Energy Efficiency in Office Computing Environments

Total Page:16

File Type:pdf, Size:1020Kb

Energy Efficiency in Office Computing Environments Fakulät für Informatik und Mathematik Universität Passau, Germany Energy Efficiency in Office Computing Environments Andreas Berl Supervisor: Hermann de Meer A thesis submitted for Doctoral Degree March 2011 1. Reviewer: Prof. Hermann de Meer Professor of Computer Networks and Communications University of Passau Innstr. 43 94032 Passau, Germany Email: [email protected] Web: http://www.net.fim.uni-passau.de 2. Reviewer: Prof. David Hutchison Director of InfoLab21 and Professor of Computing Lancaster University LA1 4WA Lancaster, UK Email: [email protected] Web: http://www.infolab21.lancs.ac.uk Abstract The increasing cost of energy and the worldwide desire to reduce CO2 emissions has raised concern about the energy efficiency of information and communica- tion technology. Whilst research has focused on data centres recently, this thesis identifies office computing environments as significant consumers of energy. Office computing environments offer great potential for energy savings: On one hand, such environments consist of a large number of hosts. On the other hand, these hosts often remain turned on 24 hours per day while being underutilised or even idle. This thesis analyzes the energy consumption within office computing environments and suggests an energy-efficient virtualized office environment. The office environment is virtualized to achieve flexible virtualized office resources that enable an energy-based resource management. This resource management stops idle services and idle hosts from consuming resources within the office and consolidates utilised office services on office hosts. This increases the utilisation of some hosts while other hosts are turned off to save energy. The suggested architecture is based on a decentralized approach that can be applied to all kinds of office computing environments, even if no centralized data centre infrastructure is available. The thesis develops the architecture of the virtualized office environment together with an energy consumption model that is able to estimate the energy consumption of hosts and network within office environments. The model enables the energy- related comparison of ordinary and virtualized office environments, considering the energy-efficient management of services. Furthermore, this thesis evaluates energy efficiency and overhead of the suggested approach. First, it theoretically proves the energy efficiency of the virtualized of- fice environment with respect to the energy consumption model. Second, it uses iii Markov processes to evaluate the impact of user behaviour on the suggested ar- chitecture. Finally, the thesis develops a discrete-event simulation that enables the simulation and evaluation of office computing environments with respect to vary- ing virtualization approaches, resource management parameters, user behaviour, and office equipment. The evaluation shows that the virtualized office environ- ment saves more than half of the energy consumption within office computing environments, depending on user behaviour and office equipment. iv Acknowledgements I would like to express my sincere gratitude to my supervisor, Prof. Hermann de Meer, for the continuous support, guidance, and valuable feedback I received during the last few years. He introduced me to the world of research, entrusted me with many interesting and challenging tasks, and taught me how to successfully write scientific publications. Furthermore, I would like to thank Prof. David Hutchison for enabling my four months DAAD scholarship at Lancaster University in 2009. He heavily supported my research with valuable discussions and brought me in contact with researchers of related fields. Especially, I want to thank Dr. Andreas Mauthe for his excellent supervision during my time in Lancaster and Gareth Tyson for most interesting dis- cussions and giving me guided Lancaster tours. I also want to thank Dr. Nicholas Race and Dr. Johnathan Ishmael for their help and cooperation. My special thanks go to all of my colleagues at the University of Passau. Specif- ically, I want to thank Andreas Fischer and Patrick Wüchner for their support, insightful discussions, and reviews of my thesis. Finally, I want to thank my wife Saskia for her support during the last two years, endless discussions, and helpful reviews. v Contents List of Figures xi List of Tables xiii List of Definitions xv List of Acronyms xvii List of Symbols xix 1 Introduction 1 1.1 Energy consumption within office computing environments . .1 1.2 Solution approach . .2 1.3 Contribution of this thesis . .3 1.4 Thesis structure . .5 2 Related Work 7 2.1 Virtualization . .7 2.1.1 Host virtualization . .8 2.1.2 Network virtualization . 13 2.2 Energy efficiency in distributed environments . 16 2.2.1 Power-management features of hosts . 16 2.2.2 Grid and cluster computing . 17 2.2.3 Future home environments . 18 2.2.4 Internet Suspend/Resume . 19 2.2.5 Office power management . 20 2.2.6 Terminal servers and virtual desktop infrastructures . 21 vii CONTENTS 2.2.7 Cloud computing . 23 2.3 Power consumption models . 25 2.3.1 Host models . 25 2.3.2 Networked architecture models . 27 3 Energy-Efficient Office Design 31 3.1 Energy-saving potential . 31 3.2 Design principles . 34 3.3 Requirements and challenges . 37 4 Virtualized Office Environment Architecture 43 4.1 Virtualization of office resources . 43 4.1.1 PDE execution environments . 44 4.1.2 PDE migration . 45 4.1.3 Distributed resource management . 49 4.2 PDE management . 56 4.2.1 Energy states of hosts and PDEs . 56 4.2.2 Energy-optimal PDE management . 57 4.2.3 Service-optimal PDE management . 66 4.2.4 Energy and service-aware PDE management . 70 4.2.5 Energy efficiency and availability trade-off . 76 4.3 Resilience and security issues . 78 4.4 Architecture overview . 79 5 Energy Consumption Model 83 5.1 Host power consumption model . 84 5.1.1 Power consumption characteristic . 84 5.1.2 Ordinary host model . 87 5.1.3 Virtualized host model . 88 5.2 Network power consumption model . 90 5.2.1 Power consumption characteristic . 90 5.2.2 Ordinary network model . 91 5.2.3 Virtualized network model . 91 5.3 Office energy consumption . 93 viii CONTENTS 5.4 Energy efficiency proof . 94 6 Evaluation 99 6.1 User model . 100 6.2 Markov process . 102 6.2.1 Work time scenario and modelling . 103 6.2.2 PDE management . 103 6.2.3 Evaluation . 104 6.2.4 Conclusions . 110 6.3 Discrete-event simulation . 110 6.3.1 DES implementation and validation . 111 6.3.2 Parameter settings . 112 6.3.3 Evaluation . 117 6.3.4 Conclusions . 131 6.4 Measurements . 132 6.4.1 Power meter and systems under test . 132 6.4.2 Validation of the energy consumption model . 133 6.4.3 Energy states and PDE migration . 136 6.4.4 Conclusions . 137 7 Conclusions and Future Work 139 7.1 Main contributions and results . 139 7.2 Application and practical implications . 141 7.3 Possible extensions and integration with other solutions . 142 References 145 ix List of Figures 2.1 Aggregation and splitting of hardware resources . .8 2.2 Layers of system virtualization . 10 2.3 The eDonkey architecture . 15 2.4 FHE architecture . 19 3.1 Ordinary and energy-efficient office environment . 36 3.2 Data centres, office environments, and home environments [74] . 37 4.1 PDEs encapsulated within VMs . 44 4.2 Migration of a PDE . 47 4.3 A centralized P2P-overlay approach . 51 4.4 A pure P2P-overlay approach . 52 4.5 A hybrid P2P-overlay approach . 55 4.6 PDE utilisation states . 59 4.7 Lower bound of active hosts within different office environments . 65 4.8 PDE service within an ordinary office environment . 68 4.9 PDE service within a virtualized office environment . 69 4.10 Extended PDE utilisation states . 72 4.11 Architecture overview . 80 4.12 Ordinary and virtualized office environment . 81 5.1 Power consumption of servers and office hosts . 85 5.2 Power consumption of an ordinary host . 87 5.3 Power consumption of a virtualized host . 90 5.4 Power consumption of a virtualized network . 93 xi LIST OF FIGURES n Cidle 5.5 Relation of mean consolidation ratio and m := h ............... 96 Cidle 6.1 User model . 102 6.2 User and work time scenario modelled as generalised stochastic Petri net . 104 6.3 Probability of jobs . 106 6.4 Probability of remote users . 106 6.5 Probability that users turn their host off over night . 107 6.6 Interaction period . 108 6.7 Period without interaction . 108 6.8 Probability of jobs, with premote = 0 ....................... 109 6.9 Probability of remote users, with p job = 0.................... 109 6.10 Probability of remote users in the Markov process . 112 6.11 Probability of remote users in the DES . 112 6.12 Mean consolidation ratio, StrictTime scenario and ch = 2............ 118 6.13 Mean service ratio, StrictTime scenario and ch = 2 ............... 119 6.14 Mean service ratio between 7:50 h and 8:10 h, StrictTime scenario, ch = 2 . 119 6.15 Evaluation function, StrictTime scenario, ch = 2, a = 1, b = 2 . 120.
Recommended publications
  • Evaluating and Optimizing I/O Virtualization in Kernel-Based Virtual Machine (KVM)
    Evaluating and Optimizing I/O Virtualization in Kernel-based Virtual Machine (KVM) Binbin Zhang1, Xiaolin Wang1, Rongfeng Lai1, Liang Yang1, Zhenlin Wang2, Yingwei Luo1, and Xiaoming Li1 1 Dept. of Computer Science and Technology, Peking University, Beijing, China, 100871 2 Dept. of Computer Science, Michigan Technological University, Houghton, USA {wxl,lyw}@pku.edu.cn, [email protected] Abstract. I/O virtualization performance is an important problem in KVM. In this paper, we evaluate KVM I/O performance and propose several optimiza- tions for improvement. First, we reduce VM Exits by merging successive I/O instructions and decreasing the frequency of timer interrupt. Second, we simplify the Guest OS by removing redundant operations when the guest OS operates in a virtual environment. We eliminate the operations that are useless in the virtual environment and bypass the I/O scheduling in the Guest OS whose results will be rescheduled in the Host OS. We also change NIC driver’s con- figuration in Guest OS to adapt the virtual environment for better performance. Keywords: Virtualization, KVM, I/O Virtualization, Optimization. 1 Introduction Software emulation is used as the key technique in I/O device virtualization in Ker- nel-based Virtual Machine (KVM). KVM uses a kernel module to intercept I/O re- quests from a Guest OS, and passes them to QEMU, an emulator running on the user space of Host OS. QEMU translates these requests into system calls to the Host OS, which will access the physical devices via device drivers. This implementation of VMM is simple, but the performance is usually not satisfactory because multiple environments are involved in each I/O operation that results in multiple context switches and long scheduling latency.
    [Show full text]
  • Oracle Solaris: the Carrier-Grade Operating System Technical Brief
    An Oracle White Paper February 2011 Oracle Solaris: The Carrier-Grade Operating System Oracle White Paper—Oracle Solaris: The Carrier-Grade OS Executive Summary.............................................................................1 ® Powering Communication—The Oracle Solaris Ecosystem..............3 Integrated and Optimized Stack ......................................................5 End-to-End Security ........................................................................5 Unparalleled Performance and Scalability.......................................6 Increased Reliability ........................................................................7 Unmatched Flexibility ......................................................................7 SCOPE Alliance ..............................................................................7 Security................................................................................................8 Security Hardening and Monitoring .................................................8 Process and User Rights Management...........................................9 Network Security and Encrypted Communications .......................10 Virtualization ......................................................................................13 Oracle VM Server for SPARC .......................................................13 Oracle Solaris Zones .....................................................................14 Virtualized Networking...................................................................15
    [Show full text]
  • Tampere University Research Portal
    Tampereen teknillinen yliopisto. Julkaisu 800 Tampere University of Technology. Publication 800 Francis Tam Service Availability Standards for Carrier-Grade Platforms: Creation and Deployment in Mobile Networks Thesis for the degree of Doctor of Technology to be presented with due permission for public examination and criticism in Tietotalo Building, Auditorium TB222, at Tampere University of Technology, on the 15th of May 2009, at 12 noon. Tampereen teknillinen yliopisto - Tampere University of Technology Tampere 2009 ISBN 978-952-15-2134-8 (printed) ISBN 978-952-15-2158-4 (PDF) ISSN 1459-2045 Abstract The rapid development of the mobile network industry has raised considerably the expectations and requirements of the whole chain of stakeholders, from the end users through the mobile network operators and ultimately to the network equipment providers. A key expectation from an end user is service availability, which is a perception that services are continuously operational even in the presence of failures in the mobile network. Network equipment providers have been using carrier-grade platforms to provide various support functions including high availability as reusable assets for products creation. The term carrier-grade refers to a class of systems used in public telecommunications network that deliver up to five nines or six nines (99.999% or 99.9999%) availability. The convergence of communications and information technology in the industry has led to more competition and pressure to reduce development efforts. By creating a service availability standard, Commercial Off-The-Shelf (COTS) software can be bought and integrated into a carrier-grade platform, enabling a company to focus on the core business and concentrate the resource investment onto new innovations.
    [Show full text]
  • Virtualizing Your Network: Benefits & Challenges
    Network Monitoring Technology Virtualizing Your Network: Benefits & Challenges What is Virtualization? factory or process plant. Virtualization can give this software Gartner Research1 defined network virtualization as the a longer operating lifecycle time, and can save both costs process of combining hardware and software network and intellectual property. resources and functionality into a single virtual network. This offers access to routing features and data streams that can provide newer, service-aware, resilient solutions; newer security services that are native within network elements; support for subscriber-aware policy control for peer-to- peer traffic management; and application-aware, real-time session control for converged voice and video applications with guaranteed bandwidth on-demand. For the most part, when we speak of virtualization, we speak of hardware virtualization. That means that we create, on a host machine, a virtual machine that looks like another computer with an operating system and software. The software on the virtual machine is separate from the host machine’s resources, and as far as it is concerned, it is running on its own computer (that we call the guest). Both in information technology (IT) and in operational technology (OT) environments the benefits of virtualization have led to its rapid adoption. This white paper is not a prescriptive guide to network virtualization, rather it is a high-level overview focused on the benefits and challenges of network virtualization. While it will Desktop virtualization separates the logical desktop from review the benefits, it will also cover the specific challenges the actual hardware. Virtual desktop infrastructure (VDI) network administrators and their respective businesses should permits the user to interact with the computer through understand to cost-effectively apply this technology to gain another host computer or device on a network connection.
    [Show full text]
  • Wireless Network Virtualization: Ensuring Carrier Grade Availability
    ™ AN INTEL COMPANY Wireless Network Virtualization: Ensuring Carrier Grade Availability WHEN IT MATTERS, IT RUNS ON WIND RIVER WIRELESS NETWORK VIRTUALIZATION: ENSURING CARRIER GRADE AVAILABILITY EXECUTIVE SUMMARY The wireless industry’s battle to acquire new subscribers and retain existing ones is accelerating the need for new services. Profit margins are under pressure from the increased infrastructure and operations costs required to satisfy the growing demand. Network functions virtualization (NFV), a rapidly growing initiative in telecom networks, promises to revolutionize how networks are architected and managed. It allows communications service providers (CSPs) to virtualize network functions and consolidate them on standard off-the-shelf servers. Although 4G LTE is effective at meeting the increasing bandwidth demands at lower costs than its predecessors, its mobile base station, E-UTRAN Node B (eNB), located at the edge of the radio access network (RAN), is underutilized at certain times of the day and has grown in complexity, resulting in higher downtime and field maintenance costs. As a result, the eNB is a good candidate for NFV. Cloud-RAN (C-RAN) is the virtualization of the eNB’s control plane and data plane functions, consolidating it in one or more data centers. The result is significantly higher equipment utilization, cost-efficient redundancy to achieve high availability, and lower operations and maintenance costs. However, to realize these benefits, the foundation for virtualized eNBs must be a robust, carrier grade NFV platform that incorporates advanced fault management features. Poor implementation results in lower quality execution with excessive outage and maintenance costs. Wind River® Titanium Cloud is the industry’s first NFV-ready solution that incorporates advanced carrier grade fault, security, performance, and network management features.
    [Show full text]
  • Carrier Grade Virtualization
    Carrier Grade Virtualization Leveraging virtualization in Carrier Grade Systems Abstract Network Equipment Providers (NEPs) have been building networking infrastructure equipment able to deliver “carrier grade” services, typically mission-critical services such as voice telephony. In decades past, NEPs have achieved high degrees of availability through purpose-built hardware and software implementations. Today they increasingly build on COTS (Commercial Off The Shelf) hardware and Open Source Software (OSS), freeing their engineering resources to focus on core telephony competencies. The move to COTS and OSS requires that these hardware and software components be available from an ecosystem of suppliers, and that they interoperate seamlessly. Bodies such as The Linux Foundation (LF), the Service Availability Forum (SA Forum) and PICMG have defined standards and specifications such as carrier grade OSes (CGLinux), Service Availability Forum APIs and AdvancedTCA hardware to target carrier grade applications. Recent advances have made virtualization appealing for carrier class equipment by permitting significant cost reduction through consolidation of workloads and of physical hardware. Virtualization also transparently lets NEPs and other OEMs (Original Equipment Manufacturers) leverage multi-core processors to run legacy software designed for uniprocessor hardware. However, virtualization needs to meet specific requirements to enable network equipment deploying this technology to meet industry expectations for carrier grade systems. This
    [Show full text]
  • Carrier Grade Linux Requirements Definition
    Carrier Grade Linux Requirements Definition The Linux Foundation Version 5.0 1796 18th Street S u i t e C Prepared by the Carrier Grade Linux Working Group San Francisco CA 94107, USA Copyright (c) 2005, 2006, 2007, 2011 by The Linux +1 (415) 723 - 9 7 0 9 Foundation. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, v1.0 or later (the latest version is available at http://www.opencontent.org/opl.shtml/). Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Linux is a Registered Trademark of Linus Torvalds. Other company, product, or service names may be the trademarks of others. CONTRIBUTORS TO THE CGL 5.0 REQUIREMENTS DEFINITION INCLUDE (IN ALPHABETICAL ORDER): Last Name First Name Company Anderson Matt HP Anderson Tim MontaVista Software Awad Majid Intel Aziz Khalid HP Badovinatz Peter IBM Bozarth Brad Cisco Cauchy Dan MontaVista Software Chacron Eric Alcatel Chen Terence Intel Cherry John OSDL Christopher Johnson Sun Microsystems Cihula Jospeh Intel Cress Andrew Intel Dague Sean IBM Dake Steven MontaVista Software Flaxa Ralf Novell Fleischer Julie Intel Fleischer Julie OSDL Fox Kevin Sun Microsystems Gross Mark Intel Haddad Ibrahim Ericsson Heber Troy HP Howell David P. Intel Hu Michael Radisys Ikebe Takashi NTT Ishitsuka Seiichi NEC Jagana Venkata IBM Johnson Christopher P. Sun Microsystems Kevin Fox Sun Microsystems Kimura Masato NTT Comware Krauska Joel Cisco Kukkonen Mika Nokia La Monte.H.P Yarrol Timesys Lavonius Ville Nokia Liu Bing Wei Intel Lynch Rusty Intel * MacDonald Joe Wind River Systems Manas Saksena Timesys Nakayama Mitsuo NEC Peter-Gonzalez Inaky Intel Pourzandi Makan Ericsson Rossi Frederic Eicsson Saksena Manas Timesys Sakuma Junichi OSDL Saskena Manas Timesys Seiler Glenn Wind River Systems Smarduch Mario Motorola Takamiya Noriaki NTT Software Weijers Gé Witham Timothy D.
    [Show full text]
  • Network Virtualization for Dummies®, Vmware Special Edition Published by John Wiley & Sons, Inc
    These materials are © 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Network Virtualization VMware Special Edition by Mora Gozani These materials are © 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Network Virtualization For Dummies®, VMware Special Edition Published by John Wiley & Sons, Inc. 111 River St. Hoboken, NJ 07030‐5774 www.wiley.com Copyright © 2016 by John Wiley & Sons, Inc., Hoboken, New Jersey No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748‐6011, fax (201) 748‐6008, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. VMware, vSphere, and vRealize are registered trademarks and VMware NSX and VMware vRealize Operations, and vRealize Automation are trademarks of VMware, Inc. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associ- ated with any product or vendor mentioned in this book.
    [Show full text]
  • Read Book Hyper-V Network Virtualization Cookbook Ebook
    HYPER-V NETWORK VIRTUALIZATION COOKBOOK PDF, EPUB, EBOOK Ryan Boud | 228 pages | 02 Dec 2014 | Packt Publishing Limited | 9781782177807 | English | Birmingham, United Kingdom Hyper-V Network Virtualization Cookbook PDF Book In , Slack faced a problem: the load on its backend servers had increased by 1,x. The Best Tech Newsletter Anywhere Join , subscribers and get a daily digest of news, geek trivia, and our feature articles. Case studies How Slack rearchitected its system to achieve zero downtime and improve latency, reliability and availability In , Slack faced a problem: the load on its backend servers had increased by 1,x. For one thing, VPN servers are located all over the world. We still need to add the other hard drives. Each IDE Controller only has two slots available for adding drives. Networking Fundamentals Read how we developed our new breakthrough NLP-powered feature. The Best Tech Newsletter Anywhere Join , subscribers and get a daily digest of news, geek trivia, and our feature articles. Here is how to change what gets switched back on. Now navigate to the exported virtual machine and be sure to select folder that your virtual machine was exported into. Since we launched in , our articles have been read more than 1 billion times. Security and privacy are big concerns these days, particularly when it comes to dealing with sensitive information on the internet. The wizard allows the disk geometry to be changed, which can be handy if a drive has become close to full and a little more breathing room is needed. By submitting your email, you agree to the Terms of Use and Privacy Policy.
    [Show full text]
  • Provisioning Service Differentiation for Virtualized Network Devices
    ICNS 2011 : The Seventh International Conference on Networking and Services Provisioning Service Differentiation for Virtualized Network Devices Suk Kyu Lee, Hwangnam Kim, Jun-gyu Ahn, Kwang Jae Sung, and Jinwoo Park School of Electrical Engineering Korea University, Seoul, Republic of Korea Email: {sklee25, hnkim, dubhe, kjsung80, jwpark}@korea.ac.kr Abstract— In order to efficiently utilize the network bandwidth the existing works (that are described in Section II), many of and flexibly enable one or more networks to be combined or the virtualization techniques have been focused on the fairness subdivided into virtual networks, it is essential to virtualize among virtual machines’ CPU and I/O. network devices and then to provide service differentiation for the virtualized network devices. In this paper, we propose a virtualizing method for network devices based on the virtual machine and offers a differentiated scheduling scheme to satisfy QoS requirements that are imposed on virtualized devices. We have built the network virtualization framework combining the Virtual Box, time-slot-based time-sharing scheme, and leaky- bucket controller, and then we have conducted a performance evaluation study with real testbed. The empirical study indicates that the service differentiation for virtualized network devices is successfully supported by the proposed framework. Keywords - Network Virtualization, Scheduling Policy, Virtual Box, Virtual Machine I. INTRODUCTION Figure 1. Comparison of network resource usage between two virtual machines without any scheduling scheme. There has been a large improvement in the field of However, there has not been much research conducting on virtualization in the past decade. As noted by Goldberg [7], how to provide service differentiation for the network the idea of the virtual machine emerged around 1970s, but, resources.
    [Show full text]
  • Virtualization Basics: Understanding Techniques and Fundamentals
    Virtualization Basics: Understanding Techniques and Fundamentals Hyungro Lee School of Informatics and Computing, Indiana University 815 E 10th St. Bloomington, IN 47408 [email protected] ABSTRACT example of growing involvement in virtualization technolo- Virtualization is a fundamental part of cloud computing, gies with the cloud. Early technologies and developments especially in delivering Infrastructure as a Service (IaaS). in the virtualization have been accomplished by some com- Exploring different techniques and architectures of the vir- panies such as IBM from 1967 and VMware from 1998. In tualization helps us understand the basic knowledge of virtu- open source communities, Xen, KVM, Linux-vServer, LXC alization and the server consolidation in the cloud with x86 and others have supported virtualization in different plat- architecture. This paper describes virtualization technolo- forms with different approaches. In this paper, x86 archi- gies, architectures and optimizations regarding the sharing tecture virtualization will be discussed with these historical CPU, memory and I/O devices on x86 virtual machine mon- changes. itor. In cloud computing, Infrastructure-as-a-Service (IaaS) pro- vides on-demand virtual machine instances with virtualiza- Categories and Subject Descriptors tion technologies. IaaS has been broadly used to provide re- C.0 [General]: Hardware/software interface; C.4 [Performance quired compute resources in shared resource environments. of systems]: Performance attributes; D.4.7 [Operating Amazon Web Services (AWS), Google Compute Engine, Mi- Systems]: Organization and design crosoft Windows Azure, and HP Cloud offer commercial cloud services. OpenStack, Eucalyptus, SaltStack, Nimbus, General Terms and many others provide private open source cloud plat- Performance, Design forms with community support in development.
    [Show full text]
  • Data Center Server Virtualization Solution Using Microsoft Hyper-V
    St. Cloud State University theRepository at St. Cloud State Culminating Projects in Information Assurance Department of Information Systems 5-2017 Data Center Server Virtualization Solution Using Microsoft yH per-V Sujitha Dandu St Cloud State University, [email protected] Follow this and additional works at: https://repository.stcloudstate.edu/msia_etds Recommended Citation Dandu, Sujitha, "Data Center Server Virtualization Solution Using Microsoft yH per-V" (2017). Culminating Projects in Information Assurance. 23. https://repository.stcloudstate.edu/msia_etds/23 This Starred Paper is brought to you for free and open access by the Department of Information Systems at theRepository at St. Cloud State. It has been accepted for inclusion in Culminating Projects in Information Assurance by an authorized administrator of theRepository at St. Cloud State. For more information, please contact [email protected]. Datacenter Server Virtualization Solution Using Microsoft Hyper-V by Sujitha Dandu A Starred Paper Submitted to the Graduate Faculty of St. Cloud State University in Partial Fulfillment of the Requirements for the Degree of Master of Information Assurance February, 2017 Starred Paper Committee: Dr. Dennis Guster, Chairperson Dr. Susantha Herath Dr. Balasubramanian Kasi 2 Abstract Cloud Computing has helped businesses scale within minutes and take their services to their customers much faster. Virtualization is considered the core-computing layer of a cloud setup. All the problems a traditional data center environment like space, power, resilience, centralized data management, and rapid deployment of servers as per business need have been solved with the introduction of Hyper-V (a server virtualization solution from Microsoft). Now companies can deploy multiple servers and applications with just a click and they can also centrally manage the data storage.
    [Show full text]