Virtual AMT for Unified Management of Physical and Virtual Desktops
|
|
|
- Susan Jacobs
- 10 years ago
- Views:
Transcription
1 Virtual AMT for Unified Management of Physical and Virtual Desktops Kenichi Kourai Department of Creative Informatics Kyushu Institute of Technology Fukuoka, Japan Kouki Oozono Department of Creative Informatics Kyushu Institute of Technology Fukuoka, Japan Abstract To reduce the burden of administrators in enterprises, current PCs are equipped with Intel Active Management Technology (AMT). AMT enables administrators to perform hardware-level remote management of desktops even on system failures. Recently, however, virtual desktops are emerging with virtual machines (VMs), e.g., in Desktop as a Service (DaaS). Since physical and virtual desktops are mixed in current enterprises, administrators have to manage them using two different tools: that for AMT and that for VMs. In this paper, we propose vamt, which is virtual AMT for VMs. vamt provides the same interfaces as AMT: WS-Management, SOAP, and KVM interfaces. Using AMT and vamt, administrators can perform unified management of physical and virtual desktops without being aware of the differences in most of the operations. We have implemented vamt and confirmed that the existing management tools for AMT could also manage virtual desktops. I. INTRODUCTION The number of desktops such as PCs used in enterprises becomes enormous. Administrators in the IT department have to manage all the desktops in all the departments. To manage desktops located in remote departments, many management tools install agent software in target desktops [1], [2]. Then they can install and update software, scan viruses, and perform backups by communicating with the agents. However, when a desktop is turned off, such software-level management tools cannot access the desktop. Even when the power is on, they cannot manage a desktop if the agent or the operating system does not work correctly due to system failures or attacks. To improve the manageablity of desktops, current PCs for enterprises are equipped with Intel Active Management Technology (AMT) [3]. AMT is one of the core technologies in Intel vpro and is implemented in an embedded processor separated from main CPUs. It enables remote management even if target desktops are turned off or even on system failures. Using AMT, administrators can perform hardwarelevel management of desktops. Management tools for AMT can monitor and control the systems on the desktops without depending on agents although they also use agents to provide high-level management functions. Recently, however, virtual desktops are emerging, e.g., in Desktop-as-a-Service (DaaS) clouds. A virtual desktop runs as a virtual machine (VM) in a server and only its screen is displayed in user s device. Since all the desktops cannot be replaced with virtual desktops, physical and virtual desktops are mixed in the current enterprises. In such an environment, administrators have to manage these different desktops using different management tools because management using AMT is applicable only to physical desktops. As a result, the burden of desktop management increases. In this paper, we propose virtual AMT named vamt for managing virtual desktops. vamt provides the same interfaces as those provided by AMT. The interfaces include WS-Management [4], Simple Object Access Protocol (SOAP) [5], and Keyboard/Video/Mouse (KVM). Remote management tools can monitor and control virtual desktops through the WS-Management interface with Common Information Model (CIM) [6] or the SOAP interface for Web services. They can also provide out-of-band remote GUI control of virtual desktops by Virtual Network Computing (VNC) [7] with the RFB protocol [8]. Using both AMT and vamt, administrators can perform unified management of not only physical but also virtual desktops. However, this cannot be achieved by simply providing the same interfaces. There are several differences between physical and virtual desktops. One of the differences is that VMs are destroyed when virtual desktops are turned off. Another is that VMs do not have sensors such as temperature. To bridge the gap between physical and virtual desktops, vamt allows transparent management of turnedoff virtual desktops like turned-off physical ones. It also emulates the functionalities of physical desktops as much as possible. We have implemented vamt using OpenPegasus [9], Axis2 [10], and Kernel-based Virtual Machine (KVM) 1 [11]. For the WS-Management interface, we have developed CIM providers for vamt using CIMPLE [12]. For the SOAP interface, we have developed Web services for vamt using WSDL2Java included in Axis2. These tools automatically generate templates of CIM providers and Web services from the definition files provided by Intel, respectively. Then we modified the templates so that 1 Do not confuse the KVM interface and the KVM virtualization software.
2 vamt monitors and controls a VM using libvirt [13]. We confirmed that Intel System Defense Utility worked well for both vamt and AMT. The rest of this paper is organized as follows. Section II describes desktop management using AMT and emerging virtual desktops. Section III proposes vamt and Section IV describes the interfaces provided by vamt. Section V explains the implementation details of vamt and Section VI shows experimental results. Section VII discusses related work and Section VIII concludes this paper. II. DESKTOP MANAGEMENT A. AMT AMT is a core technology in Intel vpro and enables the remote management of physical desktops such as PCs at a hardware level. AMT is implemented in a chip separated from CPU and can control hardware such as physical KVM and network interface cards (NICs). The basic functions are detection, failure recovery, and protection. For detection, AMT enables remote management tools to obtain information on a target desktop even if the power of the desktop is turned off. At boot time, AMT obtains information on hardware and software of a desktop from system management BIOS (SMBIOS) and stores it into its flash memory. Then it returns the information anytime. For failure recovery, AMT enables remote management tools to control hardware of a target desktop. AMT can reboot a desktop when the operating system does not respond. Even when the operating system cannot boot, AMT can boot a desktop using a remote disk image including hardware diagnostic tools and identify the problem. Furthermore, AMT provides out-of-band remote GUI control of a desktop and directly accesses a video card, a keyboard, and a mouse. Even if the network is unreachable due to configuration errors in the operating system, remote management tools can still access the desktop with the network of AMT. For protection, AMT can monitor the behavior of agents running on top of the operating system in a target desktop. Agents for AMT can send heartbeats to AMT periodically. If the heartbeats are interrupted for some reason, e.g., by intruders, AMT can send alerts to administrators. In addition, AMT can restrict network accesses from the desktop by controlling NICs. For example, it can deny all the communication until the compromised system is recovered. B. Virtual Desktops Virtual desktops are emerging desktop usage. Unlike a physical desktop running as a client PC, a virtual desktop runs as a VM in a server machine. In particular, cloud-based virtual desktops are called Desktop as a Service (DaaS). In a virtual desktop, only the screen of a VM is displayed in user s device such as a PC and a smart device, and keyboard and mouse inputs are sent to the VM via a network. Such desktop virtualization enables administrators to consolidate desktops in a server. As a result, it becomes easier to install and update software and to maintain the system. From the users point of view, their desktops can be used everywhere. Currently, administrators have to manage both physical and virtual desktops remotely because these desktops are mixed in many enterprises. The transition from physical to virtual desktops is in progress. Even if the transition is complete, physical desktops such as PCs may be still necessary for running virtual desktops. In addition, it is difficult to use virtual desktops for laptop PCs because they can be used in an environment where network is unreachable. Recent virtual desktops are being usable in network-unreachable environments, but the functionality is restricted. In such an environment, administrators have to use at least two different management tools to manage two different types of desktops. Since AMT is only for physical desktops, management tools for AMT cannot manage virtual desktops. In contrast, those for virtual desktops cannot manage physical desktops with AMT. This makes the burden of desktop management increase. Administrators have to first distinguish physical and virtual desktops and then use an appropriate tool. Since most of management tools have different user interfaces, administrators can be confused when they switch tools. Another approach is to add the support for virtual desktops to management tools for AMT, or to add the support for AMT to management tools for virtual desktops. However, the burden of the developers of management tools is large in any case. On the other hand, physical and virtual desktops have many similarities in terms of remote management. Since both desktops can run the same software, administrators manage it in the same way, for example, using remote GUI control. On system failures, both desktops can be recovered by reboots. Therefore, it is desirable that administrators can deal with both desktops using the same tools for common management tasks. III. VIRTUAL AMT This paper proposes vamt, which is virtual AMT for VMs. Like AMT for managing physical desktops, vamt enables administrators to manage virtual desktops using the WS-Management, SOAP, and KVM interfaces. Remote management tools can access vamt by sending WS- Management requests or SOAP requests. They can also access vamt for out-of-band remote GUI control of virtual desktops by VNC with the RFB protocol. Using both AMT and vamt, administrators can perform unified management of physical and virtual desktops using the existing management tools for AMT, as shown in Fig. 1. They do not need to be aware of the differences between physical and virtual desktops in most of the operations. The architecture of vamt is illustrated in Fig. 2. The primary components of vamt are a WS-Management server,
3 Figure 1. physical desktops... VM AMT AMT vamt management tool virtual desktops server... VM vamt The system overview using both AMT and vamt. CIM providers CIMOM WS-Man server vamt Web server Figure 2. Web services SOAP server dispatcher VNC server hypervisor VM The system architecture of vamt. a SOAP server, and a VNC server. When a request is sent in WS-Management, the WS-Management server converts it to a corresponding CIM request and sends the CIM request to CIM object manager (CIMOM). CIMOM delivers the CIM request to an appropriate CIM provider, which is prepared for each function of vamt. It monitors and controls a VM by accessing virtual hardware of the VM. On the other hand, when a request is sent in SOAP, the SOAP server invokes an appropriate Web service, which is prepared for each category of vamt functions. When a VNC request is sent, the VNC server handles it by accessing virtual hardware of a VM. vamt can be accessed by specifying the same IP address as a target VM. This is the same as AMT, which can be accessed using the IP address of the PC equipped with AMT. The dispatcher of vamt dispatches various accesses for one IP address by port numbers. For example, it delivers packets to port to the Web server, which further dispatches requests to either the WS-Management server or the SOAP server by URLs. It delivers packets to port 5900 to the VNC server. The other packets are delivered to a VM. What to consider for vamt are the differences between physical and virtual desktops. One of the biggest differences is the state when the power of a desktop is turned off. For physical desktops, PCs always exist because they are concrete hardware. For virtual desktops, however, VMs are destroyed after they stop. To absorb this difference, vamt allows transparent management of turned-off virtual desktops like turned-off physical ones. Using vamt, management tools for AMT are not aware that target virtual desktops are turned on or off. Another difference is the functionalities between PCs and VMs. For example, PCs have physical sensors such as temperature and management tools should monitor the status of the sensors. In contrast, VMs do not have such sensors. As specific features, they can be newly created and be migrated to other hosts by management tools. Therefore vamt emulates the functionalities of PCs as much as possible, whereas it does not support VM-specific operations because those are not included in the AMT specification. Such operations are still done using VM-specific tools. IV. VAMT INTERFACES vamt provides three interfaces to remote management tools. These interfaces are used for obtaining information from vamt and a target VM and for controlling the VM. A. WS-Management Interface To allow remote management using the CIM extended for AMT, vamt provides the WS-Management interface. WS-Management became a standard interface from AMT version 6.0. CIM is used through this interface. It adopts an object-oriented hierarchical architecture to make it easy to express target components and track mutual dependencies among them. CIM is composed of classes, properties, methods, modifiers, references, and associations. A class defines properties and methods that its instances commonly have. A property has a name, a data type, and a value. The value expresses the characteristics of its class. A method is invoked for operating an instance of the class defining the method. A modifier provides additional information on a class, a method, a method parameter, a property, a reference, and an association. A reference is a special data type indicating a pointer to another instance. An association is a type of class including more than two references and expresses the relationship between instances of different classes. To define CIM classes, the managed object format (MOF) language is used. MOF is an extension of BNF notation for syntax and is defined in the CIM specification [6]. Fig. 3 illustrates an example of a CIM class described in MOF. This example defines three classes, CIM Processor, CIM Chip, and CIM Realizes. For brevity, these definitions are a bit different from actual classes defined in AMT. CIM Processor is a class inherited the CIM LogicalDevice class, which handles logical information on a device. It has the Number property for a CPU number and the Enable method for enabling and disabling CPUs. The Key modifier in the Number property indicates that the property is used for identifying an instance. Such a property is called a key property. TheIN
4 class CIM_Processor : CIM_LogicalDevice { [Key] uint32 Number; uint32 Enable([IN] boolean Enabled); }; class CIM_Chip : CIM_PhysicalElement { [Key] string Tag; }; class CIM_Realizes { [Key] CIM_PhysicalElement REF Antecedent; [Key] CIM_LogicalDevice REF Dependent; }; Figure 3. CIM classes described in MOF. modifier in the parameter of the Enable method indicates that the parameter is used for an input. CIM Realizes is an association class whose properties are references to CIM PhysicalElement and CIM LogicalDevice. REF after each data type indicates that the property is a reference. This class associates logical and physical information on a device. For example, an instance of CIM Processor is associated with that of CIM Chip, which inherits the CIM PhysicalElement class. To operate CIM classes and instances, CIM operations are used. For example, remote management tools can obtain all the instances of the specified CIM class by the Enumerate- Instances operation. To obtain one specific instance, they specify one or several key properties using the GetInstance operation. They can also invoke the specified method of a CIM class with parameters and obtain a return value. These operations are bound to WS-Management operations [14]. B. SOAP Interface To allow remote management using Web services for AMT, vamt provides the SOAP interface. This interface was deprecated from AMT version 6.0, but many tools continue to use this interface. The support was removed from AMT version 9.0. To define Web services, Web services description language (WSDL) is used. WSDL is based on XML and is used for describing the functionality offered by Web services. A WSDL document is mainly composed of port types, operations, messages, and types. A port type defines related operations collectively. An operation defines a method with input messages (method parameters) and output parameters (return values). A message defines data with a type. A type defines a data type. Fig. 4 illustrates an example of a Web service described in WSDL. Note that this example omits several definitions. This example defines RemoteControl operation in the RemoteControlSoapPortType port type. This port type manages the power of a VM and how to boot it. The input message of the operation is RemoteControlIn, whereas the <types> <element name="remotecontrol"> <element name="command" type="remotecontrolcommand"/> </element> </types> <message name="remotecontrolin"> <part name="parameters" element="remotecontrol"> </message> <porttype name="remotecontrolsoapporttype"> <operation name="remotecontrol"> <input message="remotecontrolin"/> <output message="remotecontrolout"/> </operation> </porttype> Figure 4. A Web service described in WSDL. output message is RemoteControlOut. TheRemoteControlIn message is composed of the RemoteControl type, which contains the RemoteControlCommand type. In this example, we omit the definition of the RemoteControlOut message. C. KVM Interface To enable out-of-band remote GUI control of a VM, vamt provides the KVM interface. Using VNC, remote management tools can monitor the screen of a VM and control the keyboard and the mouse of a VM. Unlike in-band remote management, they connect to vamt using VNC and vamt directly accesses virtual hardware of a VM. This out-of-band management does not depend on the system state inside a VM. Even if network failure occurs inside a VM, remote tools can access the VM. vamt provides two methods for this out-of-band remote management. One method uses a default port and allows remote tools to connect to vamt in the standard VNC protocol. The other method uses a redirection port and enables remote tools to securely connect to vamt using a proprietary protocol. Currently, vamt does not support the redirection port. D. Other Interfaces AMT also provides other interfaces: Serial over LAN (SOL) for serial console, IDE Redirection (IDER) for mounting a remote image, Remote Management and Control Protocol (RMCP) in Alert Standard Format (ASF) [15] for pings. SOL and IDER use the redirection port with proprietary protocols. vamt does not support these interfaces currently. V. IMPLEMENTATION A. System Architecture Fig. 5 depicts the detailed system architecture of vamt. For the WS-Management server and the CIMOM, we used
5 Apache web server HTTP OpenPegasus Figure 5. CIM providers CIMOM WS-Man server Tomcat Web services Axis2 Linux libvirtd VM QEMU-KVM The detailed system architecture of vamt. rfbproxy VNC OpenPegasus [9]. To handle requests from management tools for AMT, we have modified OpenPegasus. One modification is using the default namespace (root/cimv2) when any namespace is not specified. OpenPegasus requires specifying a namespace in a selector, whereas several management tools we tried do not specify any namespace. Another modification is using the IP address and port number of OpenPegasus when an end-point reference (EPR) is default. OpenPegasus requires specifying an EPR explicitly, whereas several management tools for AMT do not. In addition, we modified OpenPegasus so that it accepts WS-Management requests in which CIM classes do not start with CIM. AMT uses not only CIM classes starting with CIM but also those starting with AMT and IPS as an AMT extension. Also, we added the digest access authentication [16] in HTTP to OpenPegasus, which supported only the basic access authentication. The digest access authentication is required by many management tools. For the SOAP server, we used Apache Axis2/Java [10] with the Apache Tomcat [17]. Axis2 contains various tools for generating and deploying Web services. CIM providers in OpenPegasus and Web services in Tomcat access the libvirt daemon [13] to monitor and control a VM. The Apache web server [18] is used for dispatching requests to the WS-Management server and the SOAP server. For the VNC server, we used QEMU-KVM [19]. QEMU-KVM is a user space tool of the KVM virtualization software and provides a VNC server for connecting to its VM. Rfbproxy [20] is used for supporting a turned-off VM, as described in Section V-E. B. CIM Providers for vamt To create CIM providers for managing VMs, we used CIMPLE [12]. CIMPLE generates templates of CIM providers from MOF in which CIM classes are described. Specifically, it generates two C++ classes from one CIM class. One is a class directly corresponding to a CIM class and defines members corresponding to the properties in the CIM class. The other is a class corresponding to a CIM provider for the CIM class and defines member functions such as enum instances and get instance. These functions are invoked when CIM operations such as EnumerateInstances and GetInstance are executed. We used the MOF files included in SDK provided by Intel. We modified the syntax check of CIMPLE slightly so that it could parse MOF files for AMT. The original CIMPLE does not permit that the same key properties appear in both a super class and a subclass, but the MOF files for AMT violate this constraint. To monitor and control VMs from vamt, we used the libvirt virtualization library [13]. Libvirt enables vamt to handle VMs running on top of various virtualization software in a unified manner. For example, vamt can obtain a domain object using the virdomainlookupby- Name function with a VM name. Note that vamt specifies virtualization software in the virconnectopen function invoked at first. The library communicates with the libvirt daemon and the daemon accesses QEMU-KVM. Fig. 6 shows the function prototypes of the CIM provider for the CIM Processor class in Fig. 3. The enum instances function is executed for enumerating all the instances of the class. CIMPLE generates only a function header and a return statement in the body. This function creates the same number of instances of CIM Processor as virtual CPUs. Then it sets a different CPU number to the Number property of each instance. Finally, it registers the instances to the parameter handler to return them to a remote tool. The get instance function is executed for obtaining one specific instance of the class. The parameter model stores only the value of the key property Number requested by a remote tool. This function searches the instance whose property Number has the same value as model. If only one instance is found, the function sets all the properties of the instance to the parameter instance. Otherwise, it returns an error. In this example, the function returns information on the virtual CPU with the specified CPU number. The Enable function is executed when a remote tool invokes the Enable method using a CIM operation. The target instance is specified by the parameter self and the method parameter is passed by the parameter Enabled of this function. In this example, the status of the virtual CPUs is maintained in the array of the cpuinfo objects. If the value of Enabled is true and the target virtual CPU is not enabled, the function enables it. If the value of Enabled is false and the target virtual CPU is enabled, the function disables it. Then it re-calculates the number of enabled virtual CPUs and changes the actual CPU assignment to the specified VM by using the virdomainsetvcpus function in libvirt. Finally, it sets zero to the parameter return value if the request is successfully executed. For association classes, CIM providers are implemented similarly. Let us consider the enum instances function of the CIM Realizes class in Fig. 3. First, the function
6 Enum_Instances_Status enum_instances(const CIM_Processor* model, Enum_Handler<CIM_Processor>* handler); Get_Instance_Status get_instance(const CIM_Processor* model, CIM_Processor*& instance); Invoke_Method_Status Enable(const CIM_Processor* self, const Property<boolean>& Enabled, Property<uint32>& return_value); Figure 6. The function prototypes of the CIM provider for CIM Processor. management tool enumerate enumerate Figure 7. vamt CPU0 CPU1 CIM_Processor CIM_Realizes Chip0 Chip1 CIM_Chip instances Obtaining CPU information. creates two instances of CIM Chip and CIM Processor, respectively, and sets the values to only their key properties. Next, it creates an instance of CIM Realizes and sets the above two instances to its members as references. At this time, these are casted to their super classes. Finally, it registers the instance to handler. From all the registered instances, CIMPLE finds all the instances associated with a requested instance and returns them to a remote tool. A remote tool combines these CIM providers and obtains CPU information as shown in Fig. 7. It first obtains all the instances of CIM Processor. For each instance, it obtains associated instances of CIM Chip by requesting EnumerateInstances for CIM Realizes. Similarly, it obtains instances of CIM Location, which are associated with each instance of CIM Chip. CIM Location is a CIM class for the physical position and address of a device. For the association class, CIM PhysicalElementLocation is used. Finally, the remote tool can obtain necessary information from the properties of all the obtained instances. As another example, the power management of a VM requires three CIM providers when only the WS- Management interface is used. First, a remote tool obtains the value of the PowerState property of the CIM AssociatedPowerManagementService class to examine the power status of a VM. Next, it obtains an instance of the CIM ComputerSystem class for the target system of the power management. Finally, it invokes the RequestPowerStateChange method of the CIM PowerManagementService class to execute the power management using libvirt. There are 264 CIM classes for vamt. Since all CIM classes are not used in real management tools, we prioritized CIM classes by examining the real uses in several management tools. Then we have implemented 39 providers. C. Web Services for vamt To create Web services for managing VMs, we used a tool named WSDL2Java included in Apache Axis2/Java. WSDL2Java generates templates of Web services from WSDL. Specifically, it generates multiple Java classes for all the port types and the types from one WSDL file. A class for a port type has methods corresponding to the operations defined in the port type. We used the WSDL files included in SDK provided by Intel. Let us explain the implementation of the RemoteControl operation for the RemoteControlSoapPortType port type in Fig. 4. The remotecontrol method is executed when a remote tool requests this operation. The parameter types and the return type correspond to the types of input and output messages, respectively. In this example, the method obtains the requested command type from the RemoteControl object in the input parameter and manages the power of a VM according to the value. After the command execution, the method returns the status. To monitor and control VMs, we used the libvirt-java binding tool [13]. This tool provides a Java application programming interface (API) so that Java programs can use the functionality of libvirt. In the example of the RemoteControl operation, the method invokes the shutdown method for the Domain object, which corresponds to a target VM. In general, many operations in web services for AMT return not only status but also various information with complex data structure to a remote tool. For example, the CbFilterEnumerate operation in the CircuitBreaker web service returns information on packet filtering with the data structure as in Fig. 8. In addition to the status, CbFilterEnumerateResponse consists of a filter name such as NoPing, an IP address, a network mask, etc. For such operations, we created many Java objects and assembled the data structure by using the accessors defined for properties. There are 522 operations in 23 Web services for vamt. We prioritized these operations on the basis of the real uses in several management tools and have implemented 20 operations. D. Request Redirection To redirect requests to appropriate servers as in Fig. 2, vamt configures static network address and port translation
7 CbFilterEnumerateResponse PT_STATUS UnsignedInt CircuitBreakerFilterInfoType CircuitBreakerFilterType FilterName_type0 CircuitBreakerFilterDirectionType CircuitBreakerProfileType UnsignedInt CircuitBreakerPacketType CircuitBreakerPacketTypeChoice_type0 CircuitBreakerPacketIPType CircuitBreakerIPPacketType CircuitBreakerIPPacketTypeChoice_type0 CircuitBreakerIPv4Type CircuitBreakerIPv4AddressAndMaskType CircuitBreakerFilterIPAddressDirectionType IPv4AddressStringType IPv4AddressStringType UnsignedByte bool UnsignedInt Figure 8. The data structure of a response to the CbFilterEnumerate operation. (NAPT) using iptables in the host operating system. For WS- Management and SOAP requests, a pair of the IP address of a VM and port is translated into that of the IP address of the host and the port of the web server in vamt. For VNC requests, the IP address of a VM and port 5900 are translated into the IP address of the host and the VNC server in vamt, respectively. The redirected port numbers are different for each vamt to coexist multiple vamts. For example, requests to VM 1 are redirected to ports 6992 and 5901, whereas those to VM 2 are to ports 6993 and vamt further redirects requests to either the WS- Management server or the SOAP server using a reverse proxy in the web server. If the URL specified in an HTTP request starts with /wsman, the request is redirected to the WS-Management server. If the URL starts with /*Service such as /RemoteControlSoapService, the request is redirected to the SOAP server. E. Management of Turned-off VMs To monitor a turned-off VM, vamt obtains information on it from its configuration. When a VM is running, the runtime of the virtualized system manages the latest information such as the number of virtual CPUs, the memory size of the VM. However, it does not manage such information for turned-off VMs. Fortunately, initial values of such information are stored in VM configuration when a VM is created. vamt can obtain most appropriate information from either the runtime or the configuration by using libvirt. To access a turned-off VM using VNC, vamt uses a VNC proxy server called rfbproxy. For a turned-off VM, a VNC server for it does not exist because QEMU-KVM including a VNC server runs only while a VM is running. Therefore, when a management tool connects to vamt for a turned-off VM, rfbproxy returns a dummy black screen and ignores keyboard and mouse inputs. This behavior is the same as that of AMT in a turned-off PC. To return such a dummy screen, we recorded a black screen using the function of rfbproxy in advance. Then rfbproxy continues to play back the recorded events. For a turned-on VM, rfbproxy simply redirects requests to the VNC server in QEMU- KVM. F. Support for VM Migration VMs can be migrated to another host in various reasons. Since vamt runs in the outside of a migrated VM, it could not monitor or control the VM after the migration. In the current implementation, vamt is restarted at the destination host of the VM migration. To seamlessly support the migration of a target VM, there are two possible ways. One is that vamt remotely manages the VM migrated to another host. Requests to vamt can be redirected from iptables in the destination host. Then vamt can monitor and control the remote VM by communicating with the libvirt daemon in the destination host. One drawback is inefficiency in the communication for the request redirection and libvirt between the source and destination hosts. Another drawback is that administrators cannot shut down the source host still running vamt after the target VM has been migrated. The other drawback is that vamt may lose several requests while vamt switches its target hosts. The other way is running vamt in another VM and migrating together with the target VM using the technique proposed in VMCoupler [21]. After co-migration, vamt can manage the target VM as before migration. The communication for the request redirection and libvirt is performed efficiently inside the destination host. Administrators can shut down the source host because vamt is not running. In addition, it is not necessary that vamt is aware of the migration of the target VM. VI. EXPERIMENTS We conducted experiments to confirm that management tools for AMT could be used for vamt. For a physical desktop with AMT 7.1.4, we used a PC with one Intel Core i7 3.4 GHz processor and 2 GB of memory and ran Windows 7. For a virtual desktop with vamt, we used a VM with one virtual CPU and 1 GB of memory and ran Linux as the guest operating system. For running the VM, we used a PC with one Intel Core i GHz processor and 4 GB of memory and ran Linux as the host operating system and QEMU-KVM as the virtualization software. To run management tools remotely, we used a PC with one Intel Xeon W GHz processor and 6 GB of memory and ran Windows 7. All the PCs and the VM are connected with Gigabit Ethernet.
8 Figure 9. The asset management screen in System Defense Utility. Figure 10. The remote control screen in System Defense Utility. A. Comparison of Behaviors To confirm the behavior of vamt, we used Intel System Defense Utility as a management tool for AMT. 1) Connection: When we connected to AMT, the tool used 40 CIM classes and five Web services and sent 189 requests to AMT in total. Until it established the connection, it obtained the capabilities of AMT, hardware information of a desktop, etc. When we connected to vamt using the same tool, the tool used 26 CIM classes and five Web services and sent 97 requests to vamt in total. The reason of the difference between AMT and vamt is that vamt does not support several requests yet. However, the tool could establish the connection to vamt because it ignores functions that are not indispensable. After the connection was established, the hardware information of the target desktop was shown in the asset management tab, as shown in Fig. 9. When the tool connected to vamt, information on the VM was shown in the Computer System and Memory areas. For example, the manufacturer is Red Hat, Inc. and the memory size is 1024 MB. In the Motherboard area, the same information as the PC was shown. 2) Power Management: When we changed the power status of the physical desktop with AMT, the tool sent one WS-Management request and one SOAP request. When we selected the Remote Control tab, the tool obtained the power status with the CIM AssociatedPowerManagementService class and showed it on the screen. When we executed the power management, the tool changed the power status with the RemoteControlService operation and obtained the power status again. Using the screen shown in Fig. 10, we confirmed that the tool could perform the power management for the virtual desktop with vamt in the same way. To examine the actual power status, we obtained the power status using the virsh tool [13] in the PC running the VM. As a result, the power status of the VM was changed as requested. Figure 11. The VNC screen in System Defense Utility. 3) VNC: When the tool accessed to AMT with VNC, it sent only VNC requests, neither WS-Management nor SOAP requests. We confirmed that the tool could access to vamt and showed the VNC screen of the virtual desktop as in Fig. 11. B. Performance To compare the performance of vamt with that of AMT, we used Windows Remote Management (WinRM) and command-line tools included in the SDK provided by Intel. We measured the time needed to execute each command for AMT and vamt 10 times. 1) Obtaining the AMT Version: To obtain version information of AMT, we used WinRM, which can send WS-Management requests by specifying a CIM class and its properties. In this experiment, WinRM executed the GetInstance operation for the CIM SoftwareIdentity class with the InstanceID property. Then AMT returned an instance in which the value of the property was AMT. For AMT and vamt, we measured the time needed for obtaining the AMT version. The results are shown in Fig. 12. When the PC was turned off, it took more than 2 seconds to obtain the AMT version. This is because the AMT chip is in the sleep mode. The successive execution took 392 ms to complete. When the PC was turned on, it took only 112 ms to obtain the version. For vamt, the execution time was
9 execution time (ms) AMT (power off, 1st) AMT (power off, 2nd) AMT (power on) vamt classes, which have to search association information for a requested instance. 3) Power Management: To change the power status of a physical desktop with AMT, we used the RemoteControlUntyped command. When the command turned the power off, it used one CIM class, CIM PowerManagementService. The right two bars in Fig. 13 show the average execution time. Similar to the other experiments, vamt changed the power status faster than AMT, but the difference was smaller. This is because this command sent only one request. execution time (ms) Figure Figure The time for obtaining the AMT version. AMT vamt system info CPU info power off The execution time of commands for AMT and vamt. 64 ms. This shows that vamt could handle requests in a shorter time than AMT. The reason is because the hardware performance of the AMT chip is lower than that of the CPU running vamt. In the following experiments, we turned on the PC and measured the performance of AMT. 2) Obtaining Hardware Information: To obtain hardware information of a physical desktop with AMT, we used the AssetDisplay command. When the command obtained system information, it used three CIM classes: CIM BIOSElement for BIOS information, CIM Chassis for a manufacturer and a model name, and CIM ComputerSystemPackage for a global unique identifier. It sent 12 WS-Management requests for both AMT and vamt. The left two bars in Fig. 13 show the average execution time. As in the above experiment, vamt was faster then AMT. When the command obtained CPU information, it used five CIM classes, as described in Section V-B: CIM Processor, CIM Chip, CIM Location, CIM Realizes, CIM PhysicalElementLocation. The former three are for obtaining instances and the latter two are for association. The middle two bars in Fig. 13 show the average execution time. It is shown that AMT is much slower than vamt. Compared this execution time with the above time for obtaining system information, the execution time for vamt was almost the same, but that for AMT was 1.9 times slower. This may be caused by using association VII. RELATED WORK There are several hardware-level management interfaces. Wake on LAN (WOL) enables only turning on a PC by a special network message. Intelligent Platform Management Interface (IPMI) [22] is similar to AMT and enables remote management without depending on CPUs and the operating system. It can monitor temperatures, power status, fan status, etc. even when the operating system is down. HP s implementation is called ilo and Dell s is called idrac. However, IPMI cannot be used for desktop management because it is for server platforms and is not equipped with PCs. For IPMI, several IPMI simulators have been developed such as the MIMIC IPMI simulator [23] and the OpenIPMI lanserv simulator [24]. In particular, the lanserv simulator can be used with a virtual IPMI device of QEMU-KVM, which is provided as patches [25]. The lanserv simulator can receive requests from remote management tools and communicate with the virtual IPMI device to manage a VM. In addition, agents inside a VM can access the virtual IPMI device and use the functionalities of IPMI through the lanserv simulator. These simulators are mainly used for testing management tools without server hardware equipped with IPMI. Our vamt can be also used for such a purpose. Until Intel AMT SDK 2.x, the AMT emulator was included in the SDK. It is mainly for developing management tools before AMT hardware was released. However, the emulator was removed from SDK 3.0. It may have similarities to vamt, but it supported only the SOAP interface. To manage not only physical machines but also VMs through CIM, the CIM specification extended for virtualization [26] is defined. Using this extension, management tools can manage both physical and virtual desktops. In addition, this extension supports VM-specific operations such as creation and migration. Xen-CIM [27] is the first implementation of this specification for Xen. Libvirt-CIM [28] manages Linux virtualization platforms using libvirt. However, this extension requires the modification to the existing management tools. Management tools have to differentiate two types of desktops and use different CIM classes for them. Since AMT does not support this extension, management tools for AMT cannot be used for managing VMs without modification.
10 Several cloud management software such as Cloud- Stack [29] and OpenStack [30] support not only VMs but also physical machines called bare metal. Traditional Infrastructure-as-a-Service (IaaS) clouds provide users with VMs whenever requested. Recently, they also provide bare metal in the same manner. IPMI is used for the power management of bare metal and Preboot Execution Environment (PXE) is used for booting the operating system. Although cloud management software can handle a mix of VMs and bare metal, it needs to be aware of the differences between VMs and bare metal. In addition, managed bare metal has to be server machines equipped with IPMI. Desktop management tools can achieve unified desktop management by being combined with management tools for virtual desktops. For example, VMware Horizon Mirage [2] can manage not only physical desktops but also virtual desktops with VMware Horizon View [31]. Microsoft System Center Configuration Manager [1] can manage both types of desktops, for example, with XenDesktop [32]. However, only the maintenance of desktop images and agentbased desktop management are mainly supported because such tools provide only software-level management. Several software-level tools also support AMT, but they can manage only physical desktops, not virtual ones, using AMT. VIII. CONCLUSION In this paper, we proposed vamt for managing virtual desktops. vamt has the same interfaces with AMT and enables administrators to manage physical and virtual desktops using the existing management tools in a unified manner. We have implemented vamt and confirmed that we could monitor and control virtual desktops with vamt. Our future work is implementing all the CIM providers and Web services for vamt. In the current implementation, we have implemented only a minimal set of them as a proof of concept. For example, packet filtering is not supported. Another direction is implementing unsupported interfaces such as SOL. In addition, we need to implement a local interface of AMT, which is accessed from agents inside desktops. Through the interface, the agents can register software information to vamt for detection and send heartbeats to vamt for protection. ACKNOWLEDGMENT This research was supported in part by JSPS KAKENHI Grant Number REFERENCES [1] Microsoft, System Center Configuration Manager: Unified Device Management, com/systemcenter/configurationmanager/. [2] VMware, VMware Horizon Mirage Desktop Management, [3] Intel Corp., Intel Active Management Technology, [4] DMTF, Web Services for Management Specification Version 1.1.1, [5] World Wide Web Consortium, SOAP Version 1.2, [6] DMTF, Common Interface Model Infrastructure Version 2.7.0, [7] T. Richardson, Q. S.-F. K. R. Wood, and A. Hopper, Virtual Network Computing, IEEE Internet Computing, vol. 2, no. 1, pp , [8] T. Richardson, The RFB Protocol Version 3.8, realvnc.com. [9] The Open Group, OpenPegasus, org/. [10] Apache Software Foundation, Apache Axis2, apache.org/. [11] Red Hat, Inc., Kernel Based Virtual Machine, linux-kvm.org/. [12] K. Schopmeyer and M. Brasher, CIMPLE, simplewbem.org/. [13] Red Hat, Inc., libvirt: The Virtualization API, org/. [14] DMTF, WS-Management CIM Binding Specification Version 1.2.0, [15], Alert Standard Format Specification Version 2.0, [16] J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, and L. Stewart, HTTP Authentication: Basic and Digest Access Authentication, RFC 2617, [17] Apache Software Foundation, Apache Tomcat, tomcat.apache.org/. [18], The Apache HTTP Server Project, apache.org/. [19] A. Kivity, QEMU-KVM Fork for x86, KVM. [20] T. Waugh, rfbproxy, [21] K. Kourai and H. Utsunomiya, Synchronized Co-migration of Virtual Machines for IDS Offloading in Clouds, in Proc. Int l Conf. Cloud Computing Technology and Science, 2013, pp [22] Intel, Hewlett-Packard, NEC, and Dell, Intelligent Platform Management Specification Second Generation v2.0, [23] Gambit Communications, Inc., MIMIC IPMI Simulator, shtml. [24] C. Minyard, OpenIPMI, openipmi/. [25], [Qemu-devel] [PATCH 00/20] Add an IPMI device to QEMU, /msg04335.html. [26] DMTF, CIM System Virtualization Model Version 1.0.0, [27] G. S. Bestor and J. Fehlig, Open Standard CIM Management for Xen, Xen Summit, [28] Red Hat, Inc., Libvirt-CIM: The Virtualization CIM API, [29] Apache Software Foundation, Apache CloudStack: Open Source Cloud Computing, [30] OpenStack Project, OpenStack Open Source Cloud Computing Software, [31] VMware, VMware Horizon View Virtual Desktop Management, [32] Citrix Systems, Inc., Virtual Desktop Delivery, Virtual Apps on Demand,
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5
Technical Note Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5 In the VMware Infrastructure (VI) Perl Toolkit 1.5, VMware
System Area Manager. Remote Management
System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for
Management of VMware ESXi. on HP ProLiant Servers
Management of VMware ESXi on W H I T E P A P E R Table of Contents Introduction................................................................ 3 HP Systems Insight Manager.................................................
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Dynamic Load Balancing of Virtual Machines using QEMU-KVM
Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College
Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM
Bern University of Applied Sciences Engineering and Information Technology Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM By Franz Meyer Version 1.0 February 2011 Virtualization Architecture
Configuring and Using AMT on TS140 and TS440
Configuring and Using AMT on TS140 and TS440 Lenovo ThinkServer TS Series Servers Lenovo Enterprise Product Group Version 1.0 September 17, 2013 2013 Lenovo. All rights reserved. LENOVO PROVIDES THIS PUBLICATION
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
Efficient Load Balancing using VM Migration by QEMU-KVM
International Journal of Computer Science and Telecommunications [Volume 5, Issue 8, August 2014] 49 ISSN 2047-3338 Efficient Load Balancing using VM Migration by QEMU-KVM Sharang Telkikar 1, Shreyas Talele
Virtualization Management the ovirt way
ovirt introduction FOSDEM 2013 Doron Fediuck Red Hat What is ovirt? Large scale, centralized management for server and desktop virtualization Based on leading performance, scalability and security infrastructure
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...
Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR
SETUP & CONFIGURATION GUIDE FOR Intel vpro Technology-based PCs This Setup Guide details what makes a true Intel vpro technology-based PC, and how to set up and configure Intel AMT (Active Management Technology)
Red Hat enterprise virtualization 3.0 feature comparison
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India [email protected] 2 Department
ovirt Introduction James Rankin Product Manager Red Hat [email protected] Virtualization Management the ovirt way
ovirt Introduction James Rankin Product Manager Red Hat [email protected] Agenda What is ovirt? What does it do? Architecture How To Contribute What is ovirt? Large scale, centralized management for server
Development of Web-Based Remote Desktop to Provide Adaptive User Interfaces in Cloud Platform
Development of Web-Based Remote Desktop to Provide Adaptive User Interfaces in Cloud Platform Shuen-Tai Wang, Hsi-Ya Chang Abstract Cloud virtualization technologies are becoming more and more prevalent,
vsphere Client Hardware Health Monitoring VMware vsphere 4.1
Technical Note vsphere Client Hardware Health Monitoring VMware vsphere 4.1 Purpose of This Document VMware vsphere provides health monitoring data for ESX hardware to support datacenter virtualization.
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
The Art of Virtualization with Free Software
Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike
FOR SERVERS 2.2: FEATURE matrix
RED hat ENTERPRISE VIRTUALIZATION FOR SERVERS 2.2: FEATURE matrix Red hat enterprise virtualization for servers Server virtualization offers tremendous benefits for enterprise IT organizations server consolidation,
Desktop Virtualization Technologies and Implementation
ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method
www.see-grid-sci.eu Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009
SEE-GRID-SCI Virtualization and Grid Computing with XEN www.see-grid-sci.eu Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009 Milan Potocnik University
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
Client Manageability. Out-of-Band Management with DMTF DASH. Valerie K. Kane Commercial Client Product Group, AMD
Client Manageability Out-of-Band Management with DMTF DASH Valerie K. Kane Commercial Client Product Group, AMD Agenda Overview: Out-of-Band Client Management Standards-Based Client Management DASH: Key
Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details
ZENworks 11 SP3 System December 2014 The following sections provide the Novell ZENworks 11 SP3 requirements for hardware and software: Section 1, Primary Server, on page 1 Section 2, Managed Device, on
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
Server Management with Lenovo ThinkServer System Manager
Server Management with Lenovo ThinkServer System Manager For next-generation Lenovo ThinkServer systems Lenovo Enterprise Product Group Version 1.0 September 2014 2014 Lenovo. All rights reserved. LENOVO
Better Integration of Systems Management Hardware with Linux
Better Integration of Systems Management Hardware with Linux LINUXCON NORTH AMERICA Aug 2014 Charles Rose Engineer Dell Inc. Agenda Introduction Systems Management Hardware/Software Information Available
Migrating to ESXi: How To
ILTA Webinar Session Migrating to ESXi: How To Strategies, Procedures & Precautions Server Operations and Security Technology Speaker: Christopher Janoch December 29, 2010 Migrating to ESXi: How To Strategies,
Intel Embedded Virtualization Manager
White Paper Kelvin Lum Fee Foon Kong Platform Application Engineer, ECG Penang Intel Corporation Kam Boon Hee (Thomas) Marketing Development Manager, ECG Penang Intel Corporation Intel Embedded Virtualization
A Middleware Strategy to Survive Compute Peak Loads in Cloud
A Middleware Strategy to Survive Compute Peak Loads in Cloud Sasko Ristov Ss. Cyril and Methodius University Faculty of Information Sciences and Computer Engineering Skopje, Macedonia Email: [email protected]
Overview... 2. Customer Login... 2. Main Page... 2. VM Management... 4. Creation... 4 Editing a Virtual Machine... 6
July 2013 Contents Overview... 2 Customer Login... 2 Main Page... 2 VM Management... 4 Creation... 4 Editing a Virtual Machine... 6 Disk Management... 7 Deletion... 7 Power On / Off... 8 Network Management...
Hardware + Software Solutions for The Best in Client Management & Security. Malcolm Hay Intel Technology Manager
Hardware + Software Solutions for The Best in Client Management & Security Malcolm Hay Intel Manager vpro - Hardware Management & Security for the New Era of End User Computing Hardware Management Intel
Backup & Disaster Recovery Appliance User Guide
Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the
NEC SigmaSystemCenter 3.0 highlights
NEC SigmaSystemCenter 3.0 highlights NEC Corporation 2nd IT Software Division IT Network Global Solutions Division Sept. 2011 NEC SigmaSystemCenter 3.0 highlights Cloud Management Multitenancy Resource
RED HAT ENTERPRISE VIRTUALIZATION
Giuseppe Paterno' Solution Architect Jan 2010 Red Hat Milestones October 1994 Red Hat Linux June 2004 Red Hat Global File System August 2005 Red Hat Certificate System & Dir. Server April 2006 JBoss April
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various
HRG Assessment: Stratus everrun Enterprise
HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at
User Guide. SUSIAccess. Remote Device Management
User Guide SUSIAccess Remote Device Management Edition 2.0 May 10 2012 Part. No. 200EMBSA01 Printed in Taiwan 2 Advantech SUSIAccess User Manual ADVANTECH SUSIACCESS USER MANUAL... 3 1. SOLUTION OVERVIEW...
ServerPronto Cloud User Guide
ServerPronto Cloud User Guide Virtual machines Virtual machines are based on templates and are deployed on hypervisors. Hypervisors give them access to CPU, disk and network resources. The ServerPronto
Getting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
Introduction to ovirt
Introduction to ovirt James Rankin What is ovirt? Large scale, centralized management for server and desktop virtualization Based on leading performance, scalability and security infrastructure technologies
VIRTUALIZATION INTROSPECTION SYSTEM ON KVM-BASED CLOUD COMPUTING PLATFORMS. [email protected] Advisor: [email protected] Software Security Lab.
VIRTUALIZATION INTROSPECTION SYSTEM ON KVM-BASED CLOUD COMPUTING PLATFORMS [email protected] Advisor: [email protected] Software Security Lab. Motivation The era of cloud computing Motivation In the
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer [email protected] Agenda Session Length:
Out-of-Band Management: the Integrated Approach to Remote IT Infrastructure Management
WHITE PAPER Management: the Integrated Approach to Remote IT Management EXECUTIVE SUMMARY For decades, business imperatives for information technology (IT) have remained constant to cut costs and improve
PARALLELS SERVER 4 BARE METAL README
PARALLELS SERVER 4 BARE METAL README This document provides the first-priority information on Parallels Server 4 Bare Metal and supplements the included documentation. TABLE OF CONTENTS 1 About Parallels
How To Install Openstack On Ubuntu 14.04 (Amd64)
Getting Started with HP Helion OpenStack Using the Virtual Cloud Installation Method 1 What is OpenStack Cloud Software? A series of interrelated projects that control pools of compute, storage, and networking
Mobile Cloud Computing T-110.5121 Open Source IaaS
Mobile Cloud Computing T-110.5121 Open Source IaaS Tommi Mäkelä, Otaniemi Evolution Mainframe Centralized computation and storage, thin clients Dedicated hardware, software, experienced staff High capital
Out-of-Band Management Reference
www.novell.com/documentation Out-of-Band Management Reference ZENworks 11 Support Pack 3 Beta February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents
Gigabyte Content Management System Console User s Guide. Version: 0.1
Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
TimeIPS Server. IPS256T Virtual Machine. Installation Guide
TimeIPS Server IPS256T Virtual Machine Installation Guide TimeIPS License Notification The terms and conditions applicable to the license of the TimeIPS software, sale of TimeIPS hardware and the provision
Citrix XenServer Product Frequently Asked Questions
Citrix XenServer Product FAQ Citrix XenServer Product Frequently Asked Questions Version 4.0.1i Citrix XenServer FAQ 4.01i 2 New Features... 3 Hardware Support... 3 Product Limits... 6 Virtual Machine
PHD Virtual Backup for Hyper-V
PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V
HP Insight Management Agents architecture for Windows servers
HP Insight Management Agents architecture for Windows servers Technology brief, 2 nd edition Introduction... 3 A first look at the Insight Management Agents architecture... 3 HP Insight Management agents...
Virtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
Citrix Training. Course: Citrix Training. Duration: 40 hours. Mode of Training: Classroom (Instructor-Led)
Citrix Training Course: Citrix Training Duration: 40 hours Mode of Training: Classroom (Instructor-Led) Virtualization has redefined the way IT resources are consumed and services are delivered. It offers
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
Table of Contents. Server Virtualization Peer Review 01-03-2007 cameron 1-24-2007: modified, cameron
Table of Contents Objective...2 Definitions...2 Objective discussion...2 Comparison criteria...3 Criteria weights...4 Product scores...4 Criteria comparison discussion...5 References...7 Cost Estimate,
RCL: Software Prototype
Business Continuity as a Service ICT FP7-609828 RCL: Software Prototype D3.2.1 June 2014 Document Information Scheduled delivery 30.06.2014 Actual delivery 30.06.2014 Version 1.0 Responsible Partner IBM
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2.
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:
With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments
RED HAT ENTERPRISE VIRTUALIZATION DATASHEET RED HAT ENTERPRISE VIRTUALIZATION AT A GLANCE Provides a complete end-toend enterprise virtualization solution for servers and desktop Provides an on-ramp to
Setup Cisco Call Manager on VMware
created by: Rainer Bemsel Version 1.0 Dated: July/09/2011 The purpose of this document is to provide the necessary steps to setup a Cisco Call Manager to run on VMware. I ve been researching for a while
Desktop Virtualization. The back-end
Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers
Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
VIRTUALIZATION 101. Brainstorm Conference 2013 PRESENTER INTRODUCTIONS
VIRTUALIZATION 101 Brainstorm Conference 2013 PRESENTER INTRODUCTIONS Timothy Leerhoff Senior Consultant TIES 21+ years experience IT consulting 12+ years consulting in Education experience 1 THE QUESTION
Enterprise-Class Virtualization with Open Source Technologies
Enterprise-Class Virtualization with Open Source Technologies Alex Vasilevsky CTO & Founder Virtual Iron Software June 14, 2006 Virtualization Overview Traditional x86 Architecture Each server runs single
Solution for private cloud computing
The CC1 system Solution for private cloud computing 1 Outline What is CC1? Features Technical details Use cases By scientist By HEP experiment System requirements and installation How to get it? 2 What
INTRODUCTION TO CLOUD MANAGEMENT
CONFIGURING AND MANAGING A PRIVATE CLOUD WITH ORACLE ENTERPRISE MANAGER 12C Kai Yu, Dell Inc. INTRODUCTION TO CLOUD MANAGEMENT Oracle cloud supports several types of resource service models: Infrastructure
Remote PC Guide for Standalone PC Implementation
Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
Server and Storage Virtualization. Virtualization. Overview. 5 Reasons to Virtualize
Server and Storage Virtualization. Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at:
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
KVM Virtualization in RHEL 7 Made Easy
A Dell Technical White Paper Jose De la Rosa Dell Linux Engineering 2 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
Data Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration
ULI101 Week 06b Week Overview Installing Linux Linux on your Desktop Virtualization Basic Linux system administration Installing Linux Standalone installation Linux is the only OS on the computer Any existing
Virtualization in Linux a Key Component for Cloud Computing
Virtualization in Linux a Key Component for Cloud Computing Harrison Carranza a and Aparicio Carranza a a Computer Engineering Technology New York City College of Technology of The City University of New
Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms
EXECUTIVE SUMMARY Intel Cloud Builder Guide Intel Xeon Processor-based Servers Red Hat* Cloud Foundations Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms Red Hat* Cloud Foundations
HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances
HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances Introduction............................................................ 2 What is Virtualization?....................................................2
Virtualization & Cloud Computing (2W-VnCC)
Virtualization & Cloud Computing (2W-VnCC) DETAILS OF THE SYLLABUS: Basics of Networking Types of Networking Networking Tools Basics of IP Addressing Subnet Mask & Subnetting MAC Address Ports : Physical
RED HAT ENTERPRISE VIRTUALIZATION 3.0
OVERVIEW Red Hat Enterprise Virtualization (RHEV) is a complete virtualization management solution for server and desktop virtualization and the first enterprise-ready, fully open-source virtualization
HP Data Protector software. Assuring Business Continuity in Virtualised Environments
HP Data Protector software Assuring Business Continuity in Virtualised Environments Would not it be great if your virtual server environment actually translated to a better reality? One where you could
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Implementing Red Hat Enterprise Linux 6 on HP ProLiant servers
Technical white paper Implementing Red Hat Enterprise Linux 6 on HP ProLiant servers Table of contents Abstract... 2 Introduction to Red Hat Enterprise Linux 6... 2 New features... 2 Recommended ProLiant
Synchronizer Installation
Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient
HP Systems Insight Manager 7.0 and HP Agentless Management overview
HP Systems Insight Manager 7.0 and HP Agentless Management overview Technology brief Introduction... 2 Overview of HP Agentless Management... 2 Using traditional OS-based management software... 4 Using
Installing the Operating System or Hypervisor
Installing the Operating System or Hypervisor If you purchased E-Series Server Option 1 (E-Series Server without preinstalled operating system or hypervisor), you must install an operating system or hypervisor.
Rally Installation Guide
Rally Installation Guide Rally On-Premises release 2015.1 [email protected] www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access
Exploring the Remote Access Configuration Utility
Exploring the Remote Access Configuration Utility in Ninth-Generation Dell PowerEdge Servers The Remote Access Configuration Utility supports local and remote server management in ninth-generation Dell
Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage [email protected]
Intelligent Laptop Virtualization No compromises for IT or end users VMware Mirage [email protected] Little video to start with... The Problem with Laptops Windows XP support is expiring
