Cloud Computing UNIT-3

You might also like

You are on page 1of 14
3. Enabling Cloud Technologies ‘Web services: XML, SOAP, REST A Web Service is can be defined by following ways: © Itisa client-server application or application component for communication. © The method of communication between two devices over the network. © Itisa software system for the interoperable machine to machine communication. © It isa collection of standards or protocols for exchanging information between two devives or application. XML XML stands for Extensible Markup Language. It is a text-based markup language derived from Standard Generalized Markup Language (SGML), XML tags identify the data and are used to store and organize the data, rather than specifying how to display it like HTML tags, which are used to display the data, XML is not going to replace HTML in the near future, but it introduces new possibilities by adopting many successful features of HTML. ‘There are three important characteristics of XML that make it useful in a variety of systems and solutions ~ © XML is extensible ~ XML allows you to create your own self-descriptive tags, or language, that suits your application. © XML carries the data, does not present it — XML allows you to store the data irrespective of how it will be presented © XML isa public standard ~ XML was developed by an organization called the World Wide Web Consortium (W3C) and is available as an open standard. The following diagram depicts the syntax rules to write different types of markup and text in an XML document. EntityReforences Bap; ‘Character References: 8465; (= ears Allowed ment Desciption « hy ese than > Bet: greater than & amp; ampersané apos; apostrophe Ge} quot; quotation mark -¢href~"heps/ www online comy"sonlines/a> Data Collected By Omkar Javadwar An XML document with correct syntax is called "Well Formed". ‘ The syntax rules + XML documents must have a root element + XML elements must have a closing tag cto>Tovechts> + XML tags are case sensitive from>Jani + XML elements must be properly nested See + XML attribute values must be quoted wweekend! Valid XML Documents ‘A *well formed" XML document is not the same as a "valid" XML document. ‘A “valid” XML document must be well formed. In addition, it must conform to a document type definition. There are two different document type definitions thet can be used with XML: 1, DTD - The original Document Type Definition 2. XML Schema - An XML-based alternative to DTD A document type definition defines the rules and the legal elements and attributes for an ‘XML document. XML - DTD XML- Schema /* ‘70 sx rooaer pe Don, \, /+ tts eset sees ae te. [+ kor dinesbesoutucentteedenensantiogesctacaa — / , Mina Shemctees ene nn oes ticnet “fri ent tot nM Scene th Wel oe and iene exe? UF “a terete ENN t> cena’ co cecmpte equ “eee ean pees > extn eine ee oop or pte is weld o> ; Ie. “heen? \ ... ... ... .. Envelope ~ Defines the start and the end of the message. It is a mandatory element, Header ~ Contains any optional attributes of the message used in processing the message, either at an intermediary point or at the ultimate end-point. It is an optional element. Body ~ Contains the XML data comprising the message being sent. It is a mandatory element. Fault ~ An optional Fault clement that provides information about errors that occur while processing the message. "1.05 Data Co 2. WSDL © WSDL is an acronym for Web Services Description Language. © WSDL is a part of UDDL. It acts as an interface between web service applications. © WSDL is pronounced as wiz-dull, @ WSDL js an XML-based language for describing Web services and how to access them, © WSDL is an XML based protocol for information exchange in decentralized and distributed © environments. © WSDL is the standard format for describing a web service. © WSDL definition describes how to access a web service and what operations it will perform, © WSDL is the language that UDDI uses, an XML-based worldwide business registry. © WSDL was developed jointly by Microsoft and IBM. WSDL has three parts: = Definitions Defini ns Data type defnitions Message defitions Data type defnitions Message definitions Data type defnitions ‘Messane definitions Operations pemee Por type a Fo. & to = Operations = Service bindings Element Deseri © A container for data type definitions used by the web service A typed definition of the data being communicated ® A set of operations supported by one or more endpoints ® A protocol and data format specification for a particular port type ion 3. UDDI UDDI is an XML-based standard for describing, publishing, and finding web services, © UDDI stands for Universal Description, Discovery, and Integration, © UDDI isa specification for a distributed registry of web services. © UDDI isa platform-independent, open framework. ¢ UDDI can communicate via SOAP, CORBA, Java RMI Protocol. © UDDI uses Web Service Definition Language(WSDL) to describe interfaces to web services. © UDDI is seen with SOAP and WSDL as one of the three foundation standards of web services. © UDDI is an open industry initiative, enabling businesses to discover each other and define how they interact over the Internet. UDDI has two sections ~ © A registry of all web service's metadata, including a pointer to the WSDL description of aservice. © A set of WSDL port type definitions for manipulating and searching that registry. REST [REpresentational State Transfer] © REST is an architectural style not a protocol © First introduced in 2000 by Roy Fielding at the University of California © REST uses HTTP methods explicitly ie. the interaction between the client and services will happen through HTTP protocol. © Expose directory structure like URI’s © Transfer XML, Java Script Object Notation (JSON) or both. © Uses XML while creating Java or Net application and JSON is used while developing Web Application. © Service should be stateless ic. deleted. . once the request is completed the request is erased or © There are plenty of reasons why REST has become more popular than SOAP. Data Collected By Omkar Javadwar ‘SOAP REST SOAP isa protocol REST isan architectural ‘SOAP can’t use REST because it isa protocol REST can use SOAP because i is a concept and can use protocols such as HTTP, SOAP SOAP uses services interface to expose the business logic REST uses URI to expose business logic TAX-WS is a Java API for SOAP Web Services TAX-RS is a Java API for REST Web Services SOAP defines standards to be strictly followed. REST does not define too many standards like SOAP SOAP requires more Eandwidth and resources than REST REST requires less bandwidth and resources than SOAP SOAP permits XML format only. REST permits different formats such as HTML, Text, XML, JSON and so on, Data Collected By Omkar Javadwar Taste 7.1 SOAP/WSDL versus REST SOAP/WSDL REST Comments Location Some endpoints Allendpoints Complex B2B can be behind must be on the scenarios corporate internet require SOAP networks on non-HTTP connects, e.g. message queues Security HTTPS which can Only HTTPS Very stringent be augmented security needs with additional can be security layers addressed only by SOAP Efficiency XML parsing XML parsing can REST is lighter and required be avoided by _ more efficient using JSON Transactions Can be supported No support Situations requiring complex multi-request / multi-party transactions need SOAP Technology Can work without’ Relieson HTTP REST is for pure HITP, e.g. internet com- using messi munications queues instead and cannot mix other transports Tools Sophisticated tools No special tools REST is lighter required (and required and easier to use are available) to especially if handle client using JSON and server development Productivity Low, due to High, due to REST is faster and complex tools simplicity cheaper for and skills developers to needed use Data Collected By Omkar Javadwar Virtualization ‘Virwalization, in computing, refers to the act of creating a virtual (rather than actual) version of something, including but not limited to a virtual computer hardware platform, operating system (OS), storage device, or computer network resources. HYPERVISOR or VMM © The software or firmware that creates a virtual machine on the host hardware is called a hypervisor or VMM. © In virtualization, the host machine is the actual machine on which the virtualization takes place, and the guest machine is the virtual machine. The words host and guest are used to distinguish the software that runs on the physical machine from the software that runs on the virtual machine. ‘Types of Hypervisor TYPE - I: Type I hypervisors run directly on top of the hardware. Therefore, they take the place of the operating systems and interact directly with the ISA (Instruction Set Architecture) interface exposed by the underlying hardware, and they emulate this interface in order to allow the management of guest operating systems. This type of hypervisor is also called a native virtual machine since it runs natively on hardware. TYPE - II: Type II hypervisors require the support of an operating system to provide Virtualization services. This means that they arc programs managed by the operating system, which interact with it through the Application Binary Interface (ABI) and emulate the ISA of virtual hardware for guest operating systems. This type of hypervisor is also called # hosted virtual machine since it is hosted with in an operating system. Go Virtual Machine Manager a Go) Type-T Type - IT Data Collected By Omkar Javadwar Different types of virtualization & ; a 5 |{s g)/8] | & alls 2) a} /2 cuos] | cwsos} | 8 || $ 2) 3/18 Vial Macine Monitor Guest 8 VM |VM- VM (Host VMM) Vitual Machine Montor Opening ysien Operating stm ‘hatve Vii) Hardvare Hardware Hardware Process Virtual Machines: ‘System Virtual Machines ‘System Virtual Machines (Host) (Native) 1) Full virtualization: Almost complete simulation of the actual hardware to allow software, which typically consists of a guest operating system, to run unmodified. (VMWare’s ESXi) 2) Partial virtualization: Some but not the entire target environment is simulated, Some guest programs, therefore, may need modifications to nun in this virtual environment. (Java JVM) 3) Paravirtualization: A hardware environment is not simulated; however, the guest programs are executed in their own isolated domains, as if they are running on a separate system. Guest programs need to be specifically modified to run in this environment. (VMWare’s Workstation) Advantages: © Managed execution and isolation # Portability and self-containment © Efficient use of resources Disadvantages: © Performance degradation © Inefficiency user experience © Security holes and new threats Data Collected By Omkar Javadwar 10 Virtualization applications in enterprises Application Virtualization 2 Application virwalization is software technology that encapsulates application software from the underlying operating system on whieh it is executed 2 A fully virtualized application is not installed in the traditional sense, although it is still executed as if it were. I The application behaves at runtime like it is directly interfacing with the original operating system and all the resources managed by it, but can be isolated One of the most popular solutions implementing application virtualization is Wine, which isa software application allowing Unix- like operating systems to execute Desktop Virtualization Desktop virtualization abstracts the desktop environment available on a waitin personal computer in order to provide — access to it using a client or server wenssmocTne> approach. CD It is the concept of separating the logical desktop from the physical machine. It makes accessing to a system which is =. stored remotely on a different host and accessed through a network connection. & Ql It simplifies software versioning and QR wmarive ‘curnts a patch management, where the new image is simply updated on the server, and the desktop gets the updated version when it reboots, Server Virtualization Itis a technique of running multiple independent virtual operating systems on a single physical server system. Q The division of physical server into multiple servers is carried out by the use of virtualization software. This masking will include physical servers, processors and operating systems, The process is carried out in an intelligent way, where the masking of server resources is kept isolated from the server users. Data Collected By Omkar Javadwar u Network Virtualization Network virtualization combines hardware appliances and specific software for the creation and Management of a virtual network. OF Network virtualization can aggregate different physical networks into a single logical network (external network virtualization) Q Provide network — like functionality to an operating system partition (internal network virtualization). The result of external network virtualization is generally a virtual LAN (VLAN). Q Intemal network virtualization is generally applied together with hardware and operating system-level virtualization, in which the guests obtain a virtual network interface to communicate with Storage Virtualization © Storage virtualization is a system administration practice thet allows decoupling the physical organization of the hardware from its logical representation. 2 There are different techniques for storage virtualization, one of the most popular being, network-based virtualization by means of storage area networks (SANS). Q Storage virtualization allows us to harness a wide range of storage facilities and represent them under a single logical file system. Using this technique, users do not have to be worried about the specific location of their data, which can be identified using a logical path. ryscatosk | (LUNMMDIsK) Data Collected By Omkar Javadwar 2 ‘Case Study: Amazon EC2 a The Amazon cloud provides infrastructure as a service (IaaS), whereby computing infrastructure is virtually provisioned in minutes through an automated web-based management console. This core IasS service, called Elastic Compute Cloud or EC2 The Elastic Compute Cloud service provides users access to dedicated virtual machines of a desired capacity that are provisioned. Through the management console users generate PKI key-pairs using which they can securely login to these virtual servers over the internet. In fig. User C provisions the virtual server VM4 through the management console, and accesses it using ssh, Linux server, or ‘remote desktop’ Windows server. Users have a choice of virtual machine images (called Amazon machine images, or AMIs) to choose from when provisioning a server. All AMIs are stored in common storage in the Amazon S3 storage service and used to boot the desired configuration of virtual server. The user's account is charged on an hourly basis based on actual consumption. Charges vary depending on the AMI used and capacity of server chosen. For example, a ‘small’ Linux server costs a few cents per epu - hour, whereas a larger server preloaded with licensed software. such as Windows, as well as other database or middleware products, could end up costing close to a dollar per hour. Static network addresses required for such purposes can also be provisioned through the management console. Static IP addresses are charged on a fixed monthly basis. Users can provision and access many servers that can communicate with each other over the fast internal network within the Amazon cloud, The Amazon SimpleDB service provides an object store where key-value pairs can be efficiently stored and retrieved. It is important to understand that virtual servers do not have any persistent storage; 50 any user data on file system (i.e. whatever is not part of the AMI) is lest when the server shuts down, In order to store date persistently, such in a relational database, Elastic Block Storage needs tobe mounted on a virtual server. The Elastic Block Storage service maintains persistent data across all users on a large set of physical servers. The Amazon Simple Queue Service (SQS) is a reliable persistent message queue that is usefull for temporarily storing data that needs to eventually get to a processing server such as VM6 Data Collected By Omkar Javadwar 1B @ Amazon S3 is especially useful for reliably storing large collections of unstructured data. It is important to note that all data in $3 is outomatically replicated ct least three times for fault tolerance. Runtime performance parameters, such as CPU and V/O utilization, of a user's virtual servers can be monitored in real-time by Amazon Cloud Watch; Q Elastic Load Balancing allows a group of servers to be configured into a set across which incoming requests (e.g, HTTP connections) are load balanced. Q The performance statistics of the load-balanced requests can also be monitored by Cloud Watch and used by Auto Scale to add or remove servers from the load balanced cluster. Amazon EC? provides a Virtual Private Cloud service, whereby virtual servers can be connected to an enterprise's internal network using a VPN (virtual private network). Data Collected By Omkar Javadwar

You might also like