Upload
asif-anik
View
1.145
Download
1
Tags:
Embed Size (px)
DESCRIPTION
Cloud computing presentation
Citation preview
Midterm presentation
Intern Office
Institute of Information Technology
University of Dhaka
Asif ImranBIT0119
Bachelor of ITMajor in Software Engineering
3rd year 2nd Semester
Tauhid Bin Iqbal PranBIT0125
Bachelor of ITMajor in Software Engineering
3rd year 2nd Semester
1
.
About Hayestech
Company Culture
Communication process
Evaluation
Tasks Participated
Cloud: Services and Architectures
Component, Functionalities
Requirements: Functional and Non-functional
Use Case: Level 1 and Level 2
Monitoring and Analysis
References
Table of Contents
Midterm presentation
2
Midterm presentation 3
Mainly active in:
•Telecommunication•Software Services•Research and Development•Office Automation•Networking•Value Added Services (VAS)• Softswitch•Call Center solution•IP networking•POS machines
Operates in:
• Australia•Bangladesh•Hong Kong•Malaysia•Singapore•Thailand
Established in 1999Local and international markets
Midterm presentation
4
Company Culture:
CTO
Project Manager A
Project Manager B
Team Member A
Team Member B
Team Member C
Team Member D
Policies for Development:
Documentation (wiki).
Htprojects Regular
meetings Workshops and
trainings
Rules regarding actions:
• Leave Form• Strict attendance
system• Report to
administration : loss or malfunction
General Policies:
Laptop provision
Lunch, refreshment
Movement expense
Monthly salary
5
Communicate about project
Collect requirements
Obtain learning materials
Devise an approach
Verify
Consult and Collect Implementation
Implement the system
Continuous checking for smooth working.
1.Obtain results2.Document results3. SWOT analysis4.Provide feedback
Communication Process
6
Attitude:• Enthusiastic• New challenges• New technologies
Ability to learn:Short time implementationSolved the problems
Dependability:o Implementationo Maintenanceo Workshops
InitiativeCloud computingTrainingPara-virtualization
Quality: Virtualization Use of efficient methods Requirement elicitation Document acceptance
Relationship with others:-> Good relationship-> Respect opinions-> Maintain hierarchy
Evaluation
Cloud computing
Ensure computing tasks are carried out using resources from a remote location.
Disk Cloning
Shadow copy of a hard drive to ensure redundancy.
Sessions
Training the other employees and software engineers about cloud
Enterprise level Documentation
- Requirement specification- Implmentation details - Commercial prospects.- Monitoring system
Participation
7
Tasks Participated
8
Public Cloud: Infrastructure and control with service provider. SaaS
Private Cloud:Infrastructure held by owner, but control is with the customer. IaaS is the main service.
Hybrid Cloud:Mixture of public and private cloud that yields the most benefit.
IaaS: It is the delivery of computer infrastructure as a service.
PaaS: It delivers a computing platform or solution stack as a service
SaaS: On-demand software, hosted on the cloud.
Services and Architectures
Cloud: Services and Architectures
Midterm presentation 9
Master
Cluster Controller [CC]:1.Receive requests from CLC2.Deployment of NCs3.Control virtual network4.Collect NC information
Cloud Controller [CLC]:1.Monitor resource availability2.Monior running instances3.Resource arbitration
Walrus:1.Store MI2. Store snapshots
Storage Controller:1.Create volumes snapshots2.Persistent storage for instances
Cloud: Components
Midterm presentation 10
Cloud: Prospects and Opportunities [4,6,7]
Traditional In-house system implementation
Cloud services in the form of SaaS, Paas and IaaS
1. High CapEx 1. OpEx oriented
2. Time required to implement the system
2. Comparatively low startup cost
3. Maintenance Cost 3. Pay for what you use
4. Equipment depreciation 4. Low maintenance cost
5. Dedicated staff for 24 * 7 support
5. Scalable and secure environment
6. Under-utilized resources 6. Business companies can focus on business development, not on IT.
Midterm presentation 11
Rendezvous with new challenges
Virtualization in Cloud
-Using KVM [Kernel Virtual Machine] run multiple virtually independent operating systems.- Using XEN hypervisor, run virtual machines n the physical ones that do not support virtualization (in progress).
Security in cloud:
-Identify areas of security breach.-Analyze the security faults of cloud providers like Amazon EC2.-Learn about Trusted Computing.
Openbravo ERP
-Setting up the Openbravo ERP in ubuntu server.-Integrating ERP with Postgresql-Linked the ERP with tomcat and built it from source.
12
Cloud: Progress
Week 4 was eid holiday.
Week 1 - 2
Week 3
Week 4 System integration with maintenance software. Generate reportsSWOT analysis
Series of meetings with project manager.
Obtaining basic knowledge about handling servers
Learning about Cloud computing architecture
Implementing cloud and PROBLEM: 1
Solving PROBLEM: 1 and working on PROBLEM: 2. Solved PROBLEM: 2
Faced with PROBLEM:3 and working out solution
Devised solution for PROBLEM: 3.
Month 1 Month 2 Month 3
Problem: 1 Node associationProblem: 2 Virtual MachinesProblem: 3 Pending instance
Midterm presentation 13
Functional Requirements:
Functional Requirements
Description
1. Compatibility
Must comply with the third-party cloud management.
2. Monitoring System resources, instances monitored for dead/alive.
3. Provision Flexibility
Based on QoS resources should be allocated.
4. Multiple instances
Supplementary information displayed with the instance, emi-id, eri-id, eki-id.
5. Scalability During greater demand for resources, new nodes can be registered with major changes.
6. Dynamic ip address
Instances should be assigned ip addresses dynamically from the range of public addresses.
Midterm presentation 14
Non-functional requirements
Non-functional requirements
Description
1. High availability System uptime is 180 [120 seconds is standard [3], so we get 88% uptime] seconds, instance launching time is 1.00 second.
2. Security SLA agreement must be followed.
3. Cost efficiency Maximum 30% costs should be saved.
4. Intelligent Management
Reporting about the instance behavior and pattern of use.
Midterm presentation 15
Midterm presentation 16
Level 1 Use-Case diagrams [8]
SaaS
Midterm presentation 17
Level 2 use case diagram [8]
Midterm presentation 18
Cloud computing: Principle Tasks
4. Virtualization
1. Eucalyptus cloud
2. Register the nodes to the
master
3. Create an image
Computing on the cloud
Midterm presentation 19
Cloud: System Diagram [2]
Web Service
Master
2 NodesVirtual
Machines
Hub
Midterm presentation 20
Monitoring [5]: CPU Utilization
Midterm presentation 21
Monitoring: Bandwidth
Midterm presentation 22
Monitoring: Memory
Midterm presentation 23
Cloud: Financial Analysis [7]
Machine Price Memory Instances Utilization Remaining Power
Master 20, 000 2 GB NA NA NA 250 W
Node 30, 000 8 GB 100MB -> 60200MB -> 301GB -> 07
DNS ->100 GBMAIL-> 1GBFTP -> 200MBSMTP -> 1GBDatabase -> 1GB
4.2 GB can be used for other instances
250 W
Total 50,000BDT 10 GB 97 instances 3.3 GB 4.2 GB 500 W
Midterm presentation 24
Midterm presentation 25
Cloud: SWOT analysis
Strengths:1. Scalable 2. Virtualization3. Monitoring
Weaknesses:4. Experiments required in terms of para-virtualization. 5. Custom images is an issue.
Opportunities:1. Reliable2. Marketing prospects
Threats:6. Regular maintenance of the private cloud is needed. 7. Training of individuals is required before the system can be fully delivered to
them for maintenance.
Midterm presentation 26
Cloud: Workshops
1. Workshops on cloud
2. Main focus: train
3. Reflect the business potential
4. Architecture: simple terminology
6. Areas of implementation
7. Different services: PaaS, SaaS, IaaS
Midterm presentation 27
Cloud: Future Challenges
4. Para-virtualization 2. Cloud
Security
3. Network administration
of the cloud
Future Works
1. Telecom
Midterm presentation 28
References:
1. open.eucalyptus.com/troubleshooting/topten.html
2. microsoft.com/msvision2007/index
3. Use Cases and Functional Requirements for Inter-Cloud Computing, Global Inter-Cloud Technology Forum
4. Mapping Non-Functional Requirements to Cloud Applications, David Villegas and S. Masoud Sadjadi School of Computing and Information Sciences Florida International University Miami, Florida
5. wiki.kaavo.com
6. Cloud computing: benefits, risks and recommendations for information security
7. Having Confidence in Cloud Computing Addressing Enterprise Security Concerns
8. Visual Paradigm, seppo.net
29
Thank youQuestions