A New Scalable Server Construction Method Based On. Virtual Machine Transfer and Duplication
|
|
- Abel Gardner
- 8 years ago
- Views:
Transcription
1 A New Scalable Server Construction Method Based On Virtual Machine Transfer and Duplication Yuko KAMIYA and Toshihiko SHIMOKAWA Graduate School of Information Science, Kyushu Sangyo University, JAPAN Faculty of Information Science, Kyushu Sangyo University, JAPAN ABSTRACT In the Internet world, server systems play a crucial role in continuously supporting the 24/7 operation of the network. However, some problem issues have been identified with the current server systems on the Internet. In this research, we tackle two of these problems, i.e., the processing power and network bandwidths, and proposed solutions on these issues. In this research, we use virtual machines to solve the above-mentioned problems. Generally, a virtual machine consists of some files which are easy to duplicate and transfer. By duplicating a virtual machine at a server and transferring it to a high-performance processing server, we can increase the origin server s processing power. Likewise, by tapping the wide bandwidth of a high-performance processing server, we can increase the network bandwidth. We call this idea, Server Proliferation. We designed the Virtual Machine Control Protocol (CP) to implement Server Proliferation. CP has six basic functions; namely, to authenticate users, to obtain information of remote physical machines, to obtain information of remote networks, to transfer virtual machines, to control remote virtual machines, and to provide help functions. We implemented a prototype system of CP, called PIYO (ProlIferate and Yield Objects). PIYO is a server-client system. At the server side, PIYO processes CP and controls the virtual machines. At the client side, PIYO processes CP and duplicates the virtual machines. Lastly, we evaluated Server Proliferation by using PIYO. Keywords: Virtual Machine, Server Mobility, Server Proliferation 1. INTRODUCTION With the rapid developments and widespread use of information systems and ubiquitous environments, the Internet becomes one of the base infrastructures in realizing these systems. The Internet server systems provides many services and some of these servers are frequently accessed by many users. We can say that server system is one of the key technologies energizing the Internet. However, some problem issues have been identified with the current server systems. In this research, we tackle two of the problems and proposed solutions. The first problem is the processing power, i.e., if the processing power of a server is insufficient, it may not be able to continue to provide its service. The second problem is the network bandwidth, i.e., if the network bandwidth is narrow and many requests are flooding the server, the network may suffer congestion. A possible solution to the first problem is to increase the number of servers and/or by using high performance machines. However, usually the peak load time does not last long. Therefore, using high performance machines and/or increasing the number of machines are costly alternatives. Likewise, it needs time to increase the number of machines. Therefore, it is difficult to provide an adaptive solution to the rapid increase of users access. The second problem can be solved by distributing machines in a wide area. This is because accesses from clients are distributed among servers. However, it is difficult to distribute physical machines dynamically. In this research, we use virtual machines to solve the above-mentioned problems. 2. VIRTUAL MACHINE TECHNIQUE Virtualization is one of the key techniques oftentimes used in computer science. For example, the virtual memory technique virtualizes a memory to get large memory spaces. On the other hand, the virtual machine technique virtualizes a whole machine. There are two kinds of virtual machine models. The first one is Host OS model. In this model, the usual OS, i.e., Windows, Linux and so on, runs on a physical machine. A virtual machine runs as one of the applications on the host OS. The other one is the Virtual Machine Monitor model. In this model, a special purpose OS,
2 called virtual machine monitor, runs on a physical machine. Virtual machine monitor only supports to run virtual machines. 3. SERVER PROLIFERATION support at layer 4, and requires modifying the applications. However, it has an advantage on the performance. So, we use both Mobile IP and SCTP. In this research, our goal is to increase the server processing power and network bandwidth, dynamically. To realize this, we propose a new idea, called Server Proliferation. The basic idea of Server Proliferation is simple. We build all services on top of virtual machines. We duplicate and/or transfer a virtual machine when needed. By duplicating a virtual machine and transferring it to a high-performance processing server, we can increase the origin server s processing power. Likewise, by tapping the wide bandwidth of a high-performance processing server, we can increase the network bandwidths. In order to avoid network congestion, we can distribute duplicated virtual machines in a wide area. Generally speaking, a virtual machine consists of a hardware configuration information file and some hard disk image files, which are easy to duplicate and transfer. One case of using Server Proliferation is as follows. Server providers can build their own servers on virtual machines and not directly on physical machines. By this, they can easily increase and transfer their servers. To run these servers, they can distribute the physical machines all over the Internet with virtual machine monitors. To run many virtual machines on these virtual machine monitors, they have to use high performance machines. As we mentioned earlier, high performance machines are very expensive. However, since these machines can serve many servers, the cost can be offset by its services. At the early stage, a server provider can run its virtual machine on a virtual machine monitor. When its service becomes popular, it has two choices, i.e., either to transfer the virtual machine or process duplication. When the server provider transfers its virtual machine to another virtual machine monitor that runs on a high-performance machine, it can increase its processing power. Figure 1 shows a virtual machine transfer. However, if a virtual machine is transferred to another network, the IP address must be changed. Therefore, users cannot continue their communication between servers. To solve this problem, we use Mobile IP[1] and/or SCTP[2][3]. Mobile IP adds mobility support to IP, and is used for client mobility. However, in our case, we use it for server mobility. Mobile IP provides mobility support at layer 3. Therefore, we don t have to modify applications. However, it has a disadvantage on the performance. On the other hand, SCTP provides mobility Internet Figure 1. Transferring a Virtual Machine When a server provider duplicates its virtual machine, it can increase its processing power and network bandwidths. Figure 2 shows multiple duplications of a virtual machine. By increasing the network bandwidths, it can prevent network congestion. Also, by navigating users to the suitable server, it can distribute the load of the server provider. Internet Figure 2. Duplications of a Virtual Machine Furthermore, aside from increasing the server processing power and increasing the bandwidth, Server Proliferation can be used to solve some environmental problems. We can save energy by transferring virtual machines from daytime area to nighttime area. This is because the temperature is different between daytime and nighttime, i.e., nighttime is cooler than daytime. It needs more energy to cool server systems at daytime rather than at nighttime. If the processing of virtual machines can be transferred to a nighttime area, then we can reduce the energy consumption, and thus contribute a solution to some environmental problems.
3 Command Function AUTH Get authentication from a server GETHOST Get information of a server GETNET Get information of a remote network SEND Send virtual machine to a server RECV Receive a virtual machine from a server START Start a virtual machine on a server STOP Stop a virtual machine on a server PAUSE Pause a virtual machine on a server UNPAUSE Unpause a virtual machine on a server DESTORY Shutdown a virtual machine on a server REBOOT Reboot a virtual machine on a server Terminate connection between a client QUIT and a server LIST List virtual machines on a server Table 1. CP commands 4. CP: VIRTUAL MACHINE CONTROL PROTOCOL We can transfer virtual machines from one physical machine to another, and execute the virtual machine on the other physical machine. To implement this, we designed a new protocol, called CP: Virtual Machine Control Protocol. CP is a simple ASCII-based protocol like the other major protocols on the Internet. It uses reliable ordered stream transport protocol. Basically, it uses TCP. CP has six functions and they are described as follows. 1) To authenticate users This function is to authenticate a CP client by the CP server. 2) To get information of a remote physical machine This function is to get information about a remote physical machine; i.e., CPU specs, memory size, HDD size, network bandwidths, and so on. With this information, CP clients can judge whether to send or not a virtual machine to a certain physical machine. 3) To get information of a remote network This function is to get information of remote networks; i.e., IP address, default gateway, nameserver, netmask, and so on. CP clients can use this information to modify a virtual machine before sending it. 4) To transfer virtual machines This function is to transfer a virtual machine from a CP server machine to a CP client machine, and vice versa. 5) To control a remote virtual machine This function is to control a remote virtual machine. It can start, suspend, and stop remote virtual machines. 6) To provide help functions This function is to provide help functions. For example, it can list up remote virtual machines, or connect a CP server machine to a CP client machine. Table 1 shows the lists of CP commands with brief descriptions of each. 5. PROTOTYPE IMPLEMENTATION OF CP We implemented a prototype system of CP, called PIYO: ProlIferate and Yield Objects. PIYO is a server-client system. At the server side, PIYO processes CP and controls the virtual machines via the virtual machine monitor. Current implementation uses Xen[4] as the virtual machine monitor. Xen is an open-source para-virtualizing virtual machine monitor for the x86 processor architecture. Xen can execute multiple virtual machines on a single physical system with close-to-native performance. At the client side, PIYO processes CP and duplicates virtual machines. PIYO processes the virtual machine duplication as follows. It copies the image files of a virtual machine, and gets information about a remote network; such as its IP address, netmask, default router, and so on, from a PIYO server. It then creates a new MAC address. PIYO applies this information to the copied virtual machine to be able to run on a remote network. PIYO is written in Ruby. 6. EXPERIMENTS We conducted three experiments to evaluate PIYO. In the first experiment, we measured the time to duplicate a virtual machine. As mentioned in Section 5, PIYO duplicates a virtual machine in two steps, and we measured the time for each step. Also, as we said in Section 1, a virtual machine consists of a hardware configuration information file and some hard disk image files. We call these files as virtual machine construction files. We measured the time to copy a virtual machine for five times according to the following procedures. 1) We copied the virtual machine construction files by the PIYO client. We measured the time incurred, and call it Copy time. 2) We modified the copied virtual machine construction files.
4 To do so, we applied new information i.e., MAC address to the hardware configuration information file. Likewise, we applied new information i.e., IP address, default gateway, nameserver and netmask to the OS configuration files in the copied hard disk image files. To modify these files in the hard disk image files, we mounted those hard disk image files via the loop back device of Linux. We measured the time incurred, and call it Modify time. the QGPOP network at KSU campus. And the third machine, called zyx.qgpop.net, is located on the QGPOP network in Kyushu University. Table 4 shows the physical machine specs of these three machines. Table 2 shows the physical machine specs in this experiment, while Table 3 shows the results. CPU Pentium4 2.40GHz Memory 1.2GB HDD UDMA100 40GB Table 2. The machine specs (First expt.) Figure 5. The experimental environment (Second expt.) Copy time Modify time Total First 237 seconds 1 second 238 seconds Second 189 seconds 6 seconds 195 seconds Third 210 seconds 3 seconds 213 seconds Forth 208 seconds 4 seconds 212 seconds Fifth 233 seconds 4 seconds 237 seconds Average seconds 3.6 seconds seconds Table 3. The time to duplicate a virtual machine This result shows that on the average, it took seconds to copy and modify a virtual machine. Most of the time was spent in copying the virtual machine construction files. This indicates that by reducing the virtual machine copy time, we can reduce the virtual machine duplication time. In the second experiment, we measured the virtual machine transfer time. Figure 5 shows the experimental environment. There are two separate networks used in this experiment; namely, the Kyushu Sangyo University (KSU) Campus Network, or KIND, and the Kyushu Gigapop Project Network, or QGPOP. QGPOP network is a research network connecting some universities and companies in Kyushu. At KSU, we can use both the KIND and QGPOP networks. These two networks are connected by the Internet. We use three physical machines in this experiment. The first machine, called cute.nw.is.kyusan-u.ac.jp, is located on the KIND network. The second machine, called ah.qgpop.net, is located on hostname CPU Memory Network cute Pentium4 2.4GHz 1.2GB 1Gbps ah Xeon 2.4GHz 512MB 1Gbps zyx Xeon 2.4GHz 512MB 1Gbps Table 4. The machine specs (Second expt.) Here, we measured the transfer time in two different scenarios. In the first scenario, we transferred a virtual machine between hosts ah and zyx. Both machines are connected to the QGPOP network, but ah is located at KSU while zyx is located in Kyushu University. In the second scenario, we transferred a virtual machine between hosts cute and ah. These machines are located both at KSU. But cute is connected to the KIND network and ah is connected to the QGPOP network. The size of the virtual machine is 2GB. Table 5 and Table 6 are the results of the experiments. Transferring time First 59 seconds Second 57 seconds Third 59 seconds Forth 58 seconds Fifth 57 seconds Average 58 seconds Table 5. The transfer time between ah and zyx
5 Transferring Time First 1 hour 8 minutes 18 seconds Second 1 hour 13 minutes 55 seconds Third 1 hour 14 minutes 37 seconds Forth 1 hour 15 minutes 40 seconds Fifth 1 hour 16 minutes 30 seconds Average 1 hour 13 minutes 48 seconds Table 6. The transfer time between ah and cute SCP FTP PIYO First 136 seconds 56 seconds 59 seconds Second 140 seconds 54 seconds 58 seconds Third 146 seconds 56 seconds 60 seconds Forth 131 seconds 62 seconds 61 seconds Fifth 132 seconds 56 seconds 60 seconds Average seconds 56.8 seconds 59.6 seconds Table 8. The results in the final experiment These results show that the average transfer time between QGPOP nodes is 58 seconds. This is because the network distance between the two physical machines is short. On the other hand, the average transfer time between nodes in QGPOP and KIND is 1 hour 13 minutes 48 seconds. This is because the network distance between the two physical machines is long. This too long time to transfer a virtual machine in a wide area is a big problem. Therefore, we must improve the virtual machine transfer time. In the final experiment, we compare the transfer time of a virtual machine using other known tools. We understand that it takes too long time to transfer a virtual machine in a wide area, and so we compared PIYO with existing tools: SCTP and FTP. Figure 6 shows the experimental environment and Table 7 shows the specs of the physical machines. We use the same specs for the machines used in this experiment. Table 8 shows the results of this experiment. The result shows that PIYO can transfer virtual machines faster than SCTP, while PIYO can transfer as fast as FTP. These results justifies that PIYO can withstand the comparison with existing tools. 7. RELATED WORKS Some related works include the Live Migration[5] of Xen and the otion[6] of ware which are also virtual machine transferring techniques. These techniques though can only transfer virtual machines between local area networks. However, our method can transfer virtual machines between wide area networks. Quasar[7] is a mobile computing system built on top of CPU Emulator QEMU. Quasar provides support for migration of QEMU s virtual machine. Quasar only provides server migration. However, our research supports both server migration and server proliferation. 8. CONCLUSIONS Figure 6. The experimental environment (Final expt.) CPU Pentium4 2.40GHz Memory 256MB HDD UDMA100 40GB Table 7. The specs of the physical machines (Final expt.) In this research, we proposed a new method to construct servers, called Server Proliferation. We designed and implemented a prototype of a new protocol, called CP, to implement our method. In our method, we can increase the server processing power and network bandwidths, dynamically. Our method is based on virtual machine technique. We can increase the number of virtual machines when more processing power is needed and can transfer virtual machines to remote networks. Moreover, our method can also be used to help solve some environmental problems. The current prototype system only supports the sub-functions of CP. In the future, we will implement CP in full and evaluate it with due consideration to environmental problems. Furthermore, since the duplication and transfer time of virtual machines took too long, we plan to reduce the time and address
6 this issue more deeply. ACKNOWLEDGMENTS This research was supported in part by MEXT in Japan under Grants-in-Aid for Scientific Research on Priority Area , and by JSPS in Japan under Grants-in-Aid for Scientific Research (B) REFERENCES [1] C. Perkins, Ed., IP Mobility Support for IPv4, RFC3344, August [2] R. Stewart, Stream Control Transmission Protocol, RFC4960, September [3] R. Stewart, Q. Xie, M. Tuexen, S. Maruyama, M. Kozuka, Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration, RFC5061, September [4] Home of the Xen hypervisor, [5] C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I.Pratt, and A. Warfield, Live Migration of Virtual Machines, In Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), May [6] ware, otion Overview, Virtual Machine Migration, Virtualization, [7] Koichi Onoue, Yoshihiro Oyama, Akinori Yonezawa, Quasar: A Mobile Computing System Based on CPU Emulator QEMU, In Proceedings of The 8th Workshop on Systems for Programming and Applications (SPA 2005), March 2005.
Study of Flexible Contents Delivery System. With Dynamic Server Deployment
Study of Flexible Contents Delivery System With Dynamic Server Deployment Yuko KAMIYA Toshihiko SHIMOKAWA and orihiko YOSHIDA Graduate School of Information Science, Kyushu Sangyo University, JAPA Faculty
More information3. Flexible Contents Delivery System with Dynamic Server Deployment. 2. Related Works. 3.1 Server Proliferation 2.1 CDN
81 Scalable Contents Delivery System with Dynamic Server Deployment Yuko KAMIYA 1, Toshihiko SHIMOKAWA 2, Fuminori TANIZAKI 3 and Norihiko YOSHIDA 4 1 Graduate School of Information Science, Kyushu Sangyo
More informationNetwork performance in virtual infrastructures
Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso
More informationEnabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
More informationXen Live Migration. Networks and Distributed Systems Seminar, 24 April 2006. Matúš Harvan Xen Live Migration 1
Xen Live Migration Matúš Harvan Networks and Distributed Systems Seminar, 24 April 2006 Matúš Harvan Xen Live Migration 1 Outline 1 Xen Overview 2 Live migration General Memory, Network, Storage Migration
More informationEnabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
More informationDynamic Load Balancing of Virtual Machines using QEMU-KVM
Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College
More informationVirtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
More informationQuantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
More informationHow To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox 3.5.2 (Xeen) 2.2.5-Xen-Virtualization (X
Performance Evaluation of Virtual Routers in Para-virtual Environment 1. Abhishek Bajaj abhishek.bajaj@iiitb.net 2. Anargha Biswas anargha.biswas@iiitb.net 3. Ambarish Kumar ambarish.kumar@iiitb.net 4.
More informationIOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
More informationIMPLEMENTING GREEN IT
Saint Petersburg State University of Information Technologies, Mechanics and Optics Department of Telecommunication Systems IMPLEMENTING GREEN IT APPROACH FOR TRANSFERRING BIG DATA OVER PARALLEL DATA LINK
More informationComparison of Open Source Cloud System for Small and Medium Sized Enterprises
, pp.276-282 http://dx.doi.org/10.14257/astl.2014.51.63 Comparison of Open Source Cloud System for Small and Medium Sized Enterprises Yasuo Uchida 1, Seigo Matsuno 1, Makoto Sakamoto 2 1 Ube National College
More informationRemus: : High Availability via Asynchronous Virtual Machine Replication
Remus: : High Availability via Asynchronous Virtual Machine Replication Brendan Cully, Geoffrey Lefebvre, Dutch Meyer, Mike Feeley,, Norm Hutchinson, and Andrew Warfield Department of Computer Science
More informationBUILDING OF A DISASTER RECOVERY FRAMEWORK FOR E-LEARNING ENVIRONMENT USING PRIVATE CLOUD COLLABORATION
BUILDING OF A DISASTER RECOVERY FRAMEWORK FOR E-LEARNING ENVIRONMENT USING PRIVATE CLOUD COLLABORATION Satoshi Togawa 1 and Kazuhide Kanenishi 2 1 Faculty of Management and Information Science, Shikoku
More informationSage Grant Management System Requirements
Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to
More informationNetwork Mobility Support Scheme on PMIPv6 Networks
Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. sgmin@korea.ac.kr
More informationPeter Ruissen Marju Jalloh
Peter Ruissen Marju Jalloh Agenda concepts >> To research the possibilities for High Availability (HA) failover mechanisms using the XEN virtualization technology and the requirements necessary for implementation
More informationConfiguring Virtual Blades
CHAPTER 14 This chapter describes how to configure virtual blades, which are computer emulators that reside in a WAE or WAVE device. A virtual blade allows you to allocate WAE system resources for use
More informationVirtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
More informationVMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
More informationZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationIntroduction of Virtualization Technology to Multi-Process Model Checking
Introduction of Virtualization Technology to Multi-Process Model Checking Watcharin Leungwattanakit watcharin@is.s.u-tokyo.ac.jp Masami Hagiya hagiya@is.s.u-tokyo.ac.jp Mitsuharu Yamamoto Chiba University
More informationInstalling & Using KVM with Virtual Machine Manager COSC 495
Installing & Using KVM with Virtual Machine Manager COSC 495 1 Abstract:. There are many different hypervisors and virtualization software available for use. One commonly use hypervisor in the Linux system
More informationInfluence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
More informationFrom Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
More informationRed Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Network (RHN) Satellite server is an easy-to-use, advanced systems management platform
More informationRed Hat Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Satellite server is an easy-to-use, advanced systems management platform for your Linux infrastructure.
More informationLecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
More informationAchieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.
More informationOS Installation Guide Red Hat Linux 9.0
OS Installation Guide Red Hat Linux 9.0 C o n t e n t s Contents 3 About This Guide 5 1 Planning Your Installation 7 Requirements 7 2 Installing Red Hat 9.0 Error! Bookmark not defined. What s Next? 19
More informationModule I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM
Bern University of Applied Sciences Engineering and Information Technology Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM By Franz Meyer Version 1.0 February 2011 Virtualization Architecture
More informationWinClon CC. Network-based System Deployment and Management Tool. A Windows Embedded Partner
Network-based System Deployment and Management Tool A Windows Embedded Partner Table of Contents Introduction Overview Integrated System Imaging System Requirements Deployment & Distribution System Image
More informationVirtualization. Michael Tsai 2015/06/08
Virtualization Michael Tsai 2015/06/08 What is virtualization? Let s first look at a video from VMware http://bcove.me/x9zhalcl Problems? Low utilization Different needs DNS DHCP Web mail 5% 5% 15% 8%
More informationDesktop virtualization using SaaS Architecture
Desktop virtualization using SaaS Architecture Pranit U. Patil, Pranav S. Ambavkar, Dr.B.B.Meshram, Prof. Varshapriya VJTI, Matunga, Mumbai, India. pranit_patil@aol.in Abstract - Desktop virtualization
More informationVMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
More informationKFUPM Enterprise Network. Sadiq M. Sait sadiq@kfupm.edu.sa
KFUPM Enterprise Network Sadiq M. Sait sadiq@kfupm.edu.sa 1 Outline KFUPM Enterprise Network Diagram KFUPM Network Model KFUPM Backbone Network Connectivity: Academic Buildings, SDN, RAS Major Acheivements
More informationManageEngine EventLog Analyzer. Best Practices Document
ManageEngine EventLog Analyzer Best Practices Document Table of Contents System Requirements... 3 Up to 50 hosts... 3 Up to 100 hosts... 3 Up to 200 hosts... 3 Up to 500 hosts... 3 Above 500 hosts... 4
More informationPlexxi Control Installation Guide Release 2.1.0
Plexxi Control Installation Guide Release 2.1.0 702-20002-10 Rev 1.2 February 19, 2015 100 Innovative Way - Suite 3322 Nashua, NH 03062 Tel. +1.888.630.PLEX (7539) www.plexxi.com Notices The information
More informationInstall Guide for JunosV Wireless LAN Controller
The next-generation Juniper Networks JunosV Wireless LAN Controller is a virtual controller using a cloud-based architecture with physical access points. The current functionality of a physical controller
More informationZdeněk Salvet. Virtual machine control tools in METACentrum. CESNET Technical Report X/2007
Zdeněk Salvet Virtual machine control tools in METACentrum CESNET Technical Report X/2007 1 Introduction This technical report describes first generation of commandline and WWW portal tools developed to
More informationPARALLELS CLOUD SERVER
PARALLELS CLOUD SERVER Performance and Scalability 1 Table of Contents Executive Summary... Error! Bookmark not defined. LAMP Stack Performance Evaluation... Error! Bookmark not defined. Background...
More informationDeploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
More informationZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationVIRTUALIZATION, The next step for online services
Scientific Bulletin of the Petru Maior University of Tîrgu Mureş Vol. 10 (XXVII) no. 1, 2013 ISSN-L 1841-9267 (Print), ISSN 2285-438X (Online), ISSN 2286-3184 (CD-ROM) VIRTUALIZATION, The next step for
More informationServerPronto Cloud User Guide
ServerPronto Cloud User Guide Virtual machines Virtual machines are based on templates and are deployed on hypervisors. Hypervisors give them access to CPU, disk and network resources. The ServerPronto
More informationA Migration of Virtual Machine to Remote System
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationAutonomic resource management for the Xen Hypervisor
Autonomic resource management for the Xen Hypervisor Íñigo Goiri and Jordi Guitart Universitat Politécnica de Catalunya Barcelona, Spain {igoiri,jguitart}@ac.upc.es Abstract Servers workload varies during
More informationDIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION A DIABLO WHITE PAPER AUGUST 2014 Ricky Trigalo Director of Business Development Virtualization, Diablo Technologies
More informationPERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India sudha.mooki@gmail.com 2 Department
More informationNitin V. Choudhari National Informatics Centre, District Unit, Collector Office, Akola, Maharashtra, India nv.choudhari@nic.in,nitinvc@gmail.
Virtualization using Virtual Machines: for Improved Service Delivery, increased throughput, technical and financial resource optimization in e-governance Nitin V. Choudhari National Informatics Centre,
More informationMinimum Hardware Configurations for EMC Documentum Archive Services for SAP Practical Sizing Guide
Minimum Hardware Configurations for EMC Documentum Archive Services for SAP Practical Sizing Guide Abstract The sizing of hardware in a deployment of EMC Document Archive Services for SAP is determined
More informationPerformance Analysis of Network Subsystem on Virtual Desktop Infrastructure System utilizing SR-IOV NIC
ICSNC 13 : The Eighth International Conference on Systems and Networks Communications Performance Analysis of Network Subsystem on Virtual Desktop Infrastructure System utilizing SR-IOV NIC Soo-Cheol Oh
More informationHow To Speed Up A Flash Flash Storage System With The Hyperq Memory Router
HyperQ Hybrid Flash Storage Made Easy White Paper Parsec Labs, LLC. 7101 Northland Circle North, Suite 105 Brooklyn Park, MN 55428 USA 1-763-219-8811 www.parseclabs.com info@parseclabs.com sales@parseclabs.com
More informationPARALLELS SERVER 4 BARE METAL README
PARALLELS SERVER 4 BARE METAL README This document provides the first-priority information on Parallels Server 4 Bare Metal and supplements the included documentation. TABLE OF CONTENTS 1 About Parallels
More informationManageEngine EventLog Analyzer. Best Practices Document
ManageEngine EventLog Analyzer Best Practices Document Table of Contents System Requirements... 3 Up to 50 hosts... 3 Up to 100 hosts... 3 Up to 200 hosts... 3 Up to 500 hosts... 3 Above 500 hosts... 4
More informationServervirualisierung mit Citrix XenServer
Servervirualisierung mit Citrix XenServer Paul Murray, Senior Systems Engineer, MSG EMEA Citrix Systems International GmbH paul.murray@eu.citrix.com Virtualization Wave is Just Beginning Only 6% of x86
More informationOverview... 2. Customer Login... 2. Main Page... 2. VM Management... 4. Creation... 4 Editing a Virtual Machine... 6
July 2013 Contents Overview... 2 Customer Login... 2 Main Page... 2 VM Management... 4 Creation... 4 Editing a Virtual Machine... 6 Disk Management... 7 Deletion... 7 Power On / Off... 8 Network Management...
More informationIntegration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide
Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate
More information4-2 A Load Balancing System for Mitigating DDoS Attacks Using Live Migration of Virtual Machines
4-2 A Load Balancing System for Mitigating DDoS Attacks Using Live Migration of Virtual Machines ANDO Ruo, MIWA Shinsuke, KADOBAYASHI Youki, and SHINODA Yoichi Recently, rapid advances of CPU processor
More informationINUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture
More informationHillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides
More informationBig Data Technologies for Ultra-High-Speed Data Transfer and Processing
White Paper Intel Xeon Processor E5 Family Big Data Analytics Cloud Computing Solutions Big Data Technologies for Ultra-High-Speed Data Transfer and Processing Using Technologies from Aspera and Intel
More informationComputing Service Provision in P2P Clouds
Computing Service Provision in P2P Clouds Ghislain FOUODJI TASSE Supervisor: DR. Karen BRADSHAW Department of Computer Science Rhodes University Research Statement Leverage advantages of cloud computing
More informationGlobus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago
Globus Striped GridFTP Framework and Server Raj Kettimuthu, ANL and U. Chicago Outline Introduction Features Motivation Architecture Globus XIO Experimental Results 3 August 2005 The Ohio State University
More informationPARALLELS SERVER BARE METAL 5.0 README
PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal
More informationComparing Free Virtualization Products
A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this
More informationVirtual Desktop Infrastructure Planning Overview
WHITEPAPER Virtual Desktop Infrastructure Planning Overview Contents What is Virtual Desktop Infrastructure?...2 Physical Corporate PCs. Where s the Beef?...3 The Benefits of VDI...4 Planning for VDI...5
More informationA Middleware Strategy to Survive Compute Peak Loads in Cloud
A Middleware Strategy to Survive Compute Peak Loads in Cloud Sasko Ristov Ss. Cyril and Methodius University Faculty of Information Sciences and Computer Engineering Skopje, Macedonia Email: sashko.ristov@finki.ukim.mk
More informationCloud.com CloudStack Community Edition 2.1 Beta Installation Guide
Cloud.com CloudStack Community Edition 2.1 Beta Installation Guide July 2010 1 Specifications are subject to change without notice. The Cloud.com logo, Cloud.com, Hypervisor Attached Storage, HAS, Hypervisor
More informationCOMPUTING. Centellis Virtualization Platform An open hardware and software platform for implementing virtualized applications
COMPUTING Data Sheet Centellis VP provides the hardware and software platform to deploy carrier grade virtualized applications. Application virtualization software framework based on industry standard
More information4 High-speed Transmission and Interoperability
4 High-speed Transmission and Interoperability Technology 4-1 Transport Protocols for Fast Long-Distance Networks: Comparison of Their Performances in JGN KUMAZOE Kazumi, KOUYAMA Katsushi, HORI Yoshiaki,
More informationUDR: UDT + RSYNC. Open Source Fast File Transfer. Allison Heath University of Chicago
UDR: UDT + RSYNC Open Source Fast File Transfer Allison Heath University of Chicago Motivation for High Performance Protocols High-speed networks (10Gb/s, 40Gb/s, 100Gb/s,...) Large, distributed datasets
More informationEnhancing the Performance of Live Migration of Virtual Machine s with WSClock Replacement Algorithm
Enhancing the Performance of Live Migration of Virtual Machine s with WSClock Replacement Algorithm C.Sagana M.Geetha Dr R.C.Suganthe PG student, Assistant Professor, Professor, Dept of CSE, Dept of CSE
More informationVirtual Computing Laboratories Extension with Virtual Desktop Infrastructure for Smart Campus on a Cloud Computing
, pp.52-57 http://dx.doi.org/10.14257/astl.2013 Virtual Computing Laboratories Extension with Virtual Desktop Infrastructure for Smart Campus on a Cloud Computing Dongho Song 1, Youngpil Kim 2, Yeonjin
More informationA High-Performance Storage and Ultra-High-Speed File Transfer Solution
A High-Performance Storage and Ultra-High-Speed File Transfer Solution Storage Platforms with Aspera Abstract A growing number of organizations in media and entertainment, life sciences, high-performance
More informationCOS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
More informationOracle Virtual Machine Qualification Note Oracle FLEXCUBE Universal Banking Release 12.0.3.0.0 [April] [2014]
Oracle Virtual Machine Qualification Note Oracle FLEXCUBE Universal Banking Release 12.0.3.0.0 [April] [2014] Table of Contents 1. INTRODUCTION... 2 1.1 SCOPE... 2 1.2 INTRODUCTION TO ORACLE VM... 2 1.3
More informationSage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
More informationSyncplicity On-Premise Storage Connector
Syncplicity On-Premise Storage Connector Implementation Guide Abstract This document explains how to install and configure the Syncplicity On-Premise Storage Connector. In addition, it also describes how
More informationSage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
More informationEnsure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details
ZENworks 11 SP3 System December 2014 The following sections provide the Novell ZENworks 11 SP3 requirements for hardware and software: Section 1, Primary Server, on page 1 Section 2, Managed Device, on
More informationIntro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
More informationSigniant Agent installation
Signiant Agent installation Release 11.3.0 March 2015 ABSTRACT Guidelines to install the Signiant Agent software for the WCPApp. The following instructions are adapted from the Signiant original documentation
More informationVON/K: A Fast Virtual Overlay Network Embedded in KVM Hypervisor for High Performance Computing
Journal of Information & Computational Science 9: 5 (2012) 1273 1280 Available at http://www.joics.com VON/K: A Fast Virtual Overlay Network Embedded in KVM Hypervisor for High Performance Computing Yuan
More information7 Real Benefits of a Virtual Infrastructure
7 Real Benefits of a Virtual Infrastructure Dell September 2007 Even the best run IT shops face challenges. Many IT organizations find themselves with under-utilized servers and storage, yet they need
More informationSILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE
VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak
More informationHitachi Virtage Embedded Virtualization Hitachi BladeSymphony 10U
Hitachi Virtage Embedded Virtualization Hitachi BladeSymphony 10U Datasheet Brings the performance and reliability of mainframe virtualization to blade computing BladeSymphony is the first true enterprise-class
More informationAn Introduction to Dispersive Virtualized Networks
An Introduction to Dispersive Virtualized Networks Dispersive Technologies software and cloud-based virtualized networks deliver mission-critical communications over the public Internet to help organizations
More informationXen Virtualization: Xen (source) and XenServer
Xen Virtualization: Xen (source) and XenServer An introduction to free and commercial methods of creating virtual servers by Mark Sallee, Sys Admin, NCAR " Why Virtualization? Scenario: imagine that you
More informationD1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June ronald.vanderpol@sara.nl,freek.dijkstra@sara.nl,
More informationWindows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...
More informationAqua Connect Load Balancer User Manual (Mac)
Aqua Connect Load Balancer User Manual (Mac) Table of Contents About Aqua Connect Load Balancer... 3 System Requirements... 4 Hardware... 4 Software... 4 Installing the Load Balancer... 5 Configuration...
More informationAlphaTrust PRONTO - Hardware Requirements
AlphaTrust PRONTO - Hardware Requirements 1 / 9 Table of contents Server System and Hardware Requirements... 3 System Requirements for PRONTO Enterprise Platform Software... 5 System Requirements for Web
More informationParallels Cloud Server 6.0
Parallels Cloud Server 6.0 Parallels Cloud Storage I/O Benchmarking Guide September 05, 2014 Copyright 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings
More informationBarracuda Message Archiver Vx Deployment. Whitepaper
Barracuda Message Archiver Vx Deployment Whitepaper Document Scope This document provides guidance on designing and deploying Barracuda Message Archiver Vx on VMware vsphere Document Scope, and Microsoft
More informationVirtualised MikroTik
Virtualised MikroTik MikroTik in a Virtualised Hardware Environment Speaker: Tom Smyth CTO Wireless Connect Ltd. Event: MUM Krackow Feb 2008 http://wirelessconnect.eu/ Copyright 2008 1 Objectives Understand
More informationA Comparison of VMware and {Virtual Server}
A Comparison of VMware and {Virtual Server} Kurt Lamoreaux Consultant, MCSE, VCP Computer Networking and Consulting Services A Funny Thing Happened on the Way to HP World 2004 Call for speakers at the
More informationDeploying Business Virtual Appliances on Open Source Cloud Computing
International Journal of Computer Science and Telecommunications [Volume 3, Issue 4, April 2012] 26 ISSN 2047-3338 Deploying Business Virtual Appliances on Open Source Cloud Computing Tran Van Lang 1 and
More informationsimplify monitoring Environment Prerequisites for Installation Simplify Monitoring 11.4 (v11.4) Document Date: January 2015 www.tricerat.
simplify monitoring Environment Prerequisites for Installation Simplify Monitoring 11.4 (v11.4) Document Date: January 2015 www.tricerat.com Legal Notices Simplify Monitoring s Configuration for Citrix
More information