Virtualization Education Environment

Size: px
Start display at page:

Download "Virtualization Education Environment"

Transcription

1 Virtualization Education Environment Project Plan Project Team: 15 Client: Dr. Daniels Advisor: Dr. Daniels Tasewell Fox Robert Goetz Jacob Phillips Submitted 3/1/2011

2 Table of Contents A. Executive Summary I. System Requirements 1. Problem Statement 2. Conceptual System 2.a) Concept Sketch 2.a-1: Fully Virtualized 2.a-2: Virtual Lab Virtualization Only 2.b) System Block Diagram 3. Functional Requirements 3.a) System Access 3.b) Open Source Technology 3.c) Creation/Configuration 3.d) Benchmarking 3.e) Hardware/Software Requirements 4. Non-functional Requirements 4.a) Hardware Access 4.b) Compatibility 4.c) Performance and Reliability 4.d) Security 4.e) Virtual Machines 5. Operating Environment and Constraints 5.a) Operating Hardware/Software 5.b) Nested Virtualization II. Project Management 1. Work breakdown and statement of work 1.a) Virtualization Education Environment statement of work 2. Project Schedule (Gantt Chart) 3. Resource Requirements (Budget) 4. Potential Risks and Mitigation 4.a) Delay of development hardware 4.b) Opensource possibilities and abilities 4.c) CSG Hardware 4.d) Unacceptable Performance III. Conclusion 1. End-product description and deliverables 1.a) Virtual Lab Implementation 1.b) Labs 1.c) Benchmarking Suite

3 2. References 3. Project Team Contact Information 3.a) Project Leader: Tasewell Fox 3.b) Web Master: Robert Goetz 3.c) Communications Officer: Jacob Phillips

4 A. Executive Summary The product is a virtualization lab environment (VLE) with a laboratory procedure for testing various systems related to virtualization. This project is needed because there is currently no lab for Cpr E 342 and the class cannot be taught to students until this is remedied. The proposed solution is to develop a VLE that can coexist either beside or on top of the current lab setup for Cpr E 308/489. This virtual lab environment will provide a virtual lab space for students to work as well as give them root access, something they would not have available to them in normal lab situations. At its core this project is a system integration, content development and deployment problem. At the conclusion of this project, there will be a complete VLE, benchmarking suite and a set of lab procedures to execute for the cpre 342 labs. The VLE will be provided to the Computer Service Group(CSG) to consider implementing throughout the lab.

5 I. System Requirements 1. Problem Statement A virtualization class has been created, but it is missing a lab portion. A series of labs must be developed, based around the existing lab infrastructure using nested virtualization. The labs require students to edit and create their own virtual machines. Some level of security must be present so an incorrectly configured virtual machine does not crash the session.

6 2. Conceptual System 2.a) Concept Sketch 2.a-1: Fully Virtualized In this system the operating system on the lab machines would be replaced with a type one hypervisor. This would allow the current lab configuration (308/489) to be moved to a virtual machine alongside the new virtual lab (Virt Lab). Inside the virtual lab would be a type two hypervisor which would provide access to the level two virtual machines.

7 2.a-2: Virtual Lab Virtualization Only In this system a type two hypervisor is used inside the current lab configuration (308/489). This allows the virtual lab (Virt Lab) to be virtualized inside the 308/489 configuration without modification.

8 2.b) System Block Diagram

9 3. Functional Requirements 3.a) System Access For this project system access must be restricted. Students will only be allowed root access on the Virt Lab virtual machine. Students will not be allowed root access on either the type one hypervisor or the 308/489 system. 3.b) Open Source Technology The second level of virtualization must be open source technology. 3.c) Creation/Configuration Students can create and configure multiple level 2 virtual machines, inside of the Virt Lab virtual machine. 3.d) Benchmarking Students must be able to run multi-level benchmarks. The benchmarks should include programs and techniques for the following: CPU\Memory Performance CPU Arithmetic Memory Access, Latency, and Bandwidth Disk Performance Read/Write speeds Data throughput Network Performance Network Status (can it reach outside the virtual environment) Network Latency Network Bandwidth [OPTIONAL]: If time allows, a unified system will be put in place that allows the benchmarks to be run from a single executable. This executable will have a graphical user interface, support for batch processing, and systems to view the results of a benchmark run. 3.e) Hardware/Software Requirements The system must run on Red Hat Enterprise Linux. The system must run on a PC using the Intel x86_64 architecture.

10 4. Non-functional Requirements 4.a) Hardware Access Since this hardware is owned by Iowa State and used as the primary laboratory for the Cpr E 308 and 489 courses, we will not have physical access to the machines. Any changes to the system must be pre-approved by CSG. 4.b) Compatibility The system must be compatible with the current CprE 308 / CprE 489 lab setup. Compatibility in this case means that both systems can coexist without interfering with the operation of the other. 4.c) Performance and Reliability Since this is a machine that will be used for education it is paramount that the system is stable and performance is acceptable. Performance shall be judged based upon the base hardware s performance vs. the virtual environment by using predetermined benchmarks. The parameters for acceptable performance are: For a system running a single level 1 virtual machine, that level 1 virtual machine shall not perform any less then 50% worse then the base hardware. A system running a single level 1 virtual machine and a single level 2 virtual machine, that level 2 virtual machine shall not perform any less then 70% worse then the base hardware. Stability shall be judged by these parameters: The VLE shall add no instabilities to the Cpr E 308/489 systems. A student that properly follows all instructions shall be able to complete the entire lab course without the system failing. 4.d) Security The VLE shall add no major security flaws to the current lab system. This requirement will be determined by CSG. 4.e) Virtual Machines The system must allow multiple nested (virtual machines inside virtual machines) virtual machines.

11 5. Operating Environment and Constraints 5.a) Operating Hardware/Software The operating environment is Red Hat Enterprise Linux on Intel_x86_64 with virtualization. We intend to boot the stuents/lab in a virtual machine, and then let the students create and edit the VM from within this sandbox. 5.b) Nested Virtualization No open source VM's have out of the box support for it Cascading memory access Context switching 5.c) Constraints Everything must conform to the Computer Service Group s standards and system in order to be approved. All software should be open source. It must run on Intel x86_64

12 6. Security, Safety, Intellectual Property, and Technology Considerations 6.a) Security Considerations Giving student the ability to recompile a kernel introduces some major security holes, even if it is in a vm. Student may have root access on the vm, thus introducing a whole set of ways they can introduce instabilities. Students will have full network access, as in 489. So the network must be secure Various unforeseen security issues that probably exist. 6.b) Safety Our software runs no critical systems. If, in the worst case, the network were to be compromised nobody would be physically injured. 6.c) Intellectual Property All software will be open source. (xen on kvm, xen on vbox) So, the intellectual property depends on the liscence. GPL is viral, so the whole project has to be gpl if even one piece of software is, I think. That means that IP belongs to the software developers, and we only own the labs. The setup of kvm on xen or whatever shouldn t be our IP. 6.d) Technology Considerations Many technologies and approaches can be used to analyze the usability and feasibility of our design of the virtualization lab. Tools are available to asses the performance of a nested virtualization system, but these can only be used after an initial design has been implemented. Testing is thus an important consideration, as we have many designs in consideration. Some of our methods may be considered new or innovative. Nesting a virtual machine appears to be a relatively new idea, or at least preliminary research yields few results on the subject. VMWare has only recently put forth a release capable of newsted virtualization.

13 II. Project Management 1. Work breakdown and statement of work 1.a) Virtualization Education Environment statement of work Task 1 - Problem Definition, Project Goals Subtask 1.a) - Determine requirements Subtask 1.b) - Formulate initial research ideas Subtask 1.c) - Identify potential early risks Task 2 - Research / Technological Considerations Subtask 2.a) - Determine feasibility of Project given current technology Subtask 2.b) - Examine viability of existing technologies for nested virtualization Subtask 2.c) - Examine viability of existing technologies for benchmark suite Subtask 2.d) - Determine possible solutions Subtask 2.e) - Select software candidates Task 3 - Virtualized Lab Environment Design Subtask 3.a) - Choose implementation Subtask 3.b) - Design the Virtualization Lab Environment Subtask 3.c) - Implement nested virtualization prototype Subtask 3.d) - Implement Virtualization Lab Environment prototype Subtask 3.e) - Present Virtualization Lab Environment prototype to client, and CSG Task 4 - Benchmark Suite subtask 4.a) - Choose suitable benchmark utilities Subtask 4.b) - Bundle benchmark utilities into a single suite

14 Subtask 4.c) - Design benchmark suite graphical interface [optional] Task 5 - Lab Procedure Design Subtask 5.a) - Write lab procedures Subtask 5.b) - Go to client for lab verification Subtask 5.c) - Implement Lab Procedures Task 6 - Virtualization Testing Subtask 6.a) - Test initial virtualization software candidates Subtask 6.b) - Test nested virtualization prototype Subtask 6.c) - Test Virtualization Lab Environment prototype Subtask 6.d) - Test Lab procedures using Virtualized Lab Environment Task 7 - Project Reporting Subtask 7.a) - Project powerpoint presentation Subtask 7.b) - Project Plan Subtask 7.c) - Design Document Subtask 7.d) - Weekly Reporting

15 2. Project Schedule (Gantt Chart)

16 3. Resource Requirements (Budget) Item With Labor Without Labor Hardware 2 Test Machines $800 Subtotal $800 Labor at $20 / hour Fox, Tasewell $3000 Goetz, Robert $2960 Phillips, Jacob $2920 Subtotal $8880 Total $9680 $800

17 4. Potential Risks and Mitigation 4.a) Delay of development hardware There is a serious risk that we will have to wait quite some time for hardware to begin test implementation. This risk can be partially mitigated by doing what testing we can on machines without hardware virtualization and using Robert Goetz s laptop whenever possible because it supports hardware virtualization. 4.b) Opensource possibilities and abilities There are a plethora of opensource virtualization sofware available which can make choosing the correct combination a potential risk. This can be mitigated by researching each choice thoroughly before making any design decisions. There is also the potential risk that this project will be impossible to implement with opensource technology. The only mitigation to this is to test as much software as possible to find a successful combination. If no combination is found go to the client and revise requirements. 4.c) CSG Hardware The hardware that this will be deployed on is owned and administered by CSG. Any changes we hope to make to those systems must first be authorized by CSG administrators. The only way to avoid this risk is to establish early lines of communication with CSG admins so they can advise us on potential problems early in the development cycle. 4.d) Unacceptable Performance Even with a successful implementation performance may be to poor to use. There is very little we can do to mitigate this risk. Good choices of software and implementations can help though.

18 III. Conclusion 1. End-product description and deliverables 1.a) Virtual Lab Implementation An implementation of the virtual lab setup that satisfies all functional and nonfunctional requirements of the project. This virtual lab implementation will be working on one test machine and ready to be implemented lab wide pending approval. 1.b) Labs A set of lab procedures for students that demonstrate various principles of virtualization outlined by the Cpr E 342 curriculum. 1.c) Benchmarking Suite A suite of programs that provide methods to benchmark all of the requirements set down in the functional requirement found in Section I, 3.d. 2. References Project Team Contact Information 3.a) Project Leader: Tasewell Fox Phone: (515) tjfox@iastate.edu 3.b) Web Master: Robert Goetz Phone: (630) rdgoetz@iastate.edu 3.c) Communications Officer: Jacob Phillips

19 Phone: (319)

CPRE491 Team Dec11 08 Project Plan

CPRE491 Team Dec11 08 Project Plan CPRE491 Team Dec11 08 Project Plan Introduction Write blockers are devices that allow acquisition of hard disk data without the possibility of accidental contamination by modification. A write blocker

More information

: XEN WORLDS: XEN AND THE ART OF COMPUTER ENGINEERING EDUCATION

: XEN WORLDS: XEN AND THE ART OF COMPUTER ENGINEERING EDUCATION 2006-2300: XEN WORLDS: XEN AND THE ART OF COMPUTER ENGINEERING EDUCATION Benjamin Anderson, Iowa State University Thomas Daniels, Iowa State University Dr. Thomas E. Daniels is an Assistant Professor in

More information

vmoodle: Virtual Machine based Online Learning Environment

vmoodle: Virtual Machine based Online Learning Environment : Virtual Machine based Online Learning Environment CIS4911 - Senior Project Mentor - Dr. Ming Zhao Professor - Tiana Solis Group Members Jose Hernandez Gisselle Ginarte Junior Bazile Diana Serpa Darien

More information

Detailed Design. Java Problem Repository & Education Platform JPREP

Detailed Design. Java Problem Repository & Education Platform JPREP Team Members: Luke Greiner Denis Kalic Abigail McCarthy Robert Tateo Nguyen Truong Patrick White Detailed Design Java Problem Repository & Education Platform JPREP Revision: 1.1 Date: 3/07/14 1 D e l t

More information

Project Name System Critical Design Review

Project Name System Critical Design Review Insert project logo Project Name System Critical Design Review Class Number Title Date Location This Critical Design Review assumes that the design team will be following a formalized design process. This

More information

MySQL Development Cycle

MySQL Development Cycle Abstract This document explains the MySQL Server development cycle. The purpose of the document is to facilitate community involvement, for example by providing feedback on pre-releases and making contributions

More information

10 Steps to Virtualization

10 Steps to Virtualization AN INTEL COMPANY 10 Steps to Virtualization WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Virtualization the creation of multiple virtual machines (VMs) on a single piece of hardware, where

More information

Understanding Virtual System Data Protection

Understanding Virtual System Data Protection Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing

More information

Spring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand

Spring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand Introduction to Virtual Machines Nima Honarmand Virtual Machines & Hypervisors Virtual Machine: an abstraction of a complete compute environment through the combined virtualization of the processor, memory,

More information

Elastic Compute Service. Quick Start for Windows

Elastic Compute Service. Quick Start for Windows Overview Purpose of this document This document describes how to quickly create an instance running Windows, connect to an instance remotely, and deploy the environment. It is designed to walk you through

More information

VMware Infrastructure 3 Primer Update 2 and later for ESX Server 3.5, ESX Server 3i version 3.5, VirtualCenter 2.5

VMware Infrastructure 3 Primer Update 2 and later for ESX Server 3.5, ESX Server 3i version 3.5, VirtualCenter 2.5 Update 2 and later for ESX Server 3.5, ESX Server 3i version 3.5, VirtualCenter 2.5 VMware Infrastructure 3 Primer Revision: 20090313 Item: EN-000021-02 You can find the most up-to-date technical documentation

More information

Virtual Machines Measure Up

Virtual Machines Measure Up Virtual Machines Measure Up Graduate Operating Systems, Fall 2005 Final Project Presentation John Staton Karsten Steinhaeuser University of Notre Dame December 15, 2005 Outline Problem Description Virtual

More information

provides easy monitoring of kvm

provides easy monitoring of kvm provides easy monitoring of kvm plug and play it monitoring of kvm virtualization platform 2012 Author: Andreas Månsson op5 Contents Executive Summary...1 Overview...2 The background...2 The solution...2

More information

Simplifying IT through Virtualization

Simplifying IT through Virtualization E X E C U T I V E S U M M A R Y G E T T E C H N O L O G Y R I G H T C U S T O M P U B L I S H I N G Microsoft-powered virtualization offers tremendous potential to help IT executives drive innovation while

More information

F5 BIG-IQ Centralized Management andlinux KVM: Setup. Version 5.0

F5 BIG-IQ Centralized Management andlinux KVM: Setup. Version 5.0 F5 BIG-IQ Centralized Management andlinux KVM: Setup Version 5.0 Table of Contents Table of Contents Getting Started with BIG-IQ Virtual Edition...5 What is BIG-IQ Virtual Edition?...5 About BIG-IQ VE

More information

Printed Circuit Board Development Automation

Printed Circuit Board Development Automation Printed Circuit Board Development Automation Project Plan Date Submitted: February 11, 2003 Project/Team Number: Dec 03-09 Team Members Colin Burnett Advisor Client Khawaja-Shahzad Butt Christopher Rieck

More information

Virtualization. Michael Tsai 2018/4/16

Virtualization. Michael Tsai 2018/4/16 Virtualization Michael Tsai 2018/4/16 What is virtualization? Let s first look at a video from VMware http://www.vmware.com/tw/products/vsphere.html Problems? Low utilization Different needs DNS DHCP Web

More information

VIRTUALIZATION PERFORMANCE: VMWARE VSPHERE 5 VS. RED HAT ENTERPRISE VIRTUALIZATION 3

VIRTUALIZATION PERFORMANCE: VMWARE VSPHERE 5 VS. RED HAT ENTERPRISE VIRTUALIZATION 3 VIRTUALIZATION PERFORMANCE: VMWARE VSPHERE 5 VS. RED HAT ENTERPRISE VIRTUALIZATION 3 When you invest in a virtualization platform, you can maximize the performance of your applications and the overall

More information

VMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions

VMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions VMware Enterprise Desktop Solutions Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions Agenda The Enterprise Desktop Market Assured Computing Environment (ACE) Virtual Desktop

More information

The Road to a Secure, Compliant Cloud

The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud Build a trusted infrastructure with a solution stack from Intel, IBM Cloud SoftLayer,* VMware,* and HyTrust Technology innovation

More information

Spring It takes a really bad school to ruin a good student and a really fantastic school to rescue a bad student. Dennis J.

Spring It takes a really bad school to ruin a good student and a really fantastic school to rescue a bad student. Dennis J. Operating Systems * *Throughout the course we will use overheads that were adapted from those distributed from the textbook website. Slides are from the book authors, modified and selected by Jean Mayo,

More information

Xen Summit Spring 2007

Xen Summit Spring 2007 Xen Summit Spring 2007 Platform Virtualization with XenEnterprise Rich Persaud 4/20/07 Copyright 2005-2006, XenSource, Inc. All rights reserved. 1 Xen, XenSource and XenEnterprise

More information

VMware vsphere: Install, Configure, Manage (vsphere ICM 6.7)

VMware vsphere: Install, Configure, Manage (vsphere ICM 6.7) VMware vsphere: Install, Configure, Manage (vsphere ICM 6.7) COURSE OVERVIEW: This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vsphere

More information

Xen and the Art of Virtualization. Nikola Gvozdiev Georgian Mihaila

Xen and the Art of Virtualization. Nikola Gvozdiev Georgian Mihaila Xen and the Art of Virtualization Nikola Gvozdiev Georgian Mihaila Outline Xen and the Art of Virtualization Ian Pratt et al. I. The Art of Virtualization II. Xen, goals and design III. Xen evaluation

More information

ENGINEERING AND TECHNOLOGY MANAGEMENT

ENGINEERING AND TECHNOLOGY MANAGEMENT Engineering and Technology Management 1 ENGINEERING AND TECHNOLOGY MANAGEMENT Master of Science in Engineering Technology Management Tim Hardin, PhD Director Brenda L. Johnson, MS Assistant Director OSU

More information

About Us. Innovating proven technology for practical security solutions

About Us. Innovating proven technology for practical security solutions Rethink Security About Us Innovating proven technology for practical security solutions Virtualization Security Application Security Platform Security Cross Domain Security Desktop Consolidation Case Study

More information

Virtualization Food Fight. Rik van Riel

Virtualization Food Fight. Rik van Riel Virtualization Food Fight Rik van Riel May 11, 2007 Virtualization Food Fight Upstream technologies are in flux Xen, KVM, paravirt_ops, VMI,... Technological differences, advantages and disadvantages What

More information

HP SDN Document Portfolio Introduction

HP SDN Document Portfolio Introduction HP SDN Document Portfolio Introduction Technical Solution Guide Version: 1 September 2013 Table of Contents HP SDN Document Portfolio Overview... 2 Introduction... 2 Terms and Concepts... 2 Resources,

More information

MODELING OF CPU USAGE FOR VIRTUALIZED APPLICATION

MODELING OF CPU USAGE FOR VIRTUALIZED APPLICATION e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 644-651 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com MODELING OF CPU USAGE FOR VIRTUALIZED APPLICATION Lochan.B 1, Divyashree B A 2 1

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.44-8.3.7.14 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

The only open-source type-1 hypervisor

The only open-source type-1 hypervisor Monika Danikáková What is Xen? The only open-source type-1 hypervisor For Unix and Unix-like OS Linux, NetBSD and OpenSolaris From ancient greek term Xenos (ξένος), guest-friends Developed by the University

More information

Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS

Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS Applied Technology Abstract This white paper describes tests in which Navisphere QoS Manager and

More information

Connecting with Computer Science Chapter 13 Review: Chapter Summary:

Connecting with Computer Science Chapter 13 Review: Chapter Summary: Connecting with Computer Science Chapter 13 Review: Chapter Summary: Software engineering involves many different steps to create an application that meets end user s needs. The process of building an

More information

Dan Noé University of New Hampshire / VeloBit

Dan Noé University of New Hampshire / VeloBit Dan Noé University of New Hampshire / VeloBit A review of how the CPU works The operating system kernel and when it runs User and kernel mode Device drivers Virtualization of memory Virtual memory Paging

More information

HPC learning using Cloud infrastructure

HPC learning using Cloud infrastructure HPC learning using Cloud infrastructure Florin MANAILA IT Architect florin.manaila@ro.ibm.com Cluj-Napoca 16 March, 2010 Agenda 1. Leveraging Cloud model 2. HPC on Cloud 3. Recent projects - FutureGRID

More information

Privilege Escalation

Privilege Escalation Privilege Coleman Kane Coleman.Kane@ge.com February 9, 2015 Security Vulnerability Assessment Privilege 1 / 14 root, or Privilege or Elevation is the act of gaining access to resources which were intended

More information

ISEAGE Network Specification and Report System

ISEAGE Network Specification and Report System ISEAGE Network Specification and Report System Project Plan Client ISU Information Assurance Center Faculty Adviser Dr. Douglas W. Jacobson Team May 05_25 David C. N. Rodgers Lijin Varghese Derek J. Light

More information

Chapter 5. The Database Life Cycle. Class 04: Topic 3.1: The Database Life Cycle

Chapter 5. The Database Life Cycle. Class 04: Topic 3.1: The Database Life Cycle Chapter 5 The Database Life 1 Database Design Life Database Life : all the events from the time the database is first proposed to the time it is retired from service Work is typically divided into project

More information

Certification Report

Certification Report Certification Report McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.1 Issued by: Communications

More information

Vess A2000 Series NVR Storage Appliance

Vess A2000 Series NVR Storage Appliance Vess A2000 Series NVR Storage Appliance Genetec Surveillance Solution www.promise.com www.promise.com www.promise.com Version 1.0 Version 1.0 Vess A2000 NVR Storage Appliance Promise Technology Contents

More information

IBM Emulex 16Gb Fibre Channel HBA Evaluation

IBM Emulex 16Gb Fibre Channel HBA Evaluation IBM Emulex 16Gb Fibre Channel HBA Evaluation Evaluation report prepared under contract with Emulex Executive Summary The computing industry is experiencing an increasing demand for storage performance

More information

F5 iworkflow and Linux KVM: Setup. Version 2.0.2

F5 iworkflow and Linux KVM: Setup. Version 2.0.2 F5 iworkflow and Linux KVM: Setup Version 2.0.2 Table of Contents Table of Contents Getting Started with iworkflow Virtual Edition... 5 What is iworkflow Virtual Edition?... 5 About iworkflow VE compatibility

More information

INNOV-4: Fun With Virtualization. Or, How I learned to love computers that don t really exist...

INNOV-4: Fun With Virtualization. Or, How I learned to love computers that don t really exist... 1 INNOV-4: Fun With Virtualization Or, How I learned to love computers that don t really exist... President, BravePoint, Inc. About Unix user since 1982 Progress developer since 1984 Linux Desktop and

More information

Engineering Design Notes I Introduction. EE 498/499 Capstone Design Classes Klipsch School of Electrical & Computer Engineering

Engineering Design Notes I Introduction. EE 498/499 Capstone Design Classes Klipsch School of Electrical & Computer Engineering Engineering Design Notes I Introduction EE 498/499 Capstone Design Classes Klipsch School of Electrical & Computer Engineering Topics Overview Analysis vs. Design Design Stages Systems Engineering Integration

More information

Introducing Cisco Cloud Administration CLDADM v1.0; 5 Days; Instructor-led

Introducing Cisco Cloud Administration CLDADM v1.0; 5 Days; Instructor-led Introducing Cisco Cloud Administration CLDADM v1.0; 5 Days; Instructor-led Course Description Introducing Cisco Cloud Administration (CLDADM) is a new 5-day ILT course designed to help students prepare

More information

Red Hat Enterprise Virtualization and KVM Roadmap. Scott M. Herold Product Management - Red Hat Virtualization Technologies

Red Hat Enterprise Virtualization and KVM Roadmap. Scott M. Herold Product Management - Red Hat Virtualization Technologies Red Hat Enterprise Virtualization and KVM Roadmap Scott M. Herold Product Management - Red Hat Virtualization Technologies INTRODUCTION TO RED HAT ENTERPRISE VIRTUALIZATION RED HAT ENTERPRISE VIRTUALIZATION

More information

An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform

An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform A B M Moniruzzaman, StudentMember, IEEE Kawser Wazed Nafi Syed Akther Hossain, Member, IEEE & ACM Abstract Cloud

More information

The LUCID Design Framework (Logical User Centered Interaction Design)

The LUCID Design Framework (Logical User Centered Interaction Design) The LUCID Design Framework (Logical User Centered Interaction Design) developed by Cognetics Corporation LUCID Logical User Centered Interaction Design began as a way of describing the approach to interface

More information

Objectives. Connecting with Computer Science 2

Objectives. Connecting with Computer Science 2 Objectives Learn how software engineering is used to create applications Learn some of the different software engineering process models Understand what a design document is and how it should be used during

More information

TRINITY PROJECT PROPOSAL. James DeBolt Valiant Tsang

TRINITY PROJECT PROPOSAL. James DeBolt Valiant Tsang TRINITY PROJECT PROPOSAL James DeBolt Valiant Tsang SYST 699 Spring 2017 Table of Contents 1. Introduction... 2 1.1. Background... 2 1.2. Problem Statement... 2 1.3. Scope... 2 1.4. Assumptions... 2 1.5.

More information

NVIDIA GRID. Ralph Stocker, GRID Sales Specialist, Central Europe

NVIDIA GRID. Ralph Stocker, GRID Sales Specialist, Central Europe NVIDIA GRID Ralph Stocker, GRID Sales Specialist, Central Europe rstocker@nvidia.com GAMING AUTO ENTERPRISE HPC & CLOUD TECHNOLOGY THE WORLD LEADER IN VISUAL COMPUTING PERFORMANCE DELIVERED FROM THE CLOUD

More information

High-performance aspects in virtualized infrastructures

High-performance aspects in virtualized infrastructures SVM 21 High-performance aspects in virtualized infrastructures Vitalian Danciu, Nils gentschen Felde, Dieter Kranzlmüller, Tobias Lindinger SVM 21 - HPC aspects in virtualized infrastructures 1/29/21 Niagara

More information

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3

More information

Can "scale" cloud applications "on the edge" by adding server instances. (So far, haven't considered scaling the interior of the cloud).

Can scale cloud applications on the edge by adding server instances. (So far, haven't considered scaling the interior of the cloud). Recall: where we are Wednesday, February 17, 2010 11:12 AM Recall: where we are Can "scale" cloud applications "on the edge" by adding server instances. (So far, haven't considered scaling the interior

More information

Re-configurable Ad-hoc Network to Track Points of Interest

Re-configurable Ad-hoc Network to Track Points of Interest Re-configurable Ad-hoc Network to Track Points of Interest Project Plan May 2012-07 September 28, 2011 Project Client: Jessica Miller Lockheed Martin, Advanced Development Programs Members: Benjamin J.

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

CLASSROOM REQUIREMENTS 7/26/2016

CLASSROOM REQUIREMENTS 7/26/2016 CLASSROOM REQUIREMENTS 7/26/2016 INTRODUCTION Fast Facts Meeting classroom requirements is critical for successful training events. Usually 1 PC per student with extra PCs for the instructor are required,

More information

Introducing ServerView Resource Orchestrator Express/Cloud Edition XOC Pack V1

Introducing ServerView Resource Orchestrator Express/Cloud Edition XOC Pack V1 Introducing ServerView Resource Orchestrator Express/Cloud Edition XOC Pack V1 Version 1.1.2 August 2014 Fujitsu Limited Product Overview Integrated monitoring of a virtualized collection of virtual machines

More information

HPE ProLiant DL360 Gen P 16GB-R P408i-a 8SFF 500W PS Performance Server (P06453-B21)

HPE ProLiant DL360 Gen P 16GB-R P408i-a 8SFF 500W PS Performance Server (P06453-B21) Digital data sheet HPE ProLiant DL360 Gen10 4110 1P 16GB-R P408i-a 8SFF 500W PS Performance Server (P06453-B21) ProLiant DL Servers What's new Innovative design with greater flexibility to mix and match

More information

"Charting the Course... MOC 6294 A Planning and Managing Windows 7 Desktop Deployments and Environments Course Summary

Charting the Course... MOC 6294 A Planning and Managing Windows 7 Desktop Deployments and Environments Course Summary Course Summary Description This course is intended for desktop administrators who want to specialize in desktop deployment, configuration, and management. In this course, students will learn how to plan

More information

Multi-tenancy Virtualization Challenges & Solutions. Daniel J Walsh Mr SELinux, Red Hat Date

Multi-tenancy Virtualization Challenges & Solutions. Daniel J Walsh Mr SELinux, Red Hat Date Multi-tenancy Virtualization Challenges & Solutions Daniel J Walsh Mr SELinux, Red Hat Date 06.28.12 What is Cloud? What is IaaS? IaaS = Infrastructure-as-a-Service What is PaaS? PaaS = Platform-as-a-Service

More information

Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services

Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services Max Planck Institute for Software Systems Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services 1, Rodrigo Rodrigues 2, Krishna P. Gummadi 1, Stefan Saroiu 3 MPI-SWS 1, CITI / Universidade

More information

Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization

Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization Forrester Total Economic Impact Study Commissioned by Red Hat January 2017 Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization Technology organizations are rapidly seeking

More information

EE 660: Computer Architecture Cloud Architecture: Virtualization

EE 660: Computer Architecture Cloud Architecture: Virtualization EE 660: Computer Architecture Cloud Architecture: Virtualization Yao Zheng Department of Electrical Engineering University of Hawaiʻi at Mānoa Based on the slides of Prof. Roy Campbell & Prof Reza Farivar

More information

BIG-IP Virtual Edition and Linux KVM: Setup. Version 12.1

BIG-IP Virtual Edition and Linux KVM: Setup. Version 12.1 BIG-IP Virtual Edition and Linux KVM: Setup Version 12.1 Table of Contents Table of Contents Getting Started with BIG-IP Virtual Edition on KVM...5 Steps to deploy BIG-IP VE...5 Prerequisites for BIG-IP

More information

QuickSpecs. HPE Workload Aware Security for Linux. Overview

QuickSpecs. HPE Workload Aware Security for Linux. Overview Overview (WASL) is a one-click security compliance tool designed to secure Operating System and Applications. It is based on open architecture supplemented by years of security expertise and HPE Intellectual

More information

Milestone Solution Partner IT Infrastructure Components Certification Report

Milestone Solution Partner IT Infrastructure Components Certification Report Milestone Solution Partner IT Infrastructure Components Certification Report Dell MD3860i Storage Array Multi-Server 1050 Camera Test Case 4-2-2016 Table of Contents Executive Summary:... 3 Abstract...

More information

Performance evaluation of private cloud computing with Eucalyptus

Performance evaluation of private cloud computing with Eucalyptus SCIS & ISIS 2010, Dec. 8-12, 2010, Okayama Convention Center, Okayama, Japan Performance evaluation of private cloud computing with Eucalyptus Kei Hirata 1, Akihiro Yamashita 1, Takayuki Tanaka 2, Masaya

More information

VMware vsan 6.6. Licensing Guide. Revised May 2017

VMware vsan 6.6. Licensing Guide. Revised May 2017 VMware 6.6 Licensing Guide Revised May 2017 Contents Introduction... 3 License Editions... 4 Virtual Desktop Infrastructure... 5 Upgrades... 5 Remote Office / Branch Office... 5 Stretched Cluster... 7

More information

Symantec Discovery. Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure

Symantec Discovery. Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure Symantec Discovery Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure OVERVIEW Symantec Discovery helps ensure Client Resilience by identifying and

More information

Welcome to Linux Foundation Virtual Training

Welcome to Linux Foundation Virtual Training Welcome to Linux Foundation Virtual Training by The Linux Foundation 06/04/2018 Version 7.3. All rights reserved. Connection information for class You will receive an email containing the specific login

More information

Administering VMware vsphere and vcenter 5

Administering VMware vsphere and vcenter 5 Administering VMware vsphere and vcenter 5 Course VM-05 5 Days Instructor-led, Hands-on Course Description This 5-day class will teach you how to master your VMware virtual environment. From installation,

More information

VMware Virtual SAN Technology

VMware Virtual SAN Technology VMware Virtual SAN Technology Today s Agenda 1 Hyper-Converged Infrastructure Architecture & Vmware Virtual SAN Overview 2 Why VMware Hyper-Converged Software? 3 VMware Virtual SAN Advantage Today s Agenda

More information

Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS

Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Applied Technology Abstract This white paper describes tests in which Navisphere QoS Manager and VMware s Distributed

More information

GUI Computer Simulator

GUI Computer Simulator Comp145 Client Contract I Team #8 GUI Computer Simulator Client: Dr. Frederick P. Brooks Jr. February 6, 2001 Team Members: Chris Bailey Ed Goode Andy Hans Cary Hall John Ehrhardt Preface: Note that this

More information

Zdeněk Kubala Senior QA

Zdeněk Kubala Senior QA (Kernel) Isolation PV, HVM, OS-V technologies in Linux Introduction and description of the isolation diferences between HM, PV and OS-level virt. technologies. Zdeněk Kubala Senior QA Engineer zkubala@suse.com

More information

VMware BCDR Accelerator Service

VMware BCDR Accelerator Service AT A GLANCE The rapidly deploys a business continuity and disaster recovery (BCDR) solution with a limited, pre-defined scope in a non-production environment. The goal of this service is to prove the solution

More information

Advanced Systems Security: Virtual Machine Systems

Advanced Systems Security: Virtual Machine Systems Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

Goliath Performance Monitor Frequently Asked Questions: Citrix XenServer

Goliath Performance Monitor Frequently Asked Questions: Citrix XenServer Goliath Performance Monitor Frequently Asked Questions: Citrix XenServer Document Date: May 2015 www.goliathtechnologies.com Legal Notices Inc. All rights reserved. www.goliathtechnologies.com Goliath

More information

Installing or Upgrading to 6.6 on a Virtual Appliance

Installing or Upgrading to 6.6 on a Virtual Appliance Installing or Upgrading to 6.6 on a Virtual Appliance Tech Note Copyright Copyright 2017 Hewlett Packard Enterprise Development LP. Open Source Code This product includes code licensed under the GNU General

More information

Windows Server Discussion with BCIU. Kevin Sullivan Management TSP US Education

Windows Server Discussion with BCIU. Kevin Sullivan Management TSP US Education Windows Server 2008 Discussion with BCIU Kevin Sullivan Management TSP US Education Kevin.sullivan@microsoft.com 1 Web Internet Information Services 7.0 Powerful Web Application and Services Platform Manage

More information

Computer Network Protocols: Myths, Missteps, and Mysteries. Dr. Radia Perlman, Intel Fellow

Computer Network Protocols: Myths, Missteps, and Mysteries. Dr. Radia Perlman, Intel Fellow Computer Network Protocols: Myths, Missteps, and Mysteries Dr. Radia Perlman, Intel Fellow It s not what you don t know that s the problem. It s what you do know that ain t true.mark Twain (?) 2 Network

More information

ITSS Model Curriculum. - To get level 3 -

ITSS Model Curriculum. - To get level 3 - ITSS Model Curriculum - To get level 3 - (Corresponding with ITSS V3) IT Skill Standards Center IT Human Resources Development Headquarters Information-Technology Promotion Agency (IPA), JAPAN Company

More information

Pentaho and Microsoft Azure

Pentaho and Microsoft Azure Pentaho and Microsoft Azure Change log (if you want to use it): Date Version Author Changes Contents Overview... 1 Before You Begin... 1 Terms You Should Know... 1 Other Prerequisites... 1 Best Practices

More information

DBaaS (Oracle and Open Source)

DBaaS (Oracle and Open Source) DBaaS (Oracle and Open Source) Vess Natchev vess@us.ibm.com Power Cloud Team Leader Systems Lab Services IBM Systems Lab Services Proven IT Infrastructure Expertise 1 Agenda Definition Life Cycle of Database

More information

EXPERIENCES WITH VIRTUALIZATION TECHNOLOGY IN EDUCATION

EXPERIENCES WITH VIRTUALIZATION TECHNOLOGY IN EDUCATION EXPERIENCES WITH VIRTUALIZATION TECHNOLOGY IN EDUCATION Timothy Bower Kansas State University at Salina 785-826-2920 tim@ksu.edu ABSTRACT This paper describes how virtualization technology was used to

More information

Citrix Ready Setup for XenDesktop on Datrium DVX

Citrix Ready Setup for XenDesktop on Datrium DVX Citrix Ready Setup for XenDesktop on Datrium DVX 385 Moffett Park Dr. Sunnyvale, CA 94089 844-478-8349 www.datrium.com Technical Report Introduction This document covers the setup and use of Citrix XenDesktop

More information

Team Amadeus: MAD Assembly Builder Design Review

Team Amadeus: MAD Assembly Builder Design Review Team Amadeus: MAD Assembly Builder Design Review Members: Wyatt Evans, Kyle Krueger, Melody Pressley, Evan Russell Mentor: Austin Sanders Sponsors: Dr. Hélène Coullon & Frédéric Loulergue 1 Team Introductions

More information

EE/CprE/SE 491 Senior Design I and Professionalism. Design Document

EE/CprE/SE 491 Senior Design I and Professionalism. Design Document EE/CprE/SE 491 Senior Design I and Professionalism Design Document Joseph Zambreno Electrical and Computer Engineering Iowa State University www.ece.iastate.edu/~zambreno rcl.ece.iastate.edu Always design

More information

Goal 1: Maintain Security of ITS Enterprise Systems

Goal 1: Maintain Security of ITS Enterprise Systems INFORMATION TECHNOLOGY SERVICES University Technology Administration, Infrastructure and Support Open Systems Infrastructure Calendar Year 2018 Overview The primary mission of Open Systems Infrastructure

More information

arcserve r16.5 Hybrid data protection

arcserve r16.5 Hybrid data protection arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements

More information

Ronny L. Bull & Dr. Jeanna Matthews. DerbyCon 4.0. Sept 27th, 2014

Ronny L. Bull & Dr. Jeanna Matthews. DerbyCon 4.0. Sept 27th, 2014 Layer 2 Network Security in Virtualized Environments Ronny L. Bull & Dr. Jeanna Matthews DerbyCon 4.0 Sept 27th, 2014 The Researchers Ronny Bull Computer Science Ph.D. Graduate Student at Clarkson University

More information

VMware vsphere 6.5 Boot Camp

VMware vsphere 6.5 Boot Camp Course Name Format Course Books 5-day, 10 hour/day instructor led training 724 pg Study Guide fully annotated with slide notes 243 pg Lab Guide with detailed steps for completing all labs 145 pg Boot Camp

More information

I.R.SNApp Image Reconstruction and Segmentation for Neurosurgery Applications

I.R.SNApp Image Reconstruction and Segmentation for Neurosurgery Applications SENIOR DESIGN PROJECT PLAN I.R.SNApp Image Reconstruction and Segmentation for Neurosurgery Applications May09 10 MEMBERS: William Lim Aaron Logan Dylan Reid Kyungchul Song Bill Zimmerman CLIENT AND FACULTY

More information

Distributed File System Support for Virtual Machines in Grid Computing

Distributed File System Support for Virtual Machines in Grid Computing Distributed File System Support for Virtual Machines in Grid Computing Ming Zhao, Jian Zhang, Renato Figueiredo Advanced Computing and Information Systems Electrical and Computer Engineering University

More information

Flex System FC port 16Gb FC Adapter Lenovo Press Product Guide

Flex System FC port 16Gb FC Adapter Lenovo Press Product Guide Flex System FC5022 2-port 16Gb FC Adapter Lenovo Press Product Guide The network architecture on the Flex System platform has been specifically designed to address network challenges, giving you a very

More information

Installation Prerequisites

Installation Prerequisites This chapter includes the following sections: Supported Platforms, page 1 Supported Web Browsers, page 2 Required Ports, page 2 System Requirements, page 3 Important Prerequisites for Installing Cisco

More information

CUBE. Configuration Management Report. Hakan Nizamoğlu Yiğitalp Ertem Murat Toprak Saim Güveloğlu

CUBE. Configuration Management Report. Hakan Nizamoğlu Yiğitalp Ertem Murat Toprak Saim Güveloğlu CUBE Configuration Management Report Configuration Management Report Hakan Nizamoğlu Yiğitalp Ertem Murat Toprak Saim Güveloğlu 2010 C U B E C O N F I G U R A T I O N M A N A G E M E N T R E P O R T Table

More information

GUI Computer Simulator

GUI Computer Simulator Comp145 UNC Chapel Hill Contract II GUI Computer Simulator Team #8 Client: Dr. Frederick P. Brooks Jr. and Prof. Greg Welch February 13, 2001 Dr. Frederick P. Brooks Jr. Chris Bailey [Admin] Ed Goode [Librarian]

More information

Network Behavior Analysis

Network Behavior Analysis N E T W O R K O P E R AT I O N S. S I M P L I F I E D. FORWARD ENTERPRISE HIGHLIGHTS Forward Networks is the leader in Intent-based Networking and network assurance to automate the analysis and verification

More information