Eucalyptus

Submitted by: Submitted by

Views: 131

Words: 7063

Pages: 29

Category: Science and Technology

Date Submitted: 11/24/2013 12:04 AM

Report This Essay

S.no. | Experiments | Date of submission | Remark |

1 | Case study of Euceliptus. | | |

2 | Case study of Service deployment & usage over cloud. | | |

3 | Management of cloud resources. | | |

4 | Case study of existing cloud characteristics & Service model. | | |

5 | Case study on Cloud security management. | | |

Experiment No.1

AIM: Case study of Euceliptus .

Euceliptus  is a free and open-source computer software for building Amazon Web Services (AWS)-compatible private and hybrid cloud computing environments marketed by the company Eucalyptus Systems. Eucalyptus enables pooling compute, storage, and network resources that can be dynamically scaled up or down as application workloads change. Eucalyptus Systems announced a formal agreement with AWS.

Eucalyptus uses the terminology

* Images - An image is a fixed collection of software modules, system software, application software, and configuration information that is started from a known baseline (immutable/fixed). When bundled and uploaded to the Eucalyptus cloud, this becomes a Eucalyptus machine image (EMI).

* Instances - When an image is put to use, it is called an instance. The configuration is executed at runtime, and the Cloud Controller decides where the image will run, and storage and networking is attached to meet resource needs.

* IP addressing - Eucalyptus instances can have public and private IP addresses. An IP address is assigned to an instance when the instance is created from an image. For instances that require a persistent IP address, such as a web-server, Eucalyptus supplies elastic IP addresses. These are pre-allocated by the Eucalyptus cloud and can be reassigned to a running instance.

* Security - TCP/IP security groups share a common set of firewall rules. This is a mechanism to firewall off an instance using IP address and port block/allow functionality. At TCP/IP layer 2 instances are isolated. If this were not present, a user could...