scholarly journals PENGAMANAN NESTED VIRTUALIZATION SERVER UNTUK E-LEARNING MOODLE PADA PROXMOX VE MENGGUNAKAN METODE HIGH AVAILABILITY

BUANA ILMU ◽  
2021 ◽  
Vol 6 (1) ◽  
pp. 20-28
Author(s):  
Asep Sofyan Wahyudin ◽  
Muhamad Abdul Aziz ◽  
Eryan Ahmad Firdaus ◽  
Kanggep Andrijana Kusuma

Perkembangan teknologi komputasi saat ini luar biasa sangan pesat, tak sedikit sebuah server yang dulunya hanya dimanfaatkan untuk menangani satu layanan saja, kini hal itu sudah di anggap sebagai pemborosan resource, salah satu penyebabnya adalah perkembangan metode virtualisasi yang di anggap dapat mengoptimalkan sebuah server untuk menangani lebih banyak layanan dengan cara membuat beberapa mesin virtual dalam satu mesin real untuk memaksimalkan kemampuan server, lalu apakan dalam sebuah mesin virtual dapat menjalakan mesin virtual lagi, amankah bila digunakan untuk menangani layanan sistem informasi secara optimal.  Kata Kunci- Virtualisasi Bersarang, E-Learning, High Availability.   The development of computing technology is currently very fast, not a few servers that were previously only used to handle one service, now it is considered a waste of resources, one of the causes is the development of virtualization methods which are considered to optimize servers for more services by creating several virtual machines in to one real machine to maximize server capabilities, so in a virtual machine can it run the virtual machine again, is it safe to using it for optimal information system services.  Keyword- Nested Virtualization, E-Learning, High Availability.

2021 ◽  
Vol 2066 (1) ◽  
pp. 012062
Author(s):  
Renxian Zeng

Abstract With the rapid development and improvement of information technology, information system construction has new requirements and goals. Cloud computing technology is an inevitable choice in the construction of information system. By taking cloud computing technology as the basic structure framework, the phenomenon of data information island can be broken. The purpose of this paper is to study the application of cloud computing in the construction of information system. Taking the management mode of university campus as an example, based on the research of cloud computing technology, virtual machine technology and Internet of things technology, this paper discusses the data resource management algorithm of smart campus. Aiming at the scheduling model, strategy and research objectives of cloud computing resources in data center, this paper proposes a method of initial allocation and adaptive dynamic scheduling of virtual machine resources. According to the multi-dimensional vector characteristics of virtual machine, this paper proposes a resource allocation algorithm based on multi-objective evolution, and gives four important strategies. The experimental results show that the four advantages and strategies can effectively reduce the number of virtual machine migration and reduce the adverse impact on the overall performance of cloud computing core network.


Author(s):  
Ganesh Chandra Deka ◽  
Prashanta Kumar Das

Virtualization is an old proven technology used for effective utilization of Servers, Storage, and Network for reducing IT expenses without compromising the efficiency and agility for all size businesses. The area of application of Virtualization is very diverse such as e-Learning, Social Networking, and Simulation are a few to be mentioned. This chapter focuses on different virtualization approaches, benefits, architecture of different open source and commercial Virtual Machine Manager (VMM) and Virtual Machines (VM) migration techniques. All the technical terms appearing in this chapter is either defined wherever they appear or explained in the Key Terms and Definitions section of the chapter. The hardware requirements of all the hypervisiors are discussed for hassle free implementation and smooth reading of the chapter.


Author(s):  
Gurpreet Singh ◽  
Manish Mahajan ◽  
Rajni Mohana

BACKGROUND: Cloud computing is considered as an on-demand service resource with the applications towards data center on pay per user basis. For allocating the resources appropriately for the satisfaction of user needs, an effective and reliable resource allocation method is required. Because of the enhanced user demand, the allocation of resources has now considered as a complex and challenging task when a physical machine is overloaded, Virtual Machines share its load by utilizing the physical machine resources. Previous studies lack in energy consumption and time management while keeping the Virtual Machine at the different server in turned on state. AIM AND OBJECTIVE: The main aim of this research work is to propose an effective resource allocation scheme for allocating the Virtual Machine from an ad hoc sub server with Virtual Machines. EXECUTION MODEL: The execution of the research has been carried out into two sections, initially, the location of Virtual Machines and Physical Machine with the server has been taken place and subsequently, the cross-validation of allocation is addressed. For the sorting of Virtual Machines, Modified Best Fit Decreasing algorithm is used and Multi-Machine Job Scheduling is used while the placement process of jobs to an appropriate host. Artificial Neural Network as a classifier, has allocated jobs to the hosts. Measures, viz. Service Level Agreement violation and energy consumption are considered and fruitful results have been obtained with a 37.7 of reduction in energy consumption and 15% improvement in Service Level Agreement violation.


Author(s):  
Yuancheng Li ◽  
Pan Zhang ◽  
Daoxing Li ◽  
Jing Zeng

Background: Cloud platform is widely used in electric power field. Virtual machine co-resident attack is one of the major security threats to the existing power cloud platform. Objective: This paper proposes a mechanism to defend virtual machine co-resident attack on power cloud platform. Method: Our defense mechanism uses the DBSCAN algorithm to classify and output the classification results through the random forest and uses improved virtual machine deployment strategy which combines the advantages of random round robin strategy and maximum/minimum resource strategy to deploy virtual machines. Results: we made a simulation experiment on power cloud platform of State Grid and verified the effectiveness of proposed defense deployment strategy. Conclusion: After the virtual machine deployment strategy is improved, the coverage of the virtual machine is remarkably reduced which proves that our defense mechanism achieves some effect of defending the virtual machine from virtual machine co-resident attack.


2014 ◽  
Vol 1046 ◽  
pp. 508-511
Author(s):  
Jian Rong Zhu ◽  
Yi Zhuang ◽  
Jing Li ◽  
Wei Zhu

How to reduce energy consumption while improving utility of datacenter is one of the key technologies in the cloud computing environment. In this paper, we use energy consumption and utility of data center as objective functions to set up a virtual machine scheduling model based on multi-objective optimization VMSA-MOP, and design a virtual machine scheduling algorithm based on NSGA-2 to solve the model. Experimental results show that compared with other virtual machine scheduling algorithms, our algorithm can obtain relatively optimal scheduling results.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3807 ◽  
Author(s):  
Haonan Sun ◽  
Rongyu He ◽  
Yong Zhang ◽  
Ruiyun Wang ◽  
Wai Hung Ip ◽  
...  

Today cloud computing is widely used in various industries. While benefiting from the services provided by the cloud, users are also faced with some security issues, such as information leakage and data tampering. Utilizing trusted computing technology to enhance the security mechanism, defined as trusted cloud, has become a hot research topic in cloud security. Currently, virtual TPM (vTPM) is commonly used in a trusted cloud to protect the integrity of the cloud environment. However, the existing vTPM scheme lacks protections of vTPM itself at a runtime environment. This paper proposed a novel scheme, which designed a new trusted cloud platform security component, ‘enclave TPM (eTPM)’ to protect cloud and employed Intel SGX to enhance the security of eTPM. The eTPM is a software component that emulates TPM functions which build trust and security in cloud and runs in ‘enclave’, an isolation memory zone introduced by SGX. eTPM can ensure its security at runtime, and protect the integrity of Virtual Machines (VM) according to user-specific policies. Finally, a prototype for the eTPM scheme was implemented, and experiment manifested its effectiveness, security, and availability.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
C. Saravanakumar ◽  
M. Geetha ◽  
S. Manoj Kumar ◽  
S. Manikandan ◽  
C. Arun ◽  
...  

Cloud computing models use virtual machine (VM) clusters for protecting resources from failure with backup capability. Cloud user tasks are scheduled by selecting suitable resources for executing the task in the VM cluster. Existing VM clustering processes suffer from issues like preconfiguration, downtime, complex backup process, and disaster management. VM infrastructure provides the high availability resources with dynamic and on-demand configuration. The proposed methodology supports VM clustering process to place and allocate VM based on the requesting task size with bandwidth level to enhance the efficiency and availability. The proposed clustering process is classified as preclustering and postclustering based on the migration. Task and bandwidth classification process classifies tasks with adequate bandwidth for execution in a VM cluster. The mapping of bandwidth to VM is done based on the availability of the VM in the cluster. The VM clustering process uses different performance parameters like lifetime of VM, utilization of VM, bucket size, and task execution time. The main objective of the proposed VM clustering is that it maps the task with suitable VM with bandwidth for achieving high availability and reliability. It reduces task execution and allocated time when compared to existing algorithms.


Author(s):  
Pritam Patange

Abstract: Cloud computing has experienced significant growth in the recent years owing to the various advantages it provides such as 24/7 availability, quick provisioning of resources, easy scalability to name a few. Virtualization is the backbone of cloud computing. Virtual Machines (VMs) are created and executed by a software called Virtual Machine Monitor (VMM) or the hypervisor. It separates compute environments from the actual physical infrastructure. A disk image file representing a single virtual machine is created on the hypervisor’s file system. In this paper, we analysed the runtime performance of multiple different disk image file formats. The analysis comprises of four different parameters of performance namely- bandwidth, latency, input-output operations performed per second (IOPS) and power consumption. The impact of the hypervisor’s block and file sizes is also analysed for the different file formats. The paper aims to act as a reference for the reader in choosing the most appropriate disk file image format for their use case based on the performance comparisons made between different disk image file formats on two different hypervisors – KVM and VirtualBox. Keywords: Virtualization, Virtual disk formats, Cloud computing, fio, KVM, virt-manager, powerstat, VirtualBox.


2018 ◽  
Vol 17 (2) ◽  
pp. 7335-7349
Author(s):  
Rashid Alakbarov

The article analyzes the advantages of mobile cloud technologies and problems emerging during the use of those. The network infrastructure created based on cloudlets at the second level of mobile cloud computing with hierarchical structure is analyzed. At the same time, the article explores the issues of satisfaction of demand of mobile equipment for computing and memory resources by using these technologies. The article presents one solution for the allocation of mobile user requests in virtual machines created in cloudlets located near base stations of wireless metropolitan area networks (WMAN) in a balanced way by considering the technical capacity of those. Alongside, the article considers the solution of user problem during designated time and the issue of determining virtual machines satisfying other requirements. For this purpose, different characteristics of the stated problem, virtual machines, as well as communication channels between a user and virtual machines are considered. By using possible values determining the importance of cloudlets, conditions for loading software applications of a user to a virtual machine are explored and an appropriate method is proposed.


Sign in / Sign up

Export Citation Format

Share Document