scholarly journals OPTIMALISASI SUMBER DAYA KOMPUTER DENGAN VIRTUALISASI SERVER MENGGUNAKAN PROXMOX VE

2019 ◽  
Vol 9 (2) ◽  
pp. 369-376
Author(s):  
Soni Soni ◽  
Abdurrahman Abdurrahman ◽  
Afdhil Hafid

Virtualization technology is a topic that began to be scrutinized by researchers. This is inseparable from the technology's ability to reduce the cost of providing infrastructure and operations independently for each service to be served. With server virtualization, we can make several computers into one, which used to be possible for server computers to have three physical computers that can be used as one for the three server computers which in fact the resources on a single physical server computer will not use all the resources in one single physical computer. The existence of proxmox, then all servers can be connected in a network together so that they are able to streamline time. In addition, Proxmox has a web console that can be used for various purposes in server virtualization and maintenance. In this study, the performance of server virtualization using ProxmoxVE will be examined. This study is intended to determine the load of memory usage, load the CPU when running all the servers in Proxmox, and examine the Throughput, PacketLoss, Delay and Jitter on the server. Keyword: Proxmox, Virtualization, Resources, Server, Operating System

Author(s):  
Ghossoon M. Waleed Al-Saadoon ◽  
Ebrahim Al Naemi

The aim of server virtualization is to eliminate the Hardware equipment in the Datacenter and maximize the utilization of the existing resources. This helps companies in achieving the business goals and objectives in cost effective manner and better support and integration. Virtualization technology changes the protection way of security, as most of hardware and software become after virtualization such as servers, switches, Logical Unit Numbers (LUNs) etc. and it's no longer trying to protect a physical hardware, (Hurwitz & et al, 2013). The overall objective of this chapter is to find out the solution for reducing the keep regular increasing recurring cost and risk involved in information technology management and maintenance. The chapter is about finding out the solution from which it's possible to ultimately lower the cost, speed deployment, provide additional disaster recovery options, and ease testing and developing, and provide unprecedented mobility, flexibility and reliability.


Author(s):  
Richard Scroggins

Virtualization represents a class of technologies that covers a wide range of applications and implementations. Virtualization can be applied to hardware or software and the technologies within the umbrella of virtualization are growing. Some organizations are adopting virtualization technologies for the cost savings benefits, but they may not weigh the risks. Bizarro and Garcia(2013) write, “As the technology becomes more standardized, server virtualization has become more prevalent. Companies are realizing cost savings and greener computing. Virtualization may initially appear attractive because of additional capabilities and cost savings, but those benefits come with increased security risks.” (p. 11). As the idea of virtualization grows, so does adoption, and new improvements and virtualization technologies are emerging. Every emerging virtualization technology or innovation, however, has pros and cons or benefits and risk. Many of the emerging virtualization technologies represent an implementation challenge for project managers and implementers. This research paper will be focused on emerging virtualization technologies, implementation success factors, and virtualization risks.


2018 ◽  
Vol 5 (1) ◽  
pp. 32
Author(s):  
I Gede Primanata ◽  
Nyoman Putra Sastra ◽  
Dewa Made Wiharta

This study aims to compare VMware server virtualization technology and Xen server that simulates hardware into the software. In order to share loads can be balanced on both virtual servers, this research used HAproxy as Load Balancing which is implemented on Apache Web Server so performance from CPU usage side, memory and access speed from VMware and Xen server virtualization can be compared. By comparing these two models, it is expected to be used as a reference for selecting virtualization models for shared resource needs on one or more physical servers. From the results of testing in this study, it was found that the performance of VMware is better than Xen when viewed from the CPU usage. CPU usage in VMware is lower than Xen with 1.57% when handling one website and 1.58% when handling two websites. In terms of memory usage Xen Server is more efficient in memory usage when compared to VMware, Xen is more efficient memory of 29.11% and 34.84% for handling one and two websites when compared to VMware. While in terms of data access speed on Xen faster than VMware, which is about 42,132 Kbps.


2020 ◽  
Vol 6 (1) ◽  
pp. 1
Author(s):  
Kuswanto Kuswanto ◽  
Juan Junius ◽  
Anita Christine Sembiring

Facility layout is integrated planning of the flow of a product in an operating system to obtain the most effective and efficient interrelation between workers, materials, machinery, and equipment as well as handling and transferring materials. A company engaged in furniture manufacturing has a problem in its production process, namely, the distance between machines is too far so that it affects the cost of handling materials. Distant workstations are found on profile machines, milling machines, measuring machines, cutting machines. Therefore, improvements must be made to the layout of facilities on the production floor so that facility layout is efficient and material handling costs are reduced. The problem-solving approach used is the Graph Method and CRAFT Algorithm. The results of the research show that material handling costs are reduced by 7.58% or Rp. 17,765 using the CRAFT algorithm.


Author(s):  
O Sri Nagesh ◽  
Tapas Kumar ◽  
Venkateswara Rao Vedula

Significant exploitation and utilization of cloud computing in industry is come with and in the identical time vulnerable by unease regarding protection of data hold by cloud computing providers. One of the penalties of moving data processing and storage off business site is that organizations have fewer controls over their infrastructure. seeing that, cloud service (CS) providers must hope that the CS provider is capable to protect their data and infrastructure from both exterior and domestic attacks. Presently however, such hope can only rely on organizational procedures stated by the CS provider and cannot be remotely verified and validated by an external party. The central distinction between cloud computing and conventional enterprise internal Information Technology services is that the proprietor and the consumer of cloud Information Technology infrastructures are separated in cloud. This transform requires a safety responsibility severance in cloud computing. Cloud service providers (CSP) should safe the services they propose and cannot surpass the customers’ authorities. Virtualization is a buildup utterance in the Information Technology world. With the assure to reduce the ever mounting infrastructure inside data centers connected to other important apprehensions such as ease of use and scalability, virtualization technology has been in advance recognition not only with IT experts yet also among administrators and executives as well. The progressively more growing rate of the approval of this technology has exposed these systems to new protection concerns which in recent history have been unnoticed or merely overlooked. This paper presents an in depth state of art gaze at  present most old server virtualization explanations, as well as a writing study on different security matters found inside this virtualization technology. These problems can be practical to all the existing virtualization technologies accessible with no spotlight on a specific answer. Nevertheless, we do susceptibility investigation of two of the mainstream recognized virtualization answers: VMware ESX and Xen. to conclude, we illustrate some clarifications on how to progress the security of online banking and electronic commerce, using virtualization.


1996 ◽  
Vol 33 (2) ◽  
pp. 557-572 ◽  
Author(s):  
Shey-Huei Sheu

This paper considers a modified block replacement with two variables and general random minimal repair cost. Under such a policy, an operating system is preventively replaced by new ones at times kT (k= 1, 2, ···) independently of its failure history. If the system fails in [(k − 1)T, (k − 1)T+ T0) it is either replaced by a new one or minimally repaired, and if in [(k − 1) T + T0, kT) it is either minimally repaired or remains inactive until the next planned replacement. The choice of these two possible actions is based on some random mechanism which is age-dependent. The cost of the ith minimal repair of the system at age y depends on the random part C(y) and the deterministic part ci (y). The expected cost rate is obtained, using the results of renewal reward theory. The model with two variables is transformed into a model with one variable and the optimum policy is discussed.


2015 ◽  
Vol 733 ◽  
pp. 740-744 ◽  
Author(s):  
Yi Zhang ◽  
Shi Chuan Xu

Compared with the traditional electric-powered wheelchair, people are paying more attention on intelligent wheelchair. While the traditional intelligent wheelchair relays on separate designed control system, it is not good for general use. In that case, ROS provides an easy to use framework for rapid system development so that the researchers can develop various software packages to meet their needs, and we can also call each other packages without considering the compatibility problems. In this paper, we present a ROS (Robot Operating System) based intelligent wheelchair with the function of voice-control navigation. Compared with the traditional navigation, the voice-control navigation is more human. Obviously, ROS increases the versatility of system and reduces the cost. In order to prove the advancement and feasibility of this developed system, some experimental results are given in the paper.


Sign in / Sign up

Export Citation Format

Share Document