Resource Virtualization for Real-Time Industrial Clouds

Total Page:16

File Type:pdf, Size:1020Kb

Resource Virtualization for Real-Time Industrial Clouds Malardalen¨ University School of Innovation Design and Engineering Vaster¨ ˚as, Sweden Thesis for the Degree of Master of Science in Computer Science with Specialization in Embedded Systems 30.0 credits Resource Virtualization for Real-time Industrial Clouds Sharmin Sultana Sheuly [email protected] Examiner: Moris Behnam [email protected] Supervisor: Mohammad Ashjaei [email protected] June 10, 2016 Abstract Cloud computing is emerging very fast as it has potential in transforming IT industry by replacing local systems as well as in reshaping the design of IT hardware. It helps companies to share their infrastructure resources over internet ensuring better utilization of them. Nowadays developers do not need to deploy ex- pensive hardware or human resource to maintain them because of cloud computing. Such elasticity of resources is new in the IT world. With the help of virtualization, clouds meet different types of customer demand as well as ensure better utiliza- tion of resources. There are two types of virtualization technique (dominant): (i) hardware level or system level virtualization, and (ii) operating system (OS) level virtualization. In the industry system level virtualization is commonly used. How- ever it introduces some performance overhead because of its heavy weight nature. OS level virtualization replacing system level virtualization as it is of light weight nature and has lower performance overhead. Nevertheless, more research is nec- essary to compare these two technologies in case of performance overhead. In this thesis, a comparison is made in between these two technologies to find the suitable one for real time industrial cloud. XEN is chosen to represent system level virtu- alization and Docker and OpenVZ for OS level virtualization. To compare them the considered performance criteria are: migration time, downtime, CPU con- sumption during migration, execution time. The evaluation showed that OS level virtualization technique OpenVZ is more suitable for industrial real time cloud as it has better migration utility, shorter downtime and lower CPU consumption during migration. Contents 1 Introduction5 1.1 Motivation............................6 1.2 Thesis Contributions.......................7 1.3 Thesis Outline..........................7 2 Background8 2.1 Cloud computing.........................8 2.2 System Level Virtulization....................9 2.2.1 XEN............................ 10 2.2.2 XEN Toolstack...................... 11 2.2.3 XEN Migration...................... 11 2.3 Operating System (OS) Level Virtualization.......... 12 2.3.1 Docker........................... 13 2.3.2 OpenVZ.......................... 14 2.3.3 OpenVZ Migration.................... 16 3 Problem Formulation 17 4 Solution Method 18 5 System set-up 22 5.1 Local Area Network (LAN) Set up............... 22 5.2 XEN Hypervisor......................... 23 5.2.1 XEN installation..................... 24 5.2.2 Setting up Bridged Network............... 24 5.2.3 DomU Install with Virt-Manager............ 24 5.2.4 Virtual machine migration................ 24 5.3 Docker............................... 28 5.3.1 Docker Installation, Container Creation and Container Migration......................... 28 5.4 OpenVZ.............................. 29 5.4.1 OpenVZ Installation................... 29 5.4.2 Container Creation.................... 29 5.4.3 Container Migration................... 30 5.5 Test Bed Specifications Summary................ 30 1 6 Evaluation 31 6.1 Migration time.......................... 31 6.2 Downtime............................. 35 6.3 CPU consumption during migration.............. 36 6.4 Execution Time.......................... 36 6.5 Evaluation Result......................... 37 7 Related work 37 8 Conclusion 43 8.1 Summary............................. 43 8.2 Future Work........................... 43 Appendix A 51 A.1 XEN toolstack.......................... 51 A.1.1 XEND Toolstack..................... 51 A.1.2 XL Toolstack....................... 52 A.1.3 Libvirt........................... 52 A.1.4 Virt-Manager....................... 52 Appendix B 53 B.1 Docker Installation, Container Creation............ 53 B.2 Container Migration....................... 53 2 List of Figures 1 Different cloud types ([1]).....................8 2 XEN architecture (adopted from [2])............... 10 3 Major Docker components (High level overview) [3]...... 14 4 OpenVZ architecture [4]...................... 15 5 Solution method used in this thesis............... 19 6 Industrial Real time cloud.................... 21 7 LAN set up............................. 23 8 Start of Migration Virtual machine vmx............ 26 9 vmx migrated and paused in the destination host....... 27 10 Migration of vmx completed................... 28 11 Algorithm for measuring migration time............. 33 3 List of Tables 1 Test bed specifications of XEN................. 31 2 Test bed specifications of OpenVZ............... 31 3 Migration time for different RAM sizes............. 32 4 Migration time changing VM/container number (RAM size 1027)................................ 34 5 Migration time changing host CPU consumption (RAM size 1027)................................ 34 6 Downtime changing RAM size.................. 35 7 CPU conumption during migration (in percent)........ 36 8 Execution time.......................... 36 9 Summary of Evaluation..................... 37 4 1 Introduction Cloud computing has emerged as a very convenient word in the networking world. All over the world users utilizes IT services offered by cloud comput- ing. It provides infrastructure, platform, and software as services. These services are consumed in a pay-as-you-go model. In the industrial world, cloud became an alternative to local systems as it performs better [5], [6]. In industrial real time cloud all the required computation is conducted in cloud upon an external event and depending on this computation response is provided within a predefined time. However, In 2008 a survey was con- ducted with six data centres, which showed servers utilize only 10-30% of total processing capacity. On the other hand, CPU utilization rate in desk- top computers is on an average below 5% [7]. In addition to this, with the growth of VLSI technology, there is a rapid advancement in computing power. Unfortunately, this power is not exploited fully as single process running on a system does not exploit that much resource. The solution of the above problem lies in virtualization which refers to unification of multiple systems onto a single system without compromis- ing performance and security [8], [9]. Virtualization technologies became dominant technology in the industrial world for this reason. Server vir- tualization increases capability of data centers. Application of virtualiza- tion in different areas such as Cloud Environments, Internet of Things, and Network Functions is becoming more extensive [10]. In addition to these, High-Performance Computing (HPC) centres are using this technology to fulfil their clients need. For example, some clients may want their applica- tion to run in a specific operating system while others may require specific hardware. To address these issues at first the users specify their need. De- pending on this specification virtual environment is set up for them which is known as plug-and-play computing [11]. There exists three virtualization techniques: (i) hardware level or system level virtualization, (ii) operat- ing system level virtualization and (iii) high-level language virtual machines [12], [8]. Among these techniques the first two are dominant. Difference in these two virtualization technique lies in the separation of host (virtualizing part) and domain (virtualized part) [8]. In hardware level virtualization the separation is in hardware abstraction layer while in operating system level virtualization it is in system call/ABI layer. 5 1.1 Motivation Hardware level virtualization is the dominent virtualization technology in the industrial world as it provides good isolation and encapsulation . One virtual machine (VM) cannot access codes running in another VM because of isolated environment. However, this isolation comes at a cost of perfor- mance overhead. System calls in VMs are taken care of by virtual machine monitor or hypervisor introducing additional latency. If a guest issues a hardware operation, it must be translated and reissued by the hypervisor. This latency introduces higher response time of tasks which are running in- side the VM. Another challenge is that, there exists a semantic gap between the virtual machine and the service. The reason behind this is that, guest OS provides an abstraction to the VM and VMs operate below it [13]. In addition to this, VM instances should not have RAM size higher than host RAM. This fact imposes a restriction on the number of VM that can run on the host. Every VM instance has its own operating system which makes it of heavyweight nature. Because of the above problems, industry is moving towards operating system level virtualization which is a light weight alter- native to hardware level virtualization. There is no abstraction of hardware in OS level virtualization rather there exists partitions among containers. A process running in one container cannot access process in another container. Containers share the host kernel and no extra OS is installed in each con- tainer. Therefore, it is of light weight nature. However, in case of isolation hardware level virtualization outperforms operating system level virtualiza-
Recommended publications
  • Understanding Full Virtualization, Paravirtualization, and Hardware Assist
    VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist Contents Introduction .................................................................................................................1 Overview of x86 Virtualization..................................................................................2 CPU Virtualization .......................................................................................................3 The Challenges of x86 Hardware Virtualization ...........................................................................................................3 Technique 1 - Full Virtualization using Binary Translation......................................................................................4 Technique 2 - OS Assisted Virtualization or Paravirtualization.............................................................................5 Technique 3 - Hardware Assisted Virtualization ..........................................................................................................6 Memory Virtualization................................................................................................6 Device and I/O Virtualization.....................................................................................7 Summarizing the Current State of x86 Virtualization Techniques......................8 Full Virtualization with Binary Translation is the Most Established Technology Today..........................8 Hardware Assist is the Future of Virtualization, but the Real Gains Have
    [Show full text]
  • Enabling Intel® Virtualization Technology Features and Benefits
    WHITE PAPER Intel® Virtualization Technology Enterprise Server Enabling Intel® Virtualization Technology Features and Benefits Maximizing the benefits of virtualization with Intel’s new CPUs and chipsets EXECUTIVE SUMMARY Although virtualization has been accepted in most data centers, some users have not yet taken advantage of all the virtualization features available to them. This white paper describes the features available in Intel® Virtualization Technology (Intel® VT) that work with Intel’s new CPUs and chipsets, showing how they can benefit the end user and how to enable them. Intel® Virtualization Technology Goldberg. Thus, developers found it difficult Feature Brief and Usage Model to implement a virtual machine platform on Intel VT combines with software-based the x86 architecture without significant virtualization solutions to provide maximum overhead on the host machine. system utilization by consolidating multiple environments into a single server or PC. In 2005 and 2006, Intel and AMD, working By abstracting the software away from the independently, each resolved this by creat- underlying hardware, a world of new usage ing new processor extensions to the x86 models opens up that can reduce costs, architecture. Although the actual implemen- increase management efficiency, and tation of processor extensions differs strengthen security—all while making your between AMD and Intel, both achieve the computing infrastructure more resilient in same goal of allowing a virtual machine the event of a disaster. hypervisor to run an unmodified operating system without incurring significant emula- During the last four years, Intel has intro- tion performance penalties. duced several new features to Intel VT. Most of these features are well known, but others Intel VT is Intel’s hardware virtualization for may not be.
    [Show full text]
  • Standard Deck
    OVERVIEW Customers in 50+ countries All industry segments All sizes: 250 to 1 million+ devices/IPs Annual subscription model with 95% client renewal rate Strong partnerships with SIs and resellers Based in Connecticut, USA www.device42.com Representative Clients and Partners www.device42.com Visualize the Entire Estate DEVICE42 REFERENCE ARCHITECTURE KEY SELLING POINTS FOR DISCOVERY CUSTOMER COMPLEX PROJECTS: INFRASTRUCTURE INFRASTRUCTURE Windows Discovery WMI (TCP 135, 137, 139, 445,1024-65535) WINDOWS /HYPER-V Agentless auto-discovery Netlow Collector SYSTEMS Broad Support NETFLOW (UDP 2055) APIs - ACI, F5, UCS, - HTTPS (TCP 443) NETWORK MS and Unix, Cloud vendors, Hypervisors DEVICES Device42 SNMP (UDP 161) CISO Friendly Management Interfaces Secure, behind firewall, read only credentials SSH (TCP404), SSH (TCP22) Linux/Unix No data leaves the enterprise HTTPS (TCP443), SYSTEMS HTTP (TCP4242), HTTPS(4343) MAIN VENDOR API / SSH VARIOUSPORTS Full access to data APPLIANCE HYPERVISORS Fully documented complete APIs Robust reporting and audit logs CSP APIs - HTTPS (TCP443) PUBLIC CLOUD DISCOVERY Just the facts Agnostic as to vendor or disposition DNS (TCP53) DNS ZONES Easy to deploy VARIOUSPROTOCOLS Lightweight footprint, self-hosted virtual appliance makes HTTPS (TCP443) OTHER DISCOVERY deployment and management simple REMOTE VARIOUSPROTOCOLS SEGMENTED / REMOTE COLLECTOR INFRASTRUCTURE www.device42.com Continuous Discovery for your IT Infrastructure Service connections, application configs, APPLICATIONS and service groupings SERVICES Service,
    [Show full text]
  • PCI DSS Virtualization Guidelines
    Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: June 2011 Author: Virtualization Special Interest Group PCI Security Standards Council Information Supplement: PCI DSS Virtualization Guidelines Information Supplement • PCI DSS Virtualization Guidelines • June 2011 Table of Contents 1 Introduction ....................................................................................................................... 3 1.1 Audience ................................................................................................................ 3 1.2 Intended Use .......................................................................................................... 4 2 Virtualization Overview .................................................................................................... 5 2.1 Virtualization Concepts and Classes ..................................................................... 5 2.2 Virtual System Components and Scoping Guidance ............................................. 7 3 Risks for Virtualized Environments .............................................................................. 10 3.1 Vulnerabilities in the Physical Environment Apply in a Virtual Environment ....... 10 3.2 Hypervisor Creates New Attack Surface ............................................................. 10 3.3 Increased Complexity of Virtualized Systems and Networks .............................. 11 3.4 More Than One Function per Physical System ................................................... 11 3.5 Mixing VMs of
    [Show full text]
  • Virtualization and Shared Infrastructure Data Storage for IT in Kosovo Institutions Gani Zogaj
    Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 2012 Virtualization and shared Infrastructure data storage for IT in Kosovo institutions Gani Zogaj Follow this and additional works at: http://scholarworks.rit.edu/theses Recommended Citation Zogaj, Gani, "Virtualization and shared Infrastructure data storage for IT in Kosovo institutions" (2012). Thesis. Rochester Institute of Technology. Accessed from This Master's Project is brought to you for free and open access by the Thesis/Dissertation Collections at RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. AMERICAN UNIVERSITY IN KOSOVO MASTER OF SCIENCE IN PROFESSIONAL STUDIES Virtualization and Shared Infrastructure Data Storage for IT in Kosovo institutions “Submitted as a Capstone Project Report in partial fulfillment of a Master of Science degree in Professional Studies at American University in Kosovo” By Gani ZOGAJ November, 2012 Virtualization and Shared Infrastructure Data Storage for IT in Kosovo institutions ACKNOWLEDGEMENTS First, I would like to thank God for giving me health for completing my Master’s Degree studies. I would like to express my gratitude to my supervisor of capstone proposal, Bryan, for his support and for giving me suggestions and recommendations throughout the Capstone Project work. Finally, I would like to thank my wife, Shkendije, and my lovely daughters, Elisa and Erona, who I love so much, for their understanding while I was preparing the Capstone Project and I couldn’t spend enough time with them. 2 Virtualization and Shared Infrastructure Data Storage for IT in Kosovo institutions Table of Contents Figures and Tables………………………………………………….……………….……….……5 List of Acronyms………………………………………………………………....………….……6 Executive Summary……………………………………………………..………………...………8 Chapter 1…………………………………………………………………………...…………….11 1.
    [Show full text]
  • Oracle® Linux Virtualization Manager Getting Started Guide
    Oracle® Linux Virtualization Manager Getting Started Guide F25124-11 September 2021 Oracle Legal Notices Copyright © 2019, 2021 Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Firecracker: Lightweight Virtualization for Serverless Applications
    Firecracker: Lightweight Virtualization for Serverless Applications Alexandru Agache, Marc Brooker, Andreea Florescu, Alexandra Iordache, Anthony Liguori, Rolf Neugebauer, Phil Piwonka, and Diana-Maria Popa, Amazon Web Services https://www.usenix.org/conference/nsdi20/presentation/agache This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’20) February 25–27, 2020 • Santa Clara, CA, USA 978-1-939133-13-7 Open access to the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’20) is sponsored by Firecracker: Lightweight Virtualization for Serverless Applications Alexandru Agache Marc Brooker Andreea Florescu Amazon Web Services Amazon Web Services Amazon Web Services Alexandra Iordache Anthony Liguori Rolf Neugebauer Amazon Web Services Amazon Web Services Amazon Web Services Phil Piwonka Diana-Maria Popa Amazon Web Services Amazon Web Services Abstract vantage over traditional server provisioning processes: mul- titenancy allows servers to be shared across a large num- Serverless containers and functions are widely used for de- ber of workloads, and the ability to provision new func- ploying and managing software in the cloud. Their popularity tions and containers in milliseconds allows capacity to be is due to reduced cost of operations, improved utilization of switched between workloads quickly as demand changes. hardware, and faster scaling than traditional deployment meth- Serverless is also attracting the attention of the research com- ods. The economics and scale of serverless applications de- munity [21,26,27,44,47], including work on scaling out video mand that workloads from multiple customers run on the same encoding [13], linear algebra [20, 53] and parallel compila- hardware with minimal overhead, while preserving strong se- tion [12].
    [Show full text]
  • Cloud Computing Bible Is a Wide-Ranging and Complete Reference
    A thorough, down-to-earth look Barrie Sosinsky Cloud Computing Barrie Sosinsky is a veteran computer book writer at cloud computing specializing in network systems, databases, design, development, The chance to lower IT costs makes cloud computing a and testing. Among his 35 technical books have been Wiley’s Networking hot topic, and it’s getting hotter all the time. If you want Bible and many others on operating a terra firma take on everything you should know about systems, Web topics, storage, and the cloud, this book is it. Starting with a clear definition of application software. He has written nearly 500 articles for computer what cloud computing is, why it is, and its pros and cons, magazines and Web sites. Cloud Cloud Computing Bible is a wide-ranging and complete reference. You’ll get thoroughly up to speed on cloud platforms, infrastructure, services and applications, security, and much more. Computing • Learn what cloud computing is and what it is not • Assess the value of cloud computing, including licensing models, ROI, and more • Understand abstraction, partitioning, virtualization, capacity planning, and various programming solutions • See how to use Google®, Amazon®, and Microsoft® Web services effectively ® ™ • Explore cloud communication methods — IM, Twitter , Google Buzz , Explore the cloud with Facebook®, and others • Discover how cloud services are changing mobile phones — and vice versa this complete guide Understand all platforms and technologies www.wiley.com/compbooks Shelving Category: Use Google, Amazon, or
    [Show full text]
  • Reference Architecture: Lenovo Client Virtualization (LCV) with Thinksystem Servers
    Reference Architecture: Lenovo Client Virtualization (LCV) with ThinkSystem Servers Last update: 10 June 2019 Version 1.3 Base Reference Architecture Describes Lenovo clients, document for all LCV servers, storage, and networking solutions hardware used in LCV solutions LCV covers both virtual Contains system performance desktops and hosted considerations and performance desktops testing methodology and tools Mike Perks Pawan Sharma Table of Contents 1 Introduction ............................................................................................... 1 2 Business problem and business value ................................................... 2 3 Requirements ............................................................................................ 3 4 Architectural overview ............................................................................. 6 5 Component model .................................................................................... 7 5.1 Management services ............................................................................................ 10 5.2 Support services .................................................................................................... 11 5.2.1 Lenovo Thin Client Manager ...................................................................................................... 11 5.2.2 Chromebook management console ........................................................................................... 12 5.3 Storage .................................................................................................................
    [Show full text]
  • Sebastian Witowski
    I made a website! Now what? Sebastian Witowski 1 Disclaimer There are many great tools at CERN (OpenShift). This presentation is not about those tools. 2 This presentation is about external tools 3 Free to use Open source Good value/money Good service Supports FOSS/education 4 Hosting 5 Cloud hosting Physical server vs VPS: Billed for real usage (per second on AWS) Easy to scale 6 Hosting providers AWS (EC2 and Amazon Lightsail) Free tier for 1 year (2x t2.micro, 1 DB, 5GB storage, etc.) Complex pricing model DigitalOcean From $5/month (512MB RAM, 20GB storage, 1TB transfer) Additional storage from $0.10/GB/month Linode From $5/month (1GB RAM, 20GB storage, 1TB transfer) Additional storage from $0.10/GB/month Heroku PaaS: more expensive, but easier to use (less congurable) 1 dyno free forever (512 MB RAM, 10k PostgreSQL rows) 7 Server parameters Storage - 20GB is plenty (use AWS S3 for more) Transfer - 1TB is usually more than enough CPU - 1 CPU is ne for simple website RAM - the more the better (caching, DB, etc.) 8 Cloud computing 9 When a VPS is not enough AWS Free tier for 1 year (VPS, DB, S3, Lambda and more) More features than competition Longest time on market == more 3rd party libraries Google Cloud $300 free credits to spend during rst 12 months "Always free" tier with VPS (1 f1-micro, 30GB storage), DB (1GB NoSQL), storage (5 GB), messaging, logging, serverless functions, but also NLP, speech and vision API Azure 30 days free trial with $200 free credits, some services free for 12 months and some free forever Good support for Windows applications 10 Static websites 11 When a VPS is too much GitLab pages Supports any static site generator Free Continuous Integration Slightly more complicated setup GitHub pages Supports only Jekyll (to use other static site generators, you need to precompile les locally) Easy, out-of-the-box setup Both are free and offer separate websites for projects and organizations.
    [Show full text]
  • Paravirtualization (PV)
    Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels of privilege known as Ring 0, 1, 2 and 3 to operating systems and applications to manage access to the computer hardware. While user level applications typically run in Ring 3, the operating system needs to have direct access to the memory and hardware and must execute its privileged instructions in Ring 0. x86 privilege level architecture without virtualization Technique 1: Full Virtualization using Binary Translation This approach relies on binary translation to trap (into the VMM) and to virtualize certain sensitive and non-virtualizable instructions with new sequences of instructions that have the intended effect on the virtual hardware. Meanwhile, user level code is directly executed on the processor for high performance virtualization. Binary translation approach to x86 virtualization Full Virtualization using Binary Translation This combination of binary translation and direct execution provides Full Virtualization as the guest OS is completely decoupled from the underlying hardware by the virtualization layer. The guest OS is not aware it is being virtualized and requires no modification. The hypervisor translates all operating system instructions at run-time on the fly and caches the results for future use, while user level instructions run unmodified at native speed. VMware’s virtualization products such as VMWare ESXi and Microsoft Virtual Server are examples of full virtualization. Full Virtualization using Binary Translation The performance of full virtualization may not be ideal because it involves binary translation at run-time which is time consuming and can incur a large performance overhead.
    [Show full text]
  • Yritysten Tuotetietojen Globaali Jakaminen
    YRITYSTEN TUOTETIETOJEN GLOBAALI JAKAMINEN LAHDEN AMMATTIKORKEAKOULU Tekniikan ala Tietotekniikan koulutusohjelma Tietoliikennetekniikka Opinnäytetyö Syksy 2016 Ekaterina Ruotsalainen Lahden ammattikorkeakoulu Tietotekniikan koulutusohjelma RUOTSALAINEN, EKATERINA: Yritysten tuotetietojen globaali jakaminen Tietoliikennetekniikan opinnäytetyö, 99 sivua Syksy 2016 TIIVISTELMÄ Tietoliikenne- ja virtualisointitekniikoiden kehityksen myötä monien, myös pk-yritysten toiminta kansainvälistyy yhä useammin. Tämä tuo yrityksille monipuoliset edut, mutta samalla lisää haasteita tuotetiedon hallinnan ja turvallisen tietojen jakamisen kannalta. Työn tavoitteena oli tutkia yritysten tuotetietojen globaalin jakamisen haasteet ja mahdolliset ratkaisut. Ongelmaa tutkittiin kahdesta näkökulmasta: tuotetiedon tuottaminen ja hallinta sekä tuotetiedon jakaminen tietoliikenneyhteyksien välityksellä. Työn keskeinen käsite on tuotetiedonhallinta (PDM) eli toiminnot ja prosessit, jotka IT-resurssien avulla mahdollistavat tuotetietojen varastoinnin, seurannan, jakamisen ja käsittelyn. Tuotetiedolla tarkoitetaan kaikkia tuotteisiin liittyviä tietoja, kuten esimerkiksi piirustukset, 3D-mallit ja osaluettelot. PDM-järjestelmä on ison yritystietojärjestelmäkokonaisuuden osa. Sen takia toimivat integraatiot CAD-ohjelmistoihin ja ERP- järjestelmään ovat tärkeässä roolissa. Tuotetietojen jakamiseen yritysten käytössä ovat erilaiset WAN-ratkaisut ja VPN-tekniikat. Virtualisointi ja pilvipalvelut ovat myös laajentanet ja monipuolistaneet tietojenjakamismahdollisuudet.
    [Show full text]