Scenario-Based Distributed Virtualization Management Architecture for Multi-host Environments
|
|
|
- Gladys Hicks
- 10 years ago
- Views:
Transcription
1 Scenario-Based Distributed Virtualization Management Architecture for Multi-host Environments Fermín Galán 1, David Fernández 2, Miguel Ferrer 2, and Francisco J. Martín 2 1 Telefónica Investigación y Desarrollo (TID) 2 Departamento de Ingeniería de Sistemas Telemáticos (DIT), Universidad Politécnica de Madrid (UPM) [email protected], {david,mferrer,fjmartin}@dit.upm.es Abstract. Traditional virtual scenario management tools (VNUML, NetKit, MLN, etc.) normally consider mono-host deployment (i.e. the entire virtualized scenario deployed in the same physical host). In this paper, the work carried out in the EDIV project, dealing with the development of a multi-host evolution of the Virtual Network User Mode Linux (VNUML) tool, is presented. Following an overview of virtual scenario-based management, the distributed deployment management architecture, detailing the main components, its interfaces and operations, is described. Additionally, details on the actual implementation and the results achieved so far are provided, assessing the feasibility and advantages of the system. Finally a proposal to evolve the tool towards DMTF virtualization related standards (CIM-based virtualization management and OVF) is outlined. Keywords: Distributed management, virtualization, VNUML, CIM management, OVF, User Mode Linux. 1 Introduction Scenario-based virtualization management tools (e.g. VNUML [1], NetKit [2] or MLN [3]) are essential in research and education. In such environments the ability to provide experimentation scenarios involving arbitrary and complex topologies composed of virtual machines in a quick and inexpensive way is dramatically useful. These tools are quite different from conventional virtualization management infrastructure tools (e.g., VirtualCenter [4]), which are oriented to production data center environments and more focused on achieving optimal performance for final users than in topological flexibility during development and testing stages. In this context, a scenario can be defined as the formal specification (e.g. using extended Markup Language XML) of a set of virtual machines along with their interconnection within a given topology. Furthermore a scenario-based virtualization management tool is one aimed at processing scenario specifications in order to be deployed in a physical infrastructure and provide further management. Traditional tools (such as the ones cited in the previous paragraph) normally consider mono-host deployment alone (i.e. the entire scenario deployed in the same physical host). L. Boursas et al. (Eds.): SVM 2008, CCIS 18, pp , Springer-Verlag Berlin Heidelberg 2008
2 50 F. Galán et al. Although this is the straightforward approach, it imposes severe scalability problems, making it very difficult to build large scenarios composed of tens or hundreds of virtual machines. In this case, the only possibility is to split the large scenario in smaller pieces, breaking the management integrity (because of each sub-scenario having to be manually managed independently) and thus increasing complexity. In order to avoid this limitation, the EDIV (Spanish acronym for Distributed Scenarios with VNUML) project, a partnership between Telefónica I+D and UPM starting in January 2008 and based upon our previous work [5], has developed an evolution of VNUML to allow the management of virtualization scenarios deployed on multi-host distributed infrastructure. One of the main design requirements is transparency, so users accustomed to use basic VNUML (i.e. mono-host) will be able to work with EDIV in minutes. This paper provides a thorough description of the EDIV architecture and its scenario management operations, as well as practical details of a fully functional prototype implementation and its first experimental results: several reference scenarios have been tested over a simple cluster made of three hosts, allowing to analyze how they are split depending on the segmentation algorithm used, and showing how EDIV improves the basic mono-host deployment model of VNUML. Additionally, considering that aligning EDIV-based distributed management with recent virtualrelated standards from DMTF (Distributed Management Task Force) will be a very interesting approach to improve its interoperability, a possible evolution towards CIM (Common Information Model)-based virtualization management and Open Virtual Machine Format (OVF) is also analyzed in the paper. The remaining sections of the paper are structured as follows. Firstly Section 2 describes the EDIV architecture, detailing its main components and the interfaces among them, paying special attention to VNUML tool installed in deployment hosts. Section 3 describes the different management operations. Section 4 provides the implementation details and Section 5 includes the subsequent experimental results. Finally, Section 6 presents the proposal to align EDIV with DMTF standards and Section 7 closes the paper with the main conclusions and future working lines. 2 Architectural Design This section describes the architecture in which the EDIV multi-host deployment system is based. The physical layout is shown in Fig. 1 and consists of a cluster of N physical deployment hosts plus a deployment controller. The latter is a logical entity that can be collocated in one of the deployment hosts or located in a physically separated element, as it is shown in the figure. All elements are connected to a common programmable switch-based backplane through trunk physical interfaces able to multiplex 802.1q VLANs [6]. In the following subsections the different elements in the architecture (deployment hosts, deployment controller and interconnection backplane) are described. Later, in Section 5, the example configuration made of three hosts and one controller that has been used to develop and validate the prototype is presented.
3 Scenario-Based Distributed Virtualization Management Architecture 51 Deployment hosts (N) trunk Deployment controller Switch-based interconnection backplane (supporting 802.1q VLAN) management network Fig. 1. EDIV physical layout 2.1 Deployment Hosts Deployment hosts are GNU/Linux systems in which virtual machines belonging to deployed scenarios are run. They have the VNUML tool installed, along with the additional components required for its operation (UML kernels and root filesystems for virtual machines). VNUML [1] is a general purpose open source tool designed to help building virtual network scenarios that are automatically deployed in a single host. It is based on User Mode Linux (UML) [7], a virtualization technique to run virtual Linux machines over a Linux host. The tool is made of two main components: the XML based VNUML language that enables to describe the virtual network scenario; and the interpreter of the language (actually a shell command) that parsers the description and builds and manages the scenario, relieving the user of all complex UML details. The tool implements three scenario management modes, which are applied on scenario specifications (either written by users themselves in conventional VNUML utilization or provided through the H interface described in Section 2.2): deploy, to start the virtual network scenario in the host; execution, to execute programmed command sequences on scenario virtual machines and copying files to them; and undeploy, to dismantle the scenario, releasing the host resources. Regarding VNUML specifications, they are composed of two main sections: virtual networks and virtual machines (a complete reference of the VNUML language can be found in [1]). The virtual networks that interconnect virtual machines among them or with the host network interfaces are defined using the <net> tag. Virtual networks are implemented by means of virtual software bridges running on the host machine. The <vm> tag is later used to describe each virtual machine. The language enables to describe their main characteristics in terms of: the kernel and the filesystem that are run (<kernel> and <filesystem> tags), the network interfaces used (<if> tag) and the addresses associated with them, either IPv4 or IPv6 (<ipv4> and <ipv6> tags), as well as the IP routes (<route> tag). Besides virtual machine specifications can include <filetree> and <exec> tags to define files to be copied from the host to the virtual machines and user defined commands to be executed on them. Additionally to VNUML tool, some other software packages are also required in the deployment hosts (e.g., vconfig, to create VLAN specific sub-interfaces in the physical trunk). Finally note that in order to implement the H interface some specific
4 52 F. Galán et al. services or process could be needed (in particular, a SSH/SCP based interface requires a SSH daemon). 2.2 Deployment Controller The deployment controller manages the distributed virtualization scenario, providing the interface for the user and implementing the operations to deploy, execute commands and undeploy (described in Section 3). It is implemented in a modular way (Fig. 2), composed by several functional entities (coordinator, segmentator and database), described below along with their inner and external interfaces. DB Deployment controller D Segmentator Segmentator Segmentator S Coordinator H VNUML VNUML VNUML Deployment hosts U W Scenario specifications (VNUML language) Switches Fig. 2. Deployment controller architecture and logical interfaces Coordinator. It is the main module of EDIV. It implements the user interface (U) and coordinates the rest of the modules in order to perform the operation requested by the user. As already stated in Section 1, one of the main design requirements for EDIV is transparency for VNUML users. This means that the U interface must be as close as possible to conventional (i.e. mono-host) VNUML utilization. Thus the invocation of the deployment controller is performed through a shell command, using the same XML scenario specification language and management operations (deploy, undeploy and execute) than VNUML does (see Section 2.1). The coordinator also interacts with external hosts and switches (using the H and W interfaces, respectively). Both interfaces are based on remote command and file copying protocols (e.g. SSH, SCP and rsync are the usual ones for GNU/Linux based hosts, while switch vendors typically use SNMP, telnet or TFTP), over a dedicated network (named management network), which can be associated to a preconfigured VLAN (as shown in Fig. 1) or being a physically separated network (as used in the experimental setup described in Section 5). It is assumed that IP connectivity in the management network is preconfigured in all hosts and deployment controller before starting operation. Segmentator. This module performs the segmentation of the virtual scenario, deciding in which host each virtual machine will be deployed. Using the S interface, the coordinator provides the VNUML specification to the segmentator, which processes it
5 Scenario-Based Distributed Virtualization Management Architecture 53 according to the segmentation algorithm selected (opaque from the point of view of the coordinator module), returning a table in which each <vm> in the specification is assigned to one of the hosts. The main advantage of the deployment controller modular design is that it enables to easily add new modules implementing new segmentation algorithms, as long as they meet the S interface (consisting in just one primitive, SPLIT, as detailed in Section 3). Moreover several segmentator modules could be available at the same time, allowing the user to choose the most convenient among them when invoking the deployment controller (e.g. with an algorithm selector argument in the U interface command line). Database. It stores persistent information between controller executions. In particular, it stores the per-host sub-specification fragments running in each host (associated to the scenario they belong to), the list of available VLAN IDs to implement inter-host virtual networks and arbitrary parameters that segmentation algorithms might need (e.g. host statistical load information). Fig. 2 shows the database as an inner component to the deployment controller, although actually it could be set outside (e.g. in order to take advantage of centralized backup policies). Regarding the D interface, it depends on the database implementation (e.g. SQL for a SQL-based database). 2.3 Switches The programmable switch backplane provides physical interconnection among deployment hosts and controller. It is composed of a set of Ethernet switches but, as long as it provides end-to-end 801.2q trunks among each deployment host and controller, the internal switch backplane interconnection topology is not relevant (even just one switch could be used if the number of hosts is low). If the VLANs used by EDIV to interconnect virtual machines running on different hosts need to be explicitly managed in the switches by the deployment controller, the W interface (between coordinator and switches) has to be implemented, so the coordinator can enable (or disable) specific VLAN IDs in the switches. Alternatively it can be assumed that all VLAN IDs in the operational range of the controller are always enabled in the switches. In this case, the W interface is unnecessary (this is the simplest approach, but it might not be desirable due to security concerns). 3 Detailed Operation Sequences This section details the two basic EDIV scenario management operations: deploy and undeploy, considering a simple setup made of two deployment hosts. The third operation (execution) is not shown for the sake of briefness, although it is very close to undeploy. The deployment of the scenario (Fig. 3) starts with a user command through the U interface, specifying the desired scenario (SC) as argument. As a preparatory step, the coordinator accesses the database in order to get pre-deployment information (e.g. algorithms parameters, list of free VLANs, etc.). Then SC specification is provided to
6 54 F. Galán et al. the segmentator in the SPLIT primitive. The segmentator returns a mapping, which basically is a table in which each virtual machine in SC is assigned to one of the deployment hosts (in this case, either H1 or H2). Next the coordinator splits the SC XML into per-host fragments (SC1 and SC2), each one containing the <vm> tags of the virtual machines assigned to each host (H1 and H2) and the <net> tags corresponding to intra-host and inter-host virtual networks (inter-host virtual networks required a slight modification in <net> tags, see [5] for details). In the next step the H interface is used to create inter-host networks. Basically, for each network a free VLAN ID is chosen, creating the needed subinterfaces in each host (by issuing the CREATE_VLAN_SUBIF primitive which maps to vconfig command), and, optionally, enabling the VLAN in the switches through the W interface (issuing an ENABLE_VLAN primitive). Later a VNUML deploy operation on each host is invoked using the corresponding scenario fragment (SC1 and SC2). The coordinator issues operations in H and S interfaces in parallel, waiting for all operations to finish. Once finished, it performs some post-deployment operations (mainly storing SC1 and SC2 and the newly used VLANs IDs in the database, associating them with the name of the distributed scenario as key) and finishes reporting the outcome of the deployment operation ( OK in case of success) to the user. Coor Seg H1 H2 SW OPER( deploy,sc) get pre-deployment information SPLIT_REQ(SC, param) SPLIT_RSP(mapping)) segmentator algorithm maps vms in XML to hosts (generating a mapping table) split XML in two fragment (SC1, SC2) as specified in mapping wait all responses CREATE_VLAN_SUBIF ( ) RUN_VNUML( deploy,sc1) CREATE_VLAN_SUBIF ( ) RUN_VNUML( deploy,sc2) ENABLE_VLAN ( ) RESULT( OK ) store SC1 y SC2 associated with the distributed scenario name (eg., tutorial ) store VLAN IDs allocated to the scenario Fig. 3. Deployment operation sequence Regarding undeployment (Fig. 4), the user only needs to provide the name of the scenario, because the fragments of the XML specifications (SC1 and SC2) are stored in the database, as described above, at deployment time. In addition, the coordinator also obtains the list of VLAN IDs used by inter-host networks in the scenario. With all this information gathered, the coordinator: executes a VNUML undeploy operation on each host through the H interface releases inter-host VLAN IDs (DESTROY_VLAN_SUBIF) and, if needed, disables the VLANs in the switches through the W interface
7 Scenario-Based Distributed Virtualization Management Architecture 55 Once all the previous parallel operations have finished, it cleans the database information associated with the undeployed scenario (i.e. removing SC1, SC2 and the inter-host VLAN ID list) and reports the final result to the user. It is important to note that, as the undeployment (and execution) operation does not require providing the original scenario XML filename, the risk of incoherence (e.g. trying to undeploy an scenario using a different specification than the one used to deploy it) is eliminated, improving in this way the original VNUML behaviour. Coor H1 H2 SW OPER( udeploy, tutorial ) get SC1 and SC2 and VLAN IDs (which were associated to tutorial at deployment time) RUN_VNUML( undeploy,sc1) DESTROY_VLAN_SUBIF ( ) RUN_VNUML( udeploy,sc2) DESTROY_VLAN_SUBIF ( ) DISABLE_VLAN ( ) wait all responses RESULT( OK ) remove SC1 y SC2 release VLAN IDs used by the scenario Fig. 4. Undeployment operation sequence 4 Implementation A fully functional prototype of the deployment controller (implementing all the modules and interfaces described in Section 2.2) has been developed; details are provided in this section. Both the coordinator and segmentator modules are implemented in Perl (as the original VNUML is), being the S interface based on the Perl module API (i.e. the coordinator acts as the main program and each segmentator algorithm is encapsulated in a corresponding.pm file). Two different segmentation modules have been implemented, each one involving a different algorithm: round robin (sequentially allocates each virtual machine to one of the deployment hosts) and weighted round robin (a variation of the previous, in which the host CPU load measures are used to weight the allocation, so more loaded deployment hosts would get lower share of virtual machines). Segmentation algorithms can be complemented using explicit allocation rules. This feature allows users to provide indications on how the deployment should be performed (e.g. virtual machines A and B must be deployed in the same host ), acting as restrictions to the segmentation process. The deployment controller uses a configuration file with the following information: deployment hosts cluster characteristics (e.g. number of hosts, CPU, memory, management network IP address, etc), range of VLAN IDs available for inter-host virtual networks in the interconnection switches default segmentation algorithm
8 56 F. Galán et al. Regarding the database, a MySQL database implementation has been selected, so the D interface is based on the standard modules used in Perl to access MySQL databases. Regarding external interfaces, the H interface is based on SCP (to copy the VNUML sub-specifications) and SSH (to issue commands). The optional W interface has not been implemented, assuming that the range of VLAN IDs specified in the configuration file is enabled in the interconnecting switched. Finally it is worth mentioning that the deployment controller not only implements the management operations described in Section 3, but also provides centralized access to the consoles of all the virtual machines in each scenario, by using SSH port redirection mechanisms. In this way, the user can access text-based or xterm-based virtual machine consoles in the same way he is accustomed to use with basic VNUML. 5 Results In order to validate the EDIV deployment controller implementation described in the previous section and to show that the behavior of the segmentation algorithms is as expected, several experiments have been performed. The experimental setup (shown in Fig. 5) is composed of three deployment hosts (H1, H2 and H3), consisting on Xeon 3.4 GHz dual core 4GB RAM machines, interconnected through a single switch supporting VLANs. The management network is physically independent, using different physical interfaces. Both deployment hosts and deployment controller run in Ubuntu 7.10 GNU/Linux operating system. Devices Switch HP Procurve 2650 Host Dell PowerEdge 860 Xeon 3040 (dual core, 2.4 GHz) Small scenario (6 VMs) Switch eth1 eth1 eth1 H1 H2 H3 eth0 eth0 eth0 Large scenario (51 VMs) Deployment controller Management network Fig. 5. Experimental setup In order to perform the tests, two complementary scenarios (small and large) have been used, both taken from the VNUML examples library at [1]. The small scenario is a BGP routing testbed used to test routing daemons (specifically bgpd) and it is composed of 6 virtual machines. The large scenario is a networking laboratory for
9 Scenario-Based Distributed Virtualization Management Architecture 57 OSPF dynamic routing tests, used in grade courses at DIT UPM, resembling the topology of a distributed organization and involving 51 virtual machines. The deployment of both scenarios has been performed using round robin and weighted round robin algorithms, considering several host load distribution situations (the results are shown in Table 1). In the table, low (L) implies CPU is free almost all the time (around 0% use); medium (M), around 50%; and high (H), used almost all the time (around 100%). In order to set the proper load value, hosts have been stressed using cpuburn tool [8]. Table 1. Experiments results Small scenario (6 VMs) Large scenario (51 VMs) Deployment host loads Round-Robin Weighted Round Robin L1 L2 L3 H1 H2 H3 H1 H2 H3 L L L M M M H L L H M M L L L M M M H L L H M M It can be demonstrated that the round robin algorithm always performs a uniform distribution, so each host gets the same number of virtual machines (2 in the case of the small scenario, 17 for the large one). In the case of weighted round robin a uniform distribution is also obtained when the relative load value is the same in all hosts (i.e. L/L/L and M/M/M). However, with dissimilar loads, the more loaded host gets the lowest number of virtual machines, and the difference between the number allocated to the most loaded and the less loaded is proportional to the load difference. Therefore, in the large scenario, the most loaded hosts (H1) get 7 virtual machines in H/L/L case, while obtaining 13 in the H/M/M (because in the latter the load difference is smaller). It is worth noting that, for the small scenario, this effect is almost negligible (only in the H/L/L case), given it is composed only of 6 virtual machines. Finally the deployment time (i.e. the time elapsed since the user invokes EDIV deployment controller until the scenario is finally deployed and ready for use) has been analyzed. Using conventional VNUML mono-hosts deployment, the small scenario takes around 42 seconds to boot, while the larger one takes around 282. However, using weighted round robin, this time can be lowered to 17 and 130s respectively (in the L/L/L, M/M/M and H/L/L cases), thus achieving a 50-60% significant saving. In the H/M/M the time still being short in the large scenario case (135s), while it rises to 43s in the small scenario. This can be explained because in the large scenario the most loaded host is running a significant smaller number of virtual machines than in the other hosts (so deployment time is almost the same), while for the small scenario the most loaded host runs the same number of machines as the others, which implies a higher deployment time, close to the one in VNUML mono-host case.
10 58 F. Galán et al. In summary, the tests carried out have proved that both algorithms behave as expected, being the weighted algorithm more adequate when virtual machine deployment has to compensate the CPU load in each host. 6 EDIV Alignment with DMTF Standards Although the EDIV implementation described so far provides a sound approach to scenario-based distributed virtualization management (as proven by the results shown in Section 5), it could be enhanced by aligning it with some DMTF standards. In this line, possible modifications to the current architecture and the expected advantages are described in this section. One of the current EDIV limitations is that only UML-based virtual machines can be deployed, due to the use of VNUML as the tool in charge of per-host local deployments. Given that DMTF is developing a set of standards in order to provide an interoperable management of virtualized infrastructure based on CIM, one possible EDIV improvement could be to consider CIM-based deployment hosts in addition to VNUML-based hosts (as shown in Fig. 6). Instead of using SSH/SCP in the H interface (which is quite opaque from a management point of view) the interface would be based on WBEM standard protocols, particularly CIM-XML or CIM-SOAP [9]. In addition, a WBEM server would be run in these deployment hosts, including in the repository the CIM virtualization model described in the CIM virtualization profiles [10]. A provider able to manage CIM-based virtual machines would be required, such as libvirt-cim [11], which could be integrated in any standard CIMOM (due to it implements the Common Manageability Provider Interface CMPI) and would allow managing virtual machines based on other technologies different from UML, such as KVM [12], Xen [13] or OpenVZ [14]. Note that this enhancement could imply small modifications in the VNUML language, mainly in the <vm> tags, using a new type attribute in order to specify the virtualization technology (e.g., <vm type= xen >). Another DMTF standard that would be interesting to consider from the EDIV point of view is OVF [15], which provides a common hypervisor-neutral open virtual machine format, fostering the adoption of virtual appliances (i.e. pre-configured software stacks comprising one or more virtual machines to provide self-contained services) as new software release and management model (e.g. through the development of virtual appliance lifecycle management tools). Using OVF-based virtual machines in EDIV scenarios could provide two benefits. Firstly it would enable to design scenarios in which the virtual machines are actually virtual appliances highly optimized for specific purposes (e.g. dynamic routing stacks, firewalls, etc.) provided by third-parties, relieving users from much of the installation and configuration effort. Secondly the use of the same packaging format in EDIV scenarios than in pre-production and production environments would reduce the evolution gap through the development lifecycle. Thus, once OVF virtual machines have been tested and tuned in the EDIV scenario, packages can be smoothly migrated to pre-production (in order to finish the tests in an environment that mirrors the production layout) and finally production, dramatically reducing the time-to-market of new architectures and services.
11 Scenario-Based Distributed Virtualization Management Architecture 59 Deployment controller H (SSH/SCP) VNUML VNUML-based deployment host (UML virtual machines) U H (CIM-XML or CIM-SOAP) Scenario specifications (VNUML language with minor mofidications in <vm>) WBEM Server CIM-based deployment host (CIM-manageable VMs) CIM Virt. Model CMPI, Java, Provider (e.g lbivirt-cim) Fig. 6. CIM-based deployment hosts in the EDIV architecture The EDIV evolution towards OVF consists on including OVF-encoded virtual machines in EDIV scenario specifications and is aligned with the CIM-based deployment hosts enhancement described above. Thus a new type of virtual machines would be considered (e.g. <vm type= ovf >) including a reference to the virtual machine in the OVF file and a CIM-based provider able to manage OVF packages. In this way, the power of OVF virtual appliances would be integrated in EDIV scenarios without involving severe modifications in the deployment controller logic. Moreover, in case of reusing multi-vm OVF appliances involving topology descriptions (it is worth noting that OVF descriptors allow to define arbitrary topologies equivalent to VNUML ones, although in a less intuitive way), a translator from OVF descriptors to VNUML language (both XML-based) could be developed. Note that the aforementioned modifications would extend the EDIV management capabilities (from UML to any virtualization technology supporting CIM management, with a special interest in OVF virtual appliances), but keeping the two main EDIV assets: the VNUML language (with small modifications) as high level descriptive scenario specification language and the segmentation modules (where the virtual machine allocation logic is encapsulated). Moreover these improvements could co-exist with the currently existing VNUML-based deployment hosts, considering two variants of the H interface (as shown in Fig. 6). 7 Conclusions and Future Work The present paper has described EDIV: an scenario-based distributed virtualization management architecture based on a deployment controller. Apart from the detailed description of the architecture, its modules, interfaces and operation sequences, the paper provides several results that assess the feasibility of the approach and its advantages compared to the mono-host traditional deployment. As main conclusions, firstly the EDIV distributed management approach allows to deploy very large and complex scenarios (e.g. hundreds of virtual machines), which would be very difficult or impossible to build in a single host due to the resources it would require. Secondly deployment times can be dramatically reduced (around 50-60% saving), as shown in Section 5.
12 60 F. Galán et al. Another advantage of EDIV is its transparency for the user: the deployment controller offers a user interface very similar to the one offered by VNUML, allowing a VNUML user to switch to EDIV in minutes. Indeed users only have to worry about the high-level scenario design, because the low-level deployment details are hidden by both EDIV and VNUML. Another important feature of EDIV, derived from its modularity, is the clear separation between the deployment controller logic and the segmentation algorithm, thanks to the S interface. This fact allows segmentator developers to focus on providing highly optimized algorithms without any concern about the controller deployment logic which uses such algorithms, and, on the contrary, to optimize and extend the deployment logic (e.g. new operations or new user interfaces) without worrying about the segmentation step. As future working lines, the main one is to align EDIV with DMTF standards as described in Section 6 in order to take advantage of interoperable virtualization management. Other secondary goals are to fix some issues in the current prototype (e.g. implement the optional W interface) or implement filesystem and kernel management (currently, they are preinstalled in deployment hosts, only scenario specifications are copied through the H interface). Acknowledgments. This work is supported by the Business Oriented Infrastructure (BOI) group within the Business Support Systems (BSS) unit at Telefónica I+D. References 1. Virtual Network User Mode Linux (VNUML), 2. Pizzonia, M., Rimondini, M.: Netkit: Easy Emulation of Complex Networks on Inexpensive Hardware. In: TridentCom 2008, Innsbruck, Austria (March 2008) 3. Begnumm, K.M.: Managing Large Networks of Virtual Machines. In: Proc. of 20th Large Installation System Administration Conf (LISA 2006), USENIX, December 2006, pp (2006) 4. VMware VirtualCenter, 5. Galán, F., Fernández, D.: Distributed Virtualization Scenarios Using VNUML. In: First System and Virtualization Management Workshop (SVM 2007), Toulouse, France (October 2007) 6. IEEE, Virtual Local Area Networks. IEEE standard 802.1q (2001) 7. Dike, J.: User Mode Linux (UML). Prentice-Hall, Englewood Cliffs (2006) 8. CPU Burn-in Homepage, 9. DMTF, CIM Operations over HTTP, DSP0200 v1.3.0c (September 2007) 10. DMTF, CIM System Virtualization Model White Paper, DSP2013 v1.0.0, (November 2007) 11. Libvirt-cim, Kivity, A., et al.: KVM: the Linux Virtual Machine Monitor. In: Proc. of the 2007 Linux Symposium, pp (June 2007) 13. Barham, P., et al.: Xen and the Art of Virtualization. In: Proc. of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003), pp ACM, New York (October 2003) 14. OpenVZ, DMTF, Open Virtual Machine Format (OVF), DSP0243, v1.0.0b (July 2008)
Deploying Business Virtual Appliances on Open Source Cloud Computing
International Journal of Computer Science and Telecommunications [Volume 3, Issue 4, April 2012] 26 ISSN 2047-3338 Deploying Business Virtual Appliances on Open Source Cloud Computing Tran Van Lang 1 and
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Use of Virtualization Tools in Computer Network Laboratories
Use of Virtualization Tools in Computer Network Laboratories Fermín Galán 1, David Fernández 2, Javier Ruiz 2, Omar Walid 2, Tomás de Miguel 2 1 Agora System, S. A., 2 Universidad Politécnica de Madrid
Towards a virtualized Internet for computer networking assignments
Towards a virtualized Internet for computer networking assignments Luis Bellido, David Fernández, Encama Pastor Abstract By combining virtualization technologies, virtual private network techniques and
October 2011. Gluster Virtual Storage Appliance - 3.2 User Guide
October 2011 Gluster Virtual Storage Appliance - 3.2 User Guide Table of Contents 1. About the Guide... 4 1.1. Disclaimer... 4 1.2. Audience for this Guide... 4 1.3. User Prerequisites... 4 1.4. Documentation
High Availability of the Polarion Server
Polarion Software CONCEPT High Availability of the Polarion Server Installing Polarion in a high availability environment Europe, Middle-East, Africa: Polarion Software GmbH Hedelfinger Straße 60 70327
Virtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
Chapter 2 Addendum (More on Virtualization)
Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
NETWORK EMULATION AND NETKIT
NETWORK EMULATION AND NETKIT Gestão e Segurança de Redes / Gestão de Redes e Serviços LERC / MEIC- T 2013/14 Artur M. Arsénio & Miguel P. Correia CLASS OBJECTIVES To understand what is meant by network
Scalable Linux Clusters with LVS
Scalable Linux Clusters with LVS Considerations and Implementation, Part I Eric Searcy Tag1 Consulting, Inc. [email protected] April 2008 Abstract Whether you are perusing mailing lists or reading
Preparation Guide. How to prepare your environment for an OnApp Cloud v3.0 (beta) deployment.
Preparation Guide v3.0 BETA How to prepare your environment for an OnApp Cloud v3.0 (beta) deployment. Document version 1.0 Document release date 25 th September 2012 document revisions 1 Contents 1. Overview...
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Aerohive Networks Inc. Free Bonjour Gateway FAQ
Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?
D1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June [email protected],[email protected],
MySQL and Virtualization Guide
MySQL and Virtualization Guide Abstract This is the MySQL and Virtualization extract from the MySQL Reference Manual. For legal information, see the Legal Notices. For help with using MySQL, please visit
RCL: Software Prototype
Business Continuity as a Service ICT FP7-609828 RCL: Software Prototype D3.2.1 June 2014 Document Information Scheduled delivery 30.06.2014 Actual delivery 30.06.2014 Version 1.0 Responsible Partner IBM
Install Guide for JunosV Wireless LAN Controller
The next-generation Juniper Networks JunosV Wireless LAN Controller is a virtual controller using a cloud-based architecture with physical access points. The current functionality of a physical controller
CDH installation & Application Test Report
CDH installation & Application Test Report He Shouchun (SCUID: 00001008350, Email: [email protected]) Chapter 1. Prepare the virtual machine... 2 1.1 Download virtual machine software... 2 1.2 Plan the guest
Relational Databases in the Cloud
Contact Information: February 2011 zimory scale White Paper Relational Databases in the Cloud Target audience CIO/CTOs/Architects with medium to large IT installations looking to reduce IT costs by creating
Network Virtualization
Network Virtualization What is Network Virtualization? Abstraction of the physical network Support for multiple logical networks running on a common shared physical substrate A container of network services
StACC: St Andrews Cloud Computing Co laboratory. A Performance Comparison of Clouds. Amazon EC2 and Ubuntu Enterprise Cloud
StACC: St Andrews Cloud Computing Co laboratory A Performance Comparison of Clouds Amazon EC2 and Ubuntu Enterprise Cloud Jonathan S Ward StACC (pronounced like 'stack') is a research collaboration launched
Open Source Network: Software-Defined Networking (SDN) and OpenFlow
Open Source Network: Software-Defined Networking (SDN) and OpenFlow Insop Song, Ericsson LinuxCon North America, Aug. 2012, San Diego CA Objectives Overview of OpenFlow Overview of Software Defined Networking
Technical Note. vsphere Deployment Worksheet on page 2. Express Configuration on page 3. Single VLAN Configuration on page 5
Technical Note The vfabric Data Director worksheets contained in this technical note are intended to help you plan your Data Director deployment. The worksheets include the following: vsphere Deployment
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
Instrumentation for Linux Event Log Analysis
Instrumentation for Linux Event Log Analysis Rajarshi Das Linux Technology Center IBM India Software Lab [email protected] Hien Q Nguyen Linux Technology Center IBM Beaverton [email protected] Abstract
VMware vsphere Design. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2330623/ VMware vsphere Design. 2nd Edition Description: Achieve the performance, scalability, and ROI your business needs What
International Journal of Computer & Organization Trends Volume20 Number1 May 2015
Performance Analysis of Various Guest Operating Systems on Ubuntu 14.04 Prof. (Dr.) Viabhakar Pathak 1, Pramod Kumar Ram 2 1 Computer Science and Engineering, Arya College of Engineering, Jaipur, India.
DMTF Management Standards for Edge Virtual. Port Profiles. Hemal Shah, Associate Technical Director, Broadcom Corporation.
DMTF Management Standards for Edge Virtual Bridging (EVB) and Network Port Profiles Hemal Shah, Associate Technical Director, Broadcom Corporation DMTF Platform Management Sub-Committee Chair March, 2011
VON/K: A Fast Virtual Overlay Network Embedded in KVM Hypervisor for High Performance Computing
Journal of Information & Computational Science 9: 5 (2012) 1273 1280 Available at http://www.joics.com VON/K: A Fast Virtual Overlay Network Embedded in KVM Hypervisor for High Performance Computing Yuan
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
The Virtual Environment
Chapter 2 The Virtual Environment In the following chapters we examine a variety of problems related to information security, as they arise in modern computer and communication systems. To deepen your
Intro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
A Middleware Strategy to Survive Compute Peak Loads in Cloud
A Middleware Strategy to Survive Compute Peak Loads in Cloud Sasko Ristov Ss. Cyril and Methodius University Faculty of Information Sciences and Computer Engineering Skopje, Macedonia Email: [email protected]
CentOS Linux 5.2 and Apache 2.2 vs. Microsoft Windows Web Server 2008 and IIS 7.0 when Serving Static and PHP Content
Advances in Networks, Computing and Communications 6 92 CentOS Linux 5.2 and Apache 2.2 vs. Microsoft Windows Web Server 2008 and IIS 7.0 when Serving Static and PHP Content Abstract D.J.Moore and P.S.Dowland
Data Center Virtualization and Cloud QA Expertise
Data Center Virtualization and Cloud QA Expertise Highlights Broad Functional QA Experience Deep understanding of Switching and Routing Protocols Strong hands on experience in multiple hyper-visors like
AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY
AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY Eric Freudenthal, University of Texas, El Paso Eric Freudenthal is an Assistant Professor of computer science at the University of Texas at El Paso.
A Case Based Tool for Monitoring of Web Services Behaviors
COPYRIGHT 2010 JCIT, ISSN 2078-5828 (PRINT), ISSN 2218-5224 (ONLINE), VOLUME 01, ISSUE 01, MANUSCRIPT CODE: 100714 A Case Based Tool for Monitoring of Web Services Behaviors Sazedul Alam Abstract Monitoring
W H I T E P A P E R. Best Practices for Building Virtual Appliances
W H I T E P A P E R Best Practices for Building Virtual Appliances Table of Contents Objectives.................................................................................. 3 Design Principles...........................................................................
How To Test Cloud Stack On A Microsoft Powerbook 2.5 (Amd64) On A Linux Computer (Amd86) On An Ubuntu) Or Windows Xp (Amd66) On Windows Xp 2.2.2 (Amd65
Function and Performance Test of pen Source CloudStack Platform for HPC Service Function and Performance Test of pen Source CloudStack Platform for HPC Service 1 Jaegyoon Hahm, 2 Sang Boem Lim, 3 Guohua
Automated deployment of virtualization-based research models of distributed computer systems
Automated deployment of virtualization-based research models of distributed computer systems Andrey Zenzinov Mechanics and mathematics department, Moscow State University Institute of mechanics, Moscow
Manage Dell Hardware in a Virtual Environment Using OpenManage Integration for VMware vcenter
Manage Dell Hardware in a Virtual Environment Using OpenManage Integration for VMware vcenter This Dell Technical White Paper gives an overview of using OpenManage Integration to streamline the time, tools
Advanced Service Design
vcloud Automation Center 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH
Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH CONTENTS Introduction... 4 System Components... 4 OpenNebula Cloud Management Toolkit... 4 VMware
Virtual Machine in Data Center Switches Huawei Virtual System
Virtual Machine in Data Center Switches Huawei Virtual System Contents 1 Introduction... 3 2 VS: From the Aspect of Virtualization Technology... 3 3 VS: From the Aspect of Market Driving... 4 4 VS: From
Virtualization Management the ovirt way
ovirt introduction FOSDEM 2013 Doron Fediuck Red Hat What is ovirt? Large scale, centralized management for server and desktop virtualization Based on leading performance, scalability and security infrastructure
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
Contents. Load balancing and high availability
White Paper Load Balancing in GateDefender Performa The information contained in this document represents the current view of Panda Software International, S.L on the issues discussed herein as of the
OGF25/EGEE User Forum Catania, Italy 2 March 2009
OGF25/EGEE User Forum Catania, Italy 2 March 2009 Constantino Vázquez Blanco Javier Fontán Muiños Raúl Sampedro Distributed Systems Architecture Research Group Universidad Complutense de Madrid 1/31 Outline
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
A Virtual Laboratory for IT Security Education
A Virtual Laboratory for IT Security Education Ji Hu, Dirk Cordel, Christoph Meinel FB IV Informatik Universitaet Trier D-54286 Trier, Germany {hu, cordel, meinel}@ti.uni-trier.de Abstract: Success of
How To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox 3.5.2 (Xeen) 2.2.5-Xen-Virtualization (X
Performance Evaluation of Virtual Routers in Para-virtual Environment 1. Abhishek Bajaj [email protected] 2. Anargha Biswas [email protected] 3. Ambarish Kumar [email protected] 4.
Migrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches
Migration Guide Migrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches Migration Guide November 2013 2013 Cisco and/or its affiliates. All rights reserved. This document is
2) Xen Hypervisor 3) UEC
5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran
The Linux Router The performance of the Linux router makes it an attractive alternative when concerned with economizing. by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran Routers are amongst
NOC PS manual. Copyright Maxnet 2009 2015 All rights reserved. Page 1/45 NOC-PS Manuel EN version 1.3
NOC PS manual Copyright Maxnet 2009 2015 All rights reserved Page 1/45 Table of contents Installation...3 System requirements...3 Network setup...5 Installation under Vmware Vsphere...8 Installation under
Computer Virtualization in Practice
Computer Virtualization in Practice [ life between virtual and physical ] A. Németh University of Applied Sciences, Oulu, Finland [email protected] ABSTRACT This paper provides an overview
Rally Installation Guide
Rally Installation Guide Rally On-Premises release 2015.1 [email protected] www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access
Monitor the Cisco Unified Computing System
Monitor the Cisco Unified Computing System Using Sentry Software Monitoring for BMC ProactiveNet Performance Management White Paper September 2010 August 2010 Contents What You Will Learn... 3 Overview...
VLAN for DekTec Network Adapters
Application Note DT-AN-IP-2 VLAN for DekTec Network Adapters 1. Introduction VLAN (Virtual LAN) is a technology to segment a single physical network into multiple independent virtual networks. The VLANs
Programmable Networking with Open vswitch
Programmable Networking with Open vswitch Jesse Gross LinuxCon September, 2013 2009 VMware Inc. All rights reserved Background: The Evolution of Data Centers Virtualization has created data center workloads
Efficient Cloud Management for Parallel Data Processing In Private Cloud
2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore Efficient Cloud Management for Parallel Data Processing In Private
How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall
Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition
Building Clouds with OpenNebula 2.2 and StratusLab
Contrail Summer School June 2011, France Building Clouds with OpenNebula 2.2 and StratusLab Javier Fontán Muiños dsa-research.org Distributed Systems Architecture Research Group Universidad Complutense
Educational Platform using Virtualization Technologies: Teaching-Learning Applications and Research Use Cases
Educational Platform using Virtualization Technologies: Teaching-Learning Applications and Research Use Cases W. Fuertes 1,2, J. E. López de Vergara 2, F. Meneses 1 1 Departament of Computer Science, Escuela
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
The OpenNebula Cloud Platform for Data Center Virtualization
CloudOpen 2012 San Diego, USA, August 29th, 2012 The OpenNebula Cloud Platform for Data Center Virtualization Carlos Martín Project Engineer Acknowledgments The research leading to these results has received
Chapter 3 Operating-System Structures
Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Virtual Appliance Installation Guide
> In This Chapter Document: : Installing the OpenManage Network Manager Virtual Appliance 2 Virtual Appliance Quick Start 2 Start the Virtual Machine 6 Start the Application 7 The Application is Ready
VM-Series Firewall Deployment Tech Note PAN-OS 5.0
VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5
LinuxWorld Conference & Expo Server Farms and XML Web Services
LinuxWorld Conference & Expo Server Farms and XML Web Services Jorgen Thelin, CapeConnect Chief Architect PJ Murray, Product Manager Cape Clear Software Objectives What aspects must a developer be aware
FleSSR Project: Installing Eucalyptus Open Source Cloud Solution at Oxford e- Research Centre
FleSSR Project: Installing Eucalyptus Open Source Cloud Solution at Oxford e- Research Centre Matteo Turilli, David Wallom Eucalyptus is available in two versions: open source and enterprise. Within this
Stream Processing on GPUs Using Distributed Multimedia Middleware
Stream Processing on GPUs Using Distributed Multimedia Middleware Michael Repplinger 1,2, and Philipp Slusallek 1,2 1 Computer Graphics Lab, Saarland University, Saarbrücken, Germany 2 German Research
Management of VMware ESXi. on HP ProLiant Servers
Management of VMware ESXi on W H I T E P A P E R Table of Contents Introduction................................................................ 3 HP Systems Insight Manager.................................................
VMware ESX Server 3 Configuration Guide
Date: 03/03/08 VMware ESX Server 3 Configuration Guide Enterprise Applications Division of the Systems and Network Analysis Center (SNAC) Information Assurance Directorate National Security Agency 9800
Open-Source Software Toolkit for Network Simulation and Modeling
Open-Source Software Toolkit for Network Simulation and Modeling Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 [email protected] Abstract This paper summarizes
Technical Investigation of Computational Resource Interdependencies
Technical Investigation of Computational Resource Interdependencies By Lars-Eric Windhab Table of Contents 1. Introduction and Motivation... 2 2. Problem to be solved... 2 3. Discussion of design choices...
Building a Penetration Testing Virtual Computer Laboratory
Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network
Analysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
Cloud Computing for a Smarter Planet Virtualization
Cloud Computing Workshop - Uni Stuttgart Cloud Computing for a Smarter Planet Virtualization Andreas Maier, IBM ([email protected]) November 2010 Contributors to this presentation Jim Rymarczyk, IBM Fellow,
Enabling Large-Scale Testing of IaaS Cloud Platforms on the Grid 5000 Testbed
Enabling Large-Scale Testing of IaaS Cloud Platforms on the Grid 5000 Testbed Sébastien Badia, Alexandra Carpen-Amarie, Adrien Lèbre, Lucas Nussbaum Grid 5000 S. Badia, A. Carpen-Amarie, A. Lèbre, L. Nussbaum
High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
PHD Virtual Backup for Hyper-V
PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V
The Road to SDN: Software-Based Networking and Security from Brocade
WHITE PAPER www.brocade.com SOFTWARE NETWORKING The Road to SDN: Software-Based Networking and Security from Brocade Software-Defined Networking (SDN) presents a new approach to rapidly introducing network
Capacity Planning for NightWatchman Management Center
Capacity Planning for NightWatchman Management Center Server sizing guide for NightWatchman Management Center www.1e.com i Version 6.0 document revision 1 1E Ltd 2011 All rights reserved. No part of this
Configuration Management of Massively Scalable Systems
1 KKIO 2005 Configuration Management of Massively Scalable Systems Configuration Management of Massively Scalable Systems Marcin Jarząb, Krzysztof Zieliński, Jacek Kosiński SUN Center of Excelence Department
SNMP, CMIP based Distributed Heterogeneous Network Management using WBEM Gateway Enabled Integration Approach
, CMIP based Distributed Heterogeneous Network Management using WBEM Gateway Enabled Integration Approach Manvi Mishra Dept. of Information Technology, SRMSCET Bareilly (U.P.), India S.S. Bedi Dept of
Flauncher and DVMS Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically
Flauncher and Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically Daniel Balouek, Adrien Lèbre, Flavien Quesnel To cite this version: Daniel Balouek,
Globus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago
Globus Striped GridFTP Framework and Server Raj Kettimuthu, ANL and U. Chicago Outline Introduction Features Motivation Architecture Globus XIO Experimental Results 3 August 2005 The Ohio State University
