1、谈高校云计算的必要性和谈高校云计算的必要性和可行性可行性肖 波 一、云计算是一、云计算是IT IT发展的趋势发展的趋势1980s 计算机就是计算机;1990s 网络就是计算机2000s 数据中心就是计算机2010-云计算就是计算机?2011 Gartner“IT Hype Cycle”for Emerging Technologies2011 Gartner“IT Hype Cycle”for Emerging Technologies2011 Gartner“IT Hype Cycle”for Emerging Technologies2011 Gartner“IT Hype Cycle”f
2、or Emerging Technologies20072008200920102011Copyright 2012,Elsevier Inc.All rights reserved.Clouds and Internet of ThingsClouds and Internet of ThingsHPC:HPC:High-High-Performance Performance ComputingComputingHTC:HTC:High-High-Throughput Throughput ComputingComputingP2P:P2P:Peer to PeerPeer to Peer
3、MPP:MPP:Massively Massively Parallel Parallel ProcessorsProcessorsThe Internet of ThingsThe Internet of Things(IoT)(IoT)InternetCloudsInternet of ThingsThe InternetSmart EarthSmart Earth:An IBM DreamCloudCloud 云计算将IT相关的能力以服务的方式提供给用户,允许用户在不了解提供服务的技术、没有相关知识以及设备操作能力的情况下,通过Internet获取所需要的服务。Vaquerolm的定义
4、云是一个包含大量可用的虚拟资源(硬件、开发平台、I/O服务)的资源池。这些资源可以根据不同的负载动态地重新配置,以达到更优化的资源利用率。The Next Revolution in ITThe Next Revolution in ITCloud ComputingClassical ComputingClassical ComputingClassical ComputingClassical Computing Buy&OwnBuy&OwnBuy&OwnBuy&Own Hardware,System Software,Hardware,System Software,Hardware,S
5、ystem Software,Hardware,System Software,Applications often to meet peak Applications often to meet peak Applications often to meet peak Applications often to meet peak needs.needs.needs.needs.Install,Configure,Test,Verify,Install,Configure,Test,Verify,Install,Configure,Test,Verify,Install,Configure,
6、Test,Verify,EvaluateEvaluateEvaluateEvaluate ManageManageManageManage.Finally,use itFinally,use itFinally,use itFinally,use it$.$(High CapEx)$.$(High CapEx)$.$(High CapEx)$.$(High CapEx)Cloud ComputingCloud ComputingCloud ComputingCloud Computing SubscribeSubscribeSubscribeSubscribe UseUseUseUse$-pa
7、y for what you use,based on$-pay for what you use,based on$-pay for what you use,based on$-pay for what you use,based on QoSQoSQoSQoSEvery 18 months?Copyright 2012,Elsevier Inc.All rights reserved.(Courtesy of Raj Buyya,2012)Basic Concept of Internet CloudsTransparent Cloud Computing EnvironmentClou
8、d Computing Challenges:Dealing with too many issues(Courtesy of R.Buyya)(Courtesy of R.Buyya)VirtualizationQoSService Level AgreementsResource MeteringBillingPricingProvisioning on DemandUtility&Risk ManagementScalabilityReliabilityEnergy EfficiencySecurityPrivacyTrustLegal&RegulatorySoftware Eng.Co
9、mplexityProgramming Env.&Application Dev.云计算技术云计算技术三大模式四大部署云计算的关键技术云计算的三大交付模式云计算的三大交付模式SaaSPaaSIaaS云计算的四大部署云计算的四大部署公共云私有云社区云混合云云计算的关键技术云计算的关键技术虚拟化技术分布式计算和并行计算分布式存储分布式海量数据管理1.1.虚拟化技术虚拟化技术服务器虚拟化存储虚拟化应用虚拟化平台虚拟化桌面虚拟化二、高校云计算必要性二、高校云计算必要性减少硬件浪费绿色节能提高效率方便管理资源共享降低管理成本u业务系统增多,只能通过采购新的硬件设备进行业务支撑,硬件设备业务系统增多,只能
10、通过采购新的硬件设备进行业务支撑,硬件设备一多,导致一多,导致“机房空间拥堵、能耗较高、不够环保机房空间拥堵、能耗较高、不够环保”!u数据中心虽拥有众多数据中心虽拥有众多PC服务器,但服务器的资源利用率一直较低,存服务器,但服务器的资源利用率一直较低,存在较为严重的资源浪费!在较为严重的资源浪费!u数据中心软硬件较多,但安全性重视程度不够,缺少系统必备的可靠数据中心软硬件较多,但安全性重视程度不够,缺少系统必备的可靠性设计,且设备宕机的风险较大!性设计,且设备宕机的风险较大!u机房环境复杂,软硬件设备繁多,系统管理人员难以有足够的精力来机房环境复杂,软硬件设备繁多,系统管理人员难以有足够的精力
11、来进行管理和维护!进行管理和维护!传统数据中心数据中心现状状服服务器的百分比器的百分比主时间高峰时间20%40%60%80%0%0-10%20-30%40-50%60-70%80-90%CPU 利用率利用率当前服当前服务器利用率很低器利用率很低为未使用的未使用的计算算资源源买单x86服服务器采器采购量量/年年需要管理的服需要管理的服务器数量不断增器数量不断增长服服务器部署:器部署:20%杂项 30%安全:安全:10%支持:支持:20%备份和份和监视:15%在低价在低价值的任的任务上花上花费了太多的了太多的时间,例如采,例如采购和和调配配数据中心管理效率低数据中心管理效率低系系统管理管理员如何使
12、用他如何使用他们的的时间低价值任务硬件采硬件采购:5%除了硬件的成本,除了硬件的成本,服服务器器对空空间的不的不断侵占断侵占还带来了管来了管理成本的增理成本的增长20002002200420062008费用(以十用(以十亿美元美元为单位)位)管理和管制成本服务器费用501001500200管理成本占管理成本占TCO的大部分的大部分100%990%的服务器的服务器90%的运行时间的运行时间CPU占用率低于占用率低于10%919-9-19-9-1原则原则1-主机存储层面主机存储层面大学数据中心大学数据中心现状状Datacenter and Server Cost Distribution三、高校云
13、计算可行性三、高校云计算可行性数据中心虚拟化私有云PaaSSaaS虚拟机与数据中心虚拟化虚拟机与数据中心虚拟化 Server Consolidation in Virtualized DatacenterServer Consolidation in Virtualized Datacenter Virtual Storage Provisioning and Virtual Storage Provisioning and DeprovisioningDeprovisioning Cloud Operating Systems for Virtual Datacenters Cloud Op
14、erating Systems for Virtual Datacenters Trust Management in virtualized Datacenters Trust Management in virtualized Datacenters传统计算机与虚拟机的区别传统计算机与虚拟机的区别(Courtesy of VMWare,2008)何为虚拟化何为虚拟化?(Courtesy of VMWare,2008)VMM VMM 作用作用 (1)(1)(Courtesy of Mendel Rosenblum,2006)VMM VMM 作用作用(2)(2)(Courtesy of Men
15、del Rosenblum,2006)VMM VMM 作用作用(3)(3)(Courtesy of Mendel Rosenblum,2006)VMM VMM 作用作用(4)(4)(Courtesy of Mendel Rosenblum,2006)主要主要主要主要 的的的的VMM VMM 和和和和 Hypervisor Hypervisor 软件包软件包软件包软件包 存存储虚虚拟化化I/O虚虚拟化化CPU,存储器和存储器和I/O虚拟化的总结虚拟化的总结 CPU virtualization demands hardware-assisted traps of CPU virtualizati
16、on demands hardware-assisted traps of sensitive instructions by the VMM sensitive instructions by the VMM Memory virtualization demands special hardware support Memory virtualization demands special hardware support (shadow page tables by (shadow page tables by VMWareVMWare or extended page table by
17、 or extended page table by Intel)to help translate virtual address into physical address Intel)to help translate virtual address into physical address and machine memory in two stages.and machine memory in two stages.I/O virtualization is the most difficult one to realize due to I/O virtualization i
18、s the most difficult one to realize due to the complexity if I/O service routines and the emulation the complexity if I/O service routines and the emulation needed between the guest OS and host OS.needed between the guest OS and host OS.虚拟机的热迁移虚拟机的热迁移Resource provisioning methodsResource provisionin
19、g methodsDemand-driven resource provisioning based on the current utilization level of the allocated resources.(60%)Event-driven resource provisioning based on a specific time event.(predicte)Popularity-driven resource provisioning by popularity demand.(Internet searches)虚拟机可信管理虚拟机可信管理Tenant#2APPOSA
20、PPOSVirtual InfrastructurePhysical InfrastructureCloud ProviderAPPOSAPPOSVirtual InfrastructureTenant#1Insulate information from cloud providers employeesInsulate information from other tenantsInsulate infrastructure from Malware,Trojans and cybercriminalsSegregate and control user accessControl and
21、 isolate VM in the virtual infrastructureFederate identities with public cloudsIdentity federationVirtual network securityAccess MgmtCybercrime intelligenceStrong authenticationData loss preventionEncryption&key mgmtTokenizationEnable end to end view of security events and compliance across infrastr
22、ucturesSecurity Info.&Event MgmtGRCAnti-malware(Courtesy of L.Nick,EMC 2008)虚拟化市场虚拟化市场虚拟化市场虚拟化市场 2006 to 2011 2006 to 2011 增长情况增长情况增长情况增长情况 私有云操作系统私有云操作系统私有云操作系统私有云操作系统 March 5,2012Prof.Kai Hwang,USCCloud Roles in The Future Internet(Courtesy of G.Xie and Z.Li 2012)Three Aspects in Hardware that can
23、 benefit from Cloud Computing 1.The illusion of infinite computing resources available on demand,thereby eliminating the need for cloud users to plan far ahead for resource provisioning.2.The elimination of an up-front commitment by cloud users,thereby allowing companies to start small and increase
24、the hardware resources when needed in the future.3.The ability to pay the costs of computing resources on a short-term basis as needed(e.g.,processors by the hour and storage by the day)and release them after done and thereby rewarding resource conservation.(Courtesy of M.Ambrust,et al 2009)Cost-Effectiveness in Cloud ComputingCost-Effectiveness in Cloud Computingvs.Datacenter Utilizationvs.Datacenter Utilization(Courtesy of M.Ambrust,et al 2009)IaaS,PaaS,SaaSIaaS,PaaS,SaaSIaaS:Infrastructute as a servicePaaS:Platform as a serviceSaaS:Software as a service 谢谢