NETWORK EMULATION AND NETKIT
|
|
- Camron Lane
- 8 years ago
- Views:
Transcription
1 NETWORK EMULATION AND NETKIT Gestão e Segurança de Redes / Gestão de Redes e Serviços LERC / MEIC- T 2013/14 Artur M. Arsénio & Miguel P. Correia
2 CLASS OBJECTIVES To understand what is meant by network virtualizaoon and emulaoon the basics of Netkit 2
3 VIRTUALIZATION 3
4 VIRTUALIZATION VirtualizaOon relates to the nooon of abstrac6on, which appears at several levers in computer science & eng. An interpreter is a virtual machine that runs programs wrizen in a certain language (e.g., Basic, Perl, JavaScript, PHP) A Java or.net virtual machine runs programs in bytecodes / CIL An operaong system provides a virtual machine for each program that runs on top of it Virtual machines provide virtualized resources each program has to some extent the illusion that the memory, CPU and I/O are used by itself only These resources look different from plain hw: memory, disk, 4
5 VIRTUALIZATION IN COMPUTING VirtualizaOon in this sense involves a Virtual Machine Monitor (VMM) or hypervisor Each virtual machine (VM) or guest system has the illusion that it runs on top of the hardware with its usual API Each VM can run its own operaong system! That s the difference in relaoon to what we just saw 5
6 VIRTUALIZATION - TYPES Type I or NaOve - VMM runs on top of the hardware ObjecOve is to share a server among several VMs, e.g., as in cloud comp. IaaS Examples: Xen, VMware vsphere, Microsoi Hyper- V, KVM Type II or Hosted - VMM runs on top of an OS ObjecOve is to allow user to run apps on top of different or encapsulated OSs Examples: Oracle VirtualBox, VMware Player 6
7 VIRTUALIZATION - BENEFITS Reliability: one applicaoon per VM prevents e.g. the crash of the applicaoon to affect the whole machine Security: azack against an applicaoon in a VM does not contaminate other VMs (containment) Scalability / load balancing / elasocity: applicaoon no longer azached to a physical machine so dynamic resource allocaoon for applicaoons (disk, mem, CPUs) cloud compuong CompaObility: hardware abstracoon allows running legacy applicaoons 7
8 USER- MODE LINUX (UML) VirtualizaOon planorm that works slightly differently Enables mulople Linux virtual machines to run as processes (i.e., in user mode) of a normal Linux Processes Processes Processes Linux Linux Linux Virtual hw Virtual hw Virtual hw Linux Hardware 8
9 USER- MODE LINUX (UML) Runs several virtual machines Each virtual machine runs Linux and Linux processes Distributed as patch of the Linux kernel Allows having dozens of virtual Linux machines inside a single one! Netkit is based on UML 9
10 NETKIT 10
11 NETWORK SIMULATION VS EMULATION ExperimenOng networks and their configuraoons is a common need Using a real network is oien undesirable equipment is expensive, it takes Ome to install and configure Simulators Run a model aiming at reproducing the performance of a real system (latency, bandwidth used, ); mostly used for research Emulators Aim at reproducing the funcoonality of the real components Packets are actually exchanged and there are device emulators that follow the same states of the real devices No model is used, but real (or close to real) soiware 11
12 NETKIT A network emulator based on UML So it reproduces funcoonality, not performance A virtual network is a set of virtual machines (VMs) interconnected They can play the role of hosts, routers, switches, Linux already has most soiware needed The virtual network can access the real network and the internet 12
13 VIRTUAL MACHINES Each virtual machine has: a console (a terminal window) its own memory space a filesystem (stored in a single file of the host filesystem) one or more network interfaces (NICs) Each NIC is connected to a collision domain 2 NICs connected to a collision domain à c.d. emulates a link 3 or more NICs connected to a collision domain à c.d. emulates a hub or Ethernet bus no longer used! 13
14 A SIMPLE VIRTUAL NETWORK 14
15 NODES OF A VIRTUAL NETWORK In Netkit all nodes are virtual machines with Linux; A VM can emulate: A server or a workstaoon (running Linux) A router Linux can do the rouong; Zebra/Quagga implement rouong protocols (RIP, BGP, ) A switch Linux has switching soiware (e.g., spanning tree); configured with brctl 15
16 WHAT IS NETKIT Commands used to set up virtual networks most commands are implemented as scripts A ready- to- use filesystem that serves as a pazern for creaong the file system of each VM Common networking tools are already installed in this filesystem (Quagga, brctl, Apache, etc.) A UML kernel that is used as hypervisor for the VMs Can be installed in Linux or run from a Live CD 16
17 NETKIT DETAILS 17
18 NETKIT COMMANDS Netkit provides users with two sets of commands vcommands (v- prefixed commands) for configuring and starong up single virtual machines lcommands (l- prefixed commands) to set up complex labs with several virtual machines 18
19 VCOMMANDS Allow to start up virtual machines with arbitrary configuraoons (memory, network interfaces, etc.) vstart: starts a new virtual machine vlist: lists currently running virtual machines vconfig: azaches network interfaces to running VMs vhalt: gracefully halts a virtual machine vcrash: causes a virtual machine to crash vclean: panic command to clean up all Netkit processes (including VMs) and configuraoon sewngs on the host machine 19
20 CREATING SIMPLE NETWORK WITH VCOMMANDS Create two PCs, boot them, open a shell for each: vstart pc1 - - eth0=a vstart pc2 - - eth0=a At each of the PCs console create a network interface (eth0): At pc1: ifconfig eth netmask up At pc2: ifconfig eth netmask up Ready! ping A 20
21 NETKIT LCOMMANDS Simplify sewng up complex labs consisong of several virtual machines (preferred) lstart: starts a Netkit lab (described in a file) lhalt: gracefully halts all VMs of a lab lcrash: causes all the VMs of a lab to crash lclean: removes temporary files from a lab directory linfo: provides informaoon about a lab without starong it ltest: allows to run tests to check lab is working properly 21
22 NETKIT LABS A Netkit lab is a set of preconfigured virtual machines that can be started and halted together It is launched by running lstart 22
23 NETKIT LABS USING LCOMMANDS a standard Netkit lab is a directory tree containing: a lab.conf file describing the network topology a set of subdirectories that contain configuraoon sewngs for each VM.startup and.shutdown files that describe acoons performed by VMs when they are started or halted [opoonally] a lab.dep file describing dependency relaoonships on the startup order of virtual machines [opoonally] a _test directory containing scripts for tesong that the lab is working correctly Many examples available in the Netkit web site 23
24 LAB.CONF Equivalent to physical configuraoon of the network lab.conf describes some sewngs of the VMs that make up a lab the topology of the network 24
25 LAB SUBDIRECTORIES Netkit starts a VM for each subdirectory gives each the name of the subdirectory itself unless lab.conf contains a machines= statement the contents of subdirectory VM are mapped into the root (/) of the VM s filesystem for example, vm/foo/file.txt is copied to /foo/file.txt inside the virtual machine VM this only happens the 1 st Ome the VM is started; in order to force the mapping again you have to remove the VM filesystem (.disk file next slide) 25
26 VM FILESYSTEM When a VM is executed for the first Ome a filesystem image is created file vm_name.disk This image contains: The Netkit filesystem (the one that is used as pazern) Plus whatever is in the subdirectory VM Furthermore, during the execuoon of the system the user can install more soiware, create files, etc. This is kept in vm_name.disk DeleOng vm_name.disk cleans this cleans the filesystem! Note: these files can grow big but zip/rar compress them much 26
27 STARTUP AND SHUTDOWN FILES shell scripts that tell virtual machines what to do when starong up or shuwng down they are executed inside virtual machines shared.startup and shared.shutdown affect all the virtual machines upon startup, a VM named vm_name runs shared.startup vm_name.startup upon shutdown, a VM named vm_name runs vm_name.shutdown shared.shutdown 27
28 STARTUP AND SHUTDOWN FILES a typical usage of a.startup file is to configure network interfaces and/or start network services example content of vm_name.startup: ifconfig eth netmask up (the MAC address is assigned automaocally) 28
29 LAB.DEP lstart boots VMs in some order This order can be defined by establishing dependencies e.g., pc3 can only boot aier pc2 and pc1 are up and running A lab.dep file inside the lab directory describes these dependencies file format is similar to that of a Makefile example pc3: pc1 pc2 29
30 LAUNCHING/STOPPING A LAB lcommand - d <lab_directory> [machine...] or enter the lab directory (cd lab_directory) and: lstart, to start the lab lhalt, to gracefully shut down the virtual machines of a lab lcrash, to suddenly crash the virtual machines of a lab opoonally, a list of machine names can be given on the command line only those machines will be affected by the command example: lcrash pc3 30
31 GETTING INFORMATION ABOUT A LAB linfo prints summary informaoon about a lab without running it opoon - m allows to create a sketch of the link- level topology of the lab requires the GraphViz library to be installed 31
32 ACCESSING THE OUTSIDE WORLD Can be done in two ways: FROM A VM The directory /hosthome inside a VM points to the home directory of the current user on the real host read/write access is allowed so it is possible to transfer files in/out of a VM vstart can automaocally configure tunnels ( tap interfaces ) by which a virtual machine can access an external network 32
33 ACCESSING THE INTERNET To access internet create tap, a virtual (soiware) hub tap is a Linux mechanism Done by adding to lab.conf: vm[1]=tap, , vm is the VM name, 1 is for eth1 The 2 IPs must be in the same /24 subnet The subnet can t be otherwise used in the lab 1 st IP is seen from the host; 2 nd IP is seen inside the VM Then configure DNS In the host, copy /etc/resolv.conf to vm/etc/resolv.conf 33
34 INSTALLING SOFTWARE INSIDE A VM (access to the internet is needed, previous slide) The same as installing soiware in Ubuntu or Debian: apt- get update - refresh the list of available packages apt- get install package_name - install the package If not root, sudo must be used runs the tool with superuser privileges This use to be complicated but current sysadmins have life simplified: apt- get solves conflicts and installs all that is needed 34
35 TEXT MODE Netkit runs in text mode => no graphical interfaces For instance, no normal browser can be executed Just a text mode browser 35
36 WHY NETKIT? We can implement a reasonably complex network without much hardware (e.g., ~30 nodes) We can take the network configuraoon in a memory sock Very pracocal! 36
37 SUMMARY VIRTUALIZATION EMULATION VS SIMULATION NETKIT 37
38 INSTALLING NETKIT It s easy. Just follow the instrucoons at Netkit website - hzp://wiki.netkit.org/ OpOons: Install it on Linux Install it on a Linux virtual machine, running e.g. on VirtualBox or VMware Run it from a Live CD (not recommended) Run a Live CD image as a virtual machine (not recommended) 38
39 BIBLIOGRAPHY Netkit website - hzp://wiki.netkit.org/ Netkit official labs - hzp://wiki.netkit.org/index.php/labs_official Secondary: M. Correia, P. Sousa, Segurança no Soiware, FCA, 2010 (chapter about virtualizaoon) The slides contain Networks Research Group Roma Tre 39
Version Author(s) E-mail Web Description
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Netkit The poor man s system for experimenting computer networking Version Author(s) E-mail Web
More informationIP networks Introduction to laboratory
IP networks Introduction to laboratory Piotr Pacyna, Katarzyna Kosek-Szott, Szymon Szott Working environment Laboratory exercises are based on netkit (www.netkit.org), a virtualization system, which allows
More informationEmulating Computer Networks with Netkit. Massimo Rimondini
UNIVERSITY OF ROMA TRE Department of Computer Science and Automation Emulating Computer Networks with Netkit Massimo Rimondini Computer Networks Research Group http://www.dia.uniroma3.it/~compunet 4th
More informationModule I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM
Bern University of Applied Sciences Engineering and Information Technology Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM By Franz Meyer Version 1.0 February 2011 Virtualization Architecture
More informationnetkit lab single-host Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab single-host Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani,
More informationCorso di Configurazione e Gestione di Reti Locali
Corso di Configurazione e Gestione di Reti Locali Marco Bonola Lorenzo Bracciale A.A. 2011/2012 TOC Netkit: installation, configuration, use Lab0-interfaces: basic IP configuration IP Networking (ifconfig,
More informationnetkit lab Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version 1.
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab walkthrough Version 1.3 Author(s) Massimo Rimondini E-mail Web Description contact@netkit.org
More informationwalkthrough Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version 1.
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab walkthrough Version 1.2 Author(s) Massimo Rimondini E-mail Web Description contact@netkit.org
More informationIOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
More informationIntro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
More informationWeek Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration
ULI101 Week 06b Week Overview Installing Linux Linux on your Desktop Virtualization Basic Linux system administration Installing Linux Standalone installation Linux is the only OS on the computer Any existing
More informationODP REGIONAL NODE DEPLOYMENT QUICK GUIDE FOR TRAININGS
ODP REGIONAL NODE DEPLOYMENT QUICK GUIDE FOR TRAININGS Version 1.0, 23 Jan 2014 TABLE OF CONTENTS 1. Installation of images under VMware Player...3 2. Installation of images under VirtualBox...3 3. Downloading
More informationHypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.
Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,
More information9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary kpcleary@buffalo.edu What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
More informationEXPLORING LINUX KERNEL: THE EASY WAY!
EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment
More informationEnabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
More informationVirtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
More informationEnabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
More informationDefinitions. Hardware Full virtualization Para virtualization Hosted hypervisor Type I hypervisor. Native (bare metal) hypervisor Type II hypervisor
Virtualization Objectives Definitions Why Problems Versions Virtualization vs Cloud Creating a New Virtual Machine Working with a Virtual Machine Virtual Machine Settings Virtual Machine Snapshots Definitions
More informationnetkit lab two-hosts Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab two-hosts Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani,
More informationVirtualization Management the ovirt way
ovirt introduction FOSDEM 2013 Doron Fediuck Red Hat What is ovirt? Large scale, centralized management for server and desktop virtualization Based on leading performance, scalability and security infrastructure
More informationAnh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh
Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh Introduction History, Advantages, Common Uses OS-Level Virtualization Hypervisors Type 1 vs. type 2 hypervisors
More informationBuilding a Penetration Testing Virtual Computer Laboratory
Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network
More informationComputer Virtualization in Practice
Computer Virtualization in Practice [ life between virtual and physical ] A. Németh University of Applied Sciences, Oulu, Finland andras.nemeth@students.oamk.fi ABSTRACT This paper provides an overview
More informationRemote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
More informationInformation Security Training. Assignment 1 Networking
Information Security Training Assignment 1 Networking By Justin C. Klein Keane September 28, 2012 Assignment 1 For this assignment you will utilize several networking utilities
More informationMicrokernels, virtualization, exokernels. Tutorial 1 CSC469
Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,
More informationOperating Systems Virtualization mechanisms
Operating Systems Virtualization mechanisms René Serral-Gracià Xavier Martorell-Bofill 1 1 Universitat Politècnica de Catalunya (UPC) May 26, 2014 Contents 1 Introduction 2 Hardware Virtualization mechanisms
More informationVirtualization. Pradipta De pradipta.de@sunykorea.ac.kr
Virtualization Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
More information6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days)
www.peaklearningllc.com 6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days) Introduction This three-day instructor-led course teaches students how to implement and manage Windows Server
More informationThe Art of Virtualization with Free Software
Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike
More informationCOS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
More informationDistributed systems Techs 4. Virtualization. October 26, 2009
Distributed systems Techs 4. Virtualization October 26, 2009 Current interest in virtualization is one of the hottest topics in information technology today. Possible due to the increasing speed and capabilities
More informationCloud.com CloudStack Community Edition 2.1 Beta Installation Guide
Cloud.com CloudStack Community Edition 2.1 Beta Installation Guide July 2010 1 Specifications are subject to change without notice. The Cloud.com logo, Cloud.com, Hypervisor Attached Storage, HAS, Hypervisor
More informationImplementing and Managing Windows Server 2008 Hyper-V
Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:
More informationVirtual Computing and VMWare. Module 4
Virtual Computing and VMWare Module 4 Virtual Computing Cyber Defense program depends on virtual computing We will use it for hands-on learning Cyber defense competition will be hosted on a virtual computing
More informationLinux Virtualization Nesting and Management
Linux Virtualization Nesting and Management Shen Wei Faculty of Informatics Technische Universität München May 14, 2013 Overview of nested virtualization Network bridging Hardware acceleration libvirt
More informationChapter 16: Virtual Machines. Operating System Concepts 9 th Edition
Chapter 16: Virtual Machines Silberschatz, Galvin and Gagne 2013 Chapter 16: Virtual Machines Overview History Benefits and Features Building Blocks Types of Virtual Machines and Their Implementations
More informationISERink Installation Guide
ISERink Installation Guide Version 1.1 January 27, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to
More informationPort stealing and ARP poisoning attack simulation with NETKIT
Port stealing and ARP poisoning attack simulation with NETKIT Marco Bonola, Lorenzo Bracciale Corso di Reti di Accesso Tor Vergata Prof. Stefano Salsano A.A. 2009-2010 Part 1 Port stealing Outline GOAL
More informationVMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
More informationLaboratory guide nº 2
Introduction to Computer Networks (IRC) Licenciatura in Electronics Engineering (LEE) Licenciatura in Communication Networks Engineering (LERC) Laboratory guide nº 2 1 Objectives To familiarize your- self
More informationBasics in Energy Information (& Communication) Systems Virtualization / Virtual Machines
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to
More informationCDH installation & Application Test Report
CDH installation & Application Test Report He Shouchun (SCUID: 00001008350, Email: she@scu.edu) Chapter 1. Prepare the virtual machine... 2 1.1 Download virtual machine software... 2 1.2 Plan the guest
More informationVMware vsphere 5 Quick Start Guide
VMware vsphere 5 Quick Start Guide This document is created to provide some basic information about VMware, and allow you, the customer, to determine when and how to engage us for support or other needs
More informationVirtualization and Other Tricks.
Virtualization and Other Tricks. Pavel Parízek, Tomáš Kalibera, Peter Libič DEPARTMENT OF DISTRIBUTED AND DEPENDABLE SYSTEMS http://d3s.mff.cuni.cz CHARLES UNIVERSITY PRAGUE Faculty of Mathematics and
More informationVirtual Switching Without a Hypervisor for a More Secure Cloud
ing Without a for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton) 1 Public Cloud Infrastructure Cloud providers offer computing resources
More informationnanohub.org An Overview of Virtualization Techniques
An Overview of Virtualization Techniques Renato Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida NCN/NMI Team 2/3/2006 1 Outline Resource
More informationPARALLELS SERVER BARE METAL 5.0 README
PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal
More informationCS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System J.D. DeVaughn-Brown University of Massachusetts Amherst Department of Computer Science jddevaughn@cs.umass.edu 1 Reminders After
More informationOutline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows
More informationVMware vsphere 5.0 Boot Camp
VMware vsphere 5.0 Boot Camp This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter. Assuming no prior virtualization experience, this
More informationVirtualizing a Virtual Machine
Virtualizing a Virtual Machine Azeem Jiva Shrinivas Joshi AMD Java Labs TS-5227 Learn best practices for deploying Java EE applications in virtualized environment 2008 JavaOne SM Conference java.com.sun/javaone
More informationTom Eastep Linuxfest NW April 26-27, 2008 Bellingham, Washington
Tom Eastep Linuxfest NW April 26-27, 2008 Bellingham, Washington 1. Introduction to Virtualization Techniques 2. Pros and Cons 3. Where does KVM fit in 4. QEMU-kvm 5. Creating a virtual disk 6. Installing
More informationPlug-and-play Virtual Appliance Clusters Running Hadoop. Dr. Renato Figueiredo ACIS Lab - University of Florida
Plug-and-play Virtual Appliance Clusters Running Hadoop Dr. Renato Figueiredo ACIS Lab - University of Florida Advanced Computing and Information Systems laboratory Introduction You have so far learned
More informationCloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH
Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH CONTENTS Introduction... 4 System Components... 4 OpenNebula Cloud Management Toolkit... 4 VMware
More informationComputer Systems and Networks. ECPE 170 Jeff Shafer University of the Pacific. Linux Basics
ECPE 170 Jeff Shafer University of the Pacific Linux Basics 2 Pre- Lab Everyone installed Linux on their computer Everyone launched the command line ( terminal ) and ran a few commands What problems were
More informationThe Virtual Environment
Chapter 2 The Virtual Environment In the following chapters we examine a variety of problems related to information security, as they arise in modern computer and communication systems. To deepen your
More informationVerax Service Desk Installation Guide for UNIX and Windows
Verax Service Desk Installation Guide for UNIX and Windows March 2015 Version 1.8.7 and higher Verax Service Desk Installation Guide 2 Contact Information: E-mail: sales@veraxsystems.com Internet: http://www.veraxsystems.com/
More informationDeploying Business Virtual Appliances on Open Source Cloud Computing
International Journal of Computer Science and Telecommunications [Volume 3, Issue 4, April 2012] 26 ISSN 2047-3338 Deploying Business Virtual Appliances on Open Source Cloud Computing Tran Van Lang 1 and
More informationVirtualization @ Google
Virtualization @ Google Alexander Schreiber Google Switzerland Libre Software Meeting 2012 Geneva, Switzerland, 2012-06-10 Introduction Talk overview Corporate infrastructure Overview Use cases Technology
More informationUses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:
Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between
More informationAPPLICATION NOTE. How to build pylon applications for ARM
APPLICATION NOTE Version: 01 Language: 000 (English) Release Date: 31 January 2014 Application Note Table of Contents 1 Introduction... 2 2 Steps... 2 1 Introduction This document explains how pylon applications
More informationnetkit lab static-routing Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab static-routing Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani,
More informationSystems Administration Introduction to OSPF
Systems Administration Introduction to OSPF Introduction to Virtualization Campus Networking TERNET 2012 Workshop Dar es Salaam, Tanzania April 2012 These materials are licensed under the Creative Commons
More informationSolution for private cloud computing
The CC1 system Solution for private cloud computing 1 Outline What is CC1? Features Technical details System requirements and installation How to get it? 2 What is CC1? The CC1 system is a complete solution
More informationAKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 16. AKIPS Pty Ltd
AKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 16 AKIPS Pty Ltd July 5, 2016 1 Copyright Copyright 2015 AKIPS Holdings Pty Ltd. All rights reserved worldwide. No part of this
More informationIBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2.
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:
More informationOptions in Open Source Virtualization and Cloud Computing. Andrew Hadinyoto Republic Polytechnic
Options in Open Source Virtualization and Cloud Computing Andrew Hadinyoto Republic Polytechnic No Virtualization Application Operating System Hardware Virtualization (general) Application Application
More informationAutomated deployment of virtualization-based research models of distributed computer systems
Automated deployment of virtualization-based research models of distributed computer systems Andrey Zenzinov Mechanics and mathematics department, Moscow State University Institute of mechanics, Moscow
More informationCPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
More informationLSN 10 Linux Overview
LSN 10 Linux Overview ECT362 Operating Systems Department of Engineering Technology LSN 10 Linux Overview Linux Contemporary open source implementation of UNIX available for free on the Internet Introduced
More informationVMware vsphere 5.1 Advanced Administration
Course ID VMW200 VMware vsphere 5.1 Advanced Administration Course Description This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter.
More informationLinux/Open Source and Cloud computing Wim Coekaerts Senior Vice President, Linux and Virtualization Engineering
Linux/Open Source and Cloud computing Wim Coekaerts Senior Vice President, Linux and Virtualization Engineering NIST Definition of Cloud Computing Cloud computing is a model for enabling convenient, on-demand
More informationRES ONE Automation 2015 Task Overview
RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying
More informationVMware vsphere 4.1 with ESXi and vcenter
VMware vsphere 4.1 with ESXi and vcenter This powerful 5-day class is an intense introduction to virtualization using VMware s vsphere 4.1 including VMware ESX 4.1 and vcenter. Assuming no prior virtualization
More informationVirtual machine W4M- Galaxy: Installation guide
Virtual machine W4M- Galaxy: Installation guide Christophe Duperier August, 6 th 2014 v03 This document describes the installation procedure and the functionalities provided by the W4M- Galaxy virtual
More informationAKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 15. AKIPS Pty Ltd
AKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 15 AKIPS Pty Ltd November 12, 2015 1 Copyright Copyright 2015 AKIPS Holdings Pty Ltd. All rights reserved worldwide. No part of
More informationVirtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
More informationHow To Install Eucalyptus (Cont'D) On A Cloud) On An Ubuntu Or Linux (Contd) Or A Windows 7 (Cont') (Cont'T) (Bsd) (Dll) (Amd)
Installing Eucalyptus Past, Present, and Future Eucalyptus Overview Most widely deployed software platform for on-premise IaaS clouds 25,000+ cloud starts as of mid 2011 AWS-compatible, enterprise-deployed
More informationSolution for private cloud computing
The CC1 system Solution for private cloud computing 1 Outline What is CC1? Features Technical details Use cases By scientist By HEP experiment System requirements and installation How to get it? 2 What
More informationHP SDN VM and Ubuntu Setup
HP SDN VM and Ubuntu Setup Technical Configuration Guide Version: 1 September 2013 Table of Contents Introduction... 2 Option 1: VirtualBox Preconfigured Setup... 2 Option 2: VMware Setup (from scratch)...
More informationVirtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
More informationHOWTO: Set up a Vyatta device with ThreatSTOP in router mode
HOWTO: Set up a Vyatta device with ThreatSTOP in router mode Overview This document explains how to set up a minimal Vyatta device in a routed configuration and then how to apply ThreatSTOP to it. It is
More informationNETFORT LANGUARDIAN INSTALLING LANGUARDIAN ON MICROSOFT HYPER V
NETFORT LANGUARDIAN INSTALLING LANGUARDIAN ON MICROSOFT HYPER V Instructions apply to installs on Windows Server 2012 R2 Before you begin When deployed in a Hyper V environment, LANGuardian will capture
More informationIntroduction to Virtualization & KVM
Introduction to Virtualization & KVM By Zahra Moezkarimi ICT Research Institute Software Platform Laboratory Outline Virtualization History Overview Advantages and Limitations Types of virtualization Virtualization
More informationAC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY
AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY Eric Freudenthal, University of Texas, El Paso Eric Freudenthal is an Assistant Professor of computer science at the University of Texas at El Paso.
More informationDesktop virtualization using SaaS Architecture
Desktop virtualization using SaaS Architecture Pranit U. Patil, Pranav S. Ambavkar, Dr.B.B.Meshram, Prof. Varshapriya VJTI, Matunga, Mumbai, India. pranit_patil@aol.in Abstract - Desktop virtualization
More informationCloud Computing #6 - Virtualization
Cloud Computing #6 - Virtualization Main source: Smith & Nair, Virtual Machines, Morgan Kaufmann, 2005 Today What do we mean by virtualization? Why is it important to cloud? What is the penalty? Current
More informationEnterprise-Class Virtualization with Open Source Technologies
Enterprise-Class Virtualization with Open Source Technologies Alex Vasilevsky CTO & Founder Virtual Iron Software June 14, 2006 Virtualization Overview Traditional x86 Architecture Each server runs single
More informationSetup Cisco Call Manager on VMware
created by: Rainer Bemsel Version 1.0 Dated: July/09/2011 The purpose of this document is to provide the necessary steps to setup a Cisco Call Manager to run on VMware. I ve been researching for a while
More informationNetwork Virtualization Tools in Linux PRESENTED BY: QUAMAR NIYAZ & AHMAD JAVAID
Network Virtualization Tools in Linux PRESENTED BY: QUAMAR NIYAZ & AHMAD JAVAID Contents Introduction Types of Virtualization Network Virtualization OS Virtualization OS Level Virtualization Some Virtualization
More informationUsing VirtualBox ACHOTL1 Virtual Machines
Using VirtualBox ACHOTL1 Virtual Machines The steps in the Apache Cassandra Hands-On Training Level One courseware book were written using VMware as the virtualization technology. Therefore, it is recommended
More informationTable of Contents Introduction and System Requirements 9 Installing VMware Server 35
Table of Contents Introduction and System Requirements 9 VMware Server: Product Overview 10 Features in VMware Server 11 Support for 64-bit Guest Operating Systems 11 Two-Way Virtual SMP (Experimental
More informationKnut Omang Ifi/Oracle 19 Oct, 2015
Software and hardware support for Network Virtualization Knut Omang Ifi/Oracle 19 Oct, 2015 Motivation Goal: Introduction to challenges in providing fast networking to virtual machines Prerequisites: What
More informationMASTERING (VIRTUAL) NETWORKS A Case Study of Virtualizing Internet Lab
MASTERING (VIRTUAL) NETWORKS A Case Study of Virtualizing Internet Lab Keywords: Abstract: Virtual Labs, Networking Labs, open-source, web access, Xen, MLN. In this paper we describe a single-server-based
More information2972 Linux Options and Best Practices for Scaleup Virtualization
HP Technology Forum & Expo 2009 Produced in cooperation with: 2972 Linux Options and Best Practices for Scaleup Virtualization Thomas Sjolshagen Linux Product Planner June 17 th, 2009 2009 Hewlett-Packard
More informationSTeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)
10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA by Sowmya Krishnan, Senior Software QA Engineer, Citrix Copyright: STeP-IN Forum and Quality Solutions for Information
More information13.1 Backup virtual machines running on VMware ESXi / ESX Server
13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines
More informationSymantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
More information