1 Virtual Resource Management (VRM) in Cloud Environment draft-Junsheng-Cloud-VRM-00 Friday 21 Jan 2011 B. Khasnabish, Chu JunSheng, Meng Yu.

Slides:



Advertisements
Similar presentations
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Advertisements

All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
Chapter 1 Introduction Copyright © Operating Systems, by Dhananjay Dhamdhere Copyright © Introduction Abstract Views of an Operating System.
All rights reserved © 2005, Alcatel Grid services over IP Multimedia Subsystem  Antoine Pichot, Olivier Audouin, Alcatel  GridNets ’06.
Sabyasachi Ghosh Mark Redekopp Murali Annavaram Ming-Hsieh Department of EE USC KnightShift: Enhancing Energy Efficiency by.
Chapter 1: Introduction to Scaling Networks
Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
Capacity Planning in a Virtual Environment
Proposal by CA Technologies, IBM, SAP, Vnomic
Internet Protocol How does information get sent from one device to another across a WAN?
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
2  Industry trends and challenges  Windows Server 2012: Beyond virtualization  Complete virtualization platform  Improved scalability and performance.
Ed Duguid with subject: MACE Cloud
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
(omniran TG) Short introduction into OmniRAN P802.1CF Date: Authors: NameAffiliationPhone Max RiegelNokia.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBCMSN BCMSN Module 1 Lesson 1 Network Requirements.
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
System Center 2012 R2 Overview
The Case for Enterprise Ready Virtual Private Clouds Timothy Wood, Alexandre Gerber *, K.K. Ramakrishnan *, Jacobus van der Merwe *, and Prashant Shenoy.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Cloud Computing to Satisfy Peak Capacity Needs Case Study.
Introduction CSCI 444/544 Operating Systems Fall 2008.
Study of Hurricane and Tornado Operating Systems By Shubhanan Bakre.
Module 5: Configuring Access for Remote Clients and Networks.
FI-WARE – Future Internet Core Platform FI-WARE Cloud Hosting July 2011 High-level description.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Abstraction and Control of Transport Networks (ACTN) BoF
VMware vSphere 4 Introduction. Agenda VMware vSphere Virtualization Technology vMotion Storage vMotion Snapshot High Availability DRS Resource Pools Monitoring.
Data Center Network Redesign using SDN
Configuring Routing and Remote Access(RRAS) and Wireless Networking
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
Cloud Models – Iaas, Paas, SaaS, Chapter- 7 Introduction of cloud computing.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
1 Second ATLAS-South Caucasus Software / Computing Workshop & Tutorial October 24, 2012 Georgian Technical University PhD Zaza Tsiramua Head of computer.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Page 1 Network Addressing CS.457 Network Design And Management.
Chapter2 Networking Fundamentals
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNP 1 v3.0 Module 1 Overview of Scalable Internetworks.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
VMware vSphere Configuration and Management v6
Virtualization and Databases Ashraf Aboulnaga University of Waterloo.
WS-B327 Dynamic, policy-driven network (re)configuration Consistent, profile- based deployment of SDN traffic policies through distributed.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
The Intelligent Infrastructure John Pollard – 29 th April 2008
Capacity Planning in a Virtual Environment Chris Chesley, Sr. Systems Engineer
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
Workload Active directory BizTalk server DHCP DNS Dynamics Exchange server Fax server IIS Lync server RDS SharePoint server SQL System Center Visual.
Discussion Context NIST Cloud definition and extension to address network and infrastructure issues Discussion of the ISPD-RG Infrastructure definition.
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
I2RS Overlay usecase 1 Fangwei hu Bhumip Khasnabish.
Tunis, Tunisia, 28 April 2014 Requirements of network virtualization for Future Networks Nozomu Nishinaga New Generation Network Laboratory Network Research.
Use Case for Distributed Data Center in SUPA
CCNA 3 Chapter 10 Virtual Trunking Protocol
Network instantiation
Grid Computing.
CSI 400/500 Operating Systems Spring 2009
GGF15 – Grids and Network Virtualization
Chapter 9 Internetworking
Chapter 3: Open Systems Interconnection (OSI) Model
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Concept of VLAN (Virtual LAN) and Benefits
Cloud Computing Architecture
Cloud Computing: Concepts
Computer Networks Protocols
Presentation transcript:

1 Virtual Resource Management (VRM) in Cloud Environment draft-Junsheng-Cloud-VRM-00 Friday 21 Jan 2011 B. Khasnabish, Chu JunSheng, Meng Yu

2 Introduction Applications/services and basic functions provided by cloud are based on the Virtual Resources which are abstracted from Physical Resources. Virtual Resources include V-CPUs, V-Storages, V-Networks etc. V-Networks can be further divided into V-Routers, V-Switches, V-Firewalls, VPNs, V-Interfaces, V-Links based on physical Router/ Switch equipments. Virtual Resources are integrated as a whole (Resource Pool) and supplied to upper layers. Virtual Resources can be grouped into hierarchies, allocated and released on demand. In Cloud environment, Virtual Resources can be further divided into many Child Resource Pools which own some of the parents resources and can, in turn, have a hierarchy of child resource pools to represent successively smaller units of computational capability. VRM can allocate resources for applications/services on multiple Virtual Machines which may be deployed on several Physical Servers in the same Cloud, or even different Clouds.

Configuration of VRM 3 Our Scope VRM VRP VRC: Virtual Resource Client VRM: Virtual Resource Manager VRP: Virtual Resource Provider VRC

4 Virtual Resource Management Resource Manager Resource Manager is the registry of virtual resources to resource pools from resource providers and the allocation of virtual resource to clients (consumers), which arises from the need of overcommitment resourcesthat is, more demand than single host/cluster capacity and from the fact that demand and capacity vary over time. Resource management allows you to dynamically reallocate resources, so that you can more efficiently use available capacities. Resource Providers Hosts and clusters are providers of physical resources. Resource pools can be considered as resource providers for they provide resources to child resource pools and virtual machines. Resource Consumers Virtual machines are resource consumers. Resource pools can be considered as resource consumers for they consume their parents resources.

5 Virtual Resource Description Total Capacity(CPU, Mem, etc) Reserved Resource Capacity(CPU, Mem, etc) Available Resource Capacity(CPU, Mem, etc) Vitual Machines(0…n1) Vitual Networks Resource(0…n2) Child Resource Pools(0…n3) Hosts(1…n4) Shares(High:Normal:Low, such as 4:2:1) Resource Limitation(CPU, Mem, Storage, etc) Resource Reservation(CPU, Mem, etc) Number of Processors Number of Cores per Processors Network Connection(bridge, NAT, host-only, none) Host Information Shares(High:Normal:Low, such as 4:2:1) V-Switch/V-Router V-Network Interface/V-Network Link V-Firewall VPN Total Capacity(CPU, Mem, etc) Resource Limitation(CPU, Mem, Storage, etc) Resource Reservation(CPU, Mem, etc) Reserved Resource Capacity(CPU, Mem, etc) Available Resource Capacity(CPU, Mem, etc) Reservation Type(Extensible, fixed) Vitual Machine(0…n4) Vitual Network Resource(0…n5) Child Resource Pool(0…n6) Processors Number of Cores per Processors Total Capacity(CPU, Mem, etc) Reserved Resource Capacity(CPU, Mem, etc) Available Resource Capacity(CPU, Mem, etc) Reservation Type(Extensible, fixed)

6 View of Hierarchical Resource Organization

7 Virtual Resource Management VRM provides Virtual Resource Register & Deregister, Virtual Resource Provision function to VRP and VRC. When powered on, VRP registers to VRM immediately to deliver resources. When powered off, VRP deregisters to VRM to cancel delivered resources. When VRC needs resources to perform services, it inquires VRM to provide demand resources. VRM checks the required resources from delivered resource pool and responses eligible virtual resources to VRC. VRC interacts with VRP to bind and utilize the allocated resources for allocated time.

8 Virtual Network Resource (VNR) Physical Switches/Routers/NICs(Network Interface Cards) can be further abstracts into Virtual Network Resources, such as V-Switch V-Router V-Firewall, VPN V-Network Interface V-Network Link Based on business demands, these Virtual Network Resource can be used to provide specific service-levels or meet particular business needs. By defining a set of standardized/generalized Virtual Network Resources, Applications/Services can be easily realized, deployed and extended by VRM.

9 Resource Admission Control (RAC) Aggregate computing/storage/network capacity across a collection of servers into logical resource pools. Share resources with another cloud, RAC also has the capability to aggregate another cloud resource into local resource pools. Create one or a group of Virtual Machine(s), when Applications/ Services are ready to be deployed on the Cloud. RAC will check if there are enough unreserved resources in the shared resource pools can be provided to the Virtual Machine(s). If enough unreserved resources are available, the virtual machine is powered on. Otherwise, an Insufficient Resources warning appears.

10 Resource Authentication and Authorization (RAA) When Application/Services request RAM to allocate (extra) resources, RAA will check whether they are authorized the capabilities. When the Cloud is requested to provide resources to another Cloud, it will authenticate the entity who initiates the inter-cloud resource request. If passed, the required amount of resources will be provided. Also, in case of new host or another Cloud providing resources to the Cloud, it will check the security of the resources. If reliable, it will authorize the resources and put them into the resource pools.

11 Resource Scheduler (RS) RS defines rules and policies to decide how resources should be prioritized among virtual machines and intelligently allocates available resources from virtual resource pools among the virtual machines based on the pre-defined rules that reflect Applications/ Services requirements and changing priorities. Consolidate workloads during off-peak hours and power off hosts to make datacenters more energy efficient. Bring powered off hosts online to meet virtual machine requirements either at a pre-defined time or when the utilization of virtual machine increases.

12 Inter-Cloud Resource Control (ICRC) Resources in one cloud can be shared with another cloud in certain circumstances, that is, with ICRC the cloud has the capability to provide resource to another cloud the capability to consume resource from another cloud ICRC may provide the following functions Signaling with other cloud Control and monitoring the resources in other cloud Control and provisioning the resources requested by other cloud Transport and security with other cloud Naming, Addressing and Translation if they have different format.

13 Conclusion Grouping virtual resources into hierarchies is the efficient way to manage and schedule virtual resources. Virtual Network Resources can be flexibly used to realize virtual network, telecom network virtualization, and VLAN related services. Delivery of Virtual Resources to VRM needs to be considered when dynamically construct Virtual Resource Pools. Based on pre-defined policy and rules, VRM schedules resources in a efficient way among virtual machines to satisfy business requirements. VRM mainly focuses on allocation of Virtual Resources efficiently, securely, flexibly and reliably.

14 Next Step Further develop the requirements Define the interfaces and protocols Develop the profile for the protocols Work on the draft draft-Junsheng-Cloud-VRM-00

Comments/Suggestions 15

16