FIGURE 14 - uploaded by Srinarayan Sharma
Content may be subject to copyright.
Desktop Virtualization Architecture (Adopted from Sun Microsystems, 2008)  

Desktop Virtualization Architecture (Adopted from Sun Microsystems, 2008)  

Source publication
Article
Full-text available
This paper provides a thorough review of different types of virtualization both at the technical and application levels. At the technical level, it explains with the help of descriptive diagrams how virtualization technologies work in general. It then goes on to make a distinction, again with the help of self-explanatory diagrams and industry-avail...

Citations

... In [120] Sharma et al. virtualization is described as technologies that provide a layer of abstraction of the physical computing resources between computer hardware systems and the software systems running on them. ...
... • Virtual machines (VM) are the oldest technology of the three. They are described as a self-contained operating environment consisting of guest operating system and associated applications, but independent of the host operating system [120]. VMs enable us to pack isolation and better utilization of hardware in big DCs. ...
Thesis
Full-text available
Cloud computing is facing some serious latency issues due to huge volumes of data that need to be transferred from the place where data is generated to the cloud. For some types of applications, this is not acceptable. One of the possible solutions to this problem is the idea to bring cloud services closer to the edge of the network, where data originates. This idea is called edge computing, and it is advertised that it dramatically reduces the network latency as a bridge that links the users and the clouds, and as such, it makes the foundation for future interconnected applications. Edge computing is a relatively new area of research and still faces many challenges like geo-organization and a clear separation of concerns, but also remote configuration, well defined native applications model, and limited node capacity. Because of these issues, edge computing is hard to be offered as a service for future real-time user-centric applications. This thesis presents the dynamic organization of geo-distributed edge nodes into micro data-centers and forming micro-clouds to cover any arbitrary area and expand capacity, availability, and reliability. We use a cloud organization as an influence with adaptations for a different environment with a clear separation of concerns, and native applications model that can leverage the newly formed system. We argue that the presented model can be integrated into existing solutions or used as a base for the development of future systems. Furthermore, we give a clear separation of concerns for the proposed model. With the separation of concerns setup, edge-native applications model, and a unified node organization, we are moving towards the idea of edge computing as a service, like any other utility in cloud computing. The first chapter of this thesis, gives motivation and problem are that this thesis is trying to resolve. It also presents research questions, hypotheses and goals based on these questions. The second chapter gives an introduction to the area of distributed systems, narrowing it down only the parts that are important for further understanding of the other chapters and the rest of the thesis in general. The third chapter shows related work from different areas that are connected or that influenced this thesis. This chapter also shows what the current state of the art in industry and academia is, and describes the position of this thesis compared to the related research as well. The fourth chapter proposes a model that is influenced by cloud computing architectural organizations but adapted for a different environment. We present how we can separate the geographic area into micro data-centers that are zonally organized to serve the local population, and form them dynamically. This chapter also gives formal models for all protocols used for the creation of such a system with separation of concerns, applications models, and presents limitations of this thesis. The fifth presents an implemented framework that is based on the model described in chapter three. We describe the architecture, and in detail every operation a framework can do, with all existing limitations. The sixth chapter presents the usability of the proposed model, with possible applications that could be implemented based on the model. We also present one example of COVID-19 area traffic control in the city of Milan, Italy. The seventh and the last chapter concludes this thesis and presents future work that should be done. Key words: distributed systems, cloud computing, multi cloud, microservices, software as a service, edge computing, micro clouds, big data, infrastructure as code.
... Dalam Processor yang memiliki kemampuan SMT, sebagian besar sumber daya yang dimiliki Processor akan dibagikan kepada Thread.[4] c. Arsitektur Virtualisasi Secara umum, virtualisasi mengacu pada teknologi yang menyediakan lapisan abstraksi dari karakteristik fisik sumber daya komputasi, antara sistem perangkat keras dan sistem perangkat lunak yang berjalan diatasnya[5].Gambar 1. Ilustrasi VirtualisasiSecara umum, semua bentuk teknologi virtualisasi memungkinkan pemanfaatan sumber daya komputasi yang lebih tinggi dengan memungkinkan banyak aplikasi berjalan pada komputer yang sama dan dapat digunakan oleh pengguna yang berbeda. Dari perspektif lingkungan, virtualisasi menghasilkan konsumsi daya yang lebih sedikit dan lebih sedikit komputer yang digunakan. ...
Article
Full-text available
Dalam membangun sebuah laboratorium keamanan informasi, perlu diperhatikan aspek perangkat, aplikasi, dan lingkungannya (environment). Laboratorium keamanan informasi ini bertujuan untuk menguji tingkat keamanan dari sebuah aplikasi yang akan atau sudah dibangun. Tetapi yang menjadi masalah utama adalah sulitnya pemilihan jenis perangkat keras yang sesuai dengan kebutuhan. Ada beberapa parameter yang harus diperhatikan dalam menentukan komponen perangkat keras yang tepat, yaitu Random Access Memeory (RAM), Processor, dan Network Interface Card (NIC). Dalam penelitian ini, hanya berfokus pada pengujian pengaruh Multi Core dalam sebuah Processor. Seperti yang diketahui, Processor merupakan perangkat utama yang sangat penting dalam komputer. Jika diibaratkan, Processor merupakan otak dari komputer yang akan digunakan untuk menguji tingkat keamanan dari sebuah aplikasi yang akan atau sudah dibangun. Selain itu, pemilihan jenis Processor juga sangat berpengaruh dalam pemrosesan tugas yang akan dilakukan oleh komputer uji dalam rancangan pembangunan laboratorium kemanan informasi ini, sehingga pemilihan Processor sangatlah penting. Hasil akhir dari penelitian ini adalah untuk mendapatkan rekomendasi Processor yang sesuai dengan kebutuhan komputer uji pada Blueprint laboratorium kemanan informasi
Article
Full-text available
This paper presents a concept, developed and tested by the authors, of a virtualisation environment enabling the protection of aggregated data through the use of high availability (HA) of IT systems. The presented solution allows securing the central database system and virtualised server machines by using a scalable environment consisting of physical servers and disk arrays. The authors of this paper focus on ensuring the continuity of system operation and on minimising the risk of failures related to the availability of the operational data analysis system.