Tugas Konsep Cloud Computing Nama : Rizal

Total Page:16

File Type:pdf, Size:1020Kb

Load more

TUGAS KONSEP CLOUD COMPUTING NAMA : RIZAL KURNIAWAN NIM : 145410039 / S1 – TI Teknologi Web Aplikasi web adalah suatu aplikasi yang berbentuk klien/server yang dapat membentuk halaman-halaman web berdasarkan permintaan pemakai. Klien adalah pemakai yang meminta halaman web, sedangkan server adalah penyedia layanan yang melayani permintaan dari pemakai. Klien dan server berhubungan dalam suatu jaringan Internet atau Intranet. Web dapat diakses oleh berbaga iplatform dengan menggunakan browser, misalnya Internet Explorer,Mozilla,Opera, dan lain-lain. Model dari aplikasi web dapat kita lihat seperti pada gambar di bawah : Proses pengaksesan suatu web yaitu klien melakukan permintaan suatu halaman web kepada server, kemudian server akan mencari halaman yang diminta dan mengembalikannya dalam bentuk kode kode HTML. Kode-kode HTML ini akan didownload oleh komputer klien dan kemudian akan diterjemahkan oleh browser menjadi suatu tampilan halaman web.Aplikasi web dibangun oleh 2 jenis scripting yaitu sebagai berikut: a. Server Side Scripting Pemrograman dari sisi server maksudnya adalah membuat kode-kode program yang hanya dieksekusi di server menjadi bentuk tag-tag HTML untuk dikirim ke klien. Tag-tag inilah yang akan diterjemahkan oleh browser klien menjadi halaman web. Kode-kode program ini tidak akan kelihatan di klien.Contoh bahasa pemrograman dari sisi serveryaitu seperti PHP, ASP, JSP dan lainnya.Bahasa pemrograman ini digunakan untuk membuat suatu halaman web menjadi dinamis. b. Client Side Scripting Pemrograman web dari sisi klien maksudnya adalah membuat kode- kode program yang dieksekusi di klien khususnya olehbrowser.Kode-kode program ini bisa dilihat oleh klien.Contoh bahasa pemrograman dari sisi klien yaitu HTML, javascript, CSS. HTML adalah tag-tag yang diterjemahkan oleh browser untuk membentuk secara visual suatu halaman web. HTML sekarang dikembangkan menjadi eXtensible HyperText MarkupLanguage (XHTML), sebuah versi yang lebih matang dan stabil. XHTML datang bersama beberapa cara dan pemikiran yang baru mengenai tag dalam halaman web. Aturan aturan dalam XHTML lebih ketat dibandingkan HTML dari segi cara penulisan.XHTML dapat merupakan perpaduan antara HTML dan XML karenamerupakan formulasi ulang HTML dalambentuk XML. Sekarang ini, XHTML menjadi standar suatu web berdasarkan rekomendasi W3C (World Wide Web Consortium). CSS dan javascript adalah bahasa program untuk membuat tampilan web menjadi interaktif.CSS dan javascript disisipkan di antara sintaksHTML.Berbagai contoh aplikasi web yaitu seperti mesin pencari atau search TUGAS KONSEP CLOUD COMPUTING NAMA : RIZAL KURNIAWAN NIM : 145410039 / S1 – TI engine(google,yahoo), tokoonline(amazon), situs berita(detikcom), layanan akademis perguruan tingg i(website IT Telkom) dan lain-lain. Beberapa konsep dasar pemrograman berbasis web (Hariyanto, 2004), yaitu : 1. Komunikasi antara web browser dan web server berdasarkan protokol HTTP. 2. Dokumen dan semua sumber daya apapun di jaringan yang dikehendaki diidentifikasi dengan Universal Resource Locator (URL). 3. Dokumen web ditulis berdasarkan standar HTML. 4. Pemrograman dilakukan dari sisi Client (client-side scripting ) 5. Pemrograman dilakukan dari sisi server (server-side cripting/programming). Standar Teknologi Web Secara umum teknologi disain web terbagi menjadi beberapa layer (lapisan), yaitu structural layer, presentation layer dan behavioral layer. Structural layer Layer ini berhubungan dengan struktur dokumen dokumen web. Bagaimana sebuah dokumen tersusun, format apa yang dipakai, tanda atau mark up apa yang digunakan merupakan bagian dari layer ini. Standar teknologi yang direkomendasikan saat ini adalah Extensible Hypertext Markup Language (XHTML) dan Extensible Markup Language (XML). XHTML adalah HTML versi terakhir (4.01) yang ditulis ulang dengan dengan aturan-aturan yang lebih ketat mengacu pada XML. Sedangkan XML adalah sekumpulan aturan untuk menyusun bahasa markup. Presentation layer Layer ini berhubungan dengan bagaimana mengatur tampilan dokumen pada layar, suara yang keluar, atau bagaimana format pencetakan dokumen. Pada teknologi web lama bagian ini menyatu dengan structural layer. Tapi pada standar baru, layer ini disarankan untuk dipisah. Yang termasuk teknologi ini adalah Cascading Style Sheets (CSS). Behavioral layer Layer ini berhubungan dengan masalah penggunaan bahasa skrip dan pemrogramannya untuk tujuan meningkatkan sisi interaktif dan dinamis halaman web. Yang termasuk dalam layer ini adalah Document Object Model (DOM) dan JavaScript. DOM memungkinkan suatu dokumen atau skrip untuk mengakses atau meng-update isi, struktur, dan style dari dokumen. JavaScript merupakan teknologi yang cukup lama dan tetap digunakan untuk menambah dokumen menjadi lebih interaktif. Web Statis dan Web Dinamis Halaman web dapat digolongkan menjadi web statis dan web dinamis. Pengertian web statis dan web dinamis seringkali mengundang perdebatan. Sebagian pengguna internet menyatakan TUGAS KONSEP CLOUD COMPUTING NAMA : RIZAL KURNIAWAN NIM : 145410039 / S1 – TI jika pada halaman-halaman web dilengkapi dengan animasi yang bergerak maka disebut web dinamis sedangkan jika halaman-halaman web tersebut hanya berisi teks dan gambar yang tidak bergerak maka disebut web statis. Namun berdasarkan kesepakatan maka pengertian statis dan dinamis tidak ditentukan oleh ada atau tidaknya animasi bergerak pada halaman- halaman web, tetapi ditentukan oleh isi atau informasi yang ada pada halaman-halaman tersebut. Data dan informasi yang ada pada web statis tidak berubah-ubah. Dokumen web yang dikirim kepada client akan sama isinya dengan apa yang ada di webserver. Sedangkan web dinamis, memiliki data dan informasi yang berbeda-beda tergantung input apa yang disampaikan client. Dokumen yang sampai di client akan berbeda dengan dokumen yang ada di webserver. Contoh paling mudah untuk membedakan web statis dan web dinamis adalah bila kalian membuka situs Google. Halaman awal adalah statis karena kita tidak melihat perubahan isi atau informasi. Halaman ini baik di komputer client maupun di webserver akan sama. Namun begitu kita memasukkan kata pada textbox yang tersedia kemudian menekan tombol search maka kita sedang berinteraksi dengan webserver Google. Webserver akan mengirimkan halaman web sesuai yang diminta oleh client. Tampilan di sisi client akan berupa daftar alamat dan keterangannya. Sedangkan di sisi server isi dokumennya adalah serangkain kode-kode untuk mencari apa yang diinputkan client. Automatic Computing Otomatis Computing Mesin (ACE) adalah desain komputer awal elektronik yang disimpan- program yang diproduksi oleh Alan Turing atas undangan John R. Womersley, pengawas dari Divisi Matematika dari National Physical Laboratory (NPL). Penggunaan kata Mesin adalah untuk menghormati Charles Babbage dan Difference Engine dan Analytical Mesin. Desain teknis Turing Usulan Elektronik Kalkulator adalah produk dari karya teoretisnya pada tahun 1936 "On Computable Numbers" [1] dan pengalaman masa perang di Bletchley Park di mana komputer Colossus telah berhasil memecahkan kode militer Jerman. Dalam makalahnya tahun 1936, Turing dijelaskan idenya sebagai "universal mesin komputasi", tetapi sekarang dikenal sebagai mesin Turing Universal. Pada 19 Februari 1946 Turing mempresentasikan makalah rinci untuk National Physical Laboratory (NPL) Komite Eksekutif, memberikan desain yang cukup lengkap pertama dari sebuah komputer disimpan-program. Namun, karena ketat dan tahan lama kerahasiaan di sekitar pekerjaan Bletchley Park, ia dilarang (karena Official Secrets Act) dari menjelaskan bahwa ia tahu bahwa ide-idenya bisa diimplementasikan dalam perangkat elektronik. Desain EDVAC lebih terkenal disajikan dalam Draft Pertama Laporan di EDVAC (tanggal 30 Juni 1945), oleh John von Neumann, yang tahu pekerjaan teoritis Turing, menerima banyak publisitas, meskipun sifatnya tidak lengkap dan kurangnya dipertanyakan atribusi sumber dari beberapa ide. TUGAS KONSEP CLOUD COMPUTING NAMA : RIZAL KURNIAWAN NIM : 145410039 / S1 – TI Laporan Turing di ACE ditulis pada akhir 1945 dan termasuk rinci diagram sirkuit logis dan perkiraan biaya £ 11.200. Dia merasa bahwa kecepatan dan ukuran memori yang penting dan ia mengusulkan memori berkecepatan tinggi apa yang akan saat ini disebut 25 KiB, diakses pada kecepatan 1 MHz. ACE dilaksanakan panggilan subroutine, sedangkan EDVAC tidak, dan apa juga mengatur ACE terpisah dari EDVAC adalah penggunaan Instruksi Disingkat Komputer, bentuk awal dari bahasa pemrograman. Awalnya, direncanakan bahwa Tommy Flowers, insinyur di Stasiun Penelitian Kantor Pos di Dollis Bukit di utara London, yang telah bertanggung jawab untuk membangun komputer Colossus harus membangun ACE, tapi karena kerahasiaan di sekitar prestasi masa perang dan tekanan kerja pasca-perang, ini tidak mungkin. Rekan Turing di NPL, tidak mengetahui tentang Colossus, berpikir bahwa pekerjaan rekayasa untuk membangun ACE lengkap terlalu ambisius, jadi versi pertama dari ACE yang dibangun adalah Pilot Model ACE, versi yang lebih kecil dari desain asli Turing. Pilot ACE memiliki 1.450 termionik katup (tabung vakum), dan digunakan merkuri delay baris untuk memori utama. Masing-masing dari 12 jalur delay bisa menyimpan 32 instruksi atau kata-kata data 32 bit. Ini menjalankan program pertama pada 10 Mei 1950, dimana pada saat itu komputer tercepat di dunia dengan kecepatan clock 1 MHz. Implementasi kedua dari desain ACE adalah MOSAIC (Departemen Pasokan Integrator otomatis dan Komputer). Ini dibangun oleh Allen Coombs dan William Chandler dari Dollis Bukit
Recommended publications
  • Evaluating and Optimizing I/O Virtualization in Kernel-Based Virtual Machine (KVM)

    Evaluating and Optimizing I/O Virtualization in Kernel-Based Virtual Machine (KVM)

    Evaluating and Optimizing I/O Virtualization in Kernel-based Virtual Machine (KVM) Binbin Zhang1, Xiaolin Wang1, Rongfeng Lai1, Liang Yang1, Zhenlin Wang2, Yingwei Luo1, and Xiaoming Li1 1 Dept. of Computer Science and Technology, Peking University, Beijing, China, 100871 2 Dept. of Computer Science, Michigan Technological University, Houghton, USA {wxl,lyw}@pku.edu.cn, [email protected] Abstract. I/O virtualization performance is an important problem in KVM. In this paper, we evaluate KVM I/O performance and propose several optimiza- tions for improvement. First, we reduce VM Exits by merging successive I/O instructions and decreasing the frequency of timer interrupt. Second, we simplify the Guest OS by removing redundant operations when the guest OS operates in a virtual environment. We eliminate the operations that are useless in the virtual environment and bypass the I/O scheduling in the Guest OS whose results will be rescheduled in the Host OS. We also change NIC driver’s con- figuration in Guest OS to adapt the virtual environment for better performance. Keywords: Virtualization, KVM, I/O Virtualization, Optimization. 1 Introduction Software emulation is used as the key technique in I/O device virtualization in Ker- nel-based Virtual Machine (KVM). KVM uses a kernel module to intercept I/O re- quests from a Guest OS, and passes them to QEMU, an emulator running on the user space of Host OS. QEMU translates these requests into system calls to the Host OS, which will access the physical devices via device drivers. This implementation of VMM is simple, but the performance is usually not satisfactory because multiple environments are involved in each I/O operation that results in multiple context switches and long scheduling latency.
  • Virtualizing Your Network: Benefits & Challenges

    Virtualizing Your Network: Benefits & Challenges

    Network Monitoring Technology Virtualizing Your Network: Benefits & Challenges What is Virtualization? factory or process plant. Virtualization can give this software Gartner Research1 defined network virtualization as the a longer operating lifecycle time, and can save both costs process of combining hardware and software network and intellectual property. resources and functionality into a single virtual network. This offers access to routing features and data streams that can provide newer, service-aware, resilient solutions; newer security services that are native within network elements; support for subscriber-aware policy control for peer-to- peer traffic management; and application-aware, real-time session control for converged voice and video applications with guaranteed bandwidth on-demand. For the most part, when we speak of virtualization, we speak of hardware virtualization. That means that we create, on a host machine, a virtual machine that looks like another computer with an operating system and software. The software on the virtual machine is separate from the host machine’s resources, and as far as it is concerned, it is running on its own computer (that we call the guest). Both in information technology (IT) and in operational technology (OT) environments the benefits of virtualization have led to its rapid adoption. This white paper is not a prescriptive guide to network virtualization, rather it is a high-level overview focused on the benefits and challenges of network virtualization. While it will Desktop virtualization separates the logical desktop from review the benefits, it will also cover the specific challenges the actual hardware. Virtual desktop infrastructure (VDI) network administrators and their respective businesses should permits the user to interact with the computer through understand to cost-effectively apply this technology to gain another host computer or device on a network connection.
  • Energy Efficiency in Office Computing Environments

    Energy Efficiency in Office Computing Environments

    Fakulät für Informatik und Mathematik Universität Passau, Germany Energy Efficiency in Office Computing Environments Andreas Berl Supervisor: Hermann de Meer A thesis submitted for Doctoral Degree March 2011 1. Reviewer: Prof. Hermann de Meer Professor of Computer Networks and Communications University of Passau Innstr. 43 94032 Passau, Germany Email: [email protected] Web: http://www.net.fim.uni-passau.de 2. Reviewer: Prof. David Hutchison Director of InfoLab21 and Professor of Computing Lancaster University LA1 4WA Lancaster, UK Email: [email protected] Web: http://www.infolab21.lancs.ac.uk Abstract The increasing cost of energy and the worldwide desire to reduce CO2 emissions has raised concern about the energy efficiency of information and communica- tion technology. Whilst research has focused on data centres recently, this thesis identifies office computing environments as significant consumers of energy. Office computing environments offer great potential for energy savings: On one hand, such environments consist of a large number of hosts. On the other hand, these hosts often remain turned on 24 hours per day while being underutilised or even idle. This thesis analyzes the energy consumption within office computing environments and suggests an energy-efficient virtualized office environment. The office environment is virtualized to achieve flexible virtualized office resources that enable an energy-based resource management. This resource management stops idle services and idle hosts from consuming resources within the office and consolidates utilised office services on office hosts. This increases the utilisation of some hosts while other hosts are turned off to save energy. The suggested architecture is based on a decentralized approach that can be applied to all kinds of office computing environments, even if no centralized data centre infrastructure is available.
  • Network Virtualization for Dummies®, Vmware Special Edition Published by John Wiley & Sons, Inc

    Network Virtualization for Dummies®, Vmware Special Edition Published by John Wiley & Sons, Inc

    These materials are © 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Network Virtualization VMware Special Edition by Mora Gozani These materials are © 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Network Virtualization For Dummies®, VMware Special Edition Published by John Wiley & Sons, Inc. 111 River St. Hoboken, NJ 07030‐5774 www.wiley.com Copyright © 2016 by John Wiley & Sons, Inc., Hoboken, New Jersey No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748‐6011, fax (201) 748‐6008, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. VMware, vSphere, and vRealize are registered trademarks and VMware NSX and VMware vRealize Operations, and vRealize Automation are trademarks of VMware, Inc. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associ- ated with any product or vendor mentioned in this book.
  • Read Book Hyper-V Network Virtualization Cookbook Ebook

    Read Book Hyper-V Network Virtualization Cookbook Ebook

    HYPER-V NETWORK VIRTUALIZATION COOKBOOK PDF, EPUB, EBOOK Ryan Boud | 228 pages | 02 Dec 2014 | Packt Publishing Limited | 9781782177807 | English | Birmingham, United Kingdom Hyper-V Network Virtualization Cookbook PDF Book In , Slack faced a problem: the load on its backend servers had increased by 1,x. The Best Tech Newsletter Anywhere Join , subscribers and get a daily digest of news, geek trivia, and our feature articles. Case studies How Slack rearchitected its system to achieve zero downtime and improve latency, reliability and availability In , Slack faced a problem: the load on its backend servers had increased by 1,x. For one thing, VPN servers are located all over the world. We still need to add the other hard drives. Each IDE Controller only has two slots available for adding drives. Networking Fundamentals Read how we developed our new breakthrough NLP-powered feature. The Best Tech Newsletter Anywhere Join , subscribers and get a daily digest of news, geek trivia, and our feature articles. Here is how to change what gets switched back on. Now navigate to the exported virtual machine and be sure to select folder that your virtual machine was exported into. Since we launched in , our articles have been read more than 1 billion times. Security and privacy are big concerns these days, particularly when it comes to dealing with sensitive information on the internet. The wizard allows the disk geometry to be changed, which can be handy if a drive has become close to full and a little more breathing room is needed. By submitting your email, you agree to the Terms of Use and Privacy Policy.
  • Provisioning Service Differentiation for Virtualized Network Devices

    Provisioning Service Differentiation for Virtualized Network Devices

    ICNS 2011 : The Seventh International Conference on Networking and Services Provisioning Service Differentiation for Virtualized Network Devices Suk Kyu Lee, Hwangnam Kim, Jun-gyu Ahn, Kwang Jae Sung, and Jinwoo Park School of Electrical Engineering Korea University, Seoul, Republic of Korea Email: {sklee25, hnkim, dubhe, kjsung80, jwpark}@korea.ac.kr Abstract— In order to efficiently utilize the network bandwidth the existing works (that are described in Section II), many of and flexibly enable one or more networks to be combined or the virtualization techniques have been focused on the fairness subdivided into virtual networks, it is essential to virtualize among virtual machines’ CPU and I/O. network devices and then to provide service differentiation for the virtualized network devices. In this paper, we propose a virtualizing method for network devices based on the virtual machine and offers a differentiated scheduling scheme to satisfy QoS requirements that are imposed on virtualized devices. We have built the network virtualization framework combining the Virtual Box, time-slot-based time-sharing scheme, and leaky- bucket controller, and then we have conducted a performance evaluation study with real testbed. The empirical study indicates that the service differentiation for virtualized network devices is successfully supported by the proposed framework. Keywords - Network Virtualization, Scheduling Policy, Virtual Box, Virtual Machine I. INTRODUCTION Figure 1. Comparison of network resource usage between two virtual machines without any scheduling scheme. There has been a large improvement in the field of However, there has not been much research conducting on virtualization in the past decade. As noted by Goldberg [7], how to provide service differentiation for the network the idea of the virtual machine emerged around 1970s, but, resources.
  • Virtualization Basics: Understanding Techniques and Fundamentals

    Virtualization Basics: Understanding Techniques and Fundamentals

    Virtualization Basics: Understanding Techniques and Fundamentals Hyungro Lee School of Informatics and Computing, Indiana University 815 E 10th St. Bloomington, IN 47408 [email protected] ABSTRACT example of growing involvement in virtualization technolo- Virtualization is a fundamental part of cloud computing, gies with the cloud. Early technologies and developments especially in delivering Infrastructure as a Service (IaaS). in the virtualization have been accomplished by some com- Exploring different techniques and architectures of the vir- panies such as IBM from 1967 and VMware from 1998. In tualization helps us understand the basic knowledge of virtu- open source communities, Xen, KVM, Linux-vServer, LXC alization and the server consolidation in the cloud with x86 and others have supported virtualization in different plat- architecture. This paper describes virtualization technolo- forms with different approaches. In this paper, x86 archi- gies, architectures and optimizations regarding the sharing tecture virtualization will be discussed with these historical CPU, memory and I/O devices on x86 virtual machine mon- changes. itor. In cloud computing, Infrastructure-as-a-Service (IaaS) pro- vides on-demand virtual machine instances with virtualiza- Categories and Subject Descriptors tion technologies. IaaS has been broadly used to provide re- C.0 [General]: Hardware/software interface; C.4 [Performance quired compute resources in shared resource environments. of systems]: Performance attributes; D.4.7 [Operating Amazon Web Services (AWS), Google Compute Engine, Mi- Systems]: Organization and design crosoft Windows Azure, and HP Cloud offer commercial cloud services. OpenStack, Eucalyptus, SaltStack, Nimbus, General Terms and many others provide private open source cloud plat- Performance, Design forms with community support in development.
  • Data Center Server Virtualization Solution Using Microsoft Hyper-V

    Data Center Server Virtualization Solution Using Microsoft Hyper-V

    St. Cloud State University theRepository at St. Cloud State Culminating Projects in Information Assurance Department of Information Systems 5-2017 Data Center Server Virtualization Solution Using Microsoft yH per-V Sujitha Dandu St Cloud State University, [email protected] Follow this and additional works at: https://repository.stcloudstate.edu/msia_etds Recommended Citation Dandu, Sujitha, "Data Center Server Virtualization Solution Using Microsoft yH per-V" (2017). Culminating Projects in Information Assurance. 23. https://repository.stcloudstate.edu/msia_etds/23 This Starred Paper is brought to you for free and open access by the Department of Information Systems at theRepository at St. Cloud State. It has been accepted for inclusion in Culminating Projects in Information Assurance by an authorized administrator of theRepository at St. Cloud State. For more information, please contact [email protected]. Datacenter Server Virtualization Solution Using Microsoft Hyper-V by Sujitha Dandu A Starred Paper Submitted to the Graduate Faculty of St. Cloud State University in Partial Fulfillment of the Requirements for the Degree of Master of Information Assurance February, 2017 Starred Paper Committee: Dr. Dennis Guster, Chairperson Dr. Susantha Herath Dr. Balasubramanian Kasi 2 Abstract Cloud Computing has helped businesses scale within minutes and take their services to their customers much faster. Virtualization is considered the core-computing layer of a cloud setup. All the problems a traditional data center environment like space, power, resilience, centralized data management, and rapid deployment of servers as per business need have been solved with the introduction of Hyper-V (a server virtualization solution from Microsoft). Now companies can deploy multiple servers and applications with just a click and they can also centrally manage the data storage.
  • Evaluating Xen, Vmware, and Openvz Virtualization Platforms for Network Virtualization

    Evaluating Xen, Vmware, and Openvz Virtualization Platforms for Network Virtualization

    Evaluating Xen, VMware, and OpenVZ Virtualization Platforms for Network Virtualization Carlo Fragni, Marcelo D. D. Moreira, Diogo M. F. Mattos, Lu´ıs Henrique M. K. Costa, and Otto Carlos M. B. Duarte Universidade Federal do Rio de Janeiro - GTA/PEE/COPPE - Rio de Janeiro, Brazil Abstract—Network virtualization is a technique that allows Native Linux having multiple concurrent isolated networks sharing physi- 1200 Xen cal network resources. This work analyzes the main available VMWare virtualization platforms, Xen, OpenVZ, and VMware, for net- 1000 OpenVZ work virtualization. We compare their virtualization techniques, achieved performance in virtualizing computational resources 800 and appropriateness for usage in a virtual network environment. 600 To achieve our goal, we conduct experiments to evaluate overhead introduced by the virtualization platforms in comparison to a 400 non-virtualized environment. Throughput (in Mb/s) 200 I. OVERVIEW There has been recently great interest in network virtualiza- 0 tion, since it is considered a main component in many propos- Figure 1. Network reception test using large packet size. als for future internet architectures [1]. Network virtualization II. TESTS grants the ability to run concurrent virtual networks using independent network stacks, adding flexibility to the network. Many tests were made to evaluate overhead introduced by In order to implement network virtualization, a virtualization the virtualization tools in comparison to the non virtualized platform must be used. There are three main
  • 10 YEARS of OPEN VSWITCH SUCCESS and FAILURE BEN PFAFF WHAT IS OPEN VSWITCH? Controller

    10 YEARS of OPEN VSWITCH SUCCESS and FAILURE BEN PFAFF WHAT IS OPEN VSWITCH? Controller

    10 YEARS OF OPEN VSWITCH SUCCESS AND FAILURE BEN PFAFF WHAT IS OPEN VSWITCH? controller Open source project HV • Software switch Ethernet OVS VM • Portable • Programmable • Fast OPEN VSWITCH SUCCESS • Used in NSX on KVM, Windows, and public cloud • Widely used in Xen, KVM, OpenStack • Incumbent targeted by new projects • Over 5,000 academic citations LET'S CELEBRATE! • 2018: ACM SIGCOMM SOSR Software Systems Award. • 2015: NSDI "Best Paper" Award for "The Design and Implementation of Open vSwitch". KEYS TO SUCCESS PEOPLE, TECHNOLOGY, AND ENVIRONMENT ENVIRONMENT • Open source virtualization was exploding, but there was no good virtual switch. • Open vSwitch was in the right place at the right time. It filled a gap. • Nicira founders had relevant academic and business connections. • Nicira founders provided a valuable vision. PEOPLE • OVS had the best people: Justin Pettit, Jesse Gross, Ethan Jackson. Martin Casado: "You end up putting basically your best development resources... on the open source side of the house, which from a company is kind of difficult to do, because you basically want that best developer to work on the core product on the inside." (on "a16 Podcast: Monetizing Open Source", April 10, 2017.) • Nicira had PhD-type innovators: • Links to academics. • Willing and able to do library research and recognize where it was valuable. • Able to step back and consider larger problems. • Kind (by and large). TECHNOLOGY • We didn't know what Nicira needed, so we built OVS to do anything. • No one would want NSX-specific agents except NSX customers. • Lots of open source projects are aimed at one company's use case.
  • KVM) Binbin Zhang, Xiaolin Wang, Rongfeng Lai, Liang Yang, Zhenlin Wang, Yingwei Luo, Xiaoming Li

    KVM) Binbin Zhang, Xiaolin Wang, Rongfeng Lai, Liang Yang, Zhenlin Wang, Yingwei Luo, Xiaoming Li

    Evaluating and Optimizing I/O Virtualization in Kernel-based Virtual Machine (KVM) Binbin Zhang, Xiaolin Wang, Rongfeng Lai, Liang Yang, Zhenlin Wang, Yingwei Luo, Xiaoming Li To cite this version: Binbin Zhang, Xiaolin Wang, Rongfeng Lai, Liang Yang, Zhenlin Wang, et al.. Evaluating and Op- timizing I/O Virtualization in Kernel-based Virtual Machine (KVM). IFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.220-231, 10.1007/978- 3-642-15672-4_20. hal-01054988 HAL Id: hal-01054988 https://hal.inria.fr/hal-01054988 Submitted on 11 Aug 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Evaluating and Optimizing I/O Virtualization in Kernel-based Virtual Machine (KVM) Binbin Zhang1, Xiaolin Wang1, Rongfeng Lai1, Liang Yang1, Zhenlin Wang2, Yingwei Luo1 and Xiaoming Li1 1) Dept. of Computer Science and Technology, Peking University, Beijing, China, 100871 2) Dept. of Computer Science, Michigan Technological University, Houghton, USA {wxl, lyw}@pku.edu.cn, [email protected] Abstract. I/O virtualization performance is an important problem in KVM. In this paper, we evaluate KVM I/O performance and propose several optimizations for improvement.
  • Network Virtualization: State of the Art and Research Challenges N.M

    Network Virtualization: State of the Art and Research Challenges N.M

    1 Network Virtualization: State of the Art and Research Challenges N.M. Mosharaf Kabir Chowdhury and Raouf Boutaba, University of Waterloo Abstract—Recently network virtualization has been pushed forward by its proponents as a long term solution to the gradual ossification problem faced by the existing Internet and proposed to be an integral part of the next-generation networking paradigm. By allowing multiple heterogeneous network architectures to cohabit on a shared physical substrate, network virtualization provides flexibility, promotes diversity, and promises security and increased manageability. However, many technical issues stand in the way toward its successful realization. This article investigates the past and the state of the art in network virtualization along with the future challenges that must be addressed to realize a viable network virtualization environment. F 1 INTRODUCTION 2.1 Virtual Local Area Network A virtual local area network (VLAN) is a group of logically In recent years, the concept of network virtualization has networked hosts with a single broadcast domain regardless attracted significant attention in the debate on how to model of their physical connectivity. All frames in a VLAN bear a the next-generation networking paradigm that can replace the VLAN ID in the MAC header, and VLAN-enabled switches existing Internet. Architectural purists view network virtual- use both the destination MAC address and the VLAN ID to ization as a tool for evaluating new architectures; whereas, forward frames. Since VLANs are based on logical instead pluralists conceive virtualization as a fundamental diversifying of physical connections, network administration, management, attribute of the next-generation architecture itself [1].