Designing the Stable Infrastructure for Kernel-based Virtual Machine using VPN-tunneled VNC
|
|
- Myron Fox
- 6 years ago
- Views:
Transcription
1 Designing the Stable Infrastructure for Kernel-based Virtual Machine using VPN-tunneled VNC presented by : Berkah I. Santoso Informatics, Bakrie University International Conference on Computer Science 2014 December 5 th, 2014 Grand Clarion Hotel & Convention, Makassar
2 Table of Content Abstract.. 3 Introduction... 4 Related Works 7 Proposed System.. 9 Implementation and Diagnosis. 14 Conclusion 29 ** Preview : list of running VMs ** Preview : log on form VNC ** Preview : successful VNC for VM
3 Abstract The key aspect of cloud computing is virtualization that aimed to achieve stability, scalability and flexibility in a cloud infrastructure. The shared computing resources such as processor, memory, storage and network have important roles for operating the cloud infrastructure they must be managed and monitored carefully. The virtual machine management(vmm) tools were played important role in giving real computing resources information to the system administrator. The VMM, VPN and VNC approach could be used for helping the users to get the stable, secure cloud services. The models are functioning stable, secure in a highly consumption VM computational resource. The critical event for providing the shared computing resources is the VM s booting processes. The increase in the number of VMs does not affect the working of physical host that indicates its practicability in a flexible environment. 3
4 Introduction There are two different forms of virtualization architectures. Bare-metal virtualization, which exists no host O/S because the VMM sits just above the underlying physical hardware. Hosted-virtualization, which the VMM sits just on top of the host O/S and runs as application [4]. 4
5 Introduction Virtual Network Computing (VNC) is a desktop sharing system which uses the Remote Frame Buffer (RFB) protocol to remotely control another computer. It transmits the user events from one computer to another relaying the screen updates back in other direction, over a network using buffered I/O stream[8]. Virtual Private Network is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger networks, such as the internet, as opposed to running across a single private network. The link layer protocols of the virtual network are said to be tunneled through the transport network. It provides private network connections over a publicly accessible shared network [9]. 5
6 Introduction We present the stable and secure hostedvirtualization and present a case study of deployment of private virtualized infrastructure using KVM. The KVM runs on Red Hat Enterprise Linux v6.5. We installed the Linux and Unix variant for VMs with minimal installation option. We also configured the boot loader for each VM s O/S as the default configuration. 6
7 Related Works The Papaya[2] management platform which based on Eucalyptus. Centralized monitoring and management. Using the web interface for managing and monitoring VMs. The Snooze[11] private cloud management platform to monitor and manage the resource. Self-organizing hierarchical and distributed cloud management using Java. The fault tolerance features of framework do not impact application performance and the system remained highly scalable with increasing amounts of resources. 7
8 Related Works Our works proposed the combination of VM manager. Distributed cloud management. VM migration. Build using Python. Intuitive graphical user interface for VM monitoring. 8
9 Proposed System We proposed the design, implementation and evaluation of stable and secure-private hostedvirtualization using below ingredients : KVM (qemu-kvm v ) VM service manager (libvirt v ) Red Hat Enterprise Linux v.6.5 (kernel el6.x86-64 stable) OpenVPN ver DHCP ver VM manager (virt-manager el6.x86-64) 9
10 Proposed System The hardware consist of below information : The tower server for constructing the hosted-virtualization KVM. We are using the Quad core Intel Xeon CPU E GHzbased processor, 8 GB RAM, 1 TB RAID 10 local disk, dual 1 GB Network Interface Card. The tower server for constructing the VPN services and Domain Host Control Protocol (DHCP) services. We are using the Quad core Intel Xeon CPU E GHz-based processor, 8 GB RAM, 1 TB RAID 10 local disk, single 1 GB Network Interface Card. The Cisco Catalyst Gbps 24 port Layer-2 switch. The switch has also Virtual LAN (VLAN) configured. The Cisco Router 2801 for connecting the internal network to the external networks. The router has also access control list configured. The desktop PCs (HP Compaq 5700) for accessing the VMs services. 10
11 Proposed System The bridge technique separated the private network for VMs system administration and service network for VMs. The description of every VM can be defined as shown below : VM2 is installed the Unix FreeBSD 9.0 and the IP address is /24. VM3 is installed the Fedora Linux 18 and the IP address is /24. VM4 is installed the Ubuntu Long Time Support (LTS) Server and the IP address is /24. VM5 is installed the Debian Linux 7.5 and the IP address is /24. VM6 is installed the Unix OpenBSD 5.5 and the IP address is /24. The VMs have assigned VNC's port related to their administration services. The graphical monitoring for every VM was shown such as VM's CPU usage, host CPU usage, disk I/O, network I/O. 11
12 Proposed System The Security Enhanced (SE) Linux for securing (masquerading) the physical host and VMs when they're connected to the trusted or un-trusted network. The router manages inbound and outbound traffic using its access control list (ACL) and Network Address Translation (NAT) configuration and makes secure connection for both VMs users. Whenever the VMs users have requested for private connection, the authentication system challenged VMs users with the log on page. We added the signature algorithm SHA1 with RSA encryption mechanism on OpenVPN established connection. The client certification was generated from the second tower (authentication) server for connecting the router to client with their authorized VM. 12
13 Proposed System 13
14 Implementation & Diagnosis The libvirt daemon acts a service which run on start up process. The virtual machine manager monitors and manages the VMs on cloud environment. We run the five VMs using the virtual machine manager queue mechanism and started the VM2 to VM6. We made a pertinent record related to both experiment until the log on form of every O/S has viewed. 14
15 Implementation & Diagnosis We make a sufficient record related to the execution time, processor utilization, memory utilization related to every VM for both experiment. The physical average load in 1 minute, 5 minutes and 15 minutes. We obtained the physical CPU and memory usage. We also obtained the CPU and memory usage for libvirtd process. The CPU and memory usage for every qemu-kvm process related to virtual machine. We obtained the CPU and memory usage of physical host versus virtual machines. 15
16 Implementation & Diagnosis The measurement of average load for physical host has started in 14:28:54pm to 15:20:18pm. The average load increased when the virtual machines started up (14:29:24pm to 14:30:00pm). The peak average load for last 1 minute load is 5.91 in 14:44:29pm, last 5 minutes is 5.4 in 14:46:14pm and last 15 minutes is 3.97 in 14:48:53pm. 16
17 14:28:54 14:30:00 14:32:00 14:34:19 14:37:07 14:40:37 14:42:53 14:46:14 14:48:53 14:52:18 14:54:21 14:56:42 14:58:57 15:01:25 15:04:04 15:06:01 15:08:19 15:10:38 15:12:32 15:15:02 15:17:02 15:19:24 Implementation & Diagnosis 7 6 Physical Average Load in 1 minute, 5 minutes and 15 minutes Load AVG1 (Last one minute load) Load AVG3 (last 15 minutes load) Load AVG2 (last 5 minutes load) The average load of physical host Execution Time 17
18 Implementation & Diagnosis Physical CPU & Memory Usage CPU (%) Memory % The physical CPU and memory usage (%) 18
19 Implementation & Diagnosis 2.5 CPU & Memory Usage for Libvirtd LibVirt CPU% Lib Virt Memory % The CPU and memory usage (%) for libvirtd 19
20 Implementation & Diagnosis 120 CPU & Memory Usage for VM2 (FreeBSD 9 installed) CPU(%), VM2(FreeBSD 9) Memory (%), VM2(FreeBSD 9) The CPU and memory usage (%) for virtual machine 2 (Unix FreeBSD v.9 installed) 20
21 Implementation & Diagnosis 120 CPU & Memory Usage for VM3 (Fedora 18 installed) CPU(%), VM3(Fedora 18) Memory (%), VM3(Fedora 18) The CPU and memory usage (%) for virtual machine 3 (Fedora Linux v.18 installed) 21
22 Implementation & Diagnosis CPU & Memory Usage for VM4 (Ubuntu installed) CPU(%), VM4(Ubuntu 12.04) Memory (%), VM4(Ubuntu 12.04) The CPU and memory usage (%) for virtual machine 4 (Ubuntu Linux v installed) 22
23 14:28:54 14:30:00 14:32:00 14:34:19 14:37:07 14:40:37 14:42:53 14:46:14 14:48:53 14:52:18 14:54:21 14:56:42 14:58:57 15:01:25 15:04:04 15:06:01 15:08:19 15:10:38 15:12:32 15:15:02 15:17:02 15:19:24 Implementation & Diagnosis CPU & Memory Usage for VM5 (Debian 7.5 installed) CPU(%), VM5(Debian 7.5) Memory (%), VM5(Debian 7.5) The CPU and memory usage (%) for virtual machine 5 (Debian Linux v.7.5 installed) 23
24 Implementation & Diagnosis CPU(%), VM6(OpenBSD 5.5) Memory (%), VM6(OpenBSD 5.5) The CPU and memory usage (%) for virtual machine 6 (Open BSD v.5.5 installed) 24
25 14:28:54 14:29:24 14:30:00 14:31:00 14:32:00 14:33:19 14:34:19 14:36:16 14:37:07 14:39:01 14:40:37 14:41:53 14:42:53 14:44:29 14:46:14 14:47:26 14:48:53 14:50:09 14:52:18 14:53:18 14:54:21 14:55:27 14:56:42 14:57:57 14:58:57 15:00:06 15:01:25 15:02:46 15:04:04 15:05:04 15:06:01 15:07:22 15:08:19 15:09:37 15:10:38 15:11:29 15:12:32 15:13:38 15:15:02 15:16:02 15:17:02 15:18:03 15:19:24 15:20:18 Implementation & Diagnosis Physical Memory (%) Memory (%) Libvirtd Memory (%), VM2(FreeBSD 9) Memory (%), VM3(Fedora18) Memory (%), VM4(Ubuntu1204) Memory (%), VM6(OpenBSD 5.5) Memory (%), VM5(Debian 7.5) The memory usage (%) of physical and virtual machines 25
26 14:28:54 14:29:24 14:30:00 14:31:00 14:32:00 14:33:19 14:34:19 14:36:16 14:37:07 14:39:01 14:40:37 14:41:53 14:42:53 14:44:29 14:46:14 14:47:26 14:48:53 14:50:09 14:52:18 14:53:18 14:54:21 14:55:27 14:56:42 14:57:57 14:58:57 15:00:06 15:01:25 15:02:46 15:04:04 15:05:04 15:06:01 15:07:22 15:08:19 15:09:37 15:10:38 15:11:29 15:12:32 15:13:38 15:15:02 15:16:02 15:17:02 15:18:03 15:19:24 15:20:18 Implementation & Diagnosis CPU Usage of VMs CPU(%) Physical Host CPU(%) Libvirtd CPU(%), VM2(FreeBSD 9) CPU(%), VM3(Fedora18) CPU(%), VM4(Ubuntu1204) CPU(%), VM6(OpenBSD 5.5) CPU(%), VM5(Debian 7.5) The CPU usage (%) of physical and virtual machines 26
27 Implementation & Diagnosis The VM2 (Unix FreeBSD v.9 installed) was consuming the most amount of memory resource (15.2%) for boot up process. The VM5 (Debian Linux v.7.5 installed) was consuming the least amount of memory resource (6.9%) for boot up process. The VM3 (Fedora Linux v.18 installed) was consuming the most amount of CPU resource (100.5%) for boot up process. The VM6 (Unix OpenBSD v.5.5 installed) was consuming the least amount of CPU resource (99.8%) for boot up process. 27
28 Implementation & Diagnosis The fastest boot up process came to VM6 (Unix OpenBSD v.5.5 installed) which took the time 14:28:54pm to 14:44:29pm or 15 minutes and 35 seconds. The slowest boot up process came to VM3 (Fedora Linux v.18 installed) which took the time 14:28:54pm to 15:12:32pm or 43 minutes and 38 seconds. 28
29 Conclusion The computing resources of physical host remain stable after the VM s boot processes. Deployment of stable and secure private hostedvirtualization could be done effectively whereas the users concern to monitoring and virtual machine management. The physical host is affected by the booting process of several VMs such as processor and memory resources. However, the physical host continued to decrease the computing resources whereas the VMs have finished their booting ICCS 2014 process STMIK Handayani, Makassar to O/S log on form. 29
30 Conclusion The physical host memory usage was consumed more resource than VMs memory usage for VMs boot up processes. The CPU and memory usage for libvirtd remained stable in conjunction with VMs boot up process (CPU usage : 0.3% to 1.7% and memory usage : 0.2% to 0.4%). The VPN-tunneled VNC was designed for protecting the VMs resources. Thus, the main goal of presented prototype is managing effectively the technological needs using the open source virtualization platform. 30
31 Future Work In future, we will analyze the conjunction of security testing for the private cloud environment and its impact to computing resources usage. Moreover, we will also perform the analysis of its security vulnerabilities related to computing resources monitoring and management. 31
32 Preview The list of running VMs 32
33 Preview The list of running VMs The log on form of VNC for VM3 33
34 Preview The list of running VMs The successful VNC for VM3 (Fedora Core 18) 34
35 Preview The list of running VMs The log on form of VNC for VM5 35
36 Preview The list of running VMs The successful VNC for VM5 (Debian Linux
37 Thank You! 37
EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE
EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE Solution Overview Last Updated August 2, 2012 Prepare for the worst-case scenario with the efolder continuity cloud. Downtime of critical infrastructure can
More informationCloud and Datacenter Networking
Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica
More informationCorente Cloud Services Exchange
Corente Cloud Services Exchange Oracle s Corente Cloud Services Exchange (Corente CSX) is a cloud-based service that enables distributed enterprises to deliver trusted IPSec VPN connectivity services to
More informationGTRC Hosting Infrastructure Reports
GTRC Hosting Infrastructure Reports GTRC 2012 1. Description - The Georgia Institute of Technology has provided a data hosting infrastructure to support the PREDICT project for the data sets it provides.
More informationSystem Requirements. Things to Consider Before You Install Foglight NMS. Host Server Hardware and Software System Requirements
System Requirements This section contains information on the minimum system requirements for Foglight NMS. Before you can begin to download Foglight NMS, you must make sure that your computer meets the
More informationNetwork+ Guide to Networks 6 th Edition
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access Objectives 1. Explain virtualization and identify characteristics of virtual network components 2. Create and configure
More informationvedge Cloud Datasheet PRODUCT OVERVIEW DEPLOYMENT USE CASES EXTEND VIPTELA OVERLAY INTO PUBLIC CLOUD ENVIRONMENTS
vedge Cloud Datasheet PRODUCT OVERVIEW Viptela vedge Cloud is a software router platform that supports entire range of capabilities available on the physical vedge-100, vedge-1000 and vedge-2000 router
More informationOperating system hardening
Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications
More informationSystem Requirements for Cisco DCNM, Release 11.0(1)
This chapter lists the tested and supported hardware and software specifications for Cisco Prime Data Center Network Management (DCNM) server and client architecture. The application has been tested in
More informationOrdering and deleting Single-node Trial for VMware vcenter Server on IBM Cloud instances
Ordering and deleting Single-node Trial for VMware vcenter Server on IBM Cloud instances The Single-node Trial for VMware vcenter Server on IBM Cloud is a single-tenant hosted private cloud that delivers
More informationPARALLELS SERVER 4.0 FOR MAC BARE METAL EDITION README
PARALLELS SERVER 4.0 FOR MAC BARE METAL EDITION README February 18, 2010 1999-2010 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information
More informationVIRTUAL CENTRAL LOCK
VIRTUAL CENTRAL LOCK INSTALLATION GUIDE Table of contents 1. Introduction...3 1.1. Main features...3 1.2. Technical requirements...3 2. Installing TOSIBOX Virtual Central Lock...4 2.1. VMWare vsphere/esxi...4
More informationCisco Configuration Engine 2.0
Cisco Configuration Engine 2.0 The Cisco Configuration Engine provides a unified, secure solution for automating the deployment of Cisco customer premises equipment (CPE). This scalable product distributes
More informationWhat Makes Up the Modern Linux OS?
White Paper by David Davis, ActualTech Media What Makes Up the Modern Linux OS? In this Paper The History of Linux... 2 The Components that Comprise the Linux Operating System... 3 What Is a Distribution?...
More informationCloud Computing. UCD IT Services Experience
Cloud Computing UCD IT Services Experience Background - UCD IT Services Central IT provider for University College Dublin 23,000 Full Time Students 7,000 Researchers 5,000 Staff Background - UCD IT Services
More informationSpring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand
Introduction to Virtual Machines Nima Honarmand Virtual Machines & Hypervisors Virtual Machine: an abstraction of a complete compute environment through the combined virtualization of the processor, memory,
More informationticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding
ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding THOMAS SAMANT thomas@terainsights.com Tera Insights, LLC Feb 15th 2018 ALIN DOBRA alin@terainsights.com
More information1. Ultimate Powerful VPN Connectivity
1.1. Firewall, Proxy and NAT Transparency One of the key features of SoftEther VPN is the transparency for firewalls, proxy servers and NATs (Network Address Translators). NATs are sometimes implemented
More informationBuild Cloud like Rackspace with OpenStack Ansible
Build Cloud like Rackspace with OpenStack Ansible https://etherpad.openstack.org/p/osa-workshop-01 Jirayut Nimsaeng DevOps & Cloud Architect 2nd Cloud OpenStack-Container Conference and Workshop 2016 Grand
More informationAzure Compute. Azure Virtual Machines
Azure Compute Azure Virtual Machines Virtual Machines Getting started Select image and VM size New disk persisted in storage Management portal Windows Server Boot VM from new disk >_ Scripting (Windows,
More informationSystem Requirements. System Requirements for Cisco DCNM, Release 10.4(1), page 1. System Requirements for Cisco DCNM, Release 10.
This chapter lists the tested and supported hardware and software specifications for Cisco Prime Data Center Network Management (DCNM) server and client architecture. The application has been tested in
More informationSystem Requirements for Cisco DCNM, Release 10.4(2)
This chapter lists the tested and supported hardware and software specifications for Cisco Prime Data Center Network Management (DCNM) server and client architecture. The application has been tested in
More informationInstalling Cisco APIC-EM on a Virtual Machine
About the Virtual Machine Installation, page 1 System Requirements Virtual Machine, page 2 Pre-Install Checklists, page 4 Cisco APIC-EM Ports Reference, page 7 Verifying the Cisco ISO Image, page 8 Installing
More informationPaperspace. Architecture Overview. 20 Jay St. Suite 312 Brooklyn, NY Technical Whitepaper
Architecture Overview Copyright 2016 Paperspace, Co. All Rights Reserved June - 1-2017 Technical Whitepaper Paperspace Whitepaper: Architecture Overview Content 1. Overview 3 2. Virtualization 3 Xen Hypervisor
More informationIntroduction to VPC-SI
This chapter introduces Cisco Virtualized Packet Core Single Instance (VPC-SI). VPC-SI addresses the need for virtualized cloud architectures that enable the accelerated deployment of new applications
More informationITRI Cloud OS: An End-to-End OpenStack Solution
ITRI Cloud OS: An End-to-End OpenStack Solution Tzi-cker Chiueh 闕志克 Cloud Computing Research Center for Mobile Applications (CCMA) 雲端運算行動應用研究中心 1 Cloud Service Models Software as a Service (SaaS) Turn-key
More informationThe OnApp Cloud Platform
The OnApp Cloud Platform Everything you need to sell cloud, dedicated, CDN, storage & more 286 Cores / 400 Cores 114 Cores 218 10 86 20 The complete cloud platform for service providers OnApp software
More informationNext Generation Firewall
Next Generation Firewall Release Notes 5.10.10 Revision A Contents About this release on page 2 Lifecycle model on page 2 System requirements on page 3 Build version on page 6 Compatibility on page 7 New
More informationCloud Networking (VITMMA02) Server Virtualization Data Center Gear
Cloud Networking (VITMMA02) Server Virtualization Data Center Gear Markosz Maliosz PhD Department of Telecommunications and Media Informatics Faculty of Electrical Engineering and Informatics Budapest
More informationThe vedge Cloud router targets the follow ing main deployment use cases: 1. Extend SD-WAN Overlay into Public Cloud Environments
Data Sheet Cisco vedge Cloud Product Overview Cisco vedge Cloud is a softw are router platform that supports an entire range of capabilities available on the physical vedgerouter platforms. The vedge Cloud
More informationSUSE An introduction...
Virtualization @ SUSE An introduction... Mike Latimer Sr. Engineering Manager SUSE mlatimer@suse.com Agenda Who is SUSE? Introduction to Virtualization Types of Hypervisors Xen KVM libvirt Virtualization
More informationF5 iworkflow and Linux KVM: Setup. Version 2.0.2
F5 iworkflow and Linux KVM: Setup Version 2.0.2 Table of Contents Table of Contents Getting Started with iworkflow Virtual Edition... 5 What is iworkflow Virtual Edition?... 5 About iworkflow VE compatibility
More informationChapter 3 Virtualization Model for Cloud Computing Environment
Chapter 3 Virtualization Model for Cloud Computing Environment This chapter introduces the concept of virtualization in Cloud Computing Environment along with need of virtualization, components and characteristics
More informationCisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13
Q&A Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13 Q. What is the Cisco Cloud Services Router 1000V? A. The Cisco Cloud Services Router 1000V (CSR 1000V) is a router in virtual
More informationInternational Journal of Computer & Organization Trends Volume5 Issue3 May to June 2015
Performance Analysis of Various Guest Operating Systems on Ubuntu 14.04 Prof. (Dr.) Viabhakar Pathak 1, Pramod Kumar Ram 2 1 Computer Science and Engineering, Arya College of Engineering, Jaipur, India.
More informationThe SHARED hosting plan is designed to meet the advanced hosting needs of businesses who are not yet ready to move on to a server solution.
SHARED HOSTING @ RS.2000/- PER YEAR ( SSH ACCESS, MODSECURITY FIREWALL, DAILY BACKUPS, MEMCHACACHED, REDIS, VARNISH, NODE.JS, REMOTE MYSQL ACCESS, GEO IP LOCATION TOOL 5GB FREE VPN TRAFFIC,, 24/7/365 SUPPORT
More informationElasterStack 3.2 User Administration Guide - Advanced Zone
ElasterStack 3.2 User Administration Guide - Advanced Zone With Advance Zone Configuration TCloud Computing Inc. 6/22/2012 Copyright 2012 by TCloud Computing, Inc. All rights reserved. This document is
More informationXen Summit Spring 2007
Xen Summit Spring 2007 Platform Virtualization with XenEnterprise Rich Persaud 4/20/07 Copyright 2005-2006, XenSource, Inc. All rights reserved. 1 Xen, XenSource and XenEnterprise
More informationDATASHEET. Advanced 6-Port Gigabit VPN Network Router. Model: ER-6. Sophisticated Routing Features. Advanced Security, Monitoring, and Management
Data Center & Cloud Computing DATASHEET Advanced 6-Port Gigabit VPN Network Router Model: ER-6 Sophisticated Routing Features Advanced Security, Monitoring, and Management High-Performance Gigabit Ports
More informationCisco Virtual Networking Solution for OpenStack
Data Sheet Cisco Virtual Networking Solution for OpenStack Product Overview Extend enterprise-class networking features to OpenStack cloud environments. A reliable virtual network infrastructure that provides
More informationABOUT ZEPCAM SOFTWARE INSTALLATION MANAGEMENT AND BACKUPS. Description What is it Installation requirement Server requirement
1 ABOUT ZEPCAM SOFTWARE Description What is it Installation requirement Server requirement INSTALLATION Create a bootable USB Networking Disk partitioning Bootloader configuration Setup Registration Administrator
More informationXen and CloudStack. Ewan Mellor. Director, Engineering, Open-source Cloud Platforms Citrix Systems
Xen and CloudStack Ewan Mellor Director, Engineering, Open-source Cloud Platforms Citrix Systems Agenda What is CloudStack? Move to the Apache Foundation CloudStack architecture on Xen The future for CloudStack
More informationRelease Notes for Cisco Application Policy Infrastructure Controller Enterprise Module, Release x
Release s for Cisco Application Policy Infrastructure Controller Enterprise Module, Release 1.3.3.x First Published: 2017-02-10 Release s for Cisco Application Policy Infrastructure Controller Enterprise
More informationQuickSpecs. HP Z 10GbE Dual Port Module. Models
Overview Models Part Number: 1Ql49AA Introduction The is a 10GBASE-T adapter utilizing the Intel X722 MAC and X557-AT2 PHY pairing to deliver full line-rate performance, utilizing CAT 6A UTP cabling (or
More informationVirtual Business Servers technical description
Virtual Business Servers technical description Virtual Business Servers have been developed under an extremely advanced computing platform. The product combines, within a single solution, Parallels Cloud
More informationSentinelOne Technical Brief
SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.
More informationComparing TCP performance of tunneled and non-tunneled traffic using OpenVPN. Berry Hoekstra Damir Musulin OS3 Supervisor: Jan Just Keijser Nikhef
Comparing TCP performance of tunneled and non-tunneled traffic using OpenVPN Berry Hoekstra Damir Musulin OS3 Supervisor: Jan Just Keijser Nikhef Outline Introduction Approach Research Results Conclusion
More informationP a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection
P a g e 1 Online kursus k72751 SysAdmin & DevOps Collection P a g e 2 Title Estimated Duration (hrs) Ruby on Rails - Fundamentals 1,5 Ruby on Rails - Database Fundamentals 1,22 Python: The Basics 3,5 Python:
More informationThe only open-source type-1 hypervisor
Monika Danikáková What is Xen? The only open-source type-1 hypervisor For Unix and Unix-like OS Linux, NetBSD and OpenSolaris From ancient greek term Xenos (ξένος), guest-friends Developed by the University
More informationCRYPTTECH. Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations
Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations Integration with Numerous Type of Devices Flexible Architectural Configuration
More informationScaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX
Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX Inventing Internet TV Available in more than 190 countries 104+ million subscribers Lots of Streaming == Lots of Traffic
More informationTechnical Presales Guidance for Partners
Technical Presales Guidance for Partners Document version Document release date 1.1 25th June 2012 document revisions Contents 1. OnApp Deployment Types... 3 1.1 Public Cloud Deployments... 3 1.2 Private
More informationIntroduction to Virtualization. From NDG In partnership with VMware IT Academy
Introduction to Virtualization From NDG In partnership with VMware IT Academy www.vmware.com/go/academy Why learn virtualization? Modern computing is more efficient due to virtualization Virtualization
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC2384BU VMware Cloud on AWS A Technical Deep Dive Ray Budavari @rbudavari Frank Denneman - @frankdenneman #VMworld #LHC2384BU Disclaimer This presentation may contain product features that are currently
More informationHost. Computer system #1. Host Hardening
Host Hardening Series of actions to be taken in order to make it hard for an attacker to successfully attack computers in a network environment (March 28, 2016) Abdou Illia Spring 2016 Host In network
More informationDiploma in Network (LAN/WAN) Administration
Diploma in Network (LAN/WAN) Administration The Diploma in Network (LAN/WAN) Administration program prepares students to setup Local & Wide Area Networks using Cisco routers and Catalyst switches in a
More informationVeeam Backup & Replication on IBM Cloud Solution Architecture
Veeam Backup & Replication on IBM Cloud Solution Architecture Date: 2018 07 20 Copyright IBM Corporation 2018 Page 1 of 12 Table of Contents 1 Introduction... 4 1.1 About Veeam Backup & Replication...
More informationInstallAnywhere: Requirements
InstallAnywhere: Requirements Create Multiplatform Installations from a Single Project File Physical, Cloud, and Virtual Environments, Plus Docker Containers Requirements This document shows the technical
More informationRed Hat enterprise virtualization 3.0
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
More informationPerformance evaluation of private cloud computing with Eucalyptus
SCIS & ISIS 2010, Dec. 8-12, 2010, Okayama Convention Center, Okayama, Japan Performance evaluation of private cloud computing with Eucalyptus Kei Hirata 1, Akihiro Yamashita 1, Takayuki Tanaka 2, Masaya
More informationSecuring Containers Using a PNSC and a Cisco VSG
Securing Containers Using a PNSC and a Cisco VSG This chapter contains the following sections: About Prime Network Service Controllers, page 1 Integrating a VSG into an Application Container, page 4 About
More informationVembu BDR Suite v System Requirements
Vembu BDR Suite v3.9.1 - VEMBU TECHNOLOGIES www.vembu.com Vembu BDR Backup Server Vembu BDR Suite is a Backup and Disaster Recovery solution for physical and virtual machine environments. It caters to
More informationManaging Site-to-Site VPNs: The Basics
CHAPTER 23 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels
More informationDistributed Systems COMP 212. Lecture 18 Othon Michail
Distributed Systems COMP 212 Lecture 18 Othon Michail Virtualisation & Cloud Computing 2/27 Protection rings It s all about protection rings in modern processors Hardware mechanism to protect data and
More informationOS10 Virtualization Guide. Enterprise Edition
OS10 Virtualization Guide Enterprise Edition 2018-7 Rev. A00 Contents 1 OS10 software virtualization...4 2 Setup GNS3 server...7 3 Setup GNS3 client... 11 4 Start GNS3 client...16 5 Import OS10 appliance...20
More informationSecuring Containers Using a PNSC and a Cisco VSG
Securing Containers Using a PNSC and a Cisco VSG This chapter contains the following sections: About Prime Network Service Controllers, page 1 Integrating a VSG into an Application Container, page 3 About
More informationParallels Workstation 4.0 Extreme Read Me
Parallels Workstation 4.0 Extreme Read Me Welcome to Parallels Workstation Extreme build 4.0.6740. This document contains the information you should know to successfully install Parallels Workstation Extreme
More informationWhat is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet.
1 INTRODUCTION What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet. Cloud computing encompasses any Subscriptionbased or pay-per-use
More informationLecture 09: VMs and VCS head in the clouds
Lecture 09: VMs and VCS head in the Hands-on Unix system administration DeCal 2012-10-29 1 / 20 Projects groups of four people submit one form per group with OCF usernames, proposed project ideas, and
More informationMidoNet Scalability Report
MidoNet Scalability Report MidoNet Scalability Report: Virtual Performance Equivalent to Bare Metal 1 MidoNet Scalability Report MidoNet: For virtual performance equivalent to bare metal Abstract: This
More informationExtremely Fast Distributed Storage for Cloud Service Providers
Solution brief Intel Storage Builders StorPool Storage Intel SSD DC S3510 Series Intel Xeon Processor E3 and E5 Families Intel Ethernet Converged Network Adapter X710 Family Extremely Fast Distributed
More informationCloud Services. Introduction
Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient
More informationVMware Workspace ONE UEM VMware AirWatch Cloud Connector
VMware AirWatch Cloud Connector VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this
More informationVersion Installing your 3CX PBX
Version 20160711 Installing your 3CX PBX Goal of this Module Installing 3CX Successfully Prerequisites Concepts of Networks FQDN Certificates Web Based Setup Wizard Pre-req: Operating Systems Windows Operating
More informationHardware Sizing Guide OV
Hardware Sizing Guide OV3600 6.3 www.alcatel-lucent.com/enterprise Part Number: 0510620-01 Table of Contents Table of Contents... 2 Overview... 3 Properly Sizing Processing and for your OV3600 Server...
More informationDistributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski Rutgers University Fall 2013 December 12, 2014 2013 Paul Krzyzanowski 1 Motivation for the Cloud Self-service configuration
More informationHow to Deploy a VHD Virtual Test Agent Image in Azure
How to Deploy a VHD Virtual Test Agent Image in Azure Executive Summary This guide explains how to deploy a Netrounds Virtual Test Agent as a virtual machine in Microsoft Azure. Table of Contents 1 Netrounds
More informationWIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS
WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to
More informationF5 BIG-IQ Centralized Management andlinux KVM: Setup. Version 5.0
F5 BIG-IQ Centralized Management andlinux KVM: Setup Version 5.0 Table of Contents Table of Contents Getting Started with BIG-IQ Virtual Edition...5 What is BIG-IQ Virtual Edition?...5 About BIG-IQ VE
More informationSafe Place and Code Alert Customer Information Technology Requirements Series 10.x Software
Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part
More informationSecuring VMware NSX-T J U N E 2018
Securing VMware NSX-T J U N E 2018 Securing VMware NSX Table of Contents Executive Summary...2 NSX-T Traffic [Control, Management, and Data]...3 NSX Manager:...7 NSX Controllers:...9 NSX Edge:...10 NSX-T
More informationInstallation and Cluster Deployment Guide for KVM
ONTAP Select 9 Installation and Cluster Deployment Guide for KVM Using ONTAP Select Deploy 2.6 November 2017 215-12637_B0 doccomments@netapp.com Updated for ONTAP Select 9.3 Table of Contents 3 Contents
More informationKaspersky Security Center 10
Kaspersky Security Center 10 Implementation Guide Application version: 10 Service Pack 2, Maintenance Release 1 Dear User, Thank you for your trust! We hope that this document will help you in your work
More informationNested Virtualization and Server Consolidation
Nested Virtualization and Server Consolidation Vara Varavithya Department of Electrical Engineering, KMUTNB varavithya@gmail.com 1 Outline Virtualization & Background Nested Virtualization Hybrid-Nested
More informationSilicon House. Phone: / / / Enquiry: Visit:
Silicon House Powering Top Blue Chip Companies and Successful Hot Start Ups around the World Ranked TOP Performer among the registrars by NIXI Serving over 750000 clients in 90+ countries Phone: +91-7667-200-300
More informationCymmetria MazeRunner INSTALLATION GUIDE
Cymmetria MazeRunner INSTALLATION GUIDE September 12, 2016 Supported environments (all must have nested virtualization enabled follow the links below to learn more) VMware Player (7 or higher) VMware Workstation
More informationOpenvpn Client Do Not Change Default Gateway
Openvpn Client Do Not Change Default Gateway I currently have a router using OpenVPN in client mode to connect to a host Is it possible to make OpenVPN the default gateway for everyone connected So what
More informationAC1600 Wireless Dual Band Gigabit VoIP VDSL/ADSL Modem Router
AC1600 Wireless Dual Band Gigabit VoIP VDSL/ADSL Modem Router Powerful Wi-Fi and Gigabit Wired for a High-Speed Home 300Mbps + 1300Mbps Dual Band Wi-Fi Gigabit Ports VoIP (2 FXS ports) Beamforming Technology
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,
More informationDesignated Operating Environment
Designated Operating Environment - 2018 Document Version: 2018-02-05 The material in this guide defines the Designated Operating Environment (DOE) for a NETLAB+ Virtual Edition (NETLAB+ VE) System as of
More informationInstalling the Cisco CSR 1000v in KVM Environments
Installing the Cisco CSR 1000v in KVM Environments Kernel Virtual Machine Support Information, page 1 KVM Support on OpenStack, page 2 Installation Requirements for KVM Cisco IOS XE Fuji 16.7, page 2 Creating
More informationA Fine-grained Performance-based Decision Model for Virtualization Application Solution
A Fine-grained Performance-based Decision Model for Virtualization Application Solution Jianhai Chen College of Computer Science Zhejiang University Hangzhou City, Zhejiang Province, China 2011/08/29 Outline
More informationThe spec. might change without notice Surveon is not liable for future spec change. Surveon NVR Selection
The spec. might change without notice Surveon is not liable for future spec change Surveon NVR Selection Content How to Select a Suitable NVR Surveon NVR Selector Surveon NVR Introduction Appendix 1: NVR
More informationAdvanced Network Routers. Datasheet. Model: ERPro-8, ER-8, ERPoe-5, ERLite-3. Sophisticated Routing Features
Advanced Network Routers Model: ERPro-8, ER-8, ERPoe-5, ERLite-3 Sophisticated Routing Features Advanced Security, Monitoring, and Management High-Performance Gigabit Ports Advanced Routing Technology
More informationEMC XTREMCACHE ACCELERATES VIRTUALIZED ORACLE
White Paper EMC XTREMCACHE ACCELERATES VIRTUALIZED ORACLE EMC XtremSF, EMC XtremCache, EMC Symmetrix VMAX and Symmetrix VMAX 10K, XtremSF and XtremCache dramatically improve Oracle performance Symmetrix
More informationVirtualization. join, aggregation, concatenation, array, N 1 ühendamine, agregeerimine, konkateneerimine, massiiv
Virtualization abstraction of computer resources may, but does not have to change the interface end-user has limited or no knowledge about the real resources behind the virtualization layer original /
More informationInstallation and Cluster Deployment Guide
ONTAP Select 9 Installation and Cluster Deployment Guide Using ONTAP Select Deploy 2.3 March 2017 215-12086_B0 doccomments@netapp.com Updated for ONTAP Select 9.1 Table of Contents 3 Contents Deciding
More informationAutomated Deployment of Private Cloud (EasyCloud)
Automated Deployment of Private Cloud (EasyCloud) Mohammed Kazim Musab Al-Zahrani Mohannad Mostafa Moath Al-Solea Hassan Al-Salam Advisor: Dr.Ahmad Khayyat COE485 T151 1 Table of Contents Introduction
More informationIWAN APIC-EM Application Cisco Intelligent WAN
IWAN APIC-EM Application Cisco Intelligent WAN René og Per Cisco DK SE s Feb 23 th 2016 AVC MPLS Private Cloud 3G/4G-LTE Virtual Private Cloud Branch WAAS PfR Internet Public Cloud Control, Management,
More informationGuide to Vyatta Documentation
VYATTA, INC. System Guide to Documentation Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada) COPYRIGHT Copyright 2005 2012, Inc. All rights reserved.
More information