scholarly journals Combining Server And Storage Virtualization: A New Dimension for SMB’s

Author(s):  
Mohammad Arif Baig

The virtualization wave is quickly reaching its way down into the small-to-medium-sized business. Virtualization provides unmatched flexibility, performance, and utilization by allowing you to move server workloads from one virtual workspace to the next, maximizing server resources on the fly based on your business needs. Server virtualization eliminates the conventional, one application per server model and allows businesses to run multiple, virtual servers on a single physical machine. Storage virtualization helps the storage administrator perform the tasks of backup, archiving, and recovery more easily, and in less time, by disguising the actual complexity of the SAN. Storage and server virtualization are complementary technologies that helps to build a completely virtualized infra-structure. When used together, server and storage virtualization are intended to derive greater benefit from each technology than deployed alone.

Data centers are progressively being re-intended for workload combination with a specific end goal to receive the rewards of better resource usage, control cost, and physical space investment cost. Among the strengths driving costs are server and storage virtualization innovations. A key understanding is that there is a more noteworthy cooperative energy between the two layers of storage and server virtualization to be application piece sharing data than was beforehand thought conceivable. In this segment, we display ERMF, a platform that is intended to have MapReduce applications in virtualized cost. ERMF gives a bunch file framework that backings a uniform record framework namespace over the group by coordinating the discrete nearby storage of the individual hubs. Our paper proposes ERMF accommodates the two data and VM resource assignment with contending requirements, for example, storage usage, changing CPU load and system connect limits. ERMF utilizes a stream arrange based calculation that can improve MapReduce performance under the predetermined limitations by starting situation, as well as by straightening out through VM and data relocation also. Moreover, ERMF uncovered, generally shrouded, bring down level topology data to the MapReduce work scheduler with the goal that it makes close ideal task scheduling.


2011 ◽  
Vol 34 (13) ◽  
pp. 1539-1548 ◽  
Author(s):  
Yaoxue Zhang ◽  
Yuezhi Zhou

SinkrOn ◽  
2019 ◽  
Vol 3 (2) ◽  
pp. 67-72
Author(s):  
Didik Sudyana ◽  
Reza Tanujiwa Putra ◽  
Soni Soni

Server virtualization technology has experienced significant development so that more and more industries are adopting this technology. By using server virtualization, the industry can make savings in purchasing new servers and maintenance because virtualization allows one server to run with multiple operating systems at once. The high level of use of virtualization raises a gap for the occurrence of computer crimes involving virtualization. When computer crimes occur on virtualization, it is necessary to conduct digital forensic investigations to find useful clues in solving crime cases. Therefore, in this study a digital forensic investigation was conducted on Proxmox server virtualization by acquiring the entire storage virtualization media and carrying out checks on the results of the acquisition. Based on the investigation carried out, the acquisition technique by acquiring the entire storage media on Proxmox cannot be used because the structure of the evidence files and folders cannot be read perfectly


Author(s):  
Eric Kuada

The discussion of security and trust issues in this book chapter will follow from the discussions on the role of virtualization in cloud computing and hence the impact that the various categories of virtualization such as server virtualization, network virtualization, storage virtualization, and application virtualization have on the security and trust issues in cloud computing. It will be evident from these discussions that virtualization introduces a number of security and risk related challenges in cloud computing based on the three security objectives of confidentiality, integrity, and availability; and the two main other related security objectives of authenticity and accountability of information systems that were adopted for this discussion. It was however also noted that if the necessary recommended best practices of virtualizations are faithfully adhered to, then virtualization can actually lead to improvement or enhancement in the security posture of cloud environments.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 345
Author(s):  
U V. Anbazhagu ◽  
P Maheshwaran ◽  
K S. Archana ◽  
Sheela Gowr

The aim of this research is to study and enhance the applications of most profitable technology in cloud computing ever "Virtualization". Back then, a 15 years before, nobody knows about the technology named cloud computing exists. But now, every technology such as personal computer, mobile phone, tablet PC, even televisions rely on cloud computing. Cloud computing helps greatly in reducing costs, scalability and flexibility in computer services. Virtualization is the technology that helps cloud computing to emerge in a large profitable level. Using virtualization (such as server, network and storage virtualization technologies), the resource cost is reduced in great level. 


2018 ◽  
pp. 1251-1271
Author(s):  
Eric Kuada

The discussion of security and trust issues in this book chapter will follow from the discussions on the role of virtualization in cloud computing and hence the impact that the various categories of virtualization such as server virtualization, network virtualization, storage virtualization, and application virtualization have on the security and trust issues in cloud computing. It will be evident from these discussions that virtualization introduces a number of security and risk related challenges in cloud computing based on the three security objectives of confidentiality, integrity, and availability; and the two main other related security objectives of authenticity and accountability of information systems that were adopted for this discussion. It was however also noted that if the necessary recommended best practices of virtualizations are faithfully adhered to, then virtualization can actually lead to improvement or enhancement in the security posture of cloud environments.


2018 ◽  
Vol 7 (4.12) ◽  
pp. 6
Author(s):  
Arvind Kumar Bhatia ◽  
Gursharan Singh

Cloud computing is being considered as the future architecture of IT world. Virtualization creates logical resources from physical resources which are allocated with flexibility to applications. Server virtualization is a technique for the division of the physical machine into many Virtual Machines; every Virtual Machine has the capacity of applications execution similar to physical machine. The capability of Virtual Machine migration i.e. dynamic movement of Virtual Machines between physical machines is achieved by virtualization. Migration techniques differ w.r.t order of state transfer. Pre-copy migration method transfers all pages of memory from source to destination while Virtual Machine is executing on source. Post-copy migration is transfer of memory. content after the transfer of process state. Specially, post-copy migration, first copied the process states to the destination machine. Total time of migration, Total pages transferred and Downtime are important parameters considered during live Virtual Machine migration. Many improved live pre copy Virtual Machine migration techniques tries to decrease all the three above mentioned parameters. Proposed approach also tries to minimize all the three performance parameters.  


2017 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Virtualization is a new method regarding using computing resources efficiently, by maximizing energy efficiency, extend the life of the hardware and also recycles. Virtualization technology is a system of work done by the software can merge some real physical systems into a single virtual form commonly known as virtualization without prejudice advantages over the single system. Of course, this system can reduce the amount of hardware, electrical energy consumption and time used thereby increasing the level of efficiency and effectiveness. Also, virtualization certainly reduces heat energy arising from the number of installed hardware, thereby reducing the increase in temperature geothermal (Global Warming). Some virtualization includes Server Virtualization, Network Virtualization, Memory Virtualization, Grid Computing, Application Virtualization, Storage Virtualization, Virtualization and Thin Client Platform.


Sign in / Sign up

Export Citation Format

Share Document