM, RightScale)o Operating systems (Solaris, AIX, Linux including Red Hat)

    o Platform virtualization (Citrix, Microsoft, VMware, Sun xVM, IBM)

  • 7/31/2019 Cloud Computing Seminar 2012

    24/32Department of Computer Engg. 16 UCOE, Patiala

    Implementation of Private Cloud

    CHAPTER 12

    STANDARDS

    Cloud standards, a number of existing, typically lightweight, open standards, have facilitated the growth of

    cloud computing, including:

    Application

    o Communications (HTTP, XMPP)

    o Security (OAuth, OpenID, SSL/TLS)

    o Syndication (Atom)

    Client

    o Browsers (AJAX)

    o Offline (HTML 5)

    Implementations

    o Virtualization (OVF)

    Platform

    o Solution stacks (LAMP)

    Service

    o Data (XML, JSON)

    o Web Services (REST)

    Storage

    o Database(Amazon Simple DB, Google App Engine BigTable Datastore)

    o Network attached storage (MobileMe iDisk, Nirvanix CloudNAS)

    o Synchronization (Live MeshLive Desktop component, MobileMe push functions)

    o Web service (Amazon Simple Storage Service, Nirvanix SDN)

  • 7/31/2019 Cloud Computing Seminar 2012

    25/32Department of Computer Engg. 17 UCOE, Patiala

    Implementation of Private Cloud

    CHAPTER 13

    BUILDING A PRIVATE CLOUD

    13.1 What do I need ?

    For a Private Cloud or Customer Cloud, whichever name you prefer, to have an effective IT as a Servic

    offering requires some key elements to be in-place.

    First you need a management tool that allows you to monitor the servers providing the virtualizatioservices. The tool should also allow you to easily move services around the machines, and ideall

    provide you with guidance on what actions to take should resource become over utilised.

    Secondly, you need a tool that allows for the Business units in your organization to be self-sufficient irequesting and managing their services, while at the same time provide you with a method to calculat

    charge-back costs.

    Windows Server 2008 R2 out-of-the-box does not provide all of these. It does have a number of managemen

    features you will need, but for the complete solution you need to add:-

    System Center Virtual Machine Manager 2008 R2 (SCVMM) System Center Virtual Machine Manager Self Service Portal 2.0 (SSP)

    These two System Center products provide the management, monitoring and self-service capabilities neede

    to run an IT as a Service operation.

    SCVMM provides the core management functionality. Allowing you to go beyond the Hyper-V managemen

    console in R2, you can group your servers into host groups and monitor more than one host at a time

    Intelligent placement built into SCVMM helps you make the best decisions about where virtual machines (VMs

    should go. SCVMM also provides a library service where you hold template images, ISO images and scripts tha

    can be easily deployed to meet different requirements. Finally Performance Resource Optimization (PRO

    provides you with the ability to monitor and correct problems for VMs. PRO allows the administrator to set u

    information that can be displayed when certain thresholds are reached. These Tips, can, for example, have

    messaging saying Add another Web Server to Order Tracking Web Farm.

    SSP provides the self-service functionality. At a high level, once enabled and configured by the I

    Administrator, SSP allows registered Business Units to manage their own administrative team to reques

    resources, start or stop VMs and be entirely self-sufficient in managing their resources. At the back end, the IT

    Administrator can set charge back costs for both reserved resources and allocated resources.

  • 7/31/2019 Cloud Computing Seminar 2012

    26/32Department of Computer Engg. 18 UCOE, Patiala

    Implementation of Private Cloud

    13.2 Where to Start ?

    There are requirements for the installation to work. First, there are additional roles and features that need to

    be installed on Windows Server 2008 R2. These are primarily driven by SCVMM. So to install SCVMM, Window

    Server must have:

    Hyper-V. The SCVMM Setup Wizard automatically adds this role, which will work as long as the machinbeing used supports virtualization.

    Windows Remote Management (WinRM). For SCVMM setup to work, the service must be installed anin a state other than disabled and stopped.

    Internet Information Services (IIS) 7.0. You must add the Web Server (IIS) role and then install thfollowing server role services:

    o IIS 6 Metabase Compatibilityo IIS 6 WMI Compatibilityo Static Contento Default Documento Directory Browsingo HTTP Errorso ASP.NETo .NET Extensibilityo ISAPI Extensionso ISAPI Filterso Request Filtering

    In addition to these, the SSP also requires some additional features be installed:

    Microsoft Message Queuing (MSMQ). Windows PowerShell 2.0. This requirement supersedes version 1.0 that SCVMM requires. Microsoft .NET Framework 3.5 SP1. R2 contains 3.5.1, so if this is installed then you have met thi

    requirement.

    The final requirement for both SCVMM and SSP is a database. When installed alone, SCVMM can use the SQ

    Express edition, which it will install automatically if you do not provide it with an alternative. However, SS

    requires either Standard or Enterprise editions of SQL Server 2008 or higher.

    The other requirement for the solutions is Active Directory. Both SCVMM and SSP work best in a domai

    environment. As we go through SSP, it will become clear why this is so.

    In my test environment Ive mixed and matched. The base OS is R2 Enterprise edition, the database server i

    SQL Server 2008 R2 Standard edition. At this point that you may consider installing the beta of Service Pack

    for Windows Server 2008 R2 to take advantage of the Dynamic Memory feature. This is an extremely usefu

    feature for maximizing the memory usage on Hyper-V hosts; the caveat here is that the SSP documentatio

    doesnt yet have any recommendation on how this feature interacts with the Charge-back process. I didn

    install SP1 beta for that very reason, but I do encourage you to evaluate it for potential use on productio

    Hyper-V hosts.

  • 7/31/2019 Cloud Computing Seminar 2012

    27/32Department of Computer Engg. 19 UCOE, Patiala

    Implementation of Private Cloud

    Figure: 13.1 Basic Private Cloud Architecture

    13.3 Configuring various Components ?

    ConfiguringSCVMM

    Im going to start with SCVMM, since this is the core of the environment. Basically, to create a self-servicePrivate Cloud environment you need to configure the following:-

    User Role group for the portal Add any base images and ISO files to the library Create templates of the workloads you want to offer. Next step is the creation of your templates. The templates are just preconfigured images that have been

    generalized for easy deployment. So you can either take an existing VHD, or install a new OS, configure

    it the way it needs to be. Then prepare it. On the VM menu, selecting New Template will take the image

    and do all the work needed to generalize it. When you start this process the source image is destroyed. Soif you need a copy, now is a good time to take one.

    The New Template Wizard asks for some basic information and the location where you want to store thetemplate. When you configured SCVMMs Library component during setup you created a share for thelibrary, within that share you can create a folder for templates to help organizes these files.

  • 7/31/2019 Cloud Computing Seminar 2012

    28/32Department of Computer Engg. 20 UCOE, Patiala

    Implementation of Private Cloud

    Once a template is created you have the minimum need to try out the self-service portal, which is whatwe will now configure.

    Figure 13.2 : Configuring SCVMM

    Configuring the Self-Service Portal

    As the administrator, the first task is to configure the portal. Connecting to website as the administrator, you

    need to configure just two of the four options on the Settings link. The main one is the Configure Datacenter

    Management link, here you configure these properties.

    VMM Server. This is the FQDN of the machine you installed the VMM server role on. Device. Configure the names any SANS or Load Balancers you have. Networks. These map to the names of the networks you configured in Hyper-V. The names here must

    match those in the Virtual Network Manager in the Hyper-V console.

    Active Directory. Add any Domains you have. Quota Cost. Enter the default values for memory and storage. You can alter these on a template basis

    later.

    Environment. Enter the names of any environments you want to use to group infrastructures in. This ispurely process and organization.

    Save and close and you are almost set.

    Next part is to configure the Templates. On the Template page enter the library server where youd like to get

    the templates from. If the Self-Service Portal service is not running, this is the point you find out as service willnot return any information from the library server.

    http://blogs.technet.com/cfs-file.ashx/__key/CommunityServer-Blogs-Components-WeblogFiles/00-00-00-62-96-metablogapi/1423.clip_5F00_image002_5F00_013B7E6D.jpg
  • 7/31/2019 Cloud Computing Seminar 2012

    29/32Department of Computer Engg. 21 UCOE, Patiala

    Implementation of Private Cloud

    Now you are ready to try out the configuration of Business Units, Infrastructures and Virtual Machines. As the

    administrator you get to approve all requests, so while anyone could request a BU, you get the final say. Now, if

    you are testing this, dont use really BU names because once you use than name you cant delete it later yet asI found setting up a demo.

    So what do you configure? Ill run through the basics to get the system working on a test environment. On theBU registration, a lot of it is simply documentation; the administrators are the one area that interacts with VMM

    Those names you enter here are added to the role we configured earlier. When submitted, the request appears as

    an Onboarding request in the request queue.

    Once approved, the BU can set up its infrastructures. From the first post, the diagram of what an infrastructure

    consist of gives us a good idea of what the request process will cover. The request is a 3 step process:-

    Configure the Infrastructure name. Configure the Service and Service Role Add Templates for the VMs.

    Figure 13.3 : Configuring Self-Service Portal

    http://blogs.technet.com/cfs-file.ashx/__key/CommunityServer-Blogs-Components-WeblogFiles/00-00-00-62-96-metablogapi/6765.clip_5F00_image008_5F00_2A935A7B.jpg
  • 7/31/2019 Cloud Computing Seminar 2012

    30/32Department of Computer Engg. 22 UCOE, Patiala

    Implementation of Private Cloud

    Configurethe Infrastructure nameThe first part asks for the infrastructure name, the priority, how long the BU expects to keep it and the forecast

    for the capacity it will use. The capacity you enter here is used when calculating free space when starting VMs

    or when creating new Services and Service roles. If you exceed the capacity later, you will need to enter anInfrastructure change request to change the capacity.

    Configure the Service and Service Role

    In the Service and Service Roles we set out how the Infrastructure is set up. We provide the name of the service,add it to the environment. The environment is the list we added earlier when setting up the portal. The billing

    code and datacenter are names you use internally. Its when you get to the Service Quota you start to useinformation from the other pages. As mentioned above, the Infrastructure capacity on the first page is used as the

    cap for Services and Roles.

    The networks are those setup earlier or you can be request them on this page. These have to match the name usein the Hyper-V Virtual Network Manager. The services can have their own access control; you can enter

    additional admins to those for the BU, plus members who can access this service.

    The service role is tucked away at the end, all you need to enter is the Role name and the number of images itneeds. The rest for our test environment can be left to their default.

    Add Templates for the VMs

    The final part of the infrastructure request is to assign the templates to this request. The list you get is the onefrom the template settings for the portal. Here selecting the templates available are the ones that will be available

    when the BU tries to create VMs. If the template is not selected here and is needed later then a newInfrastructure change request needs to be created.

    Once approved the virtual machine creation can begin and the billing starts.

    Creating Virtual Machines

    Weve now got to the point where BU can request Virtual Machines and manage their environment. The control

    on resources comes in here, when requesting a VM you are asked for the number of machines, their names, the

    infrastructure details and template to use. If they exceed the resources, the creation process stops. BUs cant sayone thing about capacity and do something else.

    Once created the VMs are managed and controlled from the VM page, all members of the BU Roles can start orstop the VMs created. You can also monitor the jobs from the Jobs page or as a DC Administrator the SCVMM

    console.

  • 7/31/2019 Cloud Computing Seminar 2012

    31/32Department of Computer Engg. 23 UCOE, Patiala

    Implementation of Private Cloud

    CHAPTER 14

    CONCLUSION

    Cloud Computing is a vast topic and the above report does not give a high level introduction to it. It is

    certainly not possible in the limited space of a report to do justice to these technologies. What is in store for

    this technology in the near future? Well, Cloud Computing is leading the industrys endeavor to bank on this

    revolutionary technology.

    Cloud Computing Brings Possibilities..

    Increases business responsiveness

    Accelerates creation of new services via rapid prototyping capabilities

    Reduces acquisition complexity via service oriented approach

    Uses IT resources efficiently via sharing and higher system utilization

    Reduces energy consumption

    Handles new and emerging workloads

    Scales to extreme workloads quickly and easily

    Simplifies IT management Platform for collaboration and innovation

    Cultivates skills for next generation workforce

    Today, with such cloud-based interconnection seldom in evidence, cloud computing might be more accurately

    described as "sky computing," with many isolated clouds of services which IT customers must plug into

    individually. On the other hand, as virtualization and SOA permeate the enterprise, the idea of loosely coupled

    services running on an agile, scalable infrastructure should eventually make every enterprise a node in the

    cloud. It's a long-running trend with a far-out horizon. But among big metatrends, cloud computing is the

    hardest one to argue with in the long term.

    Cloud Computing is a technology which took the software and business world by storm. The much deserved

    hype over it will continue for years to come.

  • 7/31/2019 Cloud Computing Seminar 2012

    32/32