Creating informational website for deployment hybrid infrastructure
MINISTRY OF EDUCATION AND
SCIENCE OF THE REPUBLIC OF KAZAKHSTAN
INTERNATIONAL INFORMATION
TECHNOLOGY UNIVERSITY JSC
FACULTY OF INFORMATION
TECHNOLOGY
Melisuly
D.
informational website for
deployment hybrid infrastructurePROJECT
Major 5B070400 - Computer science and software engineering
2015
MINISTRY OF EDUCATION AND
SCIENCE OF THE REPUBLIC OF KAZAKHSTAN
INTERNATIONAL INFORMATION
TECHNOLOGY UNIVERSITY JSC
FACULTY OF INFORMATION
TECHNOLOGY
Department of Computer
Science, Software Engineering and Telecommunication
APPROVED
FOR DEFENCEof the Department,.Sc.Eng., Professor
_________R.Muhamediyev
«_____» ___________2015
PROJECT
Topic: Creating
informational website for deployment hybrid infrastructure
STUDENT: CSSE111, Melisuly D.:.t.sc.
assoc. prof.,G.I.:
c.t.sc.
assoc. prof.,V.Z
2015
MINISTRY
OF EDUCATION AND SCIENCE OF THE REPUBLIC OF KAZAKHSTAN
INTERNATIONAL
INFORMATION TECHNOLOGY UNIVERSITY JSC
FACULTY
OF INFORMATION TECHNOLOGYof Computer Science, Software Engineering and
Telecommunication
Major
5B070400 - Computer Science
and Software Engineering
of the Department,.Sc.Eng., Professor
___________R.Muhamediyev «_____» ___________201_PROJECT
ASSIGNMENT
________________________Melisuly_Dauren_______________________
(student name)
. Diploma project topic
___________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________by IITU order № dated «____» _______________ 201
2. Assignment submission deadline _____________________________
3. Initial data ______________________________________________
_________________________________________________________________________________________________________________________________________________________________________________________________
. List of issues to be developed _______________________________
____________________________________________________________________________________________________________________________
5. Laser disc containing the diploma paper text with attachments _____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
6. Project consultants, by sections
Section
|
Consultant
|
Signature, date
|
|
|
Assigned by
|
Received by
|
Economic part
|
Berdykulova G.M
|
|
|
Occupational safety and health
|
Nurmuhanbetova G.A
|
|
|
English translation
|
Zhaparova A.A
|
|
|
Standardized control
|
Abdullina V.Z
|
|
|
|
|
|
|
Date of issuing the assignment ___________________________________
Supervisor____________________________________________________
(signature)by__________________________________________________
(signature)
7. DIPLOMA PROJECT WORK SCHEDULE
№
|
Diploma work stage
|
Date of submission
|
Comment
|
1 2 3 4 5 6 7
|
Review of literature and works on
the subject of cloud computing Review and analysis of work on cloud computing
Review of the theoretical part Developing applications for cloud computing
The economical part of the project Writing sections of labor protection
Explanatory work of diploma project
|
12.01.2015 - 20.01.2015 12.01.2015 - 06.02.2015 06.02.2015 - 20.02.2015 20.02.2015 - 15.03.2015
20.03.2015 - 15.04.2015 20.03.2015 - 15.04.2015 15.03.2015 - 10.05.2015
|
|
date _______________________________________________
Supervisor____________________________________________________
(signature)by_____________________________________________
(signature)
Statement
of compliance with the Professional Code of Ethics,
_____________________________, student majoring in 5В070400 - Computer Science and
Software Engineering, IITU JSC, am stating that my diploma paper on the topic:
«___________________________________________
_____________________________________________________________________________»,
submitted to the State Attestation Committee for public defence, complies with
the Professional Code of Ethics and does not contain plagiarism, falsified data
or incorrect citations.am fully aware of the fact that in accordance with the
IITU Regulation on preparation and defence of graduation papers (diploma
projects) detection of plagiarism, data falsification and incorrect citations
in my diploma paper shall constitute ground for lowering my grade or a
“Failure”.
MINISTRY OF EDUCATION AND
SCIENCE OF THE REPUBLIC OF KAZAKHSTAN
INTERNATIONAL INFORMATION
TECHNOLOGY UNIVERSITY JSC
FACULTY OF INFORMATION
TECHNOLOGIESof Computer Science, Software Engineering and Telecommunication
’S REVIEW
of the diploma project by
________________________________________in 5В070400 - Computer Science and Software
Engineering
Diploma Project Supervisor _____________________________________Project
topic: __________________________________________
__________________________________________________________
№
|
Qualification requirement
|
Degree of compliance
|
Recommended grade
|
Grade
|
1
|
Relevance and significance
|
High
|
min:0 - max:15
|
|
|
|
Medium
|
|
|
|
|
Low
|
|
|
|
|
Not topical
|
|
|
2
|
Novelty
|
Yes
|
min: 0- max:15
|
|
|
|
No
|
|
|
3
|
Practical value
|
Yes
|
min: 0- max:10
|
|
|
|
No
|
|
|
4
|
Correspondence to the specialist’s
training profile
|
Corresponds
|
min: 0- max:10
|
|
|
|
Not corresponds
|
|
|
5
|
Independence of the work done
|
Yes
|
min:0- max:10
|
|
|
|
No
|
|
|
6
|
Provision of conclusions and
recommendations
|
Yes
|
min:0- max:10
|
|
|
|
No
|
|
|
7
|
Problem-solving quality
|
High
|
min: 0- max:15
|
|
|
|
Medium
|
|
|
|
|
Low
|
|
|
8
|
Degree of research completion
|
High
|
min:0- max:15
|
|
|
|
Medium
|
|
|
|
|
Low
|
|
|
|
TOTAL
|
|
|
|
Comments on the diploma project:
_____________________________________________________________
Аннотация
В дипломном проекте разработано веб-приложение по созданию
гибридной инфраструктуры. Для этого проведен сравнительный анализ существующих
на рынке веб-приложении. Изучены понятия облачных вычислений, классификации,
модели развертывания, структура гибридного облака. Также были проанализированы
методы работы платформы Windows Azure, Microsoft Hyper-V 2008/2012 , VMWare.
Основываясь на собранных сведениях было разработано веб-приложение которое
помогает при использовании технологии виртуализации при создании гибридного
облако.
Ключевые слова: облачные вычисления, гибридное облако,
частное облако, публичное облако, модели и методы развертывания.
Дипломная работа содержит 70 страниц, 31 иллюстраций, 8
таблицы, 15 использованных источников.
Аңдатпа
Дипломдық жобада буданды инфрақұрылымды әзірлеуге
арналған web-қосымшасы әзірленген. Осы үшін әлемдегі
бар бұлтты есептеулермен айналысатын web-қосымшалары салыстырмалы
анализі өткізілген. Бұлтты есептеулердің ұғымы,
сыныптамалары, өрістетудің түрлері мен әдістері, бұданды
бұлттың құрылымы танып білінген. Сондай-ақ
Windows Azure Microsoft Hyper-V 2008/2012 , VMWare платформаларының жұмыс
істеу әдісі қаралған. Жинақталған ақпараттар
негізінде буданды инфрақұрылымды әзірлеуге үшін арналған
web-қосымшасы әзірленген.
Рисктердің түр әсерін жою мақсатында
бұл қосымша кез келген деңгейдегі компаниялардың
пайдалануына жарамды.
Маңызды сөздер: бұлтты есептеулер, бұданды
бұлт, дербес бұлт, көпшілік бұлт, өрістетудің
түрлері мен әдістері.
Диплом жұмысы 70 бет, 31 түрлі- түсті, 8
кесте, 15 зерттеу көздерінен тұрады.
Abstract
the diploma project the web-application for create a hybrid
infrastructure
is developed. To achieve this, a comparative analysis of the existing
web-application on the market is done. Concepts of cloud computing, classification, deployment model, the structure of
the hybrid cloud is examined. Also the working methods of
the platform Windows Azure, Microsoft Hyper-V 2008/2012, VMWare are analyzed. Based on the collected
information a web application that helps when you use virtualization technology
to create a hybrid cloud was developed: cloud
computing, hybrid cloud, private cloud, public cloud models and methods of
deployment.project
contains 70 pages, 31 illustrations, 8 tables, 15 references.
Introduction
. Technology of cloud computing
.1 Review of development of cloud computing.
.2 Service models of cloud computing.
.3 Deployment models of cloud computing.
.4 Safety of information.
. Technology of virtualization
.1 Virtualization of resources.
.2 Virtualization of platforms.
.3 Hypervisor.
. Algorithm of “Cloudy”
.1 Functional of website.
.2 Software tools.
. Safety and labor protection
. Justification of the cost-effectiveness of the
project
Introduction
Despite the fact that the term ,which
familiar to us, "cloud" services appeared in the 70s of the last
century, the last 10 years, the term has become very popular. Just at that
time, software developers have proposed a model of the application, in which
all calculations and data processing are carried out not on the user's computer
and on remote servers.who seriously interested in this technology was Amazon
company. Amazon introduced his “invention” to its customers which called like
extensive system of web services. The principal difference of the new
infrastructure was that users receive in order not only for hosting storage but
also to computing power of servers owned by Amazon. Just a year later similar
services offered other companies IT-industry: Google, Sun and IBM. A year
later, Microsoft announced not just an app - an entire operating system built
on the basis of "cloud" computing model.goal of diploma project is to
construct of an informational web site where placed the theoretical material
and arranged laboratory works which will helps to users in deployment of a
hybrid cloud which based on Windows Azure and Microsoft Server 2012 R2. And
also to improve the knowledge on a practical basis for technology, services,
and services provided by "cloud computing". To accomplish goal it is
necessary to:
The goal of diploma project is to improve information
security in cloud infrastructures. To accomplish goal it is necessary to:
) Get acquainted with the term of “cloud computing” and
make review to existing cloud solutions;
2) Classification of Cloud Computing by expansion models and web-services;
3) Define the hypervisor-based virtualization technology theory;
) Consider
the use of cloud technologies provided by Windows Azure and Windows Server
2008/2012;
) Development of the algorithm of laboratory works;
) Implementation of the program set.
1. Technology of cloud computing
computing - is a model of ensuring universal network access
on demand to a shared pool of the configured computing resources which can be
provided and introduced quickly with a minimum of administrative efforts or
interactions about service provider. Now usually understand possibility of
obtaining necessary computing capacities as cloud computing on demand from a
network, and to the user details of realization of this mechanism aren't
important and he receives from this "clouds" all necessary.cloudy
calculation is directly connected with development of computer facilities,
systems and networks of data storage, consolidation of infrastructures. Because
the centralized data processing on the basis of mainframes solves many problems
of information systems of scale of the enterprise more simply and cheaper than
the distributed processing used in personal computers, in 1994 growth of
interest in cloudy technologies began again.
1.1 Review of development of
cloud computing
main trends in the development of infrastructure solutions
which contributed to the emergence of cloud computing:
· Increased productivity of computers.
The advent of multi-processor and multi-core computing systems.Development of
blade-systems.
· The appearance of storage systems and
storage networks.
· Consolidation of infrastructure.of service of a large number of users
(the distributed databases, Internet services, hosting) and difficult
resource-intensive (scientific tasks, mathematical modeling) calculation always
demanded high concentration of computing means which needed development.
Producers of processors reached reasonable restriction of accumulation of power
of the processor, and it led to emergence of the multiprocessor and
multinuclear computing systems. According to Figure 1.1, the emergence of a
universal computer system IBM System / 360 in 1864, went down in history as the
first mainframe. Mainframe - a host computer center with large internal and
external memory.increase performance computing center was effective to increase
the number of individual computing modules, it created new types of servers - known
as Blade-servers.scheme of stages of development cloud computing is given in
figure 1.1.
Figure 1.1 - Scheme of stages of development cloudy
calculation
cloud computing algorithm virtualization
Blade-server - is a modular single-board
computer-system, containing CPU and RAM which are inserted into the special
chassis. These chassis with several blades is Blade-system. At present, leaders
in production of blade-servers are companies like: Hewlett-Packard <#"791879.files/image002.gif">
Рисунок 1.2 - Types of consolidation
to Figure 1.2 consolidation is divided into the
following types:
· Server Consolidation - Move
decentralized applications distributed on different servers of the company, in
one centralized cluster of homogeneous servers;
· • Consolidation of storage systems -
sharing a centralized storage system several heterogeneous nodes;
· Application consolidation -
accommodation of multiple applications on the same host.accordance with Figure
1.3 ,a cloud is based on consolidated at least one server and at least one data
storage system combined with the help of topologies of SAN.
Figure 1.3 - Server and system of data storage.
1.2 Service models of cloud
computing
Cloud computing - hardware and software available to users
through the Internet or a local area network in the form of different types of
service (web service), allowing the use of user-friendly interface for remote
access to selected resources. In accordance with Figure 1.4 shows the services
provided by cloud computing.
Рисунок
1.4 - Типы облачных вычислении
to Figure 1.4, cloud computing provides the following web
services:
· IaaS - Infrastructure as a service;
· Paas - Platform as a service;
· SaaS - Software as a service;
· HaaS - Hardware as a Service;
· WaaS - Workplace as a Service;
· DaaS - Data as a Service;
· SECaaS - Security as a Service;
1.2.1 Infrastructure
as a service(IaaS)
IaaS (Infrastructure as a Service) -
is a service of rent virtual servers are cost-effective way to provide modern
and efficient enterprise computing resources.in the data center cloud solutions
“IaaS” provide customers with the development and maintenance, rapid expansion
or reduction of the required IT-systems according to the needs of the
enterprise without investing in the development and maintenance of the server
system.
IaaS vendors provide components of the following levels:
· Virtualization platforms for
launching virtual machines
· Hardware (usually Grid with massive
horizontal scalability);
· A computer network (including
routers, firewalls, load balancing, etc.);of buying space in data centers,
servers, software, network equipment, etc. Clients of IaaS rent the resources
that are on the side serving providers IaaS. Payment for services is usually
done on a monthly basis. User pays only for consumed resources. The main
advantages of this type includes:
· Free access to a
pre-configured environment;
· Using the infrastructure
of the last generation;
· Protected and isolated
computing platforms;
· Reduced risk through the
use of third-party resources maintained by third parties;
· The ability to manage peak
loads;
· Less time, cost and
complexity is added or enhanced functionality.technologies of virtualization of
infrastructure (in our case IaaS) allow you to implement all the functionality
on a single platform that allows the necessary IT infrastructure outsourcing business
units. This may be a virtual server for hosting several dozen sites, and can be
a full-fledged corporate infrastructure of dozens of servers including virtual
employees' desktops, mail server, IP-telephony, CRM system and document
management server databases, and etc.who use IaaS was Amazon company.
Among the companies providing IaaS can be noted GoGrid which
has a very user friendly interface to manage the VPS, and cloud storage with
support for protocols SCP, FTP, SAMBA / CIFS, RSYNC.
“Enomaly” is a solution for deploying and managing virtual
applications in the cloud. Among the supported virtual architectures: Linux,
Windows, Solaris and BSD Guests. Virtualization is used not only Xen, and KVM,
and VMware.
Cloud computing environment can be created on the basis of
cloud solutions Amazon EC2, IBM x86, Microsoft Azure, EMC, VMware, based on
open-SOURCE solutions OpenStack, RackSpace based on OpenStack et al., Which
allow to transform the data center into a dynamic IT environment. Moreover,
cloud computing cloud database used, i.e. databases that run on cloud computing
platforms. As a cloud-based database used as an SQL-oriented model and data
model NoSQL.
1.2.2 Software as a service
(SaaS)
SaaS (software as a service also software on demand) - business model of using and
selling of software where supplier develop web-application and manage by
herself, providing customers with access to the software via the Internet. The
main advantage of the SaaS model for the consumer is the absence of costs associated
with installing, upgrading and support of the equipment and working on it
software. In other words SaaS applications are installed and run on the server
SaaS-provider, and users can access them through a web browser and entering the
data, the user is ready results through the Internet and use them.delivered the
following types of cloud applications and services: Business Apps, Office Web
Apps, Management Apps, Communications, Security and etc. The most popular cloud
applications are: CRM (Customer Relationship Management), HRM (Human resources management),
ERP (Enterprise Resource Planning, for example: 1С), office application, communication tools and etc.
Salesforce.com is the world's largest provider of cloud-based CRM. Along with
services whih is describes above, SaaS services include data backup “Online
Backup”. At a certain time service automatically encrypts data on a computer or
other device and send them to a remote server. Thanks to this, the data can be
accessed from anywhere on Earth. This service now provides a variety of
companies, including such as Nero and Symantec.
Main software application:
§ Office Web Apps (Google
Docs, Office Online/Microsoft OneDrive, etc.),
§ Business Apps (CMR, FRM,
IBM® B2B Cloud Services, Axway Cloud B2B, amoCRM SaaS service for B2B, Google
Apps for Business),
§ Management Apps (ERP/АРЕНДА 1С, HRM, SCM, MRP),
§ Communications (Gmail,
Google Hangouts, Microsoft Lync Online, Cloud PBX or cloudy АТС, MDM),
§ Security (Panda Cloud
Email Protection, Panda Cloud Internet Protection, McAfee SaaS Email Protection
& Continuity, Сomfortway Mobile
Security), and etc.
1.2.3 Platform as a Service (PaaS)
The development of "cloud" computing has led to
platforms that allow you to create and run a web application. Platform as a Service
(PaaS) - is to provide an integrated platform for development, testing,
deployment and support of web applications as a service organized on the basis
of the concept of cloud computing.this model, the entire information technology
infrastructure, including computer networks, servers, storage, entirely
controlled by the provider. Provider defines a set of available types of
consumer platforms, and a set of controlled parameters platforms, and the
consumer is given the opportunity to use the platform to create their virtual
copies, install, develop, test, operate on them, application software, and the
dynamically changing the amount of consumed computing resources. PaaS model
envisages that a provider of cloud services provides customers with programming
languages, development environment, libraries, services and tools, with which
the end user develops and deploys the application. Figure 1.5 shows services
which provide PaaS.
1.5
- Services offered by PaaS
to figure 1.5 PaaS provides a software platform and
maintenance as a service composed of:
§ OS - network operating
system (Unix-systems, including Ubuntu Server, BSD/OS Family, Solaris/SunOS and
etc. or Windows Server)
§ Database - database
management system(DBMS) (MySQL, Microsoft SQL, SQL Database, PostgreSQL, Oracle
and etc.)
§ Middleware - software
middle layer or binding (intermediate) software, which is designed to ensure
interoperability between different applications, systems and components.
§ Software development tools
and testing - software tools for developing and testing web applications
(software development environment: software frameworks, libraries, etc.
programming languages to create a web application: Python, Java, PHP, Ruby, JS
for Node.js, etc.).
§ App server - application
server for developing, testing, debugging and web applications.services provide
a large number of companies such as Microsoft, Amazon.com, Google. PaaS model
based on the license or subscription model so users only pay for what they use.
PaaS include workflows for creating, development, testing, deployment and
placement of application. Also, application services, virtual offices, database
integration, security, scalability, storage, wealth management, tools,
dashboards, and more.Microsoft Windows Azure- a group of "cloud"
technologies, each of which provides a specific set of services for application
developers. Computing services of Windows Azure works on basis of Windows. In
addition to applications which developed on the platform ".NET
Framework" Windows Azure also allows developers to run applications in the
languages of Windows - C #, Visual Basic, C ++ and other - using Visual Studio
or other development tools. Developers can create web applications using
technologies such as ASP.NET and Windows Communication Foundation (WCF),
applications that run as independent background processes or applications that
combine both.
1.3
Deployment models of cloud computing
addition to the various ways of providing services as SaaS,
PaaS and IaaS, and others, there are several options for the deployment of
cloud systems, as shown in Figure 1.6.
1.6
- Deployment models and Web services of cloud computing
cloud computing algorithm virtualization
According to Figure 1.6 deployment models of cloud computing
are divided into:
· Private cloud
· Public cloud
· Hybrid cloud
1.3.1 Private cloud
Private cloud - cloud infrastructure intended for use by a
single organization. Private cloud covers the need for IT services
organization, its divisions or departments , clients, contractors and others.
Private cloud (usually) physically located and is in the ownership, management
and operation of the organization of the owner.
Figure 1.7 - Private cloud
to the needs private cloud allows to flexibly redistribute
computing capacity and a load of shared infrastructure to ensure optimal
performance and required reliability. Tools for monitoring and control allow IT
professionals to track the use of hardware resources within the organization,
predict and optimize the load.well as other types of clouds, private clouds
have their advantages and disadvantages which we can see in Table 1.1.
Table 1.1 Advantages and
disadvantages of private cloud
Advantages
|
Disadvantages
|
Control, management and
configurability cloud environments
|
Significant costs
|
High performance
|
The risk of losing working capacity
services because of physical threats
|
Security
|
Limited resources
|
Efficiency of the IT department
|
|
As shown in Table 1.1 private clouds
have their own advantages and disadvantages. The benefits of private clouds
include the following features:
· More control in comparison
with public cloud at the expense of that all the components of the IT
infrastructure placed in the organization of consumer. Thus, companies can
monitor and manage cloud environments more efficiently. High level of security
provided by the fact that the service consumer is one single organization, so
that the entire infrastructure can be optimally configured for the existing
data protection requirements.
· High performance private
cloud associated in particular with the fact that they operate within the
framework of internal firewalls and protection perimeter of the corporate
network, so data transfer is much faster. Configurability of private clouds
also remains at a high level.
· Implementation of private
cloud increases the efficiency of the IT department - at any time at the
request of the business can deploy the necessary service for 5-10 minutes. IT
team only raise a virtual machine from a template and install the necessary
service, at a time when companies with traditional IT infrastructure would have
to order a server, install it on software and applications, and connect it to
the network. Only one installation of equipment sometimes takes 6-8 weeks.of
private cloud are following factors:
· Significant costs at all
stages of the life cycle of clouds, from implementation to supporting the
working capacity. At the stage of deployment requires investment in equipment
and software. Also need to manage a private cloud, which also entails
administration costs and attract qualified IT professionals.
· In comparison with the
public cloud there are risks of loss of working capacity of cloud services and
data loss because of physical threats of infrastructure.
· Sooner or later,
organization which use private cloud may face when resourses of cloud
infrastructure may be not enough.
1.3.2 Public cloud
Public cloud - infrastructure for
free use by the public. Public cloud may be in the ownership, management and
operation of commercial, academic and government organizations (or any
combination thereof). Public cloud physically exists in the jurisdiction of the
owner - the service provider.the structure, as well as private clouds, public
clouds have advantages and disadvantages.
Table 1.2 - Main characteristics of public clouds
Advantages
|
Disadvantages
|
The simplicity and efficiency of
use.
|
Lack of opportunities for the
control by organization.
|
Access to applications requiring
only an Internet connection.
|
In some cases, data transmission
may be slow.
|
Absence of expenditures on
"iron" and software.
|
Weak data security
|
Flexibility and Scalability
|
|
Reduced time for maintenance of
infrastructure
|
|
to the Table 1.2 pros my include
following:
· Public cloud services are
characterized by a great ease of use and efficiency,
· Access to the application
does not require anything other than a stable internet connection,
· The use of public cloud -
a real opportunity to reduce IT budget due to lack of spending on
"hardware" and software,
· Flexibility and
scalability: a model pay-as-you-go allows you to pay just as many resources as
you want at the moment, and quickly adjust this setting upward or downward,
· Abbreviation of time for
service of infrastructure: standard, not a cloud, environment change the
settings of applications or servers can take hours, days or even weeks, in a
virtual environment is much faster - in a matter of minutes,
· server applications are in
the cloud, that‘s why there are no risk of downtime of business processes due
to server crashes. Virtual server providers often configured on a powerful
physical base, located in large data centers where possible downtime counted in
minutes per year,
· The use of public clouds
and no contact users with complex computer equipment allows you to refuse the
services of IT professionals in your organization,
· Lack of long-term
contracts and mutual obligations with IT companies allows you to change the
cloud provider as needed.cons of public clouds include:
• The main disadvantage of
public cloud is the lack of options for the control of the organization:
performance of services is completely subordinated to the provider that
provides cloud technology.
· Slow speed: performance of
public cloud services depends on the stability and breadth of Internet
connection bandwidth, in some cases, data transmission may be slow. When
operating with large volumes of data public clouds can not compete with private
performance.
· Investments in IT
infrastructure among others are also an investment in the case of public cloud
investment with the future in mind is simply impossible, tangible assets are
not purchased.
· Weak data security -
another characteristic of public cloud environments. Whatever efforts did not
make the provider in the field of security, the protection of private cloud
will always be an order of magnitude more reliable.
1.3.3 Hybrid cloud
Hybrid cloud - is a combination of two or more different
cloud infrastructures (private, public) that remain unique entities but linked
by standardized or proprietary technology and data applications (eg, short-term
use of public cloud resources for load balancing between clouds)
1.8 -Structure of hybrid cloud
basic idea of the hybrid cloud is that when their own
capacity is not enough, the enterprise may use external resources, without
opening the data structures which remain inside. This leads to the fact that
the number of resources increases, and internal control applications using
those resources considerably increases.
1.4 Safety of
information
who are thinking about moving to cloud infrastructure,
concerned about the issue of security. On security assurances to construct the
whole marketing activity provider. And therefore the company to devote big
effort to the case such as data encryption, network traffic, backups. Just to
protect data from hackers are network intrusion detection systems, anti-virus
protection, different types of data encryption, and etc. When a user or company
move to cloud technologies are encouraged to review how the safety standards
should be, and which safety procedures performs provider of cloud technology.
Safety of stored data is performed via the use of encryption technology. The
provider should always encrypt the information stored on their servers customer
information for prevention of unauthorized access. Attackers can gain access to
information or personal data cloud services in different ways, as shown in
Figure 1.9.
1.9 - Methods of unauthorized access
to information
to the scheme of unauthorized access to information, an
attacker can obtain information through:
• unreliable nodes in the network to intercept data
• hacking authorization system
• due to poor insulation of virtual machines
• Due to the lawsuit where the plaintiff has access to all
servers belonging to cloud providers.order to prevent interception of data over
unreliable networks nodes, transmission data must always be encrypted and
descrypted only after user authentication. This approach ensures that the data
will not be able to edit or read any one person, even if they gain access to
them through unreliable nodes in the network. These technologies have been
developed for "thousands of man-years" and led to the creation of
reliable protocols and algorithms (such as TLS, IPsec and AES). Providers
should use these protocols, and not invent your own.most common method of
authentication is the password protection. However, service providers seeking
to offer their customers higher reliability, resort to more powerful tools,
such as certificates and tokens. Along with the use of more reliable means of
authentication to cracking providers must be able to work with such standards
as LDAP and SAML. This is necessary to ensure interoperability provider with
the system user authentication client authorization and determining the powers
granted to the user. Thanks to this provider will always have current
information about the logged in user. Worst case - when the customer provides a
specific provider a list of authorized users. As a rule, in this case, when an
employee leaves or move it to another position may be difficult. Some providers
put data of all clients in a single software environment and due to changes in
its code, trying to isolate the data of customers from each other. This
approach is reckless and unreliable. First, the attacker can find a gap in the
non-standard code that will allow him to gain access to data that he should not
see. Secondly, the error code may cause one customer accidentally "see"
other data. In recent years, there were also those other cases. Therefore, to
distinguish between user data use different virtual machines and virtual
networks is a smart move.best option when customers use each individual virtual
machine and virtual network. Separation between VM and consequently between the
users, provides hypervisor. Virtual networks, in turn, are deployed using
standard technologies such as VLAN (VirtualLocalAreaNetwork), VPLS
(VirtualPrivateLANService) and VPN (VirtualPrivateNetwork).incident when the
incident involving his clients, such as litigation or processes requiring
access to all servers, summons must cover a narrow range of issues and should
not affect other users. . But if the user does not know that there is a court
summons and a case scenario is that the user can protect only the full data
encryption. The agenda may require that the cloud provider is provided by the
court data and access to them, but the provider will not be the access key and
the key for decryption. To get one, the court will have to ask the user and
send him a summons. As a result, the user will have the same level of control
over their data in the cloud, as in your own private data center.prevent
unauthorized access cases, the provider must encrypt stored on their servers
the client's information. The provider must also permanently delete data when
they are no longer needed and will not be required in the future.
2. Virtualization technology
technology is a key element in the concept of
"cloud" computing. Virtualization technology is a key element in the
concept of "cloud" computing. Due to virtualization technologies
physical server can allocate server resources between applications, each
application "thinks" that it have a dedicated server,in this case
implemented a "one server - multiple applications", but without
sacrificing performance, availability, and security server applications.- is to
provide a set of computing resources or their logical association abstracted
from the hardware implementation, and ensure the logical isolation of computing
processes running on a single physical resource. Virtualisation means running
on the same physical machine (computer) multiple virtual machines (computers).
Figure 2.1 shows a diagram where virtualization on a single physical machine to
run multiple virtual computers.
Figure 2.1 - Visualization of virtualization
To date, suppliers of virtualization technologies offer a
reliable and manageable platform, and the market for these technologies is
booming. According to leading experts, virtualization is now one of the three
most advanced computer technology. Figure 2.2 shows the main types of
virtualization.
Рисунок 2.2 - Types of virtualization
to Figure 2.2, virtualization divided into two
fundamentally different categories:
• Virtualization platforms (creating emulators
platforms, OS virtualization and OS instances, application virtualization)
• Resource virtualization (consolidation and
aggregation of resources distributed computing, clustering computers, resource
sharing, encapsulation).Virtualization platforms or virtualization understand
the creation of software systems based on existing software and hardware.
System that provides hardware resources and software is called the host (host),
and it simulated system - guest (guest). To guest systems can run stably on the
platform of the host system, it is necessary that the software and hardware of
the host is strong enough to provide the necessary set of interfaces for access
to its resources. Each current form virtualization made its approach to the
concept of "virtualization". Types of virtualization platforms depend
on how well the simulation is carried out hardware.
2.1 Virtualization of
resources
of virtualization virtualization platforms considered
in the narrow sense, is mainly used in the process of creating virtual
machines.
Сoncept of virtualization platforms
considered in the narrow sense, is mainly used in the process of creating
virtual machines. Virtualization allows you to concentrate, to abstract and
simplify the management of groups of resources, such as network, storage, and
namespace.
The figure 2.3 shows the types of
virtualization of resources.
Figure 2.3 - types of virtualization of resorces
to Figure 2.3 virtualization of resources can be
divided into the foll owing types.
· Association,aggregation
and concentration of components;
· Grid computing;
· Partitioning;
· Encapsulation.
Under the guise of virtualization
'Association, aggregation and concentration of components "refers to the
organization of multiple physical or logical objects in the resource pools
(groups), is a convenient user interface. Examples of this type of
virtualization:
· Multiprocessor system
appears to us as one powerful system,
· RAID-massives and
management tools of volume, which combine a multiple physical discs into form
of one logical,
· Storage virtualization
used in the construction of storage area network (SAN)
· Virtual Private Network
(VPN) and Network Address Translation (NAT) allows you to create virtual space
network addresses and names.of virtualization which calls “grid computing
include techniques used by combining a plurality of individual computers in the
global system (metacomputer) jointly solving the general problem.In the process
of virtualization is a division of a single large resource for several similar
objects, easy-to-use. In the storage area network is called zoning resources
(«zoning»).
“Encapsulation” in relation to
virtualization, we can say that the process of creating a system that provides
a user-friendly interface to work with her and hides the details of the
complexity of its implementation. For example, the use of the CPU cache to
speed up the computation is not reflected in its external interfaces.
2.2
Virtualization of platforms
Types of virtualization platforms depend on how well the
simulation is carried out hardware. There is still no uniform agreement about
the terms in the field of virtualization. As shown in Figure 2.4
virtualization of platform is divided into the following categories:
· Full emulation
(simulation)
· Paravirtualization
· Application level
virtualization
· Operating system-level
virtualization
· Virtualization address space
Рисунок 2.4 - Types of virtualization of platform
system-level virtualization -
virtualization technique, in which the operating system kernel supports
multiple isolated instances of user-space, instead of one. These items (often
referred to as containers or zones) from a user perspective is completely
identical to the real server. For systems based on UNIX, this technology can be
seen as an improved implementation of the mechanism chroot. The kernel provides
complete isolation of containers, so the program from different containers
cannot affect each other. The essence of this type of virtualization is the
virtualization of the physical server at the operating system in order to
create a more secure virtualized servers on a single physical. Guest system, in
this case, the shared use of the host operating system kernel with other
guests. A virtual machine is an environment for applications that run in
isolation. This type of virtualization is used in the organization of systems
hosting, when a single instance of the need to support multiple virtual servers
clients. Examples of OS-level virtualization: Linux-VServer, Virtuozzo, OpenVZ,
Solaris Containers and FreeBSD Jails.applying no need paravirtualized simulate
hardware but instead (or in addition), a special application programming
interface (API) for interacting with the guest operating system. This approach
requires the modification of the guest code that, in terms of community, Open
Source is not so critical. Paravirtualization system also has its hypervisor,
and API-calls to the guest system, called «hypercalls» (hypercalls). Currently,
providers are paravirtualization of XenSource and Virtual Iron.
“Application-level virtualization”
type is not like all the others, if in the previous cases are virtual
environments or virtual machines that are used for insulation applications, in
this case, the application itself is placed in a container with the necessary
elements for its operation: registry files, configuration files, and user
system objects. The result is an application that does not require the
installation on the same platform. When you transfer this application to
another machine and run it, the virtual environment created for the program,
resolves conflicts between it and the operating system, as well as other
applications. Such a method of virtualization is similar to the behavior of
interpreters of different programming languages (no wonder the
interpreter, virtual machine Java (JVM), also falls into this category).
Examples of this approach are: Thinstall, Altiris, Trigence, Softricity.full
emulation (simulation) virtual machine is fully virtualizes all hardware while
maintaining the guest operating system intact. This approach allows you to
emulate various hardware architectures.the partial emulation (native
virtualization) virtual machine virtualizes only the necessary amount of
hardware that it can be run in isolation. This approach allows you to run guest
operating systems developed only for the same architecture as that of the host.
This type of virtualization can significantly increase the performance of guest
systems compared with full emulation and is widely used at present. In
addition, in order to improve performance in virtualization platforms that use this
approach uses a special "layer" (hypervisor) between the guest
operating system and hardware that allows the guest direct access to hardware
resources. Hypervisor, also called "virtual machine monitor» (Virtual
Machine Monitor) - one of the key concepts in the world of virtualization. The
use of a hypervisor, is the link between guests and equipment, significantly
increases the speed of the platform, bringing it closer to the speed of
physical platform. The disadvantages of this type of virtualization can be
attributed dependence of virtual machines on the architecture of the hardware
platform.of products for native virtualization: VMware Workstation, VMware
Server, VMware ESX Server, Virtual Iron, Virtual PC, VirtualBox, Parallels
Desktop, and others.
2.3
Hypervisor
- in some way is minimal operating
system. It provides a running under its operating system service virtual
machine, virtualizing or emulating the (physical) hardware specific machine and
manage virtual machines, allocating and freeing resources for them. The
hypervisor provides isolation of operating systems from each other, defense and
security division of resources between the various operating systems running
and management of resources. The hypervisor provides an isolated environment for
each virtual machine, and that it provides a guest OS access to computer
hardware, as shown in Figure 2.5.
Рисунок 2.5 - Location of hypervisor
· According to the running method,
hypervisors can be divided into three types, as shown in Figure 2.6:
· 1-rst type of hypervisor (established
on a "bare metal")
· 2-nd type of hypervisor (installed
inside the OS) 2-nd type
· Hybrid hyperisor
Also divided into 2 types by type of architecture:
· Monolithic
· Microkernel
Figure 2.6 - Types of hypervisor
2.3.1 Hypervisors by type of
architecture
Hypervisors monolithic architectures
include drivers hardware devices in code. Monolithic Hypervisor located in a
single layer which also includes most of the desired components, such as core,
device drivers and I / O stack. This approach used by VMware ESX and
traditional mainframe systems. Figure 2.7 shows the architecture of a
monolithic hypervisor.
Figure 2.7 - Architecture of monolithic hypervisor
to Figure 2.7 in a monolithic model - the hypervisor
uses its own drivers to access the hardware . Guest operating systems run on
virtual machines over of the hypervisor. When the guest needs access to the
equipment, it must pass through the hypervisor and its driver model. Usually
one of the guest operating system plays the role of an administrator or a
console, which starts a component for provisioning, management and monitoring
of all guest operating systems running on the server. The most common example
is a monolithic architecture VMware ESX. As shown in Table 2.1, monolithic
architecture has its own advantages and disadvantages. Among the advantages:
· Increased (theoretically)
performance because of the drivers placed in the space of the hypervisor,
· Increased security, as
undesired operation of management of the OS (in terms of VMware - «Service
Console») will not result in the failure of all running virtual machines.
Disadvantages monolithic architecture following:
· Handle equipment which
drivers are available in the hypervisor
· Potentially lower security - due to
the inclusion in the hypervisor arbitrary code in the form of device drivers,
· Sustainability - if an
updated driver has bug, it cause crash in the whole system, in all its virtual
machines.
2.1 - Disadvantages and advantages of
hypervisor.
Advantages
|
Disadvantages
|
Increased performance
|
Increased security
|
Potentially lower security
|
|
Poor stability if driver has an
error
|
Micronucleus hypervisor uses a very thin, specialized
hypervisor that only performs the core tasks of ensuring partition isolation
and memory management. This layer does not include I / O stack or device
drivers. This is the approach used by Hyper-V. In this architecture, the
virtualization stack and device-specific drivers are located in a special
section of the OS,which called the parent partition, as shown in Figure 2.8.
Figure 2.8 - Architecture of
microkernel hypervisor
microkernel implementation use
"thin hypervisor". In this case it does not have drivers. Instead,
the drivers work in each individual section to any guest OS was able to get
through the hypervisor access to the equipment. With this balance of power,
each virtual machine occupies a separate section, which has a positive impact
on the security and reliability. In a microkernel hypervisor model (used in the
virtualization of Windows Server 2008 R2), one section is the parent (parent),
the rest - a subsidiary (child). Section - is the smallest isolated unit,
supported by the hypervisor. Size Hyper-V hypervisor less than 1.5 MB, it can
fit on one 3.5-inch floppy disk. Each partition is assigned a specific
hardware resources - share of CPU time, memory, and other devices. The parent
partition creates child partitions and manage them, and also contains a stack
virtualization (virtualization stack), used to control the child partition. The
parent partition is created first and owns all resources that do not belong to
the hypervisor. Possession of all the hardware resources means that it is the
root (ie, parent) section controls the supply connected Plug and Play device in
charge of hardware failures and even controls the loading of the hypervisor.the
parent partition contains a virtualization stack - a set of software components
located on top of the hypervisor and together with him supporting virtual
machines. Virtualization stack communicates with the hypervisor and performs
all the functions of virtualization that are not supported directly by the
hypervisor. Most of these functions is associated with the creation of child
partitions and manage them and necessary resources (CPU, memory,
devices).compared with a monolithic hypervisor approach is that the drivers that
need to be located between the parent partition a physical server and do not
require any modification to the driver model. In other words, the system can
simply apply the existing drivers. In Microsoft chose this approach because the
need for new drivers braked heavily to the development of the system. As for
the guest operating system, they will work with emulators or synthetic
devices., the main priority was security, so for most companies is acceptable
will be a couple of percent loss in productivity in order to reduce the front
of attack and improve stability.
2.3.2
Hypervisors by type of running
First type of hypervisor runs on the
hardware and manages independently. Guest OS running in virtual machines are
located above the level, as shown in Figure 2.9.
Рисунок 2.9 - First type of Hypervisor
of the second type runs in one ring with the main OS
kernel. Guest code can be executed directly on the physical processor, but
access to the input-output devices of the computer guest OS through the second
component, the normal process of the main OS - Monitor user level as shown in
Figure 2.11
2.11
- Hypervisor of second type
:MicrosoftVirtualPC,VMwareWorkstation,QEMU,Parallels,
VirtualBox.2.12 shows hypervisor first type and hypervisor of the second type,
which clearly shows the difference in the absence of a hypervisor for operating
the first type, which means that the second type of hypervisor is installed
directly on the physical computer components.
Figure 2.12 - Difference between
first type and second type of hypervisor
Hybrid hypervisor consists of two parts: a thin hypervisor
that controls the processor and memory, as well as working under its control
special service running in the ring reduced level. OS service through guest OS
access to physical hardware.
2.4 Overview of virtualization
platforms
2.4.1 Virtualization platform - VMware
The company VMware - one of the first players in the market
of virtualization platforms. In 1998, VMware has patented its technology and
virtualization software has since released many effective and professional
products for virtualization at various levels: from VMware Workstation,
designed for desktop PCs, to VMware ESX Server, enabling enterprises to
consolidate physical servers to virtual infrastructure. VMware will have the
following products: VMware Workstation, VMware Player, VMware Server, VMware Ace,
VMware vSphere, VMware vCenter, Server VMware VMmark, VMware Capacity Planner,
VMware View, VMware ThinApp, VMware vCenter, VMware vSphere Hypervisor, VMware
ESX Server.Workstation - platform, focused on desktop-users and intended for
use by software developers, and IT professionals. As the host operating systems
supported Windows, Linux, Mac and others. Can be used in conjunction with the
development environment that makes it particularly popular among developers,
trainers and support technicians. With VMware workstation, you can create
complex virtual machines on laptops with the decision Cloud Foundry, work with
applications to process large volumes of data and 64-bit VM in vSphere
environment or Microsoft Hyper-V Server.Player - free "player" of
virtual machines based on the virtual machine, VMware Workstation, designed to
run a ready-made virtual machine images created in other products of VMware, as
well as Microsoft VirtualPC and Symantec LiveState Recovery. Starting with
version 3.0 VMware Player allows you to create virtual machine images. Limited
functionality is now mainly concerns the functions intended for
IT-professionals and software developers.product VMware Server is a pretty
powerful virtualization platform, which can be run on servers running host
operating systems Windows and Linux. The main purpose of VMware Server -
support for small and medium-sized virtual infrastructure of small businesses.
Due to the low complexity of its development and installation, VMware Server
can be deployed as soon as possible, both on the servers of the organizations,
and on home computers.Ace - product to create secure virtual machine security
policies, which can then be spread on the model of SaaS
(Software-as-a-Service).vSphere - range of products, which is a reliable
platform for data center virtualization. The company is positioning this
complex as well as a powerful virtualization platform for building and
deploying private "clouds". VMware vSphere is available in several
editions with features designed specifically for small companies and
medium-sized companies and corporations.
2.13 Structure of vShpere.
ESX Server - is a hypervisor which partition a physical
server into multiple virtual machines. VMware ESX is the foundation of VMware
vSphere package and is included in all editions of VMware vSphere.
2.14
Hypervisor VMware ESX.
2.4.2 Virtualization platform - Microsoft
Microsoft Virtual Server. Server virtualization platform Microsoft
Virtual Server can be used on a server running Windows Server 2003 and is
designed to simultaneously run multiple virtual machines on a single physical
host. The platform is free and provides only the basic functions.Virtual PC.
Product Virtual PC was bought by Microsoft in conjunction with the company and
Connectix first branded Microsoft released as Microsoft Virtual PC 2004.
Virtual PC and purchasing company Connectix, Microsoft has built a far-reaching
plans to provide users with a tool to facilitate the migration to the next
version of the Windows operating system . Now Virtual PC 2007 is free and
available to support desktop operating systems in virtual machines.Hyper-V.
Microsoft product is positioned as the main competitor to VMware ESX Server in
enterprise virtualization platforms. Microsoft Hyper-V is a solution for server
virtualization based on processors with x64 architecture in enterprise
environments. Unlike a Microsoft Virtual Server or Virtual PC, Hyper-V provides
virtualization at the hardware level, using virtualization technology built
into the processor. Hyper-V provides high performance, almost equal to the
output of one operating system running on a dedicated server. Hyper-V is
distributed in two ways: as part of Windows Server 2008, or as part of an
independent free product Microsoft Hyper-V Server.Windows Server 2008 Hyper-V
technology can be deployed as a full installation and operation in Server Core,
Hyper-V Server only works in the Core. This allows you to fully realize the benefits
of a "thin", economical and manageable virtualization platform.V is
an integrated component of the 64-bit versions of Windows Server 2008 Standard,
Windows Server 2008 Enterprise and Windows Server 2008 Datacenter. This
technology is available in 32-bit versions of Windows Server 2008, Windows
Server 2008 Standard without Hyper-V, Windows Server 2008 Enterprise without
Hyper-V, Windows Server 2008 Datacenter without Hyper-V, in Windows Web Server
2008 and Windows Server 2008 systems based on Itanium.
2.15 - Architecture of Hyper-V
versions of the Hyper-V have one parent partition. This
section controls the functions of Hyper-V. From the parent partition console
runs Windows Server Virtualization. In addition, parent partition is used to
run virtual machines (VM), supports streaming emulation of old hardware. Such
VM, built on templates, emulating hardware, are analogues of VM, working in a
product-based virtualization host, such as Virtual Server.Гостевые VM запускаются из дочерних разделов Hyper-V. Child partitions
support two types of VM: high performance VM-based architecture VMBus and VM,
managed host system. The first group includes a VM with Windows Server 2003,
Windows Vista, Server 2008 and Linux (supporting Xen). New architecture
features a high-performance VMBus conveyor operating in RAM, connecting clients
Virtualization Service Clients (VSC) on the VM guest with the provider Virtual
Service Provider (VSP) host. VM, managed host, launch platforms that do not
support the new architecture VMBus: Windows NT, Windows 2000 and Linux (without
the support of technology Xen, such as SUSE Linux Server Enterprise 10).System Center
Virtual Machine Manager (SCVMM) - separate System Center products for virtual
infrastructure management, efficient use of resources of physical nodes, as
well as facilitate the development and creation of new guests for
administrators and users. The product provides full support to consolidate
physical servers to virtual infrastructure, fast and reliable conversion of
physical machines to virtual, virtual workloads reasonable accommodation in
appropriate physical nodes and a single console for resource management and
optimization. SCVMM
provides the following features:
· Centralized management of servers
virtual machines across the enterprise. SCVMM supports management of servers
Microsoft Hyper-V, Microsoft Virtual Server, VMware ESX, and in the future
there is support for Xen.
· Create a library of templates of
virtual machine. Virtual machine templates are predefined sets of images of
operating systems that can be deployed in minutes.
· Migration (converting) physical
servers to virtual machines - the technology P2V. P2V technology allows to make
the transfer of a physical server to a virtual non-stop work. Thus, there is a
possibility of the whole online backup server and in case of its failure, it is
possible for one minute to start the virtual server and continue.
· Cluster Management of Hyper-V.
2.4.3 Платформа Microsoft Azure
Platform Microsoft Azure - a model of
Platform as a service that provides the opportunity to develop and run
applications and store data on servers located in distributed data centers.
Originally called Windows Azure. In 2014, the platform was renamed to Microsoft
Azure.
Microsoft Azure cloud fully implements two models - the
platform as a service (Platform as a Service, PaaS) and infrastructure as a
service (Infrastructure as a Service, IaaS). The efficiency of the Windows
Azure platform provides a global network of data centers Microsoft. The main
features of this model:
• payment only consumed resources;
• general, multi-threaded structure calculations;
• abstraction of infrastructure.
Рис. 2.16 The components
provided by the platform Microsoft Azure
Microsoft developed a platform Azure, allowing .NET
developers to enhance their experience of creation in Visual Studio 2008 (and
higher) ASP.NET Web applications and Windows Communication Framework (WCF)
services. Projects Web applications run in the standalone version of Internet
Information Services (IIS) 7. Web applications and Web services run in a
partially trusted security mechanism allows you to restrict access to computer
resources code (Code Access Security), which approximately corresponds to the
average level of trust and ASP.NET restricts access to certain operating system
resources. Set of development tools used Windows Azure allows full access to
the resources of the computer not to run .NET code using .NET libraries that
require full trust, and the process of interaction, using software channels
(Pipe). Microsoft promises to support the launch of the program code Ruby, PHP
and Python in the "cloud" platform. The original version of the
development platform was limited programming environment Visual Studio 2008 and
above with a plan to support the tool Eclipse. Windows Azure platform supports
web standards and protocols including SOAP, HTTP, XML, Atom and AtomPub.
Windows Azure, которая включает:
· Azure Hosted service;
· Storage Accounts;
· SQL Azure
· Live Services: existing APIs.
Live services: existing APIs are not part of the preliminary
version and does not require a token. Since early 2009, Windows Azure token
entitles you to one account Hosted Service, two accounts for Storage. You are
requesting tokens Azure across the page Microsoft Connect, which is accessed
from the portal page. The figure 2.17 shows the account page, which includes
links to the settings page and control SQL Azure, .NET services and Live
services. Live Alerts page allows you to configure how and when to receive
messages containing critical signal applications, newsletters and updates the
portal.
Figure 2.17 - Accaunt page
Azure
includes geolocation, which allows account holders to choose the data center
for the location of Hosted Services and Storage Accounts. For example,
USA-Northwest (Quincy, WA) and USA-Southeast (San Antonio, TX.). The user can
add and sets Hosted Services Storage Accounts in the group to ensure that the
services are located in the repository and the same data center, in order to
increase productivity.
Storage Windows Azure Storage provides developers with the
ability to store data in the cloud. Application can access their data at any
time from anywhere, store any amount of data, and as long as you want. The data
is guaranteed not to be damaged and lost. Windows Azure Storage provides a rich
set of data abstractions:
• Windows Azure Table - provides structured storage
conditions of service.
• Windows Azure Blob - provides storage for large data items.
• Windows Azure Queue - provides asynchronous work dispatch
to implement the exchange of data between services.
2.4.4 Network of virtual machines
Each virtual machine network consists of one or more virtual
subnets. Network virtual machines generates insulating boundaries within which
the virtual machines on the network can communicate with each other. As a
result, the virtual subnet a network of virtual machines should not use
overlapping prefixes IP-addresses. Each virtual machine has a network routing
domain that identifies a given network. PH domain routing (RDID), identifying a
network of virtual machines, appointed administrators or data center management
software, data center, such as System Center 2012 R2 Virtual Machine Manager
(VMM). RDID has format GUID Windows - for example
"{11111111-2222-3333-4444-000000000000}".
2.4.5 Routing outside of the virtual network
Deploying a client networks requires that network
virtualization environment Hyper-V has been linked with resources not included
in network virtualization environment Hyper-V. Gateways virtualization networks
are needed to provide communication between the two environments. Scenarios
that require the use of the gateway network virtualization Hyper-V, include a
private cloud and hybrid cloud. In the main gateway network virtualization
Hyper-V are required for virtual private network (VPN) and routing.can have
different physical form factors. They can be based on Windows Server 2012 R2,
built into the top-level rackmount switch (TOR) or load balancer, included in
other existing network devices, or be a new standalone network device.routing
in the private cloud or large enterprises can not be resolved, or for reasons
of compliance, not be able to move some of its services and data in the public
cloud hosting provider. However, enterprises want by combining the resources of
their data centers in a private cloud to get the benefits of cloud technology,
network virtualization provided by Hyper-V. When deploying a private cloud
overlap IP-address can not be required, as companies tend to have sufficient
internal space non-routable addresses (for example, 10.xxx or 192.xxx). Consider the example in Figure 2.18.
2.18 - Deploying a Private Cloud
It
should be noted that a virtual address of the client subnet represented as
157.x. At the same IP-address in the non-network virtualization of the network
(corporate network) is also presented in the form 157.x. In this case, the
address of the supplier for virtual subnets in the data center are the
IP-addresses of the form 10.x. This deployment allows the company to take
advantage of network virtualization Hyper-V to provide flexibility as if a
virtual machine and cross-subnet live migration in the structure of the data
center. This increases the efficiency of the data center, thereby reducing both
the running costs and capital costs. In this scenario, the gateway network
virtualization Hyper-V provides routing between the IP-addresses of the form
10.x and 157.1.
Hybrid cloud (VPN type "net-net") A key advantage
of network virtualization Hyper-V - is that it allows you to quite easily
expand the local data center to data center using cloud-based Windows Server
2012.This is a hybrid model clouds. (Figure 2.19).
2.19. Hybrid cloud model
this scenario, the internal subnet containing Web servers,
moves from the enterprise network to the data center hosting provider cloud.
Taking advantage of the offer Bring Your Own IP Address (Use your own
IP-address) of the hosting provider, the company got rid of the need to modify
the network configuration of the virtual machine web server or any other
endpoint network tied to the Web server. Hoster provides a secure communication
channel through the use of the gateway network virtualization Hyper-V.
3. Algorithm works of “Cloudy” web
application
web-application to create a hybrid infrastructure is designed
to help to users in the deployment of a hybrid infrastructure step by step in
the form of labororary works. User will be granted access to the information in
the 2 modes of functionality as shown in figure 3.1:
· The registered user mode
· The unregistered user mode
Figure 2.1 - Access modes
to Figure 2.1 when user entered as “unregistered user”
(restricted access), he will be able to view laboratory work and theoretical
information.the “registered user” mode (expanded access) in addition to
functionality granted to unregistered users, the user will be available next
functions:
· The search button within the site
· List of performed laboratory work
· Comments and questions for laboratory
worksthe unwillingness to use the “unregistered user mode” by user , the user
is offered to register by entering personal data to database. Figure 2.2 shows
a diagram of adding a new user to the database and the entrance to the site
without authorization as a registered user.
2.2
- Scheme of access to the websitethe registration, the user fills registration
form in registration page where user must indicate the name and other data.
Based on filled registration form, assigned a login and password to the user.
3.1 Functional of website
this informational website information divided into 2
main parts:
· theoretical material
· laboratory worksto collaboration
scheme in Figure 2.3, where shown interaction of website with database also
shown functional of website.
2.3
- Collaboration scheme of website
To select the theoretical section, the user must select the desired
theme and click it with the mouse on it:
· Cloud computing
· Virtualization technologies
· Models of expansion of cloud
computing
· Web-services provided by cloud
computing
· Features of virtual network
User can create complete hybrid infrastructure when he
performs the laboratory works :
· Creating local infrastructure on
Windows Server 2012/2008 with Hyper-V role.
o Instrallation and setup Hyper-V
o Creation of virtual machine on
Windows Server 2012/2008.
· Creation virtual infrastructure on
Windows Azure
o Creation of virtual machines in
virtual network Windows Azure
o Deployment of virtual machine on
Windows Azure platform
o Creation of virtual network and
configure the tunnel between Windows Azure and local infrastructure
o Creation of virtual network
3.2 Software
tools
platform assembly of Web server Xampp was used as web-server
which is distributed freely according to the license GNU General Public
Licenseadvantage of Xampp is the content of the script interpreter and a large
number of additional libraries, allows you to run a full-fledged web server.
Xampp works with all 32 - 64 bit OS Microsoft.The composition of Xampp
includes: Apache ,MySQL,phpMyAdmin.program is regularly updated to include the
latest versions of the Apache/MySQL/PHP и Perl. Also in composition of XAMPP present another modules , including
OpenSSL и phpMyAdmin.HTTP-server is
cross-platform software and maintains operating systems like Linux, BSD, Mac
OS, Microsoft Windows, Novell NetWare, BeOS.
The main advantages of Apache is reliability and flexibility
of configuration. Apache allows to connect external modules to provide data,
use database for user authentication, modify the error messages and etc.Also
supports IPv6. Apache configured by using text configuration files. The main
parameters are already configured by default and will work in most cases.
Function of web-server perform software which installed on personal computer.
When browser connects to the web-server and sends header “GET”(request to send
data), Apache handles the request. Apache checks, whether there is a title GET
file, and, if so, send it along with the browser title.
As DBMS(database management system) was used MySQL. MySQL is
a highly productive, reliable database management system that integrates well
with PHP and is focused on the implementation of dynamic web applications.
Figure 2.5 - Architecture of DBMS
MySQL allows to database developers and administrators to create advanced web, cloud and
embedded applications that can handle the ever-increasing amounts of data.program code for
implementation of application has been selected one of the most popular
languages for implementing web applications - PHP.is extremely important factor
in the programming for multi-user environments, which include web. A very
important advantage of PHP is its "engine". "The engine» PHP is
neither the compiler nor the interpreter. He is the transmitting interpreter.
Such a device "engine» PHP script allows processing at a sufficiently high
speed. Popularity in building web sites is determined by the presence of a
large set of built-in tools for developing web applications. The main ones:
· Automated extraction of POST and
GET-parameters and environment variables of Web server in predefined arrays;
· Interaction with many different
database management systems;
· Automated sending HTTP-headers;
· work with HTTP-authorization;
· work with cookies and sessions;
· Work with local and remote files,
sockets;
· processing of files uploaded to the
server;
4. Justification of the
cost-effectiveness of the project
aim of the diploma project is the development of educational
and informational web site, based on cloud computing. This section examines the
degree project site development from an economic point of view.efficiency - it
is possible to obtain maximum benefits from the resources available. To do
this, you need to constantly relate benefits (benefits) and the costs or, to
put it differently, behave rationally. Rational behavior is that the producer
and the consumer goods strive for the highest efficiency and to maximize the
benefits of this and minimize costs.important part of the economic system
efficiency is the efficiency of capital investments. It is expressed by the
ratio of the obtained effect to capital investments that caused this effect.
Capital efficiency is measured set of indicators, which includes the overall
effect of capital investments, the rate of return, payback period, comparative
effectiveness, and others. The indicators of economic efficiency of capital
investments are used to compare alternative investment projects and select the
best project.large role in the economic process (ie, whether economical
software product or not) depends on the programmers have created this software.
You play the role of the creation, debugging, and program.
4.1 Calculating the cost of
materials
install the server part of the software package and necessary
to organize one job for a programmer with a computer or laptop. During the
design phase of the server has been installed in the workplace programmer to
reduce costs. To solve workplace, it was decided to use a laptop of brand
Lenovo model Y580 (processor Intel Core i7-3610QM 2.3 GHz; video card NVIDIA
GeForce GTX 660M - 2048 MB, 8192 MB RAM, DDR3 SDRAM) price which is 163290KZT.
In addition in the process of developing a web site following materials were
used:
• USB Flash Drive 8 GB - 3000KZT.
• Pens, pencils - 500KZT.
• Office paper size A4 - 500 KZT.expenditure on materials is:
167 290 KZT.
4.2 Costs to wages
basic wage is calculated from the Developer salary as well as
the duration of individual stages of work in the development of software
system, taking into account the quality, complexity and working conditions. The
table shows the programmer salary in the field of web development in the past
month. The average number of working days in a month is 22 days.
.
Table 4.1 Staffing the project team
№
|
Position
|
Salary (KZT/ per month.)
|
1
|
Programmer
|
150 000
|
Total
|
150 000
|
Additional monthly payment shall be at the rate of 15%
of basic salary and will be:
KZT. (4.1)
Accrual of social insurance bodies
in wages make up 20% of the basic salary:
KZT. . (4.2)to the plan, the creation of a web site has been divided into
several stages. Number of days worked to create a website of 44 full working
days. Table 4.2 shows the steps and the number of days are designed to perform
a certain stage.
4.2
Stages
Stage
|
Pre-project research
|
Development and coordination of
design
|
Software part of the project
|
Site content
|
Site testing
|
Delivery site in operation
|
Number of days to perform stage
|
5-days
|
7-days
|
19-days
|
5-days
|
3-days
|
5-days
|
total amount of the payment to the employee, including
additional earnings and insurance is shown in Table 4.3.
4.3 Cost of basic and additional salary
Position
|
Salary (tenge per month.).
|
Number of days worked
|
Salary tenge per month.).
|
Sum (KZT)
|
Additional salary (KZT)
|
Social
insurance (KZT)
|
Total (KZT):
|
Programmer
|
150 000
|
44
|
6818,18
|
300000
|
45000
|
60000
|
405000
|
4.3 Expenditure for maintenance and
equipment maintenance
of software system was made on the laptop brand Lenovo Y580
model, the price of which is 163290tg.cost of 1 hour of computer time is
calculated as follows:
h = So / Tc*Ku. (4.3)
Where -
annual operating costs;c - annual fund-time useful PC;u -
coefficient of usage PC (0.7);operating costs are calculated according to the
formula:
o
= Sa+ Sm (4.4)
Where -
deductions for depreciation (12.5% of the PC);m - maintenance costs
(2% of PC).
So =
20411тг + 3265тг = 23676тKZT (4.4)
Fund useful operating time is calculated as the
product of the number of working days per year for the duration of the PC in
the day: hour.cost of one hour of computer time:h.
= 23676/1764* 0.7 = 9,4KZT (4.5)of working time spent on development and
debugging software package was (44 * 8) = 352 hours. Thus, the cost of
maintenance and operation of the PC are:
352 *
9,4 = 3300KZT. (4.6)
Таблица
4.4 Смета затрат
№
|
Wages
|
Sum, KZT.
|
1
|
Expendable materials
|
167290
|
2
|
The costs of maintenance and
operation of equipment
|
3300
|
3
|
The basic wage
|
300 000
|
4
|
Additional salary
|
45 000
|
5
|
Charges to
social security payroll
|
60 000
|
Total:
|
557 590
|
Payback information website will be at the expense of
advertising banner from cloud providers and others. The site was created 4
places for advertising banner with the size of 200x300 pixels. Price on
advertising is shown in Table 4.5
Таблица
4.5 - Price list of advertising on website
|
3 m.
|
1 year
|
Adding advertising 200х300pixels on website
|
25 000 KZT
|
100 000 KZT
|
|
|
|
|
Revenue for 2 years at advertising product is equal to 800
000KZT. Payback site through advertising achieved 16.7 months.for advertising
for one month 25,000 * 4/3 = 33333,3KZT.site in months 557 590 / 33,333.3 =
16.7 months.to this application development need in the general amount of 557
590tg. From the point of view of the economy is efficient and pays off, so it
is advisable to its implementation.
5. Safety
and labor protection
Health and Safety - the science of maintaining the health and
safety for human habitat. This is achieved by the detection and identification
of dangerous and harmful factors, the development of methods and means of
protecting people from their impact in terms of life and production methods and
protection of people in emergency situations, as well as measures to eliminate
the consequences of such situations.
5.1 Characteristics
of the workplace
In this section basic information about occupational safety
and health was covered for place where diploma project was implemented. If be
exact the field of practice was computer laboratory. This room is located in
the building of International University of Information Technology (IITU).:
International University of Information Technology.
Address: Almaty city, Dzhandosov street 8“A”.building is
located in the administrative part of the city, Almalinskiy district.area: 8578
m2.of Employees: 250.
This computer laboratory is one of the many training rooms
which are equipped approximately with 10 personal computers (PC).of computer
laboratory:- 7 meters , Length - 10 meters , Height - 2.5 metersbuilding of the
university is ten-story building. And this building corresponds to its
functional purposes and to the requirements for safety and health. Computer
laboratory which was field for practice in located in fourth floor of the
building. It has a window opening on the southeast side and the front door is
to opposite side.equipment: 10 computers, 1 projector, 1 server.the laboratory
has the air conditioning, heating and automatic fire alarm systems.
5.2 Analysis of dangerous and
harmful factors
working in front of the computer some harmful and dangerous
factors influence to people. These factors can be:
Electromagnetic fields and radiation
Insufficient level of illumination
Increased noise levels
Electrostatic fields
Emotional overloadof these factors in the one way to
influence to the health of human. Finally it can be reason for headaches,
fatigue, and eyesight. After that human become less productive. That is why
that condition for labor in enterprise is one of the important items which have
to keep certain rules.
5.2.1 Production sanitation and
health
Properly designed and executed industrial lighting improves
visual work, reduces fatigue, increases productivity, beneficial effects on the
production environment, providing a positive psychological impact on the
worker, increases safety and reduces injuries.[8]
5.2.2 Lighting
Wrong direction of light in the workplace can create harsh
shadows, reflections, disorient worker. There are three types of lighting -
natural, artificial and combined (both natural and artificial together).The
laboratory used artificial lighting.[12]lighting is used when working at night
and during the day when you cannot provide the normalized values of the natural
light (cloudy weather, short daylight hours). Lighting, in which the lack of
standards for natural lighting is complemented by artificial lighting, is
called a combined[12]
5.2.3 The parameters of the
microclimate
Microclimate parameters can vary widely, while a necessary
condition of human life is to maintain a constant body temperature through
thermoregulation, i.e. ability to regulate heat output into the environment.
Principle of regulation of microclimate - the creation of optimal conditions
for heat exchange of the human body and the environment.The supply rate of
fresh air in the room where the computers are given in Table 8.
In the laboratory temperature of 23 ° C and 50% relative
humidity.In areas where the developed software system is provided with natural
ventilation. To ensure comfortable conditions are used as methods of organization
(the rational organization of the work, depending on the time of day and year,
the alternation of work and rest)
10 - Rates of fresh air in the room where the computers
Characteristicsoftheroom
|
Air flow supplied into the room
fresh air m3 / in per person per hour
|
Volume up to 20m3 per person
|
Atleast 30
|
20 ... 40m3 perperson
|
Atleast 20
|
More than 40m3 per person
|
Naturalventilation
|
5.2.4 Noise and Vibration
The noise degrades the conditions providing the harmful
effects on the human body. Working in conditions of prolonged noise exposure
experienced irritability, headaches, dizziness, memory loss, fatigue, loss of
appetite, pain in the ears, etc. Table 8 shows the maximum sound levels
depending on the category of severity and intensity of labor, which are safe
with respect to maintaining health and performance.the laboratory, the noise
level is defined as a little tense. Noise level in the workplace mathematicians,
programmers and operators of video should not exceed 50dBA, and in the halls of
the information processing on computers - 65dBA.[14]
5.2.5 The electromagnetic and
ionizing radiation
Most scientists believe that a both short-term and long-term
effect of all forms of radiation from the monitor screen is not dangerous for
health personnel serving computers. However, comprehensive data about the
dangers of exposure to radiation from the monitors on working with computers
did not exist, and research in this area continues. Maximum ray workplace
computer operator usually does not exceed 10mkber / h, and the intensity of
ultraviolet and infrared radiation from the screen of the monitor is within
10..100mV/m2.
5.2.6 Ventilation
Ventilation - a set of interconnected devices and processes
designed to create an organization of ventilation, consisting in the removal of
contaminated industrial premises or superheated (cooled) air supply instead of
clean and cold (hot air), allowing you to create a working area favorable air
environment.on the movement of air and clean room ventilation is divided into
an artificial (mechanical), and a natural combination. The laboratory used form
of mechanical ventilation. If ventilation air is generated by mechanical
devices - fans and other thermal pressure difference created by the balance
column of air inside and outside the premises. Thus, a pressure differential
causes air. Wind pressure due to the action of wind, by which on the windward
surface of the building there is a positive pressure on the leeward side of a
depression.
5.3 Health and safety during the
work
.3.1 Requirements for safety before
starting work
There have to be requirements before work and it does not
depend on type of work. This restrictions and notifications will help to get
rid of dangerous consequences and harmful factors. Some restrictions before
working in computer laboratories:
- In the computer lab is not allowed to
work in street clothes, noise, smoking, eating.
- Do not obstruct aisles, exit
corridors and access to fire.
- For each computer user group can
operate no more than two people.
- The user must ensure that no visible
damage to the computer (i.e. violation of hull integrity , insulation failure
in cables , faulty display power- voltage signs on the body , etc.). Never
operate the computer with the case open.
5.3.2 Requirements for safety during
working with PC
In the automated system management where main actions made by
human, visualization of information on the screen plays big role. Because the
size of information which users can reach or understand depends on from this
factors. is why we have to define requirements for devices which demonstrates
information:
- Screen has to be located from eyes in
distance 400 x 800 mm and in the middle of view sight.
- The top sight of the screen has to be
placed on height 750 mm from the surface of the chair.
- The distance between keyboard and
edge of table should be approximately 60mm. Height of the keyboard does not
have to be over than 50 mm. The preferable angle of slope is 150.have to
correspond to the next technical requirements listed below:
- Brightness not less than 100
luminosity per meter square.
- The minimum size of lighting dots -
not over than 0.4 for monochromic screens and not above than 0.6 for colored
screens.
- Number of dots per line - not less
than 640.
- Low-frequency jitter in the range 0.5
+/- 1.0 Hz must be located within 0.1mm.
- Screen must have anti- glare
function.
- Observe the optimal distance between
the eyes and the monitor screen (60- 70 cm);
- Perform comply with sanitary norms
and modes of work and leisure;
- Observe the rules of operation of
computer technology in accordance with the instruction manual;
- Observe the rules of fire safety;
5.4 Health and safety during
emergency
safety - system of organizational measures and technical
means to prevent the harmful and dangerous effects on the operation of the
electric current and the electric arc. In the workplace, place the monitor,
keyboard, system module. Because their work is used alternating current and
voltage of 220 volts. In this respect, it should meet the requirements for
electrical safety.protection of buildings - a set of technical solutions
adopted in accordance with the instructions. The building of the International
University provides internal and external lightning protection system of the
building.disappearance of the compound is intentional electrical conductive
parts of electrical installations with grounded neutral point of the generator
or inverter in three-phase systems with a grounded single-phase AC power output
from a point source based in the DC networks to be carried out to to electrical
safety.in the laboratory, can lead to very negative consequences (loss of
valuable information, property damage, death, etc.), so you must: identify and
eliminate all causes of fire, develop an action plan to eliminate a fire in a
building evacuation plan building.safety - is the state of the object, which is
characterized by the ability to prevent the emergence and development of the
fire, and the impact on people fire hazards.of fire:
• wiring, outlets and switches that could cause a short
circuit or insulation breakdown;
• Use of damaged (defective) devices;
• internal use electric heaters with open heating elements;
• The risk of fire due to lightning in the building;
• inflammation of the building due to external
influences;safety - a complex of organizational and technical measures aimed at
providing good security people on the prevention of fire, limiting its spread
and to create conditions for effective fire extinguishing. As fire prevention
is extremely important to the correct assessment of the fire building, hazard
identification and alignment of the ways and means of fire safety and
protection. One of the conditions for fire safety - eliminating possible
sources of ignition. This is very dangerous for the computer and the
developer.handling of fire and failure measures to comply with fire
safetywatched fire mode, which defines the rules of human behavior, organization
of educational process and service facilities to ensure fire safety
requirements.determining the terms of fire safety at the University of
identified:
• smoking area;
• the place and the maximum amount of raw materials,
flammable and combustible liquids and hazardous substances;
• procedure for cleaning dust and combustible waste;
5.5 Engineering calculations
Light calculation job is to choose the lighting system, the
definition of the required number of fixtures, type and placement. On this
basis, we calculate the parameters of the artificial lighting.
5.5.1 Light calculation
The calculation is performed for lighting rooms of 15m2, with
a width 5m, height - 3 m use the method of flux.
To determine the number of lamps define the luminous
fluxincident on the surface by the formula:
(4.1)
- Calculated luminous flux lm;- Normalized minimum
illumination, Lk (determined by the table). Programmer's job, according to this
table can be classified as precision work, therefore, the minimum illumination
will be E = 300Lk;- The illuminated area of the room (in this case S = 15m2);-The
ratio of average brightness to the minimum (usually taken to be 1,1.1,2, let Z
= 1, 1);
К -
factor of safety, taking into account the reduction in light output light
fixtures as a result of contamination during use (it value depends on the type
and character space held therein works and in this case K = 1.5);- Utilization
rate (expressed as the ratio of the light flux incident on the calculated
surface to the total flux of all lamps and is calculated as a fraction of a
unit, depending on the characteristics of the lamp, the size of the room,
painting walls and ceilings, which are characterized by reflection coefficients
of the walls (Рs) and ceiling (Рp)), value of the coefficients Рs and Рp have been mentioned above: Рs=40%, Рp=60%.value of n is defined
by the table of coefficients using different fixtures. To do this, we calculate
the index space by the formula:
(4.2)
-Room space, S = 15 m2;-Rated altitude of
suspension, h = 2.92 m;
А
-Width of the room, А = 3 m;
В
-Length of the room, В = 5 m.the values we get:
the index premises I, we find n = 0,22substitute all the
values in the formula for determining the luminousflux F:
fluorescent lighting, select the type LB40-1, the luminous
flux which F = 4320 Lk.Calculate the number of lamps required by the formula:
(4.3)
-Determined by the number of lamps;-Luminous flux, F = 33750
Lm;l-light stream of a lamp, Fl = 4320 Lm.
choosing lighting luminaries use ML. Each
lamp comes with two lamps.
5.5.2 Calculation of noise
One of the negative factors working environment at the ITC is
a high level of noise generated printing systems of air conditioning equipment,
fans cooling systems in computers themselves.order to address the need for and
feasibility of noise reduction is necessary to know the noise levels at the
operator. The noise level arising from a few incoherent sources operating at
the same time, calculated on the basis of the principle of energy summation of
individual radiation sources:
(4.4)
i -sound pressure level of the i source;- The number of noise
sources.this sound pressures will maximum this is very dangerous to developer earns,
because many noise is hazardous to peoples.operator station is equipped with
the following equipment: hard drive in the system unit, the fan (s) cooling PC,
monitor, keyboard, printer and scanner. Substituting the values of sound
pressure level for each type of equipment in the formula, we get:
∑=10·lg(104+104,5+101,7+101+104,5+104,2)=49,5
dB.
when you consider that it is unlikely peripherals such as a
scanner and a printer will be used at the same time, this figure would be even
lower. In addition, if the printer is not necessarily the immediate presence of
the operator.
Conclusion
diploma project is dedicated to developing an informational
web-application for deploying hybrid infrastructure.the programming the fully
working functional application was developed, where stored theoretical material
and assembled laboratory works .works was realized by using Windows Server
2008R2/2012R2, Hyper-V virtualization, Windows Azure and was published by the
link cloudy.kz.section contains review of the cloud computing technology,
service models(SaaS, PaaS, IaaS) and deployment models(private cloud, public
cloud, hybrid cloud) of cloud computing, advantages and disadvantages of types
of deployment models cloud computing, and the safety information on clouds.section
contains the whole information about technology of virtualization including
types virtualization resources(association, aggregation and concentration of
components, grid computing, partitioning, encapsulation), types virtualization
of platforms(Full emulation (simulation), paravirtualization, application level
virtualization, operating system-level virtualization, virtualization address
space) and hypervisor and his types(Monolithic, microkernel, 1-rst type of
hypervisor (established on a "bare metal") , 2-nd type of hypervisor
(installed inside the OS) , hybrid hyperisor).section contains algorithm of
web-application which I named as “Cloudy”. Described functional of website and
software tools which used in creating web-application.section presents economic
justification and benefits of using the product developed on cloud
computingsection provides for the Labor protection and Industrial
Ecology.developing of program complex main attention was focused on the user
experience and user friendly interface. The objectives of the diploma project
have been made in full.
References
1
Federov A. G. Martinov D. N. Windows Azure Platform [ Электронный ресурс ] - Режим доступа
к журн. :
http://download.microsoft.com/documents/rus/msdn/Windows_Azure_web.pdf
IAAS,PAAS,SAAS
explained complained [ Электронный ресурс ] - Режим доступа
к журн. :
http://apprenda.com/library/paas/iaas-paas-saas-explained-compared/
Tejaswi
Redkar Windows Azure Platform [ Электронный ресурс ] - Режим доступа к журн. : http://it-ebooks.info/read/1033/
D.
L. Petrov Optimal algorithm for data migration in scalable storage clouds - ,
180-197
5 Theoretical Foun. of Life Safety [ Электронный ресурс ] - Режим доступа к журн. : http://userdocs.ru/geografiya/16692/index.html
Lighting jobs [ Электронный ресурс ] - Режим доступа к журн. : http://bargu.by/2991-laboratornaya-rabota-2-osveschenie-rabochih-mest.html
7
Dubovsev V.A.Life Safety - A manual for graduate students. - Kirov: ed. KIRPi
-1996
Motuzko
F.Y. Occupational safety and health-:1998. - 336p.
9
Life safety. /Under red. N.A.Belov -Znanie, 2000 - 364p.
10 Самгин
Э.Б. Освещение рабочих мест. - М.: МИРЭА, 1989. - 186с.
11
Handbook for the design of electric lighting. / Under red. G.B.Knorring. -
Energy, 1976.
Control
: Directory/ E.Y.Udin, L.A. Borisov; Under gen. red. E.Y. -Engineering, 1985. -
400p., us.
.Official
website of Windows Azure platform [ Электронный ресурс ] - Режим доступа к журн. :
http://windowsazure.com
14 Бесплатная
электронная книга «Введение в System Center 2012 R2»
[ Электронный
ресурс ] - Режим доступа к журн. : http://blogs.technet.com/b/rutechnews/archive/2014/01/13/171-system-center-2012-r2-187.aspx
.Official website of CSS [ Электронный ресурс ] - Режим доступа к журн. : http:// cssdesignawards.com
. Official website of Gliffy [ Электронный ресурс ] - Режим доступа к журн. : http://www.gliffy.com
17
John W. Rittinghouse, James F. Ransome - «Cloud Computing Implementation,
Management, and Security»
Robert
Larson , Janique Carbone - «Windows Server 2008 Hyper-V Resource Kit»
Джордж Риз - «Cloud Application Architectures»
20 Трудовой кодекс Республики Казахстан. Астана, Акорда, 15 мая 2007 года
№ 251-III ЗРК (с изменениями и дополнениями по состоянию на 17.01.2014).
(Закон Республики Казахстан от 28 февраля 2004 года №528 «О безопасности
и охране труда» признан утратившим силу с момента введения в действие Трудового
кодекса Республики Казахстан).
Санитарные правила «Санитарно-эпидемиологические требования к
эксплуатации и персональных компьютеров, видеотерминалов и условиям работы с
ними», утвержденные приказом Министра здравоохранения Республики Казахстан от
25 апреля 2011 года № 217.
22 Санитарные
правила «Санитарно-эпидемиологические требования к условиям работы с
источниками физических факторов (компьютеры и видеотерминалы), оказывающие
воздействие на человека», утвержденные приказом Министра здравоохранения
Республики Казахстан от 1 декабря 2011 года № 1430.
23 Санитарные правила «Санитарно-эпидемиологические требования к
обеспечению радиационной безопасности», утвержденные Правительством Республики
Казахстан от 3 февраля 2012 года № 202.
Закон Республики Казахстан «О гражданской защите» от 11 апреля
2014 года № 188-V (Закон Республики Казахстан от 22 ноября 1996 года «О
пожарной безопасности» признан утратившим силу с момента введения в действие
Закона «О гражданской защите»).