scholarly journals Virtualized DB Clustering and Server Consolidation: It’s Implementation with a Live Case Study

Author(s):  
Ram Prasad Patnaik ◽  
Dambaru Dhara Nahak

Virtualization is a technology that transforms today’s powerful computer hardware, which was designed to run a single operating system and a single application, to run multiple virtual machine having independent operating system. Many times, we observes that the server resources been underutilized. Virtualization allows us to efficiently utilize the available resources on physical machine. In virtualization environment, different virtualized machines can have different host operating system (i.e. different versions windows, Linux, Solaris etc). The most important concept to understand in virtualization is that, the virtual machines operating systems are independent from physical server operating system. This paper is an attempt to illustrate and appreciate the concept of virtualization and its implementation by using a live case study which we have implemented for one of our leading ETL tool development for a client. Case study elaborates the implementation details about Virtualized DB Clustering and Server Consolidation.

Author(s):  
Petr Zach ◽  
Martin Pokorný ◽  
Jiří Balej ◽  
Michal Šturma

A management of computer classroom is undoubtedly a difficult task for the administrator which has to prepare virtual operating systems for education. It is quite common that lectors need to edit the particular machine during the semester, and that is the case where the main problems can appear. The process of changes deployment is not just very time-consuming but during it a virtual machine inconsistency can appear. The main part of this paper focuses on system process diagrams and its pseudocode. At first, the machine is created on the remote server by lector or administrator. After a proper approval, the machine is able to be deployed. The lector then specifies the details about date, time and destinations of the virtual machine deployment. Once these details are approved, the virtual machine will be automatically deployed at the specified time. The automatic deployment includes also an initial configuration of the virtual machine at remote desktop and its post-install configuration (hostname, MAC address, etc.). Once all steps are completed, the process will be marked as succeed. We present an automatized solution which provides a possibility how to easily manage computer classroom with virtual operating systems. The proposed solution should deliver a greater flexibility, more reliability and faster deployment in comparison with the current solution used in our computer classroom. The proposal is also able to manipulate with already deployed machines for easy changes (e.g. software updates). The main advantage is the improvement of classroom management process automation.


Sensors ◽  
2019 ◽  
Vol 19 (12) ◽  
pp. 2724 ◽  
Author(s):  
Yuan ◽  
Sun

High-energy consumption in data centers has become a critical issue. The dynamic server consolidation has significant effects on saving energy of a data center. An effective way to consolidate virtual machines is to migrate virtual machines in real time so that some light load physical machines can be turned off or switched to low-power mode. The present challenge is to reduce the energy consumption of cloud data centers. In this paper, for the first time, a server consolidation algorithm based on the culture multiple-ant-colony algorithm was proposed for dynamic execution of virtual machine migration, thus reducing the energy consumption of cloud data centers. The server consolidation algorithm based on the culture multiple-ant-colony algorithm (CMACA) finds an approximate optimal solution through a specific target function. The simulation results show that the proposed algorithm not only reduces the energy consumption but also reduces the number of virtual machine migration.


2014 ◽  
Vol 530-531 ◽  
pp. 667-670
Author(s):  
Ke Ming Chen

In order to ensure that the cloud platform client runtime kernel virtual machine security, this paper proposes a new framework for dynamic monitoring of virtual machines, it is for the kernel rootkit attacks, study the cloud client virtual machine operating system kernel safety, presented Hyperchk virtual machine dynamic monitoring framework. This framework mainly for kernel rootkit attacks, ensure that customers running virtual machine kernel security.


2013 ◽  
Vol 394 ◽  
pp. 495-498
Author(s):  
Ya Jun Wang

Operating Linux Application softwares on Windows platform, can not only promote the development of interoperability technology of these two operating systems, but also strengthen the status Windows has in the market. Because of the differences in the architectures of Linux and Windows, when running Linux application programs in Windows operating system, we need to resort to some certain kinds of technologies such as Services For Unix, Application Programming Interface emulation, virtual machine platform, source codes refactoring, etc. This paper aims at making deep analyses on the principles and features of these technologies.


2020 ◽  
Vol 20 (1) ◽  
pp. 36-52
Author(s):  
C. Vijaya ◽  
P. Srinivasan

AbstractThe goal of data centers in the cloud computing environment is to provision the workloads and the computing resources as demanded by the users without the intervention of the providers. To achieve this, virtualization based server consolidation acts as a vital part in virtual machine placement process. Consolidating the Virtual Machines (VMs) on the Physical Machines (PMs) cuts down the unused physical servers, decreasing the energy consumption, while keeping the constraints for CPU and memory utilization. This technique also reduces the resource wastage and optimizes the available resources efficiently. Ant Colony Optimization (ACO) that is a well-known multi objective heuristic algorithm and Grey Wolf Algorithm (GWO) has been used to consolidate the servers used in the virtual machine placement problem. The proposed Fuzzy HAGA algorithm outperforms the other algorithms MMAS, ACS, FFD and Fuzzy ACS compared against it as the number of processors and memory utilization are lesser than these algorithms.


2014 ◽  
Vol 3 (1) ◽  
pp. 13-22
Author(s):  
Reza Asgari ◽  
Reza Ebrahimi Atani

Today, smart cards are widely used in variety of applications of human life.The nature of these cards depends on theirs operating system, in other words the operating system determines that card can be used in what field. Hardware development on the one hand and increasing use of smart cards on the other, have led to that the operating systems have progressed dramatically.Moving from special-purpose operating systems with single application into multi-purpose operating systems with open architecture, is proof of claim.Increase the number of operating systems and variety of their applications, caused that the need to categorize and classify operating systems be felt more than ever.Smart card operating systems can be categorized based on different parameters such as file management, applications management, and historical generations. In this paper we will discussion about smart card operating systems and their classification based on these parameters.


2020 ◽  
Author(s):  
André Gradvohl

Pandemic brought new forms of remote education into the discussion. However, facilitating students' access to good computing infrastructure is not a widespread task. This paper presents a report on the use of computing resources in the AWS cloud by students in the Operating Systems class during the pandemic, from March to July 2020. The use of these computational resources was essential to consolidate some of the concepts covered in the course and, at the same time, to complement the students' knowledge about cloud computing. The results of this survey were very positive. Students said they learned more about the resources available in the cloud, the potential of cloud computing, and how to use it. Besides, they were able to create their remote infrastructure to carry out the work proposed in the Operating System class.


2020 ◽  
Author(s):  
André Gradvohl

Pandemic brought new forms of remote education into the discussion. However, facilitating students' access to good computing infrastructure is not a widespread task. This paper presents a report on the use of computing resources in the AWS cloud by students in the Operating Systems class during the pandemic, from March to July 2020. The use of these computational resources was essential to consolidate some of the concepts covered in the course and, at the same time, to complement the students' knowledge about cloud computing. The results of this survey were very positive. Students said they learned more about the resources available in the cloud, the potential of cloud computing, and how to use it. Besides, they were able to create their remote infrastructure to carry out the work proposed in the Operating System class.


Author(s):  
Andrii Pryimak ◽  
Vasyl Karpinets ◽  
Yana Yaremchuk

It is known that with the growing popularity of blockchain and cryptocurrency technology, many people want to make money on it. As a result, hackers who use other people's resources for easy profit are becoming more active. There are many different tools available today to protect user’s personal computers from cryptojacking, but effective protection for server operating systems are still actual.This paper investigates the possibility of searching for unauthorized cryptocurrency mining processes by three parameters: search for suspicious processes by name, by binary signature and by connection to the mining pool.Based on the study, a method of automated search for unauthorized cryptocurrency mining in server OS containers was proposed, which consists of 5 main stages:1. Search for unauthorized cryptocurrency generation processes by process name.2. Search by binary signature.3. Search for a connection to a mining pool4. Detection of the process of unauthorized mining and stopping the container in which the mining process was detected.5. Notification of the system administrator about the detection of unauthorized cryptocurrency generation processes.It is worth noting that, unlike existing tools, the developed method searches for containers from the host virtual machine, so that there is no need to run a search in each of the containers, as it can be a large number of them and as a result reduce the load on the system.The block diagram of the application for the implementation of the proposed method was also described, as well as examples of stopping the container in which an unauthorized mining process was found and the corresponding message to the system administrator.In addition, a study of the speed of the proposed method was conducted. The results of the test showed a time of 2,585 seconds, which reflects the fast operation and the absence of additional overload on the system.


2019 ◽  
Vol 19 (2) ◽  
pp. e17 ◽  
Author(s):  
Pablo Andrés Pessolani

The Thesis is about an architecture model for a Distributed Virtualization System, which could expand a virtual execution environment from a single physical machine to several nodes of a cluster. With current virtualization technologies, computing power and resource usage of Virtual Machines (or Containers) are limited to the physical machine where they run. To deliver high levels of performance and scalability, cloud applications are usually partitioned in several Virtual Machines (or Containers) located on different nodes of a virtualization cluster. Developers often use that processing model because the same instance of the operating system is not available on each node where their components run. The proposed architecture model is suitable for new trends in software development because it is inherently distributed. It combines and integrates Virtualization and Distributed Operating Systems technologies with the benefits of both worlds, providing the same isolated instance of a Virtual Operating System on each cluster node. Although it requires the introduction of changes in existing operating systems, thousands of legacy applications would not require modifications to obtain their benefits. A Distributed Virtualization System is suitable to deliver high-performance cloud services with provider-class features, such as high-availability, replication, migration, and load balancing. Furthermore, it is able to concurrently run several isolated instances of different guest Virtual Operating Systems, allocating a subset of nodes for each instance and sharing nodes between them. Currently, a prototype is running on a cluster of commodity hardware provided with two kinds of Virtual Operating Systems tailored for internet services (web server) as a proof of concept.


Sign in / Sign up

Export Citation Format

Share Document