Virtualization: The Good, The Bad, and The Ugly S. Keshav University of Waterloo January 14th, 2010 Mysore Cloud Workshop.

Slides:



Advertisements
Similar presentations
1. 2 Configuring the Cloud Inside and out Paul Anderson publications/mysore-2010-talk.pdf School of.
Advertisements

Security Issues of Peer-to-Peer Systems February 14, 2001 OReilly Peer-to-Peer Conference Nelson Minar, CTO POPULAR POWER.
Virtual Switching Without a Hypervisor for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton)
Traffic Engineering with Forward Fault Correction (FFC)

Cloud Computing Brandon Hixon Jonathan Moore. Cloud Computing Brandon Hixon What is Cloud Computing? How does it work? Jonathan Moore What are the key.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
VoIP: Full Lifecycle Management Russell M. Elsner APM Technology Director OPNET Technologies, Inc.
Obstacles Security Culture Cloud Cloud Computing will be the primary delivery model, the big question is how fast is going to get there. The cost is the.
Tunis, Tunisia, 28 April 2014 Business Values of Virtualization Mounir Ferjani, Senior Product Manager, Huawei Technologies 2.
Cloud Computing Overview of cloud services and how Palm Coast will join the fun.
FI-WARE – Future Internet Core Platform FI-WARE Cloud Hosting July 2011 High-level description.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 4.
Virtual Machines. Virtualization Virtualization deals with “extending or replacing an existing interface so as to mimic the behavior of another system”
Be Smart, Use PwrSmart What Is The Cloud?. Where Did The Cloud Come From? We get the term “Cloud” from the early days of the internet where we drew a.
5205 – IT Service Delivery and Support
11 SERVER CLUSTERING Chapter 6. Chapter 6: SERVER CLUSTERING2 OVERVIEW  List the types of server clusters.  Determine which type of cluster to use for.
Mohammed Alqahtani. What is the disaster?  A disaster is An event suddenly and unpredictably happened and caused huge damage, loss or destruction in.
Cloud computing Tahani aljehani.
Open Cloud Sunil Kumar Balaganchi Thammaiah Internet and Web Systems 2, Spring 2012 Department of Computer Science University of Massachusetts Lowell.
Effectively and Securely Using the Cloud Computing Paradigm.
Cloud Computing. 2 A division of Konica Minolta Business Solutions USA Inc. What is Cloud Computing? A model for enabling convenient, on-demand network.
CLOUD COMPUTING & COST MANAGEMENT S. Gurubalasubramaniyan, MSc IT, MTech Presented by.
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Cloud Computing.
Cloud Computing April 19, Agenda Introduction What is cloud computing? What are the benefits? What are the concerns? What’s next?
Cloud Computing The self-service provisioning of IT services over the Internet, across a range of IT domains including infrastructure, business applications,
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2009 Seminar #1 VIRTUALIZATION EVERYWHERE.
Cloud Computing The coming storm. Bio  Robert Fox - Data Architect, Arkansas Blue Cross Blue Shield  18 years of data architecture and warehousing experience.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
SUNY FARMINGDALE Computer Programming & Information Systems BCS451 – Cloud Computing Prof. Tolga Tohumcu.
Virtual Machine and its Role in Distributed Systems.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
1 Testbeds Breakout Tom Anderson Jeff Chase Doug Comer Brett Fleisch Frans Kaashoek Jay Lepreau Hank Levy Larry Peterson Mothy Roscoe Mehul Shah Ion Stoica.
Technology Trends and the Productivity Gains for Life Sciences Companies Randy Paroda, Director of Product Development September 17, 2013.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
1 Wide Area Network Emulation on the Millennium Bhaskaran Raman Yan Chen Weidong Cui Randy Katz {bhaskar, yanchen, wdc, Millennium.
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
Bay Ridge Security Consulting (BRSC) Cloud Computing.
Understanding Performance Testing Basics by Adnan Khan.
BladeLogic Demo. 03/10/09 BladeLogic Demo BladeLogic Who? Automation taking my job? What? No, it’s making it easier. Started by entrepreneurs who understood.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
© 2009 Pittsburgh Supercomputing Center Server Virtualization and Security Kevin Sullivan Copyright Kevin Sullivan, Pittsburgh Supercomputing.
UNDER THE GUIDENCE OF: Mr.M.JAYANTHI RAO,M.Tech HOD OF IT. BY: I.ADITHYA(09511A1212) HONEYPOTS.
E Virtual Machines Lecture 1 What is Virtualization? Scott Devine VMware, Inc.
VIRTUALIZATION TECHNIQUES By:- Aman, Denis and Dharit.
Introducing Dell SonicWALL Capture Advanced Threat Protection Service
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
CDP Technology Comparison CONFIDENTIAL DO NOT REDISTRIBUTE.
Deployment of a Virtualized Server Grid
MOBILE NETWORKS DISASTER RECOVERY USING SDN-NFV
Protecting your mobile devices away from virus by a cloud-based approach Wei Wu.
POPULAR POWER Security Issues of Peer-to-Peer Systems
Cloud Computing Kelley Raines.
3.2 Virtualisation.
Network Services, Cloud Computing, and Virtualization
CLOUD COMPUTING Presented By:- EduTechlearners
What Do We Do? Managed IT services
Park A Call Meeting Notes (2/21/17 09:23) ok
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
Brandon Hixon Jonathan Moore
In House or Cloud Based ERP Implementation
Virtualization Dr. S. R. Ahmed.
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
Presentation transcript:

Virtualization: The Good, The Bad, and The Ugly S. Keshav University of Waterloo January 14th, 2010 Mysore Cloud Workshop

Overview Virtualization An example The good, the bad, and the ugly

Virtualization Creates virtual servers that mimic real servers and hide underlying hardware

Ideal virtualization Lets unmodified services run on virtual servers

Ideal virtualization Allows arbitrary mapping from virtual to physical servers

Ideal virtualization Allows virtual server configuration and location to be arbitrarily modified

Why virtualization for clouds? Scaling is otherwise impossible

WiFi access network Proxy 3G access network AP Internet Data center P Ideally, want one per device Mobile device

My prediction Every cloud infrastructure will be virtualized But…

Experience shows that Overall, virtualization is good But has some bad points And some downright ugliness

The Good Reduces need for servers, power and space Creates hardware-independent homogeneous infrastructure Capacity can be changed on demand State capture and rollback for rapid deployment and disaster recovery Sandboxing prevents application interaction and increases security

The Bad Slow New source of bugs New attack surface Adds complexity

The Ugly Correlated failures Unpredictable loss of emulation Introduces hardware dependencies Rapid spread of attacks More configuration parameters Encourages sloppiness

Conclusion Virtualization is inescapable But needs care