• No results found

A Survey on Cloud Computing-Deployment of Cloud, Building a Private Cloud and Simulators

N/A
N/A
Protected

Academic year: 2021

Share "A Survey on Cloud Computing-Deployment of Cloud, Building a Private Cloud and Simulators"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

Abstract. Cloud computing is emerging in the mainstream as a powerful and important force of change in the way of management of information. Cloud computing is also consumes and provides information services like Software as a Service (SaaS), Platform as Service (PaaS), Infrastructure as a Service (IaaS) as a standard services. These services are served with different deployment of cloud like private cloud, public cloud hybrid cloud and community cloud. In this paper study of cloud, its deployment and building of Private cloud is done. Simulators play important role during the implementation. So, different simulators of cloud computing are compared and analysed for suitability with which deployment of cloud it suits. The study also suggests having private/public cloud according to the need of the organization.

Keywords: Cloud computing, Private cloud, Cloud simulators.

1. Introduction

The chief scientist of the Advanced Research Projects Agency Network (ARPANET) and author of the journal paper ‘A vision of Internet’ Leonard Kleinrock said that “As of now, computer networks are still in their infancy, but as they grow up and become sophisticated, we will probably see the spread of ‘computer utilities’ which, like present electric and telephone utilities, will service individual homes and offices across the country” [1]. Leonard gave the vision of Internet which became one of the utility. To develop an Internet usage as a utility the new technology is evolved that is Cloud Computing, which is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources like networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider interaction. The cloud is having five essential characteristics like on-demand self- service, Broad network access, Rapid elasticity, Measured service, Resource pooling and three standard service models such as Software as a Service, Platform as a Service and Infrastructure as a Service with four deployment models are: Private cloud, Public cloud, Hybrid cloud, Community cloud.

A consumer expects to have all computing capabilities such as server time and network storage whenever he requires. For such requirement he is not required to interact with service provider every time. Automatically he can avail all such utilities provided by service provider as on-demand self-service. Broad network access is another character which provides capabilities over the network and accessed through standard mechanisms. Some of the mechanisms promotes the use of mobile phones, tablets, laptops, etc. Multiple consumers with multi tenant models of different physical and virtual resources dynamically assigned are having pool of services by providers. The provider computes the resources according to the requests of consumers. This feature is considered as resource pooling. There is a sense of location independence in that the customer generally has no control or knowledge over the exact loca-tion of the provided resources but may be able to specify localoca-tion like country, state or datacentre at a higher level of abstraction. Examples of resources include storage, processing, memory, and network bandwidth. The following characters are rapid elasticity and measured services. Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capa-bilities are available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time. Cloud systems automatically control and optimize resource use by leveraging a metering capability one at some level

(2)

Figure 1. Cloud character and deployments.

of abstraction appropriate to the type of service such as storage, processing, bandwidth, and active user accounts. Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.

Cloud computing is also a paradigm of distributed computing to serve the consumer need and serve his requests with new techniques like Service–Oriented–Architecture (SOA) and Virtualization. Cloud computing is partitioned into three parts as Providers, Customer and users. The providers provide the three standard services: Platform as Service (PaaS), example for this is Google App Engine. Software as a Service (SaaS) and Infrastructure as a Service (IaaS). There are many services such Data as a Service (Daas), Identity and Policy Management as a Service (IPMaaS), Network as a Service (NaaS), etc [1–5]. For any type of service there must be any one type of deployment like private cloud, public cloud, hybrid cloud and community cloud [6].

Cloud computing can be deployed as private clouds which hosts inside an organization’s firewall primarily for use by the organization’s own employees. Public clouds-is infrastructure or applications hosted by service providers and offered as services to enterprises that have decided to get outsource some applications for financial, architectural, management, or other business reasons. Hybrid clouds-the combination of private clouds and public clouds. Another typical type of deployment is Community cloud, its setup is for sole use by a particular community cloud of con-sumers from organizations that have common views. This setup may reside inside or outside the cloud service provider premises. This cloud setup could be controlled, maintained or maneuvered by a third party or combination of the organizations itself [7–9] The most important feature of information technology and network infrastructure is conti-nuous growing which created a prosperous market for Managed Services (MS).Public sector and private sector compa-nies operate in mixed-mode with internally deployed but externally hosted Information Technology (IT) applications and resources. As a result, Managed Service Providers (MSPs) are assuming operational IT responsibility for the enter-prise while the customer maintains management oversight. While this MS business model has many advantages, infor-mation security remains an inherent weakness. This has lead to the adoption of Private Clouds [10]. The private cloud model, which is defined as cloud computing on private networks or internal clouds, is having a best example of private cloud - Defense Information Systems Agency (DISA). It is a private cloud available at its in-house Defense Enter-prise Computing Centers (DECC) on which it currently hosts an MSP’s CRM software. The MSP centrally maintains and upgrades the software on the DECC platform. According to result of survey of information technology decision makers on the predict of private and public cloud computing through 2014, 44% are considering a private cloud. For a private cloud deployment virtualization is a natural and necessary step. The next steps include mechanisms to imple-ment show back and self-service provisioning. With careful plan and right choice of technology from the beginning of the transition, anyone can build private cloud by evolving whatever the organizations have rather than ripping out and replacing infrastructure as organization go. Building private cloud is discussed in the next section [11]. The Aerohive suggests choosing the deployment of cloud according to need [12] with preference to private cloud. Table 1 shows the deployment ratios of different clouds [13,14]. The figure 2 depicts details of deployment. From this figure it is found that private cloud is preferable.

2. Building Own Private Cloud

Cloud can also be implemented with simulators like GreenCloud, CloudSim, MDCSim, etc. Simulators are discussed in the next section. Own virtualized private cloud can be built with following requirements:

(3)

Figure 2. Detailed information of deployment.

• Hardware requirements

◦ Processor: One Processor core or Hyper thread for each virtualized CPU. ◦ RAM: Minimum 2 GB

◦ Hard Disk: Minimum 6 GB free disk space per guest. • Software requirements

◦ Hypervisor: Examples for hypervisor. Xen, KVM, Citrix Xen Server, VMWare. Xen and KVM are the opensource and remaining are the commercial.

◦ Middleware: Examples for middleware are Nimbus, OpenNebula, Cloud Stock, OpenStock. ◦ Host: Example any Linux, Unix or Windows.

2.1 Steps to build a private cloud

• Install any Llinux/Unix OS on all machines. • Middleware node and Hypervisor node(s).

◦ Hypervisor Node(s): for one or more machine. ◦ Middleware Node: One machine is sufficient. • On Hypervisor node install co

◦ Middleware Client Component

◦ Hypervisor and Virtualization components.

◦ Setup local DHCP server on hypervisor node to allocate IP address to VM running. ◦ Configure Bridge Network.

• Middleware Node: Install M/W server. The inbuilt components are: ◦ Scheduler

(4)

Figure 3. Hypervisor in virtualization and hypervisor’s components.

Figure 4. Private cloud and VM creation.

◦ Compute ◦ Database

◦ Storage Component that stores image of virtual machine

In this setup there will be three nodes like Cloud client, Cloud Server, Hypervisor Node which have to interact with each other dynamically [4–6,15]. Virtual Machine (VM) is the software which runs an operating system and applications. An Operating System on a VM is called a guest operating system. Hypervisor is thin software layer which is also referred as Virtual Machine Manager(VMM). It creates and controls VM and other subsystems. Hypervisor is the key component of virtualization.

Hypervisor’s main job is to control the sharing of system resources across multiple VMs. It is available at time of booting for this function. It allows multiple software to run concurrently on a host computer. It is capable to dynami-cally partitioning and sharing the physical resources such as CPU, storage, memory and I/O devices The other function of hypervisor is to provide isolated environments for each virtual machine. The architecture in which privileged parti-tions have visibility and control over the VMs will establish the controllable environment and can perform additional security tool [15]. Xen, KVM, Citrix Xen Server, VMWare are examples of hypervisor.

2.2 Virtual machine creation

The user request is sent to middleware which act as a manager. At middleware, scheduler component in VM node selects best physical node which acts like resource provider and provides.

CPUs, RAM, IP to the VM from available nodes and transfers the image.

Now VM is ready to use. User name and Password and IP are provided to the User through Portal and user can access VM through SSH Connection.

3. Cloud Computing Simulators

Information Technology (IT) is such a field in which everyday evolvement of new technology will be there. Cloud computing is another face of IT which is putting its effort to provide services of IT as one of the utility. In real time it is very difficult for implementing and testing new methodologies. So, simulation tools take the important

(5)

while developing the software for cloud as well as other applications. Cloud can be implemented with simulators like CloudSim, MDCSim, GreenCloud, Network CloudSim. Table 2 gives detailed information about these simulators. Following is the comparison table of various Clouds computing simulator on basis of their characteristics. Table 2 shows the comparison of cloud simulators with various parameters [16–19].

4. Conclusion

From the study it is concluded that cloud computing is a new delivery model and is proving challenges of record keeping professionals and being an abstract marketing with design concepts for all but the most innovative organizations.

With any type of deployment it serves for the request by client. Private cloud is considered as the secured cloud it can be implemented with GreenCloud simulators which is better than MDCSim and CloudSim. Any organization can adopt cloud computing but, in future, research is required into its nature, as progression is from the early stages of adoption, and into the interdependencies, particularly the challenges of ensuring that the data, wherever it resides, in the view of wider governance and assurance strategy. The datacentres should be of eco-friendly means consuming less power to store these data.

Acknowledgement

The encouragement given by all faculties of Alliance College of Engineering and Design of Alliance University, Dean and stakeholders is highly acknowledged.

References

[1] L. Kleinrock, A Vision for the Internet, ST Journal of Research, vol. 2(1), pp. 4–5, Nov. 2005. [2] T. Jessica, “Connecting Data Centres over Public Networks,” IPEXPO.ONLINE, April 20, 2011.

http://online.ipexpo.co.uk/2011/04/20/connecting-data-centres-over-public-networks/. [3] Huaglory Tianfield, “Cloud Computing Architecture”, 978-1-4577-0653-0 IEEE, 2010.

[4] B. B. Prahlad Rao, PayalSaluja, Neetu Sharma, Ankit Mittal and Shivay Veer Sharma, “Cloud Computing for IOT & Sensing Based Applications”, In IEEE International Conference on Sensing Technologies, ICST 2012, Kolkata, India, Dec 2012. [5] Payal Saluja, Prahlada Rao, Ankit Mittal and Rameez Ahmad, “CDAC Scientific Cloud : On Demand Provisioning of

Resources for Scientific Application”, In Proceedings of 18th International Conferences PDPTA 2012, Las vegas, Nevada, USA, pp. 16–19 July 2012.

[6] Payal Saluja, Prahlada Rao, Ankit Mittal and Rameez Ahmad, “CDAC Scientific Cloud: On Demand Provisioning of Resources for Scientific Application”, In Proceedings of 18th International Conferences PDPTA 2012, Las vegas, Nevada, USA, pp. 16–19, July 2012.

[7] Madhan Kumar Srinivasan, K. Sarukesi, Paul Rodrigues, M. Sai Manoj and P. Revathy, ‘State-of-the-art Cloud Computing Security Taxonomies A classification of security challenges in the present cloud computing environment, ICACCI ’12, August 03–05, 2012, Chennai, India, ACM 978-1-4503-1196- 0/12/08.

[8] Peter Mell, Timothy Grance. September 2011. The NIST Definition of Cloud Computing. NIST Special Publication 800–145.

National Institute of Science and Technology.

[9] Security Guidance for Critical Areas of Focus in Cloud Computing, Cloud Security Alliance, vol. 2.1, December 2009. [10] Enuma Orakwue, Private Clouds: Secure Managed Services, Information Security Journal, A Global Perspective, vol. 19:6,

(6)

[11] NetApp for the Private Cloud: Enable the Delivery of IT as a Service Theresa Villatore-Silva, NetApp June 2011| WP-7112. [12] Aerohive Networks, Inc. Sunnyvale, Calif. Public or Private Cloud: The Choice is Yours, white paper 2013.

[13] Gary Garrison, Sanghyun Kim and L. Robin, Wakefield ‘Success Factors for Deploying Cloud Computing’, Communications of the ACM September 2012|, vol. 55:9 |, pp. 63–68, 2012 ACM 0001-0782/12/09.

[14] Kirsten Ferguson-Boucher and Nicole Convery, Storing Information in the Cloud–A Research Project, Journal of the Society

of Archivists, vol. 32:2, pp. 221–239, 2011.

[15] Farzad Sabahi, “Virtualization Level Security in Cloud Computing”, 978-1-61284-486-2, IEEE, 2011.

[16] R. Calheiros, R. Ranjan, A. Beloglazov, C. De Rose and R. Buyya, “Cloudsim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms,” Software: Practice and Experience, vol. 4:1, pp. 23–50, 2011.

[17] D. Kliazovich, P. Bouvry and S. Khan, “Greencloud: a packet-level simulator of energy-aware cloud computing data centers,”

The Journal of Supercomputing, 2010. [Online].Available: http://dx.doi.org/10.1007/s11227-010-0504-1.

[18] H. Casanova, “Simgrid: A toolkit for the simulation of application scheduling,” In Proceedings of First IEEE/ACM

Inter-national Symposium on Cluster, Computing and the Grid, Brisbane, Qld., Australia, 2001.

[19] R. Buyya and M. Murshed, “Gridsim: A toolkit for the modeling and simulation of distributed resource management and scheduling for grid computing,” Concurrency and Computation: Practice and Experience, vol. 14:13–15, pp. 1175–1220, 2002.

References

Related documents

Pigovian-type economic analysis is employed to provide an illustration of the superior social economic benefits of using solar and wind power to generate electricity rather

Broad network access Resource pooling Measured service On-demand self-service 5 Characteristics Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a

Choral Director of Treble Ensemble, Chamber Singers, Male Choir, and Choral Accompanist, Downers Grove South High School.. Downers

Sanitary Control Modules for installation of horizontal shielding on DSU 3A in 2010 Concrete beam removal using. HIAB700E-9 crane-manipulator

Recognising that union with the southern states would strengthen Prussia in relation to both France and Austria, Bismarck was not averse to the idea and was prepared to use the

To obtain a better understanding about this tribe in Argentina, this paper contributes new distributional records and/or host plants associations and parasitoids, and

However, the ability for unions to reduce injury rates does not appear to increase monotonically as they progress along a workplace instrumentality continuum from recognition alone to

If museums and galleries in the North-West were to adopt the same approach with their collections, they could develop a region-wide store of works by artists of African and