Non-Intrusive Virtual Systems Monitoring by Sahil Suneja a Thesis

Total Page:16

File Type:pdf, Size:1020Kb

Non-Intrusive Virtual Systems Monitoring by Sahil Suneja a Thesis Non-intrusive Virtual Systems Monitoring by Sahil Suneja A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Computer Science University of Toronto c Copyright 2016 by Sahil Suneja Abstract Non-intrusive Virtual Systems Monitoring Sahil Suneja Doctor of Philosophy Graduate Department of Computer Science University of Toronto 2016 In this thesis, I discuss why existing intrusive systems monitoring approaches are not a good fit for the modern virtualized cloud, and describe two alternative out-of-band solutions that leverage virtualization for better systems monitoring. My first solution employs Virtual Machine Introspection (VMI) to gain access to a VM's runtime state from the virtualization layer. I develop new VMI techniques to efficiently expose VM memory state from outside the VM boundary, which can be readily employed in existing cloud platforms as they are designed to operate with no new modifications or dependencies. While there exist a variety of other competing alternatives, their latency, overhead, complexity and consistency trade-offs are not clear. Thus, I begin my thesis with addressing this gap by organizing the various existing VMI techniques into a taxonomy based upon their operational principles, and performing a thorough exploration of their trade-offs both qualitatively and quantitatively. I further present a deep dive on VMI consistency aspects to understand the sources of inconsistency in observed VM state, and show marginal benefits for consistency with commonly employed VMI solutions despite their prohibitive overheads. Then, I present NFM (Near Field Monitoring)- a new approach that decouples system execution from monitoring by pushing monitoring components out of the target systems' scope. By extending and combining VMI with a backend cloud analytics platform, NFM provides simple, standard interfaces to monitor running systems in the cloud that require no guest cooperation or modification, and have minimal effect on guest execution. By decoupling monitoring and analytics from target system context, NFM provides always-on monitoring, even when the target system is unresponsive. My second solution- CIVIC (Cloning and Injection based VM Inspection and Customization)- avoids NFM's functionality duplication effort and overcomes its VMI-related limitations arising out of its raw memory byte level visibility into the guest. CIVIC operates at a logical OS level and reuses the vast stock monitoring software codebase, but in a separate isolated environment thus avoiding guest intrusion and interference hassles. CIVIC enables a broader usage scope in addition to NFM's passive (read-only) monitoring, by supporting actuation or on-the-fly introduction of new functionality. It restricts all impact and side- effects of such customization operations inside a live clone of the guest VM. New functionality over the ii replicated VM state is introduced using code injection. I present four applications built on top of NFM using its `systems as data' monitoring approach, to showcase its capabilities for across-systems and across-time analytics. I also highlight CIVIC's versatility in terms of enabling hotplugged and impact-free live customization, by employing it to monitor, inspect, troubleshoot and tune unmodified VMs. iii Acknowledgements I express my sincere gratitude to Prof. Eyal de Lara for steering me towards the successful completion of this voyage of exploration. I've learnt a great many things from him, and I could not have asked for a more supportive supervisor. I am thankful to my committee members- Prof. Angela Demke Brown, Prof. Bianca Schroeder, and Prof. Ryan Johnson- for their guidance and backing. I owe a great deal of gratitude to my mentors at IBM Research- Dr. Canturk Isci and Dr. Vasanth Bala- for their encouragement, collaboration and contribution to this work. I also want to thank all members of the DCS Graduate Office for facilitating a smoothly functioning work environment. During the course of my journey I've been helped by so many of them, that I'm afraid I'll miss out on any names if I start listing them here! A note of thanks also to my fellow graduate students and faculty members. I've always been in awe of their brilliance and dedication, which has humbled me and motivated me to strive hard. My sincere gratitude and respect to my parents- Mr. S.K. Suneja and Mrs. Vandna Suneja- for their love, affection and emotional support, encouraging me to put in my sincere efforts. A very special thanks to my brother, Sagar Suneja, for pushing me forward during the last mile. Thanks also to my friends for their help and support throughout my time in Toronto. It would be unfair not to thank the numerous stackoverflow.com users for sharing their technical knowledge! Finally, Thank you God for all of the above! Sahil Suneja iv Contents 1 Introduction 1 2 Background and Related Work 4 2.1 Data Center Monitoring Tasks . .4 2.2 Monitoring Techniques . .5 2.3 VMI Techniques . .6 2.3.1 Exposing VM State . .6 2.3.2 Exploiting VM State . .6 2.4 VMI Applications . .7 2.5 Other Candidate Techniques for Monitoring . .7 2.5.1 Concerns with Alternatives . .8 3 Exploring VM Introspection: Techniques and Trade-offs 10 3.1 VMI Taxonomy . 11 3.2 Qualitative Comparison . 14 3.3 Quantitative Comparison . 15 3.3.1 Maximum Monitoring Frequency . 17 3.3.2 Resource Cost on Host . 18 3.3.3 Impact on VM's Performance . 19 3.3.4 Real Workload Results . 21 3.4 Consistency of VM State . 25 3.4.1 Inconsistency Types . 25 3.4.2 Quantitative Evaluation . 27 3.5 Observations and Recommendations . 28 3.6 Summary . 30 4 Near Field Monitoring 32 4.1 NFM's Design . 33 4.2 Implementation . 35 4.2.1 Exposing VM State . 36 4.2.2 Exploiting VM State . 37 4.2.3 The Frame Datastore . 39 4.2.4 Application Architecture . 39 4.3 Prototype Applications . 39 v 4.3.1 TopoLog . 40 4.3.2 CTop . 42 4.3.3 RConsole . 43 4.3.4 PaVScan . 44 4.4 Evaluation . 45 4.4.1 Latency and Frequency of Monitoring . 46 4.4.2 Monitoring Accuracy . 47 4.4.3 Benefits of Holistic Knowledge . 47 4.4.4 Operational Efficiency Improvements . 48 4.4.5 Impact on VM's Performance . 49 4.4.6 Impact on Co-located VMs . 50 4.4.7 Space Overhead . 51 4.5 Summary . 52 5 Cloning and Injection based VM Inspection and Customization 53 5.1 CIVIC's Design . 55 5.1.1 Discussion . 57 5.2 Implementation . 57 5.2.1 Disk COW . 58 5.2.2 Live Migration . 58 5.2.3 COW Memory . 58 5.2.4 Hotplugging . 59 5.2.5 Code Injection . 59 5.2.6 Application Loader Script . 61 5.3 Performance Evaluation . 62 5.3.1 Memory Cost . 62 5.3.2 Clone Instantiation Time . 63 5.3.3 Impact on Source VM . 64 5.4 Applications . 65 5.4.1 Safe Agent Reuse . 65 5.4.2 Anomaly Detection . 66 5.4.3 Problem Diagnostics and Troubleshooting . 67 5.4.4 Autotuning-as-a-Service . 69 5.5 Conclusion . 70 6 Conclusion and Future Work 71 Bibliography 74 vi List of Tables 3.1 Qualitative comparison of VMI techniques- empty cells in compatibility column indicates functionality not advertised by hypervisor, or enabled by users. 14 4.1 Key capabilities of the prototype applications . 39 6.1 NFM vs. CIVIC . 72 vii List of Figures 3.1 VMI Taxonomy: categorizing current implementations . 11 3.2 Comparing maximum monitoring frequency across all KVM instances of VMI techniques . 17 3.3 CPU used vs. maximum monitoring frequency . 18 3.4 Comparing % degradation on x264 benchmark's frames-encoded/s as a function of moni- toring frequency. 20 3.5 Comparing % degradation on memory, disk and network throughput as a function of monitoring frequency . 22 3.6 Comparing % degradation on Sysbench OLTP benchmarks transactions/s as a function of monitoring frequency . 23 3.7 Comparing % degradation on httperf's metrics as a function of monitoring frequency . 24 3.8 Observed inconsistency probabilities for all categories. 27 4.1 Introspection and analytics architecture ..
Recommended publications
  • Effective Virtual CPU Configuration with QEMU and Libvirt
    Effective Virtual CPU Configuration with QEMU and libvirt Kashyap Chamarthy <[email protected]> Open Source Summit Edinburgh, 2018 1 / 38 Timeline of recent CPU flaws, 2018 (a) Jan 03 • Spectre v1: Bounds Check Bypass Jan 03 • Spectre v2: Branch Target Injection Jan 03 • Meltdown: Rogue Data Cache Load May 21 • Spectre-NG: Speculative Store Bypass Jun 21 • TLBleed: Side-channel attack over shared TLBs 2 / 38 Timeline of recent CPU flaws, 2018 (b) Jun 29 • NetSpectre: Side-channel attack over local network Jul 10 • Spectre-NG: Bounds Check Bypass Store Aug 14 • L1TF: "L1 Terminal Fault" ... • ? 3 / 38 Related talks in the ‘References’ section Out of scope: Internals of various side-channel attacks How to exploit Meltdown & Spectre variants Details of performance implications What this talk is not about 4 / 38 Related talks in the ‘References’ section What this talk is not about Out of scope: Internals of various side-channel attacks How to exploit Meltdown & Spectre variants Details of performance implications 4 / 38 What this talk is not about Out of scope: Internals of various side-channel attacks How to exploit Meltdown & Spectre variants Details of performance implications Related talks in the ‘References’ section 4 / 38 OpenStack, et al. libguestfs Virt Driver (guestfish) libvirtd QMP QMP QEMU QEMU VM1 VM2 Custom Disk1 Disk2 Appliance ioctl() KVM-based virtualization components Linux with KVM 5 / 38 OpenStack, et al. libguestfs Virt Driver (guestfish) libvirtd QMP QMP Custom Appliance KVM-based virtualization components QEMU QEMU VM1 VM2 Disk1 Disk2 ioctl() Linux with KVM 5 / 38 OpenStack, et al. libguestfs Virt Driver (guestfish) Custom Appliance KVM-based virtualization components libvirtd QMP QMP QEMU QEMU VM1 VM2 Disk1 Disk2 ioctl() Linux with KVM 5 / 38 libguestfs (guestfish) Custom Appliance KVM-based virtualization components OpenStack, et al.
    [Show full text]
  • Red Hat Enterprise Linux 7 7.1 Release Notes
    Red Hat Enterprise Linux 7 7.1 Release Notes Release Notes for Red Hat Enterprise Linux 7 Red Hat Customer Content Services Red Hat Enterprise Linux 7 7.1 Release Notes Release Notes for Red Hat Enterprise Linux 7 Red Hat Customer Content Services Legal Notice Copyright © 2015 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]
  • Workload and Resource Aware, Proactive Autoscaler for Paas Cloud Frameworks
    University of Moratuwa Department of Computer Science & Engineering CS4202 - Research and Development Project inteliScaler Workload and Resource Aware, Proactive Autoscaler for PaaS Cloud Frameworks Group Members 110532R Ridwan Shariffdeen 110375L Tharindu Munasinghe 110056K Janaka Bandara 110059X Bhathiya Supun Supervisors Internal Dr. H.M.N. Dilum Bandara External Mr. Lakmal Warusawithana, WSO2 Dr. Srinath Perera, WSO2 Coordinated by Dr. Malaka Walpola THIS REPORT IS SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE AWARD OF THE DEGREE OF BACHELOR OF SCIENCE OF ENGINEERING AT UNIVERSITY OF MORATUWA, SRI LANKA. February 21, 2016 1 Declaration We, the project group inteliScaler hereby declare that except where specified reference is made to the work of others, the project inteliScaler - a resource & cost aware, proactive auto scaler for PaaS cloud is our own work and contains nothing which is the outcome of work done in collaboration with others, except as specified in the text and Acknowledgement. Signatures of the candidates: ....................................................... R.S. Shariffdeen [110532R] ....................................................... D.T.S.P. Munasinghe [110375L] ....................................................... U.K.J.U. Bandara [110056K] ....................................................... H.S. Bhathiya [110059X] Supervisor: ....................................................... (Signature and Date) Dr. H.M.N. Dilum Bandara Coordinator: ......................................................
    [Show full text]
  • Red Hat Enterprise Linux 6 Developer Guide
    Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Dave Brolley William Cohen Roland Grunberg Aldy Hernandez Karsten Hopp Jakub Jelinek Developer Guide Jeff Johnston Benjamin Kosnik Aleksander Kurtakov Chris Moller Phil Muldoon Andrew Overholt Charley Wang Kent Sebastian Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Edition 0 Author Dave Brolley [email protected] Author William Cohen [email protected] Author Roland Grunberg [email protected] Author Aldy Hernandez [email protected] Author Karsten Hopp [email protected] Author Jakub Jelinek [email protected] Author Jeff Johnston [email protected] Author Benjamin Kosnik [email protected] Author Aleksander Kurtakov [email protected] Author Chris Moller [email protected] Author Phil Muldoon [email protected] Author Andrew Overholt [email protected] Author Charley Wang [email protected] Author Kent Sebastian [email protected] Editor Don Domingo [email protected] Editor Jacquelynn East [email protected] Copyright © 2010 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
    [Show full text]
  • What Is Bluemix
    IBM Brings Bluemix to Developers! This document has been prepared for the TMForum Hackathon in Nice, France. The first section of this document shares Bluemix related notes, and it is followed by notes appropriate for viewing content from exposed APIs (provided by TMForum and FIware) then you see the node flows that are available for you. IBM® Bluemix™ is an open-standard, cloud-based platform for building, managing, and running apps of all types, such as web, mobile, big data, and smart devices. Capabilities include Java, mobile back-end development, and application monitoring, as well as features from ecosystem partners and open source—all provided as-a-service in the cloud. Get started with Bluemix: ibm.biz/LearnBluemix Sign up for Bluemix: https://ibm.biz/sitefrbluemix Getting started with run times: http://bluemix.net/docs/# View the catalog and select the mobile cloud boilerplate: http://bluemix.net/#/store/cloudOEPaneId=store Tap into the Internet of Things: http://bluemix.net/#/solutions/solution=internet_of_things Bluemix tutorial in Open Classroom: http://openclassrooms.com/courses/deployez-des-applications- dans-le-cloud-avec-ibm-bluemix This table below can be used for general enablement. It is been useful to developers are previous hackathons. Source Code : Quick Start Technical Asset Name URL/Mobile App Technical Asset Description Guide Uses Node.js runtime, Internet Connected Home Automation ibm.biz/ATTconnhome2 of Things boilerplate, Node-RED ibm.biz/ATTconnhome2qs App editor and MQTT protocol Uses Node.js runtime, Connected
    [Show full text]
  • Touchless and Always-On Cloud Analytics As a Service 1. Introduction
    Touchless and Always-on Cloud Analytics as a Service S. Suneja, C. Isci, R. Koller, E. de Lara Despite modern advances in automation and managed services, many end users of cloud services remain concerned with regards to the lack of visibility into their operational environments. The underlying principles of existing approaches employed to aid users gain transparency into their runtimes, do not apply to today’s dynamic cloud environment where virtual machines (VMs) and containers operate as processes of the cloud operating system (OS). We present Near Field Monitoring (NFM), a cloud-native framework for monitoring cloud systems and providing operational analytics services. With NFM, we employ cloud, virtualization, and containerization abstractions to provide complete visibility into running entities in the cloud, in a touchless manner, i.e., without modifying, instrumenting or accessing inside the end user context. Operating outside the context of the target systems enables always-on monitoring independent of their health. Using an NFM implementation on OpenStack, we demonstrate the capabilities of NFM, as well as its monitoring accuracy and efficiency. NFM is highly practical and general, supporting more than 1000 different system distributions, allowing instantaneous monitoring as soon as a guest system gets hosted on the cloud, without any setup prerequisites or enforced cooperation. 1. Introduction Emerging cloud services enable end users to define and provision complex, distributed applications and their compute resources with unprecedented
    [Show full text]
  • A Complete Survey on Software Architectural Styles and Patterns
    Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 70 ( 2015 ) 16 – 28 4th International Conference on Eco-friendly Computing and Communication Systems, ICECCS 2015 A Complete Survey on Software Architectural Styles and Patterns Anubha Sharmaa*,Manoj Kumarb, Sonali Agarwalc a,b,cIndian Institute of Information Technology,Allahabad 211012,India Abstract Software bought revolutionary change making entrepreneurs fortunate enough to make money in less time with least effort and correct output. SDLC (Software development life cycle) is responsible for software’s reliability, performance, scalability, functionality and maintainability. Although all phases of SDLC have their own importance but Software architecture serves as the foundation for other phases of SDLC. Just like sketch of a building helps constructor to correctly construct the building, software architecture helps software developer to develop the software properly. There are various styles available for software architecture. In this paper, clear picture of all important software architecture styles are presented along with recent advancement in software architecture and design phases. It could be helpful for a software developer to select an appropriate style according to his/her project’s requirement. An architectural style must be chosen correctly to get its all benefits in the system. All the architectural styles are compared on the basis of various quality attributes. This paper also specifies the application area, advantages and disadvantages of each architectural style. © 20152015 The The Authors. Authors. Published Published by byElsevier Elsevier B.V. B.V. This is an open access article under the CC BY-NC-ND license (Peerhttp://creativecommons.org/licenses/by-nc-nd/4.0/-review under responsibility of the Organizing).
    [Show full text]
  • Developer Guide
    Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Last Updated: 2017-10-20 Red Hat Enterprise Linux 6 Developer Guide An introduction to application development tools in Red Hat Enterprise Linux 6 Robert Krátký Red Hat Customer Content Services [email protected] Don Domingo Red Hat Customer Content Services Jacquelynn East Red Hat Customer Content Services Legal Notice Copyright © 2016 Red Hat, Inc. and others. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent.
    [Show full text]
  • MOS WS 2020/21 Goals
    Virtualization MOS WS 2020/21 Goals • Give you an overview about: • Virtualization and VMs in General • Hardware Virtualization on x86 Goals • Give you an overview about: • Virtualization and VMs in General • Hardware Virtualization on x86 • Not in this lecture: • Lots and lots of Details • Language Runtimes • How to use Xen/KVM/… History Erik Pitti, CC-BY, www.flickr.com/people/24205142@N00 History • Pioneered with IBM’s CP/CMS in ~1967 running on System/360 and System/370 • CP: Control Program (provided S/360 VMs) • Memory Protection between VMs • Preemptive scheduling • CMS: Cambridge Monitor System (later Conversational Monitor System) – Single User OS • At the time more flexible & efficient than time-sharing multi- user systems! Applications • Consolidation (improve server utilization) • Isolation (incompatibility or security reasons) • Reuse (legacy software) • Development … but was confined to the mainframe-world for a long time! Why? Imagine you want to write an operating system, that is: • Secure • Trustworthy • Small • Fast • Fancy but, … Why? Users expect to run their favourite software („legacy“): • Browsers • Word • iTunes • Certified Business Applications • Gaming (Windows/DirectX to DOS) Porting/Rewriting is not an option! Why? „By virtualizing a commodity OS […] we gain support for legacy applications, and devices we don’t want to write drivers for.“ „All this allows the research community to finally escape the straitjacket of POSIX or Windows compatibility […]“ Roscoe, Elphinstone, and Heiser, 2007 What is Virtualization? Suppose you develop on your x86-based workstation running a system Host, a system Guest which is supposed to run on ARM-based phones. An emulator for G running H precisely emulates G’s: • CPU • Memory (subsystem) • I/O devices Ideally, programs running on the emulated G exhibit the same behaviour, except for timing, as when run on a real system G.
    [Show full text]
  • Cloud Computing
    PA200 - Cloud Computing Lecture 6: Cloud providers by Ilya Etingof, Red Hat In this lecture • Cloud service providers • IaaS/PaaS/SaaS and variations • In the eyes of the user • Pros&Cons • Google Cloud walk-through Cloud software vs cloud service • Cloud software provider • OpenStack, RedHat OpenShift, oVirt • Many in-house implementations • Cloud service provider • Amazon EC2 • Microsoft Azure • Google Cloud Platform • RedHat OpenShift Online • ... What does CSP do? A combination of: • IaaS • PaaS/Stackless/FaaS • SaaS Business use of CSPs The hyperscalers: What does IaaS CSP do? • Abstracts away the hardware • Operating system as a unit of scale (before IaaS, hardware computer has been a unit of scale) IaaS CSP business model • Owns/rents physical DC infrastructure • Owns/buys Internet connectivity (links, IX etc) • Provides IaaS to end customers • Serves other CSPs: PaaS and SaaS • Base for multi-cloud CSPs Typical IaaS offering • Compute nodes (VMs) • Virtual networks • Bare metal nodes • Managed storage (block, file systems) • Instance-based scaling and redundancy • Pay per allocated resources (instances, RAM, storage, traffic) Example IaaS • Amazon Elastic Compute Cloud (EC2) • Google Cloud • Microsoft Azure Cloud Computing Service IaaS CSP differentiation • Technically interchangeable • Similar costs • Customer is not heavily locked-in Multicloud Multiple cloud services under the single control plane • Reduces dependence on a single CSP • Balances load/location/costs • Gathers resources • Same deployment model (unlike hybrid cloud) Examples of multicloud software • IBM Cloud Orchestrator • RedHat CloudForms • Flexera RightScale What does PaaS CSP do? • Abstracts away the OS • Containerized application as a unit of scale PaaS CSP business model • Owns or rents the IaaS • Maintains the platform • Maintains services, data collections etc.
    [Show full text]
  • Innovative Feedback System Based on Ibm Bluemix Cloud Service
    INNOVATIVE FEEDBACK SYSTEM BASED ON IBM BLUEMIX CLOUD SERVICE P.P.N.G. Phani Kumar1, N. Anil Chakravarthy2, D.V.S.Ravi Varma3, M.Y.V.Nagesh4 1,2,3,4 Assistant Professor, Department of CSE, Raghu Engineering College, Visakhapatnam, (India). ABSTRACT Getting the right feedback at right time is most important for any organization or an institution. Getting the feedback from the users will help an organization or institution to provide better services to the users or students. Ongoing interaction with users can improve the efficiency of an organization and enable them to provide better service to the users. Until now, several feedback systems are in use which are mostly manual. We propose an efficient feedback system using cloud based computing to generate the report of the faculty performance. In the proposed system all the activities will be done by the use of cloud application Platform as a Service, through the use of IBM Bluemix. Keywords: Android, Bluemix, Cloud Computing, Paas (Platform As A Services) I INTRODUCTION Cloud Computing[1] is a popular technology in which internet and central remote servers are used to store and maintain the data, applications. Cloud computing allows people to use applications without installation of any specialized software and access the required computing facilities from anywhere via internet. By using Cloud computing we can achieve much more efficient computing power by centralizing data storage, processing and bandwidth. Cloud can be available as various services Software as a service (SaaS), Platform as a service (PaaS), Infrastructure as a service (IaaS) 1.1 Services Fig.1: Cloud Computing Services 260 | P a g e Software as a service (SaaS): Software as a service is one type of cloud service in which an application software is installed and manage in the cloud.
    [Show full text]
  • Mos - Virtualization
    MOS - VIRTUALIZATION Tobias Stumpf, Marcus H¨ahnel WS 2017/18 Goals Give you an overview about: • virtualization and virtual machines in general, • hardware virtualization on x86, • our research regarding virtualization. We will not discuss: • lots and lots of details, • language runtimes, • how to use XEN/KVM/. MOS - Virtualization slide 3 What is Virtualization? Outline What is Virtualization? Very Short History Virtualization on x86 Example: L4Linux Example: NOVA Example: Karma VMM MOS - Virtualization slide 4 What is Virtualization? Starting Point You want to write a new operating system that is • secure, • trustworthy, • small, • fast, • fancy. but . MOS - Virtualization slide 5 What is Virtualization? Commodity Applications Users expect to run all the software they are used to (\legacy"): • browsers, • Word, • iTunes, • certified business applications, • new (Windows/DirectX) and ancient (DOS) games. Porting or rewriting all is infeasible! MOS - Virtualization slide 6 What is Virtualization? One Solution: Virtualization \By virtualizing a commodity OS [...] we gain support for legacy applications, and devices we don't want to write drivers for." \All this allows the research community to finally escape the straitjacket of POSIX or Windows compatibility [...]" Roscoe:2007:HV:1361397.1361401 MOS - Virtualization slide 7 What is Virtualization? Virtualization virtual existing in essence or effect though not in actual fact http://wordnetweb.princeton.edu \All problems in computer science can be solved by another level of indirection." David Wheeler MOS - Virtualization slide 8 What is Virtualization? Emulation Suppose you develop for a system G (guest, e.g. an ARM-based phone) on your workstation H (host, e.g., an x86 PC). An emulator for G running on H precisely emulates G's • CPU, • memory subsystem, and • I/O devices.
    [Show full text]