Skip to main content

Cloud Computing


Cloud Computing

                                            Private Cloud Computing





1.1 Cloud
 

Ø  Cloud computing is a computing model, where resources such as computing power, storage, network and software are abstracted and provided as services on the internet in a remotely accessible fashion. Billing models for these services are generally similar to the ones adopted for public utilities.
Ø  On-demand availability, ease of provisioning, dynamic and virtually infinite scalability are some of the key attributes of cloud computing.
Ø  An infrastructure setup using the cloud computing model is generally referred to as the “cloud”.
Ø  The following are the broad categories of services available on the cloud:
  • Infrastructure As A Service (IAAS)
  • Platform As A Service (PAAS)
  • Software As A Service (SAAS)
Ø  This cloud is generally available as a service to anyone on the internet. However, a variant called “private cloud” is increasingly becoming popular for private infrastructure that has some of the attributes of the cloud as mentioned above.
Ø  Amazon Web Services (AWS) is one of the major players providing IAAS. They have two popular services – Elastic Compute Cloud (EC2) and Simple Storage Service (S3). These services are available through web services interfaces. The client tools can use EC2 and S3 APIs to communicate with these services. The popularity of these APIs have encouraged other cloud products to provide support for them as well.

1.2 Eucalyptus
 

Ø  Eucalyptus is software available under GPL that helps in creating and managing a private or even a publicly accessible cloud. It provides an EC2-compatible cloud computing platform and S3-compatible cloud storage platform. Eucalyptus has become very popular and is seen as one of the key open source cloud platforms. Since Eucalyptus makes its services available through EC2/S3 compatible APIs, the client tools written for AWS can be used with Eucalyptus as well.

1.3 Ubuntu Enterprise Cloud (UEC)
 

Ø Ubuntu Enterprise Cloud, UEC for short, is a stack of applications from Canonical included with Ubuntu Server Edition.UEC includes Eucalyptus along with a number of other open source software.UEC makes it very easy to install and configure the cloud. Canonical also provides commercial technical support for UEC. 

1.4  Architecture



1.4  Components of a Eucalyptus (UEC) based Cloud 

1.4.1 Node Controller (NC) 


Ø  UEC node is a VT enabled server capable of running KVM as the hypervisor. UEC automatically installs KVM when the user chooses to install the UEC node. The VMs running on the hypervisor and controlled by UEC are called “instances”. Eucalyptus supports other hypervisors like Xen apart from KVM, but Canonical has chosen KVM as the preferred hypervisor for UEC.
Ø  Node Controller runs on each node and controls the life cycle of instances running on the node. The NC  interacts  with  the  OS  and  the  hypervisor  running  on  the  node  on  one  side  and  the  Cluster Controller (CC) on the other side. 
Ø  NC queries the Operating  System running  on the node to discover the node’s physical  resources – the number of cores, the size of memory, the available disk space and also to learn about the state of VM instances running on the node and propagates this data up to the CC.
Ø  Functions: 
·         Collection of data related to the resource availability and utilization on the node and reporting the data to CC 
·         Instance life cycle management 


1.5.2 Cluster Controller (CC) 
 

Ø  CC manages one or more Node Controllers and deploys/manages instances on them.CC also manages the networking for the instances running on the Nodes under certain types of networking modes of Eucalyptus. 
Ø  CC communicates with Cloud Controller (CLC) on one side and NCs on the other side. 
Ø  Functions:
·         To receive requests from CLC to deploy instances 
·         To decide which NCs to use for deploying the instances on 
·         To control the virtual network available to the instances 
·         To collect information about the NCs registered with it and report it to the CLC



1.5.3 Walrus Storage Controller (WS3)
 

Ø  WS3 provides a persistent simple storage service.
Ø  Functions:
·         Storing the machine images 
·         Storing snapshots 
·         Storing and serving files using S3 API 
Ø  WS3 should be considered as a simple file storage system. 


1.5.4 Cloud Controller (CLC)
 

Ø  The Cloud Controller (CLC) is the front end to the entire cloud infrastructure.CLC provides an EC2/S3 compliant web services interface to the client tools on one side and interacts with the rest of the components of the Eucalyptus infrastructure on the other side. CLC also provides a web interface to users for managing certain aspects of the UEC infrastructure.
Ø  Functions: 
·         Monitor the availability of resources on various components of the cloud infrastructure, including hypervisor  nodes  that  are  used  to  actually  provision  the  instances  and  the  cluster  controllers  that  manage the hypervisor nodes 
·         Resource arbitration – Deciding which clusters will be used for provisioning the       instances 
·         Monitoring the running instances
Ø  In short, CLC has a comprehensive knowledge of the availability and usage of resources in the cloud and the state of the cloud.

Comments

Popular posts from this blog

Hacking Aspx / Php websites (ACTIVE SQL INJECTION)

Hacking Aspx / Php websites (ACTIVE SQL INJECTION) hey guys in this tutorial i will show you how to make a injection on a aspx based website.  1) seach aaspx website.  for this step you can use one of this dorks  ".aspx?bookID= "     OR         ".php?id= " 2) If you found one lets check if the website is vulnverable. Add this text after the url  "order by 1--"  example : http://www.target.com/index.aspx?Id=1 order by 1--  Now you will get a Error : "Page not found" or something like that.  3) Lets go on and begin with the Injection the first step of every injection is to find out the columns.  for this step we use :  "having 1=1"  you only have to copy it behind the url  example : http://www.target.com/index.aspx?Id=1 having 1=1  4) Well lets go on and search the tables. Use this code for it  and 1=convert  example : http://www.target.com/index.aspx?Id=1 and 1=convert  The output is the first table of the databse. But this table

Hacking Cyberoam(Bypassing)

Hacking Cyberoam(Bypassing) Module A : Find open ports and your organization IP Step 1 : Download Free Port Scanner Software The first software required to crack software is a free port scanner software. download from  http://hotfile.com/dl/13028395/0467e17/FreePortScanner.rar.html It is also available on  http://www.nsauditor.com/network_tools/free  port scanner software Step 2 : Install free port scanner. Step 3 : Detecting the static IP assigned to your organization. you need to find out the static IP assigned to your organization which is allocated by the ISP Goto  www.WhatIsMyIP.com Here the site will display your IP address. Please note down your IP address which we will be using again in the further steps. Step 4 : Scanning open ports for your external IP address. Entering IP address whose port has to be scanned.                        Note the active port :                       Module B: Configuring proxy server Step 1 : Download Proxifier – proxy software To hack cyberoa

How to configure tor network in all browser

1. Download Vidalia Bridge Bundle https://www.torproject.org/download/download.html.en 2. click on start tor on Vidalia control panel 3.Wait till it connect to proxy servers 4.Go to Internet Explorer  5.Go to tools -> internet options 6.Click on Lan settings. 7.Click check on use proxy then click on advanced button 8.Proxy setting only socks ip of 127.0.0.1 and port 9050 9.Click ok and done