Recent Advances in Applied & Biomedical Informatics and Computational Engineering in Systems Applications
|
|
- Prudence Beasley
- 8 years ago
- Views:
Transcription
1 Comparison of Technologies for Software ization PETR SUBA, JOSEF HORALEK, MARTIN HATAS Faculty of Informatics and Management, University of Hradec Králové, Rokitanského 62, Hradec Kralove Czech Republic Abstract: The article presents the results of testing of some selected freely available tools for software virtualization. The article introduces at first the basic terms and principles of virtualization and the potential of its use. It further deals in more details with the full virtualization principles focused to the software virtualization. The article then presents the selected tested tools and testing methods. The measured values are represented by means of graph and its interpretation. On the basis of the measured data, one of the tested tools with the best proved properties of the measured values is recommended. Key-Words: ization, Windows PC, Oracle Vistual Box, CPU, memory, test, usability 1 Introduction to virtualization The aim of this article is to present the basic principles of virtualization and to recommend a tool for software virtualization on the basis of tests performed with some selected freely available virtualization tools. The given tool will be then used at the Faculty of Informatics and Management, University of Hradec Králové (FIM UHK) for specific operating system tasks testing. ization as a concept was developed for the first time by IBM in 1960s. During 1980s and 1990s, desktop computers and x86 servers became much more available and, therefore, virtualization had not undergone any significant progress at that period. The client-server applications and emergence of operating systems Windows and Linux made both the server technologies and home PCs markedly cheaper. However, new challenges have appeared, such as time-consuming maintenance of the existing computers, high operating cost or high failure rate, which led to the development of x86 virtualization. ization has increased the effectiveness dramatically and reduced the overall IT expenses. At present, virtualization is understood to be a relatively new concept by means of which many practical problems related to the information technologies use can be solved [1]. In general, we can say virtualization is a means allowing creation of the so-called virtual objects. ization can be performed on various levels, from the whole computer to the individual components creation: We can have a virtual disc, a virtual memory, or a virtual processor. By means of a virtualization tool, a different operating system can be started in an ing operating system. ization changes nearly all aspects of the operating system and storages administration. Using the virtualization technology, we can create training, testing, or even developmental environments; there are more possibilities to save physical means and expenses. And we must not forget another important advantage of the virtualization technology resistance to failures and high availability. ization allows more operating systems run in one physical machine, e.g. Windows, Linux etc. The number of virtual machines that can run simultaneously in one machine depends on hardware specification. At present, virtual machines are implemented in most data centres as normal servers but with much less maintenance and administration cost. This technology potential is huge and plays a great role in the computer science future [2]. 1.1 ization benefits Consolidation of servers definitely is the greatest benefit of virtualization. ization has become a saving means of about 60% of companies. Their IT departments have been transforming the physical servers to the virtual ones. Such transformation has several advantages [3]. Continuity of operation and high availability The virtual server is separated from a particular physical hardware and can easily be backed up and restored in another hardware or another locality. Advanced virtualization technologies thus allow the transfer of a virtual server to another physical server without disconnection of working users, even in applications not supporting the high availability solution at all. Scalability The separation of the physical hardware from the individual virtual servers and stations allows an easy increase of the applications performance by a simple ISBN:
2 addition of a new hardware in the existing infrastructure. If, for example, the number of demands made on a server is increased, the memory or CPU performance can simply be increased in the administration console. The same it is with the addition of any other hardware allowed by the given virtualization technology. Attendance simplification and cost of operation reduction Thanks to the reduction of the number of physical servers, automated installation of new servers from templates, their easy transferability to another hardware, and thanks to the centralized administration tools, the attendance activities during the servers and applications installation and operation have been simplified significantly. More effective administration The symbiosis of a company IT environment and its commercial needs should be the primary aim of the consolidation. The aim of the IT consolidation is mainly to shorten the period of the return on investment in the IT infrastructure and to reduce the expenses related to IT administration. The administration of an increasing number of servers, working stations and other devices of the company IT infrastructure can be expensive and demanding from the capacity point of view. Working stations consolidation eliminates the autonomous administration disadvantages to a great extent. IT departments can administer and maintain the software on such stations much more effectively, including the central application of safety patches and correction packets. A unique, consolidated and consistent environment in a company can increase the employees labour productivity and reduce the expenses. A unique setting and compliance with the configuration policy guarantees much less vulnerability of the centrally administered stations towards the safety threats [2, 3]. 1.2 Full virtualization The terminology and classification of the individual virtualization types is not uniform. For the purposes of this article, the classification published in [3] was used. ization can be classified according to the principle used to a full virtualization, simulation and emulation, paravirtualization, virtualization of storages, virtualization of networks, and virtualization of applications. From the point of view of the tested tools, the full virtualization principles were used. Under the given conditions, it is the most common type of virtualization when all parts of the computer are virtualized. The operating system running in this environment does not recognize that it has no access to the physical components of the given machine. The physical layer is divided from the programme layer. All programmes are thus running on a virtual hardware. The advantage of such virtualization is that the virtual components parameters can be defined (capacity of the disc, memory, etc.) and the programmes are independent on the given technical equipment. No hardware change influences the virtual environment as shown in Figure1. Another advantage is that the physical hardware need not be connected to the virtual environment. This means that in full virtualization, the programmes or operating system can be started in other processor platforms as well, which results in full transferability. In addition to the above mentioned advantages, this type of virtualization has also some disadvantages. Paradoxically, it is just the division of the physical and programme level which is the greatest disadvantage because in such case, full performance of the virtual machine cannot be reached although the virtual hardware is an image of the physical one. The reason is that various activities like operations with the memory, processor instruction, or access to the disc are emulated and not performed directly by the physical hardware. Fig.1 Principles of full virtualization Full virtualization allows the use of two architectures, the ed architecture or the hypervisor one. The ed architecture uses the already running operating system in which virtualization-allowing software has been installed, for example Windows PC or Box. The other variant is to install the hypervisor directly in the hardware. It then becomes the virtualization layer running under the virtual machines, for example the VMware ESX server. The operating system ed architecture is called the software ISBN:
3 virtualization while the hypervisor architecture is called the hardware virtualization. 2 ization tools selection For the purposes of the specified area of interest, we had to select such tools that are easy available, their machine equipment requirements are feasible, and can be operated even without any advanced knowledge of virtualization technologies. As to the level of equipment by computer technology, the environment of a common university in the Czech Republic is very similar to that in both the production practice and state administration. The assessed average age of a user station is from two to four years. Typically, the MS Windows XP or 7 is installed on it. Such system is administered by a separate entity who is interested in a stable and nointervention operation. In general, such environment is not suitable for experimental purposes and virtualization provides a compromise solution between the time, safety and lifelikeness of experiments. A set available commonly in the informatics laboratories and classrooms has been chosen for the selection of usable technologies. The limitation given by the use of a common work station limited, to some extent, the selection of offered technologies to those with lesser equipment demands and, therefore, we had to exclude the technologies requiring the inaccessible server technologies. For these reasons, two freely available representatives of the software virtualization were chosen for the testing, namely Oracle Box and Microsoft PC. Both selected technologies were used in default condition without any intervention in the configuration. 2.1 Tested values selection To allow an objective comparison, we had to choose such approaches that would represent sufficiently the burden during the use in practice and, at the same time, would have sufficient informative value as to the performance and direction of the individual technologies. We chose the values representing the computing performance of the processor, speed of reading and recording on the virtualized hard disc, and the network interface from the point of view of its attendance and throughput. All tests were performed with maximum consideration of constant conditions of the running test. Therefore, the same was always used and the ed system was restarted after each measurement. The tested procedure attendance was always provided by a debugged script. If it was possible, the given task was tested in the system as well. The system results were used as reference values. The processor (hereinafter CPU) was tested in a way allowing the test performance in all tested technologies and comparison and objective assessment of results. For this reason, we chose the PI number computing to a constant number of decimal digits and encrypting of a testing set of random symbols by the OpenSSL library. The speed of the access to the disc, i.e. to its virtual image, was tested in form of the duration of a 1 GB file copying from one location to another within the same disc image. Thus both the recording and reading were tested concurrently. In the network interface, we tested the measurement of the ed system response from the external source of requests (echo request, echo reply) Tests composition and technical parameters CPU encryption test Copying of a randomly generated 1 GB file was tested. The sequence of commands in the utility script was as follows: (1) system boot up and user login; (2) 90-second waiting till the system procedures stabilization; (3) start of the file copying from the root directory to another place as the Timeit.exe (Time for Linux) parameter; (4) Timeit.exe (Time for Linux) output recording in a text file after the copying termination; (5) the copied file deletion; (6) system restart. The whole procedure was repeated 100 times. CPU test π computing Π computing to 8,388,608 (8M) decimal points was tested. The SystemStabilityTester programme was used for the computing, using two non-cooperating links and Gauss Legendre algorithm. The sequence of commands was as follows: (1) system boot up and user login; (2) 30-second waiting till the system procedures stabilization (3) π computing; (4) the computing output recording in a text file after the copying termination; (5) system restart. The test was repeated 100 times and the results were recorded in two forms, directly from the calculating programme and from Timeit.exe (Time for Linux). HDD test Copying of a randomly generated 1 GB file was tested. The sequence of commands was as follows: (1) system boot up; (2) 90-second waiting till the system procedures stabilization; (3) start of the file copying after logging-on as a parameter of Timeit.exe (Time for Linux); (4) Timeit.exe (Time for Linux) output recording in a text file after the copying termination; (5) the copied file deletion; (6) system restart. The test was repeated 100 times and Timeit.exe (Time for Linux) was used both for values recording and measurement. ISBN:
4 NIC test After the network interface was configured and the network put into operation, we tested the duration of response on the network layer of the ed system. Ping, a generally known programme, was used for testing. The requests were sent from an external source and were recorded in a file. The request was sent 100 times and the result was recorded. 3 Measured data As we mentioned above, Windows 7 32b is the primary operating system at FIM UHK. Therefore, this system was chosen to be the operating system (OS). The OS was tested by means of the same series of tests as the virtualized machines and its values were used as the reference ones. It is called below in the text. Windows 7 32b and Squeeze were the ed systems. Box a PC, the pair mentioned above already, were the virtualization environment. Four tested environments thus originated, called and on for systems virtualized on the PC, and on and on for systems virtualized on the Box. NIC test In this test, we measured the time response from the local server to the virtualized NIC by means of the Ping programme. The server and the were connected directly by means of a gigabyte crossover UTP 5E cable. The results are shown in seconds. on on Average deviation Variance Maximum Quartile Median st Quartile Minimum Table 1 Results of the NIC test It is evident from the measured values that the least time delays were shown during the NIC test by the virtualized system by means of the Oracle Box. Box showed better results during the virtualization by means of the OS as well. CPU test π computing The test was aimed to the computing performance of the virtualized operating system. Data acquired by the SystemStabilityTester programme in all tested environments were used. The values are shown in seconds. on on Average deviation Variance Maximum Quartile Median st Quartile Minimum Table 2 Results of the CPU test π computing It follows from the measured values that Windows PC showed better results in virtualization of both operating systems in the tests focused to CPU computing performance. CPU encryption test In the encryption-focused tests, the time required for a randomly generated 1 GB file encryption was measured. A 256b AES encrypting algorithm was used for the encrypting. The values are shown in seconds. The encryption results were not stored to avoid the influence of the data recording speed. on on Average deviation Variance Maximum Quartile Median st Quartile Minimum Table 3 Results of the CPU encryption test These tests also show that in CPU use, virtualization by means of Windows PC is more effective. ISBN:
5 HDD test In this test, we measured the duration of the data recording and reading on a virtualized 1 GB HDD. The values are shown in seconds. requirements were stressed, the Microsoft solution should be preferred. On the other side, the Oracle product can be recommended in all situations where migration to another platform can be expected. on on Average deviation Variance Maximum Quartile Median st Quartile Minimum Table 4 Results of the HDD test Marked differences were measured during the recording and reading testing in OS virtualization on PC and Oracle Box. The measured results suggest that Oracle Box access to the virtualized HDD is markedly quicker. In the Windows 7 operating system virtualization, the results do not differ markedly although, when comparing the measured values, Windows PC is quicker in a nonsignificant extent. 4 Evaluation Several conclusions can be made from the results of our measurements. The results are very favourable for the needs of the environment from which the request for such research came. We can say that despite evident differences between the individual tools, both are usable very well and meet the educational requirements. Both virtualization tools can be used for training of the tasks related to the administration and protection of both the operating systems and computer networks. In both cases, the differences between the native and virtual machine reached no more than the multiples of the reference values measured on the system. These facts are shown in Figure 2. It shows a comparison of the differences of values related to the reference values; the system result is considered to be 100%. Therefore, both virtualization technologies can be recommended for the educational needs. If the performance Windows7 PC Box Linux PC Box Windows 7 HDD CPU Encryptin g CPU Computin g PI NIC Echo References: [1] DEDLEY, H. History of ization. Infobarrel.com [online]. 2009, 1, [cit ]. Available from WWW: < lization>. [2] MARSHALL, D., The Rise of Systems and ization (on-line), izationsdefrag.com Editors, 2009 [cit ]. Available from: < istory-of-virtualization/index.php>. [3] RUEST, N., RUEST, D., ization - The beginner s guide, Mc. Graw Hill, New York, 2009, Edit. 1, 442 pp., ISBN: [4] TULLOCH, M. and MICROSOFT VIRTUALIZATION TEAMS Understanding Microsoft ization Solutions: From the Desktop to the Datacenter. 2. Redmond : Microsoft Press, pp. Library of Congress Control Number: ISBN:
6 Fig.2 Final comparison ISBN:
Recent Researches in Circuits, Systems, Communications and Computers
Comparis of Software Virtualizati Hypervisors JOSEF HORALEK, MARTIN HATAS, VLADIMIR SOBESLAV Department of informati technologies, Faculty of informatics, University of Hradec Králové, Rokitanského 62,
More informationVirtualization tools analysis mapped into RING 0
Virtualization tools analysis mapped into RING 0 Josef Horalek, Ondrej Marik, Sona Neradova, Stanislav Zitta University of Pardubice, Faculty of Electrical Engineering and Informatics, Pardubice, Czech
More informationVirtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
More informationWhat is virtualization
Virtualization Concepts Virtualization Virtualization is the process of presenting computing resources in ways that users and applications can easily get value out of them, rather than presenting them
More informationInternational Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 VIRTUALIZATION Vikas Garg Abstract: The main aim of the research was to get the knowledge of present trends
More informationWhite Paper on Consolidation Ratios for VDI implementations
White Paper on Consolidation Ratios for VDI implementations Executive Summary TecDem have produced this white paper on consolidation ratios to back up the return on investment calculations and savings
More informationIOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
More informationIntro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
More informationServer Virtualization with VMWare
Server Virtualization with VMware Information Technology Server Virtualization with VMWare A look at server virtualization, what it is and why it should be considered. By Alex Dewar, Head of IT & IM Solutions,
More informationExperience with Server Self Service Center (S3C)
Experience with Server Self Service Center (S3C) Juraj Sucik, Sebastian Bukowiec IT Department, CERN, CH-1211 Genève 23, Switzerland E-mail: juraj.sucik@cern.ch, sebastian.bukowiec@cern.ch Abstract. CERN
More informationVirtualization. Michael Tsai 2015/06/08
Virtualization Michael Tsai 2015/06/08 What is virtualization? Let s first look at a video from VMware http://bcove.me/x9zhalcl Problems? Low utilization Different needs DNS DHCP Web mail 5% 5% 15% 8%
More informationPerformance analysis and comparison of virtualization protocols, RDP and PCoIP
Performance analysis and comparison of virtualization protocols, RDP and PCoIP Jiri Kouril, Petra Lambertova Department of Telecommunications Brno University of Technology Ustav telekomunikaci, Purkynova
More informationDELL. Virtual Desktop Infrastructure Study END-TO-END COMPUTING. Dell Enterprise Solutions Engineering
DELL Virtual Desktop Infrastructure Study END-TO-END COMPUTING Dell Enterprise Solutions Engineering 1 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL
More informationThe Xen of Virtualization
The Xen of Virtualization Assignment for CLC-MIRI Amin Khan Universitat Politècnica de Catalunya March 4, 2013 Amin Khan (UPC) Xen Hypervisor March 4, 2013 1 / 19 Outline 1 Introduction 2 Architecture
More informationPre-scheduled Control of Online Device-Based Backup and Incremental Data Backup in VMware Virtual System Environment
X Triennial International SAUM Conference on Systems, Automatic Control and Measurements Niš, Serbia, November 10 th -12 th, 2010 Pre-scheduled Control of Online Device-Based Backup and Incremental Data
More informationVirtual Machines. www.viplavkambli.com
1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software
More informationRESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA
RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA 2015 Volume 23, Special Number HYPERVISOR FOR VIRTUALIZATION IN PRIVATE CLOUD Pavol ZÁVACKÝ,
More informationIssues in Information Systems Volume 16, Issue I, pp. 219-225, 2015
MOVING TOWARD A SERVER-BASED VIRTUAL MACHINE HOSTING ENVIRONMENT IN SUPPORT OF UNIVERSITY INFORMATION TECHNOLOGY PROGRAMMING COURSES George Stefanek, PhD, Purdue University North Central, stefanek@pnc.edu
More informationENABLING VIRTUALIZED GRIDS WITH ORACLE AND NETAPP
NETAPP AND ORACLE WHITE PAPER ENABLING VIRTUALIZED GRIDS WITH ORACLE AND NETAPP Generosa Litton, Network Appliance, Inc. Monica Kumar, Frank Martin, Don Nalezyty, Oracle March 2008 WP-7037-0208 EXECUTIVE
More informationA Comparison of VMware and {Virtual Server}
A Comparison of VMware and {Virtual Server} Kurt Lamoreaux Consultant, MCSE, VCP Computer Networking and Consulting Services A Funny Thing Happened on the Way to HP World 2004 Call for speakers at the
More informationInstalling & Using KVM with Virtual Machine Manager COSC 495
Installing & Using KVM with Virtual Machine Manager COSC 495 1 Abstract:. There are many different hypervisors and virtualization software available for use. One commonly use hypervisor in the Linux system
More informationWeek Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration
ULI101 Week 06b Week Overview Installing Linux Linux on your Desktop Virtualization Basic Linux system administration Installing Linux Standalone installation Linux is the only OS on the computer Any existing
More informationCPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
More informationVMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
More informationAdvanced Server Virtualization: Vmware and Microsoft Platforms in the Virtual Data Center
Advanced Server Virtualization: Vmware and Microsoft Platforms in the Virtual Data Center Marshall, David ISBN-13: 9780849339318 Table of Contents BASIC CONCEPTS Introduction to Server Virtualization Overview
More informationSECURITY IN OPERATING SYSTEM VIRTUALISATION
SECURITY IN OPERATING SYSTEM VIRTUALISATION February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in
More informationCOS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
More informationTGL VMware Presentation. Guangzhou Macau Hong Kong Shanghai Beijing
TGL VMware Presentation Guangzhou Macau Hong Kong Shanghai Beijing The Path To IT As A Service Existing Apps Future Apps Private Cloud Lots of Hardware and Plumbing Today IT TODAY Internal Cloud Federation
More informationFull and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
More informationEXPLORING LINUX KERNEL: THE EASY WAY!
EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment
More informationWhat s New with VMware Virtual Infrastructure
What s New with VMware Virtual Infrastructure Virtualization: Industry-Standard Way of Computing Early Adoption Mainstreaming Standardization Test & Development Server Consolidation Infrastructure Management
More informationServervirualisierung mit Citrix XenServer
Servervirualisierung mit Citrix XenServer Paul Murray, Senior Systems Engineer, MSG EMEA Citrix Systems International GmbH paul.murray@eu.citrix.com Virtualization Wave is Just Beginning Only 6% of x86
More informationAnalysis on Virtualization Technologies in Cloud
Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization
More informationVIRTUALIZATION 101. Brainstorm Conference 2013 PRESENTER INTRODUCTIONS
VIRTUALIZATION 101 Brainstorm Conference 2013 PRESENTER INTRODUCTIONS Timothy Leerhoff Senior Consultant TIES 21+ years experience IT consulting 12+ years consulting in Education experience 1 THE QUESTION
More informationBest Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software
Best Practices for Monitoring Databases on VMware Dean Richards Senior DBA, Confio Software 1 Who Am I? 20+ Years in Oracle & SQL Server DBA and Developer Worked for Oracle Consulting Specialize in Performance
More informationVMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.
VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.com) Copyright 2008 EMC Corporation. All rights reserved. Agenda
More informationVirtualization: an old concept in a new approach
MPRA Munich Personal RePEc Archive Virtualization: an old concept in a new approach Logica Banica and Doina Rosca and Cristian Stefan University of Pitesti, Faculty of Economics, University of Craiova,
More informationInformatica Data Director Performance
Informatica Data Director Performance 2011 Informatica Abstract A variety of performance and stress tests are run on the Informatica Data Director to ensure performance and scalability for a wide variety
More informationStorage Guardian Remote Backup Restore and Archive Services
Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,
More informationVirtual and Virtualization Technologies in Computer Networks Education
Virtual and Virtualization Technologies in Computer Networks Education Agáta Bodnárová, Martin Hátaš, Kamila Olševičová, Vladimír Soběslav, Jaroslav Štefan Abstract We discuss benefits of different virtual
More informationManagement of IT environment end users and the impact of new technological solutions
Management of IT environment end users and the impact of new technological solutions Eva Oláhová Slovak University of Agriculture in Nitra Faculty of Economics and Management, Centre of Information Technologies
More informationPERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India sudha.mooki@gmail.com 2 Department
More informationParagon Protect & Restore
PARAGON Software GmbH Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Email sales@paragon-software.com Product website : www.protect-restore.com
More informationCSE 501 Monday, September 09, 2013 Kevin Cleary kpcleary@buffalo.edu
CSE 501 Monday, September 09, 2013 Kevin Cleary kpcleary@buffalo.edu What is Virtualization? Practical Uses What can be virtualized Popular virtualization products Demo Question, answer, discussion Can
More informationVirtual Desktops Security Test Report
Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January
More information4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access
4.1 Introduction The operating system (OS) controls almost all functions on a computer. In this lecture, you will learn about the components, functions, and terminology related to the Windows 2000, Windows
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...
More informationHow To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)
Scalability Results Select the right hardware configuration for your organization to optimize performance Table of Contents Introduction... 1 Scalability... 2 Definition... 2 CPU and Memory Usage... 2
More informationInmagic Content Server Workgroup Configuration Technical Guidelines
Inmagic Content Server Workgroup Configuration Technical Guidelines 6/2005 Page 1 of 12 Inmagic Content Server Workgroup Configuration Technical Guidelines Last Updated: June, 2005 Inmagic, Inc. All rights
More informationSecuring your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
More informationVMware vsphere 5.1 Advanced Administration
Course ID VMW200 VMware vsphere 5.1 Advanced Administration Course Description This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter.
More informationCHAPTER 2 THEORETICAL FOUNDATION
CHAPTER 2 THEORETICAL FOUNDATION 2.1 Theoretical Foundation Cloud computing has become the recent trends in nowadays computing technology world. In order to understand the concept of cloud, people should
More informationParallels Server 4 Bare Metal
Parallels Server 4 Bare Metal Product Summary 1/21/2010 Company Overview Parallels is a worldwide leader in virtualization and automation software that optimizes computing for services providers, businesses
More informationVirtualization of the MS Exchange Server Environment
MS Exchange Server Acceleration Maximizing Users in a Virtualized Environment with Flash-Powered Consolidation Allon Cohen, PhD OCZ Technology Group Introduction Microsoft (MS) Exchange Server is one of
More informationTechTarget Windows Media
TechTarget Windows Media SearchWinIT.com SearchExchange.com SearchSQLServer.com SearchEnterpriseDesktop.com SearchWindowsServer.com SearchDomino.com LabMice.net E-Guide Hyper-V: What you need to know before
More informationREDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION
REDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION SD003 V2.3 Issue Date 02 July 2014 1) SERVICE OVERVIEW The Managed Backup Service (MBS) is a streamlined alternative to traditional backup and restore
More informationinforouter V8.0 Server & Client Requirements
inforouter V8.0 Server & Client Requirements Please review this document thoroughly before proceeding with the installation of inforouter Version 8. This document describes the minimum and recommended
More informationVirtualization In Manufacturing Industries. Copyright 2012 Rockwell Automation, Inc. All rights reserved.
Virtualization In Manufacturing Industries Rev 5058-CO900C What is Virtualization? Traditionally the OS and its applications were tightly coupled to the hardware they were installed on Virtualization breaks
More informationCloud n Service Presentation. NTT Communications Corporation Cloud Services
Cloud n Service Presentation NTT Communications Corporation Cloud Services 1 Overview of Global Public Cloud Services Cloud n offeres datacenters in U.S. and Japan Global standard service architecture
More informationMonitoring Databases on VMware
Monitoring Databases on VMware Ensure Optimum Performance with the Correct Metrics By Dean Richards, Manager, Sales Engineering Confio Software 4772 Walnut Street, Suite 100 Boulder, CO 80301 www.confio.com
More informationVirtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC
Paper 347-2009 Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC ABSTRACT SAS groups virtualization into four categories: Hardware Virtualization,
More informationOS Deployment and Migration
LANDesk Solution Brief: OS Deployment and Migration Solving real IT challenges. Solving real IT challenges. Simplify OS upgrades and user migrations The Challenge: Migrating users to new Windows operating
More informationDevelop a process for applying updates to systems, including verifying properties of the update. Create File Systems
RH413 Manage Software Updates Develop a process for applying updates to systems, including verifying properties of the update. Create File Systems Allocate an advanced file system layout, and use file
More informationComparing Free Virtualization Products
A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationDistributed and Cloud Computing
Distributed and Cloud Computing K. Hwang, G. Fox and J. Dongarra Chapter 3: Virtual Machines and Virtualization of Clusters and datacenters Adapted from Kai Hwang University of Southern California March
More informationVIRTUALIZATION: From Concept to Reality A White Paper Prepared by Insight
VIRTUALIZATION: From Concept to Reality A White Paper Prepared by Insight Presented in partnership with: INSIGHT 6820 S. Harl Ave. Tempe, Arizona 85283 www.insight.com 800.INSIGHT The complexity of managing
More informationAn Empirical Performance Study of Secured Virtual Machine Migration for Inter-Cloud Networks
An Empirical Performance Study of Secured Virtual Machine Migration for Inter-Cloud Networks Akika Yamashita Ochanomizu University Department of Computer Sciences Email: akika@ogl.is.ocha.ac.jp Eng Keong
More informationDevelopment of IaaS-based Cloud Co-location and Management System using Open Source Cloud Stack
Development of IaaS-based Cloud Co-location and Management System using Open Source Cloud Stack Chil-Su Kim, HyunKi Ryu, Myung-Jin Jang and Chang-Hyeon Park Abstract The weakness of server-based hosting
More informationMFR IT Technical Guides
MFR IT Technical Guides Windows 8.1 Backup and Recovery Page 1 of 33 Table of Contents 1 Glossary... 3 2 Backup Strategy... 4 3 Windows Backup Options... 5 3.1 Windows File History Backup... 5 3.2 Windows
More informationCloud Computing CS 15-319
Cloud Computing CS 15-319 Virtualization Case Studies : Xen and VMware Lecture 20 Majd F. Sakr, Mohammad Hammoud and Suhail Rehman 1 Today Last session Resource Virtualization Today s session Virtualization
More informationRED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
More informationAVALANCHE MC 5.3 AND DATABASE MANAGEMENT SYSTEMS
AVALANCHE MC 5.3 AND DATABASE MANAGEMENT SYSTEMS Avalanche Mobility Center (MC) offers support for other database management systems (DBMS) as alternatives to the built-in PostgreSQL DBMS. This was prompted
More informationDisk-to-Disk-to-Offsite Backups for SMBs with Retrospect
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Abstract Retrospect backup and recovery software provides a quick, reliable, easy-to-manage disk-to-disk-to-offsite backup solution for SMBs. Use
More informationDIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION A DIABLO WHITE PAPER AUGUST 2014 Ricky Trigalo Director of Business Development Virtualization, Diablo Technologies
More informationKernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems
Module 9: Operating Systems Objective What is an operating system (OS)? OS kernel, and basic functions OS Examples: MS-DOS, MS Windows, Mac OS Unix/Linux Features of modern OS Graphical operating system
More informationComputer Virtualization in Practice
Computer Virtualization in Practice [ life between virtual and physical ] A. Németh University of Applied Sciences, Oulu, Finland andras.nemeth@students.oamk.fi ABSTRACT This paper provides an overview
More informationUsing VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems
Using VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems Applied Technology Abstract By migrating VMware virtual machines from one physical environment to another, VMware VMotion can
More informationUsing Virtual PC 7.0 for Mac with GalleryPro
Using Virtual PC 7.0 for Mac with GalleryPro Installing and Configuring What is Virtual PC for Mac? Virtual PC (VPC) is emulation software that simulates an actual (though virtual) Windows computer running
More informationIBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
More informationHow To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox 3.5.2 (Xeen) 2.2.5-Xen-Virtualization (X
Performance Evaluation of Virtual Routers in Para-virtual Environment 1. Abhishek Bajaj abhishek.bajaj@iiitb.net 2. Anargha Biswas anargha.biswas@iiitb.net 3. Ambarish Kumar ambarish.kumar@iiitb.net 4.
More informationMore Efficient Virtualization Management: Templates
White Paper More Efficient Virtualization Management: Templates Learn more at www.swsoft.com/virtuozzo Published: November 2006 Revised: November 2006 Table of Contents Table of Contents... 2 OS, Middleware
More informationMFR IT Technical Guides
MFR IT Technical Guides Windows 7 Backup and Recovery Page 1 of 33 Table of Contents 1 Glossary... 3 2 Backup Strategy... 4 3 Windows Backup Options... 5 3.1 Windows Backup... 5 3.2 Windows System Image
More informationVirtualization. Introduction to Virtualization Virtual Appliances Benefits to Virtualization Example Virtualization Products
Virtualization Originally prepared by Greg Bosch; last modified April 2012 by B. Davison I. Introduction to Virtualization II. Virtual Appliances III. Benefits to Virtualization IV. Example Virtualization
More informationEfficient Load Balancing using VM Migration by QEMU-KVM
International Journal of Computer Science and Telecommunications [Volume 5, Issue 8, August 2014] 49 ISSN 2047-3338 Efficient Load Balancing using VM Migration by QEMU-KVM Sharang Telkikar 1, Shreyas Talele
More informationEncore Software Solutions (V3) Identity Lifecycle Management and Federated Security Suite (ILM/FSS) Overview and Technical Requirements
Encore Software Solutions (V3) Identity Lifecycle Management and Federated Security Suite (ILM/FSS) Overview and Technical Requirements Encore Software Solutions (V3) provides a holistic Identity Lifecycle
More informationVMware vsphere 5.0 Boot Camp
VMware vsphere 5.0 Boot Camp This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter. Assuming no prior virtualization experience, this
More informationServer Virtualization and Consolidation
Server Virtualization and Consolidation An Ideal cost effective solution to maximize your Return on Investment of your organization's hardware infrastructure It is quit evident today that Business owners,
More informationGetting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
More informationChapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
More informationJOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI
JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI Job oriented VMWARE training is offered by Peridot Systems in Chennai. Training in our institute gives you strong foundation on cloud computing by incrementing
More informationMS Exchange Server Acceleration
White Paper MS Exchange Server Acceleration Using virtualization to dramatically maximize user experience for Microsoft Exchange Server Allon Cohen, PhD Scott Harlin OCZ Storage Solutions, Inc. A Toshiba
More informationVMware ESXi 3.5 update 2
VMware ESXi 3.5 update 2 VMware ESXi 3.5 Exec Summary What is it? What does it do? What is unique? Who can use it? How do you use it? Next generation, thin hypervisor for FREE Partitions servers to create
More informationNetworking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the
More informationVirtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
More information1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
More informationSimplify Your Windows Server Migration
SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ Simplify Your Windows Server Migration Who should read this paper Windows Server 2003 customers looking to migrate to the latest
More informationCloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH
Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH CONTENTS Introduction... 4 System Components... 4 OpenNebula Cloud Management Toolkit... 4 VMware
More informationSystem and Storage Virtualization For ios (AS/400) Environment
Date: March 10, 2011 System and Storage Virtualization For ios (AS/400) Environment How to take advantage of today s cost-saving technologies for legacy applications Copyright 2010 INFINITE Corporation.
More informationTechnical Specification Data
Equitrac Office 4.1 SOFTWARE SUITE Equitrac Office Software Suite Equitrac Office Suite Equitrac Office Small Business Edition (SBE) Applications Any size network with single or multiple accounting and/or
More information