Designing the Stable Infrastructure for Kernel-based Virtual Machine using VPN-tunneled VNC

Size: px
Start display at page:

Download "Designing the Stable Infrastructure for Kernel-based Virtual Machine using VPN-tunneled VNC"

Transcription

1 Designing the Stable Infrastructure for Kernel-based Virtual Machine using VPN-tunneled VNC presented by : Berkah I. Santoso Informatics, Bakrie University International Conference on Computer Science 2014 December 5 th, 2014 Grand Clarion Hotel & Convention, Makassar

2 Table of Content Abstract.. 3 Introduction... 4 Related Works 7 Proposed System.. 9 Implementation and Diagnosis. 14 Conclusion 29 ** Preview : list of running VMs ** Preview : log on form VNC ** Preview : successful VNC for VM

3 Abstract The key aspect of cloud computing is virtualization that aimed to achieve stability, scalability and flexibility in a cloud infrastructure. The shared computing resources such as processor, memory, storage and network have important roles for operating the cloud infrastructure they must be managed and monitored carefully. The virtual machine management(vmm) tools were played important role in giving real computing resources information to the system administrator. The VMM, VPN and VNC approach could be used for helping the users to get the stable, secure cloud services. The models are functioning stable, secure in a highly consumption VM computational resource. The critical event for providing the shared computing resources is the VM s booting processes. The increase in the number of VMs does not affect the working of physical host that indicates its practicability in a flexible environment. 3

4 Introduction There are two different forms of virtualization architectures. Bare-metal virtualization, which exists no host O/S because the VMM sits just above the underlying physical hardware. Hosted-virtualization, which the VMM sits just on top of the host O/S and runs as application [4]. 4

5 Introduction Virtual Network Computing (VNC) is a desktop sharing system which uses the Remote Frame Buffer (RFB) protocol to remotely control another computer. It transmits the user events from one computer to another relaying the screen updates back in other direction, over a network using buffered I/O stream[8]. Virtual Private Network is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger networks, such as the internet, as opposed to running across a single private network. The link layer protocols of the virtual network are said to be tunneled through the transport network. It provides private network connections over a publicly accessible shared network [9]. 5

6 Introduction We present the stable and secure hostedvirtualization and present a case study of deployment of private virtualized infrastructure using KVM. The KVM runs on Red Hat Enterprise Linux v6.5. We installed the Linux and Unix variant for VMs with minimal installation option. We also configured the boot loader for each VM s O/S as the default configuration. 6

7 Related Works The Papaya[2] management platform which based on Eucalyptus. Centralized monitoring and management. Using the web interface for managing and monitoring VMs. The Snooze[11] private cloud management platform to monitor and manage the resource. Self-organizing hierarchical and distributed cloud management using Java. The fault tolerance features of framework do not impact application performance and the system remained highly scalable with increasing amounts of resources. 7

8 Related Works Our works proposed the combination of VM manager. Distributed cloud management. VM migration. Build using Python. Intuitive graphical user interface for VM monitoring. 8

9 Proposed System We proposed the design, implementation and evaluation of stable and secure-private hostedvirtualization using below ingredients : KVM (qemu-kvm v ) VM service manager (libvirt v ) Red Hat Enterprise Linux v.6.5 (kernel el6.x86-64 stable) OpenVPN ver DHCP ver VM manager (virt-manager el6.x86-64) 9

10 Proposed System The hardware consist of below information : The tower server for constructing the hosted-virtualization KVM. We are using the Quad core Intel Xeon CPU E GHzbased processor, 8 GB RAM, 1 TB RAID 10 local disk, dual 1 GB Network Interface Card. The tower server for constructing the VPN services and Domain Host Control Protocol (DHCP) services. We are using the Quad core Intel Xeon CPU E GHz-based processor, 8 GB RAM, 1 TB RAID 10 local disk, single 1 GB Network Interface Card. The Cisco Catalyst Gbps 24 port Layer-2 switch. The switch has also Virtual LAN (VLAN) configured. The Cisco Router 2801 for connecting the internal network to the external networks. The router has also access control list configured. The desktop PCs (HP Compaq 5700) for accessing the VMs services. 10

11 Proposed System The bridge technique separated the private network for VMs system administration and service network for VMs. The description of every VM can be defined as shown below : VM2 is installed the Unix FreeBSD 9.0 and the IP address is /24. VM3 is installed the Fedora Linux 18 and the IP address is /24. VM4 is installed the Ubuntu Long Time Support (LTS) Server and the IP address is /24. VM5 is installed the Debian Linux 7.5 and the IP address is /24. VM6 is installed the Unix OpenBSD 5.5 and the IP address is /24. The VMs have assigned VNC's port related to their administration services. The graphical monitoring for every VM was shown such as VM's CPU usage, host CPU usage, disk I/O, network I/O. 11

12 Proposed System The Security Enhanced (SE) Linux for securing (masquerading) the physical host and VMs when they're connected to the trusted or un-trusted network. The router manages inbound and outbound traffic using its access control list (ACL) and Network Address Translation (NAT) configuration and makes secure connection for both VMs users. Whenever the VMs users have requested for private connection, the authentication system challenged VMs users with the log on page. We added the signature algorithm SHA1 with RSA encryption mechanism on OpenVPN established connection. The client certification was generated from the second tower (authentication) server for connecting the router to client with their authorized VM. 12

13 Proposed System 13

14 Implementation & Diagnosis The libvirt daemon acts a service which run on start up process. The virtual machine manager monitors and manages the VMs on cloud environment. We run the five VMs using the virtual machine manager queue mechanism and started the VM2 to VM6. We made a pertinent record related to both experiment until the log on form of every O/S has viewed. 14

15 Implementation & Diagnosis We make a sufficient record related to the execution time, processor utilization, memory utilization related to every VM for both experiment. The physical average load in 1 minute, 5 minutes and 15 minutes. We obtained the physical CPU and memory usage. We also obtained the CPU and memory usage for libvirtd process. The CPU and memory usage for every qemu-kvm process related to virtual machine. We obtained the CPU and memory usage of physical host versus virtual machines. 15

16 Implementation & Diagnosis The measurement of average load for physical host has started in 14:28:54pm to 15:20:18pm. The average load increased when the virtual machines started up (14:29:24pm to 14:30:00pm). The peak average load for last 1 minute load is 5.91 in 14:44:29pm, last 5 minutes is 5.4 in 14:46:14pm and last 15 minutes is 3.97 in 14:48:53pm. 16

17 14:28:54 14:30:00 14:32:00 14:34:19 14:37:07 14:40:37 14:42:53 14:46:14 14:48:53 14:52:18 14:54:21 14:56:42 14:58:57 15:01:25 15:04:04 15:06:01 15:08:19 15:10:38 15:12:32 15:15:02 15:17:02 15:19:24 Implementation & Diagnosis 7 6 Physical Average Load in 1 minute, 5 minutes and 15 minutes Load AVG1 (Last one minute load) Load AVG3 (last 15 minutes load) Load AVG2 (last 5 minutes load) The average load of physical host Execution Time 17

18 Implementation & Diagnosis Physical CPU & Memory Usage CPU (%) Memory % The physical CPU and memory usage (%) 18

19 Implementation & Diagnosis 2.5 CPU & Memory Usage for Libvirtd LibVirt CPU% Lib Virt Memory % The CPU and memory usage (%) for libvirtd 19

20 Implementation & Diagnosis 120 CPU & Memory Usage for VM2 (FreeBSD 9 installed) CPU(%), VM2(FreeBSD 9) Memory (%), VM2(FreeBSD 9) The CPU and memory usage (%) for virtual machine 2 (Unix FreeBSD v.9 installed) 20

21 Implementation & Diagnosis 120 CPU & Memory Usage for VM3 (Fedora 18 installed) CPU(%), VM3(Fedora 18) Memory (%), VM3(Fedora 18) The CPU and memory usage (%) for virtual machine 3 (Fedora Linux v.18 installed) 21

22 Implementation & Diagnosis CPU & Memory Usage for VM4 (Ubuntu installed) CPU(%), VM4(Ubuntu 12.04) Memory (%), VM4(Ubuntu 12.04) The CPU and memory usage (%) for virtual machine 4 (Ubuntu Linux v installed) 22

23 14:28:54 14:30:00 14:32:00 14:34:19 14:37:07 14:40:37 14:42:53 14:46:14 14:48:53 14:52:18 14:54:21 14:56:42 14:58:57 15:01:25 15:04:04 15:06:01 15:08:19 15:10:38 15:12:32 15:15:02 15:17:02 15:19:24 Implementation & Diagnosis CPU & Memory Usage for VM5 (Debian 7.5 installed) CPU(%), VM5(Debian 7.5) Memory (%), VM5(Debian 7.5) The CPU and memory usage (%) for virtual machine 5 (Debian Linux v.7.5 installed) 23

24 Implementation & Diagnosis CPU(%), VM6(OpenBSD 5.5) Memory (%), VM6(OpenBSD 5.5) The CPU and memory usage (%) for virtual machine 6 (Open BSD v.5.5 installed) 24

25 14:28:54 14:29:24 14:30:00 14:31:00 14:32:00 14:33:19 14:34:19 14:36:16 14:37:07 14:39:01 14:40:37 14:41:53 14:42:53 14:44:29 14:46:14 14:47:26 14:48:53 14:50:09 14:52:18 14:53:18 14:54:21 14:55:27 14:56:42 14:57:57 14:58:57 15:00:06 15:01:25 15:02:46 15:04:04 15:05:04 15:06:01 15:07:22 15:08:19 15:09:37 15:10:38 15:11:29 15:12:32 15:13:38 15:15:02 15:16:02 15:17:02 15:18:03 15:19:24 15:20:18 Implementation & Diagnosis Physical Memory (%) Memory (%) Libvirtd Memory (%), VM2(FreeBSD 9) Memory (%), VM3(Fedora18) Memory (%), VM4(Ubuntu1204) Memory (%), VM6(OpenBSD 5.5) Memory (%), VM5(Debian 7.5) The memory usage (%) of physical and virtual machines 25

26 14:28:54 14:29:24 14:30:00 14:31:00 14:32:00 14:33:19 14:34:19 14:36:16 14:37:07 14:39:01 14:40:37 14:41:53 14:42:53 14:44:29 14:46:14 14:47:26 14:48:53 14:50:09 14:52:18 14:53:18 14:54:21 14:55:27 14:56:42 14:57:57 14:58:57 15:00:06 15:01:25 15:02:46 15:04:04 15:05:04 15:06:01 15:07:22 15:08:19 15:09:37 15:10:38 15:11:29 15:12:32 15:13:38 15:15:02 15:16:02 15:17:02 15:18:03 15:19:24 15:20:18 Implementation & Diagnosis CPU Usage of VMs CPU(%) Physical Host CPU(%) Libvirtd CPU(%), VM2(FreeBSD 9) CPU(%), VM3(Fedora18) CPU(%), VM4(Ubuntu1204) CPU(%), VM6(OpenBSD 5.5) CPU(%), VM5(Debian 7.5) The CPU usage (%) of physical and virtual machines 26

27 Implementation & Diagnosis The VM2 (Unix FreeBSD v.9 installed) was consuming the most amount of memory resource (15.2%) for boot up process. The VM5 (Debian Linux v.7.5 installed) was consuming the least amount of memory resource (6.9%) for boot up process. The VM3 (Fedora Linux v.18 installed) was consuming the most amount of CPU resource (100.5%) for boot up process. The VM6 (Unix OpenBSD v.5.5 installed) was consuming the least amount of CPU resource (99.8%) for boot up process. 27

28 Implementation & Diagnosis The fastest boot up process came to VM6 (Unix OpenBSD v.5.5 installed) which took the time 14:28:54pm to 14:44:29pm or 15 minutes and 35 seconds. The slowest boot up process came to VM3 (Fedora Linux v.18 installed) which took the time 14:28:54pm to 15:12:32pm or 43 minutes and 38 seconds. 28

29 Conclusion The computing resources of physical host remain stable after the VM s boot processes. Deployment of stable and secure private hostedvirtualization could be done effectively whereas the users concern to monitoring and virtual machine management. The physical host is affected by the booting process of several VMs such as processor and memory resources. However, the physical host continued to decrease the computing resources whereas the VMs have finished their booting ICCS 2014 process STMIK Handayani, Makassar to O/S log on form. 29

30 Conclusion The physical host memory usage was consumed more resource than VMs memory usage for VMs boot up processes. The CPU and memory usage for libvirtd remained stable in conjunction with VMs boot up process (CPU usage : 0.3% to 1.7% and memory usage : 0.2% to 0.4%). The VPN-tunneled VNC was designed for protecting the VMs resources. Thus, the main goal of presented prototype is managing effectively the technological needs using the open source virtualization platform. 30

31 Future Work In future, we will analyze the conjunction of security testing for the private cloud environment and its impact to computing resources usage. Moreover, we will also perform the analysis of its security vulnerabilities related to computing resources monitoring and management. 31

32 Preview The list of running VMs 32

33 Preview The list of running VMs The log on form of VNC for VM3 33

34 Preview The list of running VMs The successful VNC for VM3 (Fedora Core 18) 34

35 Preview The list of running VMs The log on form of VNC for VM5 35

36 Preview The list of running VMs The successful VNC for VM5 (Debian Linux

37 Thank You! 37

EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE

EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE Solution Overview Last Updated August 2, 2012 Prepare for the worst-case scenario with the efolder continuity cloud. Downtime of critical infrastructure can

More information

Cloud and Datacenter Networking

Cloud and Datacenter Networking Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica

More information

Corente Cloud Services Exchange

Corente Cloud Services Exchange Corente Cloud Services Exchange Oracle s Corente Cloud Services Exchange (Corente CSX) is a cloud-based service that enables distributed enterprises to deliver trusted IPSec VPN connectivity services to

More information

GTRC Hosting Infrastructure Reports

GTRC Hosting Infrastructure Reports GTRC Hosting Infrastructure Reports GTRC 2012 1. Description - The Georgia Institute of Technology has provided a data hosting infrastructure to support the PREDICT project for the data sets it provides.

More information

System Requirements. Things to Consider Before You Install Foglight NMS. Host Server Hardware and Software System Requirements

System Requirements. Things to Consider Before You Install Foglight NMS. Host Server Hardware and Software System Requirements System Requirements This section contains information on the minimum system requirements for Foglight NMS. Before you can begin to download Foglight NMS, you must make sure that your computer meets the

More information

Network+ Guide to Networks 6 th Edition

Network+ Guide to Networks 6 th Edition Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access Objectives 1. Explain virtualization and identify characteristics of virtual network components 2. Create and configure

More information

vedge Cloud Datasheet PRODUCT OVERVIEW DEPLOYMENT USE CASES EXTEND VIPTELA OVERLAY INTO PUBLIC CLOUD ENVIRONMENTS

vedge Cloud Datasheet PRODUCT OVERVIEW DEPLOYMENT USE CASES EXTEND VIPTELA OVERLAY INTO PUBLIC CLOUD ENVIRONMENTS vedge Cloud Datasheet PRODUCT OVERVIEW Viptela vedge Cloud is a software router platform that supports entire range of capabilities available on the physical vedge-100, vedge-1000 and vedge-2000 router

More information

Operating system hardening

Operating system hardening Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications

More information

System Requirements for Cisco DCNM, Release 11.0(1)

System Requirements for Cisco DCNM, Release 11.0(1) This chapter lists the tested and supported hardware and software specifications for Cisco Prime Data Center Network Management (DCNM) server and client architecture. The application has been tested in

More information

Ordering and deleting Single-node Trial for VMware vcenter Server on IBM Cloud instances

Ordering and deleting Single-node Trial for VMware vcenter Server on IBM Cloud instances Ordering and deleting Single-node Trial for VMware vcenter Server on IBM Cloud instances The Single-node Trial for VMware vcenter Server on IBM Cloud is a single-tenant hosted private cloud that delivers

More information

PARALLELS SERVER 4.0 FOR MAC BARE METAL EDITION README

PARALLELS SERVER 4.0 FOR MAC BARE METAL EDITION README PARALLELS SERVER 4.0 FOR MAC BARE METAL EDITION README February 18, 2010 1999-2010 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information

More information

VIRTUAL CENTRAL LOCK

VIRTUAL CENTRAL LOCK VIRTUAL CENTRAL LOCK INSTALLATION GUIDE Table of contents 1. Introduction...3 1.1. Main features...3 1.2. Technical requirements...3 2. Installing TOSIBOX Virtual Central Lock...4 2.1. VMWare vsphere/esxi...4

More information

Cisco Configuration Engine 2.0

Cisco Configuration Engine 2.0 Cisco Configuration Engine 2.0 The Cisco Configuration Engine provides a unified, secure solution for automating the deployment of Cisco customer premises equipment (CPE). This scalable product distributes

More information

What Makes Up the Modern Linux OS?

What Makes Up the Modern Linux OS? White Paper by David Davis, ActualTech Media What Makes Up the Modern Linux OS? In this Paper The History of Linux... 2 The Components that Comprise the Linux Operating System... 3 What Is a Distribution?...

More information

Cloud Computing. UCD IT Services Experience

Cloud Computing. UCD IT Services Experience Cloud Computing UCD IT Services Experience Background - UCD IT Services Central IT provider for University College Dublin 23,000 Full Time Students 7,000 Researchers 5,000 Staff Background - UCD IT Services

More information

Spring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand

Spring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand Introduction to Virtual Machines Nima Honarmand Virtual Machines & Hypervisors Virtual Machine: an abstraction of a complete compute environment through the combined virtualization of the processor, memory,

More information

ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding

ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding THOMAS SAMANT thomas@terainsights.com Tera Insights, LLC Feb 15th 2018 ALIN DOBRA alin@terainsights.com

More information

1. Ultimate Powerful VPN Connectivity

1. Ultimate Powerful VPN Connectivity 1.1. Firewall, Proxy and NAT Transparency One of the key features of SoftEther VPN is the transparency for firewalls, proxy servers and NATs (Network Address Translators). NATs are sometimes implemented

More information

Build Cloud like Rackspace with OpenStack Ansible

Build Cloud like Rackspace with OpenStack Ansible Build Cloud like Rackspace with OpenStack Ansible https://etherpad.openstack.org/p/osa-workshop-01 Jirayut Nimsaeng DevOps & Cloud Architect 2nd Cloud OpenStack-Container Conference and Workshop 2016 Grand

More information

Azure Compute. Azure Virtual Machines

Azure Compute. Azure Virtual Machines Azure Compute Azure Virtual Machines Virtual Machines Getting started Select image and VM size New disk persisted in storage Management portal Windows Server Boot VM from new disk >_ Scripting (Windows,

More information

System Requirements. System Requirements for Cisco DCNM, Release 10.4(1), page 1. System Requirements for Cisco DCNM, Release 10.

System Requirements. System Requirements for Cisco DCNM, Release 10.4(1), page 1. System Requirements for Cisco DCNM, Release 10. This chapter lists the tested and supported hardware and software specifications for Cisco Prime Data Center Network Management (DCNM) server and client architecture. The application has been tested in

More information

System Requirements for Cisco DCNM, Release 10.4(2)

System Requirements for Cisco DCNM, Release 10.4(2) This chapter lists the tested and supported hardware and software specifications for Cisco Prime Data Center Network Management (DCNM) server and client architecture. The application has been tested in

More information

Installing Cisco APIC-EM on a Virtual Machine

Installing Cisco APIC-EM on a Virtual Machine About the Virtual Machine Installation, page 1 System Requirements Virtual Machine, page 2 Pre-Install Checklists, page 4 Cisco APIC-EM Ports Reference, page 7 Verifying the Cisco ISO Image, page 8 Installing

More information

Paperspace. Architecture Overview. 20 Jay St. Suite 312 Brooklyn, NY Technical Whitepaper

Paperspace. Architecture Overview. 20 Jay St. Suite 312 Brooklyn, NY Technical Whitepaper Architecture Overview Copyright 2016 Paperspace, Co. All Rights Reserved June - 1-2017 Technical Whitepaper Paperspace Whitepaper: Architecture Overview Content 1. Overview 3 2. Virtualization 3 Xen Hypervisor

More information

Introduction to VPC-SI

Introduction to VPC-SI This chapter introduces Cisco Virtualized Packet Core Single Instance (VPC-SI). VPC-SI addresses the need for virtualized cloud architectures that enable the accelerated deployment of new applications

More information

ITRI Cloud OS: An End-to-End OpenStack Solution

ITRI Cloud OS: An End-to-End OpenStack Solution ITRI Cloud OS: An End-to-End OpenStack Solution Tzi-cker Chiueh 闕志克 Cloud Computing Research Center for Mobile Applications (CCMA) 雲端運算行動應用研究中心 1 Cloud Service Models Software as a Service (SaaS) Turn-key

More information

The OnApp Cloud Platform

The OnApp Cloud Platform The OnApp Cloud Platform Everything you need to sell cloud, dedicated, CDN, storage & more 286 Cores / 400 Cores 114 Cores 218 10 86 20 The complete cloud platform for service providers OnApp software

More information

Next Generation Firewall

Next Generation Firewall Next Generation Firewall Release Notes 5.10.10 Revision A Contents About this release on page 2 Lifecycle model on page 2 System requirements on page 3 Build version on page 6 Compatibility on page 7 New

More information

Cloud Networking (VITMMA02) Server Virtualization Data Center Gear

Cloud Networking (VITMMA02) Server Virtualization Data Center Gear Cloud Networking (VITMMA02) Server Virtualization Data Center Gear Markosz Maliosz PhD Department of Telecommunications and Media Informatics Faculty of Electrical Engineering and Informatics Budapest

More information

The vedge Cloud router targets the follow ing main deployment use cases: 1. Extend SD-WAN Overlay into Public Cloud Environments

The vedge Cloud router targets the follow ing main deployment use cases: 1. Extend SD-WAN Overlay into Public Cloud Environments Data Sheet Cisco vedge Cloud Product Overview Cisco vedge Cloud is a softw are router platform that supports an entire range of capabilities available on the physical vedgerouter platforms. The vedge Cloud

More information

SUSE An introduction...

SUSE An introduction... Virtualization @ SUSE An introduction... Mike Latimer Sr. Engineering Manager SUSE mlatimer@suse.com Agenda Who is SUSE? Introduction to Virtualization Types of Hypervisors Xen KVM libvirt Virtualization

More information

F5 iworkflow and Linux KVM: Setup. Version 2.0.2

F5 iworkflow and Linux KVM: Setup. Version 2.0.2 F5 iworkflow and Linux KVM: Setup Version 2.0.2 Table of Contents Table of Contents Getting Started with iworkflow Virtual Edition... 5 What is iworkflow Virtual Edition?... 5 About iworkflow VE compatibility

More information

Chapter 3 Virtualization Model for Cloud Computing Environment

Chapter 3 Virtualization Model for Cloud Computing Environment Chapter 3 Virtualization Model for Cloud Computing Environment This chapter introduces the concept of virtualization in Cloud Computing Environment along with need of virtualization, components and characteristics

More information

Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13

Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13 Q&A Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13 Q. What is the Cisco Cloud Services Router 1000V? A. The Cisco Cloud Services Router 1000V (CSR 1000V) is a router in virtual

More information

International Journal of Computer & Organization Trends Volume5 Issue3 May to June 2015

International Journal of Computer & Organization Trends Volume5 Issue3 May to June 2015 Performance Analysis of Various Guest Operating Systems on Ubuntu 14.04 Prof. (Dr.) Viabhakar Pathak 1, Pramod Kumar Ram 2 1 Computer Science and Engineering, Arya College of Engineering, Jaipur, India.

More information

The SHARED hosting plan is designed to meet the advanced hosting needs of businesses who are not yet ready to move on to a server solution.

The SHARED hosting plan is designed to meet the advanced hosting needs of businesses who are not yet ready to move on to a server solution. SHARED HOSTING @ RS.2000/- PER YEAR ( SSH ACCESS, MODSECURITY FIREWALL, DAILY BACKUPS, MEMCHACACHED, REDIS, VARNISH, NODE.JS, REMOTE MYSQL ACCESS, GEO IP LOCATION TOOL 5GB FREE VPN TRAFFIC,, 24/7/365 SUPPORT

More information

ElasterStack 3.2 User Administration Guide - Advanced Zone

ElasterStack 3.2 User Administration Guide - Advanced Zone ElasterStack 3.2 User Administration Guide - Advanced Zone With Advance Zone Configuration TCloud Computing Inc. 6/22/2012 Copyright 2012 by TCloud Computing, Inc. All rights reserved. This document is

More information

Xen Summit Spring 2007

Xen Summit Spring 2007 Xen Summit Spring 2007 Platform Virtualization with XenEnterprise Rich Persaud 4/20/07 Copyright 2005-2006, XenSource, Inc. All rights reserved. 1 Xen, XenSource and XenEnterprise

More information

DATASHEET. Advanced 6-Port Gigabit VPN Network Router. Model: ER-6. Sophisticated Routing Features. Advanced Security, Monitoring, and Management

DATASHEET. Advanced 6-Port Gigabit VPN Network Router. Model: ER-6. Sophisticated Routing Features. Advanced Security, Monitoring, and Management Data Center & Cloud Computing DATASHEET Advanced 6-Port Gigabit VPN Network Router Model: ER-6 Sophisticated Routing Features Advanced Security, Monitoring, and Management High-Performance Gigabit Ports

More information

Cisco Virtual Networking Solution for OpenStack

Cisco Virtual Networking Solution for OpenStack Data Sheet Cisco Virtual Networking Solution for OpenStack Product Overview Extend enterprise-class networking features to OpenStack cloud environments. A reliable virtual network infrastructure that provides

More information

ABOUT ZEPCAM SOFTWARE INSTALLATION MANAGEMENT AND BACKUPS. Description What is it Installation requirement Server requirement

ABOUT ZEPCAM SOFTWARE INSTALLATION MANAGEMENT AND BACKUPS. Description What is it Installation requirement Server requirement 1 ABOUT ZEPCAM SOFTWARE Description What is it Installation requirement Server requirement INSTALLATION Create a bootable USB Networking Disk partitioning Bootloader configuration Setup Registration Administrator

More information

Xen and CloudStack. Ewan Mellor. Director, Engineering, Open-source Cloud Platforms Citrix Systems

Xen and CloudStack. Ewan Mellor. Director, Engineering, Open-source Cloud Platforms Citrix Systems Xen and CloudStack Ewan Mellor Director, Engineering, Open-source Cloud Platforms Citrix Systems Agenda What is CloudStack? Move to the Apache Foundation CloudStack architecture on Xen The future for CloudStack

More information

Release Notes for Cisco Application Policy Infrastructure Controller Enterprise Module, Release x

Release Notes for Cisco Application Policy Infrastructure Controller Enterprise Module, Release x Release s for Cisco Application Policy Infrastructure Controller Enterprise Module, Release 1.3.3.x First Published: 2017-02-10 Release s for Cisco Application Policy Infrastructure Controller Enterprise

More information

QuickSpecs. HP Z 10GbE Dual Port Module. Models

QuickSpecs. HP Z 10GbE Dual Port Module. Models Overview Models Part Number: 1Ql49AA Introduction The is a 10GBASE-T adapter utilizing the Intel X722 MAC and X557-AT2 PHY pairing to deliver full line-rate performance, utilizing CAT 6A UTP cabling (or

More information

Virtual Business Servers technical description

Virtual Business Servers technical description Virtual Business Servers technical description Virtual Business Servers have been developed under an extremely advanced computing platform. The product combines, within a single solution, Parallels Cloud

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.

More information

Comparing TCP performance of tunneled and non-tunneled traffic using OpenVPN. Berry Hoekstra Damir Musulin OS3 Supervisor: Jan Just Keijser Nikhef

Comparing TCP performance of tunneled and non-tunneled traffic using OpenVPN. Berry Hoekstra Damir Musulin OS3 Supervisor: Jan Just Keijser Nikhef Comparing TCP performance of tunneled and non-tunneled traffic using OpenVPN Berry Hoekstra Damir Musulin OS3 Supervisor: Jan Just Keijser Nikhef Outline Introduction Approach Research Results Conclusion

More information

P a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection

P a g e 1. Teknologisk Institut.   Online kursus k SysAdmin & DevOps Collection P a g e 1 Online kursus k72751 SysAdmin & DevOps Collection P a g e 2 Title Estimated Duration (hrs) Ruby on Rails - Fundamentals 1,5 Ruby on Rails - Database Fundamentals 1,22 Python: The Basics 3,5 Python:

More information

The only open-source type-1 hypervisor

The only open-source type-1 hypervisor Monika Danikáková What is Xen? The only open-source type-1 hypervisor For Unix and Unix-like OS Linux, NetBSD and OpenSolaris From ancient greek term Xenos (ξένος), guest-friends Developed by the University

More information

CRYPTTECH. Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations

CRYPTTECH. Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations Integration with Numerous Type of Devices Flexible Architectural Configuration

More information

Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX

Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX Scaling Internet TV Content Delivery ALEX GUTARIN DIRECTOR OF ENGINEERING, NETFLIX Inventing Internet TV Available in more than 190 countries 104+ million subscribers Lots of Streaming == Lots of Traffic

More information

Technical Presales Guidance for Partners

Technical Presales Guidance for Partners Technical Presales Guidance for Partners Document version Document release date 1.1 25th June 2012 document revisions Contents 1. OnApp Deployment Types... 3 1.1 Public Cloud Deployments... 3 1.2 Private

More information

Introduction to Virtualization. From NDG In partnership with VMware IT Academy

Introduction to Virtualization. From NDG In partnership with VMware IT Academy Introduction to Virtualization From NDG In partnership with VMware IT Academy www.vmware.com/go/academy Why learn virtualization? Modern computing is more efficient due to virtualization Virtualization

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme LHC2384BU VMware Cloud on AWS A Technical Deep Dive Ray Budavari @rbudavari Frank Denneman - @frankdenneman #VMworld #LHC2384BU Disclaimer This presentation may contain product features that are currently

More information

Host. Computer system #1. Host Hardening

Host. Computer system #1. Host Hardening Host Hardening Series of actions to be taken in order to make it hard for an attacker to successfully attack computers in a network environment (March 28, 2016) Abdou Illia Spring 2016 Host In network

More information

Diploma in Network (LAN/WAN) Administration

Diploma in Network (LAN/WAN) Administration Diploma in Network (LAN/WAN) Administration The Diploma in Network (LAN/WAN) Administration program prepares students to setup Local & Wide Area Networks using Cisco routers and Catalyst switches in a

More information

Veeam Backup & Replication on IBM Cloud Solution Architecture

Veeam Backup & Replication on IBM Cloud Solution Architecture Veeam Backup & Replication on IBM Cloud Solution Architecture Date: 2018 07 20 Copyright IBM Corporation 2018 Page 1 of 12 Table of Contents 1 Introduction... 4 1.1 About Veeam Backup & Replication...

More information

InstallAnywhere: Requirements

InstallAnywhere: Requirements InstallAnywhere: Requirements Create Multiplatform Installations from a Single Project File Physical, Cloud, and Virtual Environments, Plus Docker Containers Requirements This document shows the technical

More information

Red Hat enterprise virtualization 3.0

Red Hat enterprise virtualization 3.0 Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware

More information

Performance evaluation of private cloud computing with Eucalyptus

Performance evaluation of private cloud computing with Eucalyptus SCIS & ISIS 2010, Dec. 8-12, 2010, Okayama Convention Center, Okayama, Japan Performance evaluation of private cloud computing with Eucalyptus Kei Hirata 1, Akihiro Yamashita 1, Takayuki Tanaka 2, Masaya

More information

Securing Containers Using a PNSC and a Cisco VSG

Securing Containers Using a PNSC and a Cisco VSG Securing Containers Using a PNSC and a Cisco VSG This chapter contains the following sections: About Prime Network Service Controllers, page 1 Integrating a VSG into an Application Container, page 4 About

More information

Vembu BDR Suite v System Requirements

Vembu BDR Suite v System Requirements Vembu BDR Suite v3.9.1 - VEMBU TECHNOLOGIES www.vembu.com Vembu BDR Backup Server Vembu BDR Suite is a Backup and Disaster Recovery solution for physical and virtual machine environments. It caters to

More information

Managing Site-to-Site VPNs: The Basics

Managing Site-to-Site VPNs: The Basics CHAPTER 23 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels

More information

Distributed Systems COMP 212. Lecture 18 Othon Michail

Distributed Systems COMP 212. Lecture 18 Othon Michail Distributed Systems COMP 212 Lecture 18 Othon Michail Virtualisation & Cloud Computing 2/27 Protection rings It s all about protection rings in modern processors Hardware mechanism to protect data and

More information

OS10 Virtualization Guide. Enterprise Edition

OS10 Virtualization Guide. Enterprise Edition OS10 Virtualization Guide Enterprise Edition 2018-7 Rev. A00 Contents 1 OS10 software virtualization...4 2 Setup GNS3 server...7 3 Setup GNS3 client... 11 4 Start GNS3 client...16 5 Import OS10 appliance...20

More information

Securing Containers Using a PNSC and a Cisco VSG

Securing Containers Using a PNSC and a Cisco VSG Securing Containers Using a PNSC and a Cisco VSG This chapter contains the following sections: About Prime Network Service Controllers, page 1 Integrating a VSG into an Application Container, page 3 About

More information

Parallels Workstation 4.0 Extreme Read Me

Parallels Workstation 4.0 Extreme Read Me Parallels Workstation 4.0 Extreme Read Me Welcome to Parallels Workstation Extreme build 4.0.6740. This document contains the information you should know to successfully install Parallels Workstation Extreme

More information

What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet.

What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet. 1 INTRODUCTION What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet. Cloud computing encompasses any Subscriptionbased or pay-per-use

More information

Lecture 09: VMs and VCS head in the clouds

Lecture 09: VMs and VCS head in the clouds Lecture 09: VMs and VCS head in the Hands-on Unix system administration DeCal 2012-10-29 1 / 20 Projects groups of four people submit one form per group with OCF usernames, proposed project ideas, and

More information

MidoNet Scalability Report

MidoNet Scalability Report MidoNet Scalability Report MidoNet Scalability Report: Virtual Performance Equivalent to Bare Metal 1 MidoNet Scalability Report MidoNet: For virtual performance equivalent to bare metal Abstract: This

More information

Extremely Fast Distributed Storage for Cloud Service Providers

Extremely Fast Distributed Storage for Cloud Service Providers Solution brief Intel Storage Builders StorPool Storage Intel SSD DC S3510 Series Intel Xeon Processor E3 and E5 Families Intel Ethernet Converged Network Adapter X710 Family Extremely Fast Distributed

More information

Cloud Services. Introduction

Cloud Services. Introduction Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient

More information

VMware Workspace ONE UEM VMware AirWatch Cloud Connector

VMware Workspace ONE UEM VMware AirWatch Cloud Connector VMware AirWatch Cloud Connector VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

Version Installing your 3CX PBX

Version Installing your 3CX PBX Version 20160711 Installing your 3CX PBX Goal of this Module Installing 3CX Successfully Prerequisites Concepts of Networks FQDN Certificates Web Based Setup Wizard Pre-req: Operating Systems Windows Operating

More information

Hardware Sizing Guide OV

Hardware Sizing Guide OV Hardware Sizing Guide OV3600 6.3 www.alcatel-lucent.com/enterprise Part Number: 0510620-01 Table of Contents Table of Contents... 2 Overview... 3 Properly Sizing Processing and for your OV3600 Server...

More information

Distributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski Rutgers University Fall 2013 December 12, 2014 2013 Paul Krzyzanowski 1 Motivation for the Cloud Self-service configuration

More information

How to Deploy a VHD Virtual Test Agent Image in Azure

How to Deploy a VHD Virtual Test Agent Image in Azure How to Deploy a VHD Virtual Test Agent Image in Azure Executive Summary This guide explains how to deploy a Netrounds Virtual Test Agent as a virtual machine in Microsoft Azure. Table of Contents 1 Netrounds

More information

WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS

WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to

More information

F5 BIG-IQ Centralized Management andlinux KVM: Setup. Version 5.0

F5 BIG-IQ Centralized Management andlinux KVM: Setup. Version 5.0 F5 BIG-IQ Centralized Management andlinux KVM: Setup Version 5.0 Table of Contents Table of Contents Getting Started with BIG-IQ Virtual Edition...5 What is BIG-IQ Virtual Edition?...5 About BIG-IQ VE

More information

Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software

Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part

More information

Securing VMware NSX-T J U N E 2018

Securing VMware NSX-T J U N E 2018 Securing VMware NSX-T J U N E 2018 Securing VMware NSX Table of Contents Executive Summary...2 NSX-T Traffic [Control, Management, and Data]...3 NSX Manager:...7 NSX Controllers:...9 NSX Edge:...10 NSX-T

More information

Installation and Cluster Deployment Guide for KVM

Installation and Cluster Deployment Guide for KVM ONTAP Select 9 Installation and Cluster Deployment Guide for KVM Using ONTAP Select Deploy 2.6 November 2017 215-12637_B0 doccomments@netapp.com Updated for ONTAP Select 9.3 Table of Contents 3 Contents

More information

Kaspersky Security Center 10

Kaspersky Security Center 10 Kaspersky Security Center 10 Implementation Guide Application version: 10 Service Pack 2, Maintenance Release 1 Dear User, Thank you for your trust! We hope that this document will help you in your work

More information

Nested Virtualization and Server Consolidation

Nested Virtualization and Server Consolidation Nested Virtualization and Server Consolidation Vara Varavithya Department of Electrical Engineering, KMUTNB varavithya@gmail.com 1 Outline Virtualization & Background Nested Virtualization Hybrid-Nested

More information

Silicon House. Phone: / / / Enquiry: Visit:

Silicon House. Phone: / / / Enquiry:  Visit: Silicon House Powering Top Blue Chip Companies and Successful Hot Start Ups around the World Ranked TOP Performer among the registrars by NIXI Serving over 750000 clients in 90+ countries Phone: +91-7667-200-300

More information

Cymmetria MazeRunner INSTALLATION GUIDE

Cymmetria MazeRunner INSTALLATION GUIDE Cymmetria MazeRunner INSTALLATION GUIDE September 12, 2016 Supported environments (all must have nested virtualization enabled follow the links below to learn more) VMware Player (7 or higher) VMware Workstation

More information

Openvpn Client Do Not Change Default Gateway

Openvpn Client Do Not Change Default Gateway Openvpn Client Do Not Change Default Gateway I currently have a router using OpenVPN in client mode to connect to a host Is it possible to make OpenVPN the default gateway for everyone connected So what

More information

AC1600 Wireless Dual Band Gigabit VoIP VDSL/ADSL Modem Router

AC1600 Wireless Dual Band Gigabit VoIP VDSL/ADSL Modem Router AC1600 Wireless Dual Band Gigabit VoIP VDSL/ADSL Modem Router Powerful Wi-Fi and Gigabit Wired for a High-Speed Home 300Mbps + 1300Mbps Dual Band Wi-Fi Gigabit Ports VoIP (2 FXS ports) Beamforming Technology

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Designated Operating Environment

Designated Operating Environment Designated Operating Environment - 2018 Document Version: 2018-02-05 The material in this guide defines the Designated Operating Environment (DOE) for a NETLAB+ Virtual Edition (NETLAB+ VE) System as of

More information

Installing the Cisco CSR 1000v in KVM Environments

Installing the Cisco CSR 1000v in KVM Environments Installing the Cisco CSR 1000v in KVM Environments Kernel Virtual Machine Support Information, page 1 KVM Support on OpenStack, page 2 Installation Requirements for KVM Cisco IOS XE Fuji 16.7, page 2 Creating

More information

A Fine-grained Performance-based Decision Model for Virtualization Application Solution

A Fine-grained Performance-based Decision Model for Virtualization Application Solution A Fine-grained Performance-based Decision Model for Virtualization Application Solution Jianhai Chen College of Computer Science Zhejiang University Hangzhou City, Zhejiang Province, China 2011/08/29 Outline

More information

The spec. might change without notice Surveon is not liable for future spec change. Surveon NVR Selection

The spec. might change without notice Surveon is not liable for future spec change. Surveon NVR Selection The spec. might change without notice Surveon is not liable for future spec change Surveon NVR Selection Content How to Select a Suitable NVR Surveon NVR Selector Surveon NVR Introduction Appendix 1: NVR

More information

Advanced Network Routers. Datasheet. Model: ERPro-8, ER-8, ERPoe-5, ERLite-3. Sophisticated Routing Features

Advanced Network Routers. Datasheet. Model: ERPro-8, ER-8, ERPoe-5, ERLite-3. Sophisticated Routing Features Advanced Network Routers Model: ERPro-8, ER-8, ERPoe-5, ERLite-3 Sophisticated Routing Features Advanced Security, Monitoring, and Management High-Performance Gigabit Ports Advanced Routing Technology

More information

EMC XTREMCACHE ACCELERATES VIRTUALIZED ORACLE

EMC XTREMCACHE ACCELERATES VIRTUALIZED ORACLE White Paper EMC XTREMCACHE ACCELERATES VIRTUALIZED ORACLE EMC XtremSF, EMC XtremCache, EMC Symmetrix VMAX and Symmetrix VMAX 10K, XtremSF and XtremCache dramatically improve Oracle performance Symmetrix

More information

Virtualization. join, aggregation, concatenation, array, N 1 ühendamine, agregeerimine, konkateneerimine, massiiv

Virtualization. join, aggregation, concatenation, array, N 1 ühendamine, agregeerimine, konkateneerimine, massiiv Virtualization abstraction of computer resources may, but does not have to change the interface end-user has limited or no knowledge about the real resources behind the virtualization layer original /

More information

Installation and Cluster Deployment Guide

Installation and Cluster Deployment Guide ONTAP Select 9 Installation and Cluster Deployment Guide Using ONTAP Select Deploy 2.3 March 2017 215-12086_B0 doccomments@netapp.com Updated for ONTAP Select 9.1 Table of Contents 3 Contents Deciding

More information

Automated Deployment of Private Cloud (EasyCloud)

Automated Deployment of Private Cloud (EasyCloud) Automated Deployment of Private Cloud (EasyCloud) Mohammed Kazim Musab Al-Zahrani Mohannad Mostafa Moath Al-Solea Hassan Al-Salam Advisor: Dr.Ahmad Khayyat COE485 T151 1 Table of Contents Introduction

More information

IWAN APIC-EM Application Cisco Intelligent WAN

IWAN APIC-EM Application Cisco Intelligent WAN IWAN APIC-EM Application Cisco Intelligent WAN René og Per Cisco DK SE s Feb 23 th 2016 AVC MPLS Private Cloud 3G/4G-LTE Virtual Private Cloud Branch WAAS PfR Internet Public Cloud Control, Management,

More information

Guide to Vyatta Documentation

Guide to Vyatta Documentation VYATTA, INC. System Guide to Documentation Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada) COPYRIGHT Copyright 2005 2012, Inc. All rights reserved.

More information