SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
GRID VIRTUALIZATION
ENGINE

By Mohd. Ajaz
Ahmed
AGENDA

Introduction

Virtual Machine Based Grid System
Architecture Of GVE
Use Cases Of GVE
Queries
LET’S LEARN ABOUT GRID
 Grid provides for the allocation and management of
heterogeneous networked resources and makes them
available to a large number of users.
 A network of geographically distributed resources
 Resources may be owned by diverse organizations.
 Grid Computing involves more than one computer to solve the
problem.
 Grid Computing is used mainly for CPU intensive calculations
which can be divided into multiple tiny tasks and which can
be executed parallel on dif ferent nodes.
LET’S LEARN ABOUT GRID

Grid node

TASK
Control
Server
LET’S LEARN ABOUT VIRTUALIZATION
 Virtualization, in computing, refers the act of creating a
virtual version of something, including but not limited to a
virtual
computer
hardware
platform,
operating
system(OS), storage device, or computer network resources.
 In computing, virtualization means to create a virtual version
of a device or resource, such as a server, storage
device, network or even an operating system where the
framework divides the resource into one or more execution
environments.
 Devices, applications and human users are able to interact
with the virtual resource as if it were a real
single logical resource.
LET’S LEARN ABOUT VIRTUALIZATION
OBJECTIVE
 Although great advances have been made in the field of Grid
computing, users still expect to meet some difficulties when
employing Grid resources. Qualities of service (QoS) of
resource provision and performance Isolation and Customized
runtime environment for Grid applications
 Goal of a Grid infrastructure is to provide “flexible, secure,
coordinated resource sharing.
 The middleware of these approaches interact with physical
resources at the same level as local users and applications
do.
 Virtualization
technologies
encompass
a
variety
of
mechanisms and techniques used to decouple the
architecture and user-perceived behavior of hardware and
software resources from their physical implementation.
BENEFITS OF VM APPROACH

Lower Hardware
Cost
Easier
Management
Isolation between
Logical servers
GRID VIRTUALIZATION ENGINE
 Grid Virtualization Engine creates an abstract layer between
users and underlying virtualization technologies.
 Can also be simplified as software layer between various
virtualization implementations, computing centers and Grid
users.
 Enables Users to operate VM’s and provide Virtual Distributed
environments
 Users can require and employ virtual machines via the access
interface of GVE
GRID VIRTUALIZATION ENGINE
Computational Grid

Computer Site

Access Service
Virtual Machine
Host Resource
Form virtualized distributed
environments. GVE service
operates on virtual machines
in this level
Host resources offer multiple
virtual machines. The GVE
Agent Service is implemented

allows
remote users to
access resources of
the computer
Center
ARCHITECTURE OF GVE
 GVE provides functionalities for users to access virtual
machines and virtual environments supported by distributed
computing centers.
 The GVE is designed in distributed and hierarchical flavors
with standard Web service interface.
 Current implementation of the GVE can work on popular
VMMs, for instance, VMware server, and VMware ESX server.
 GVE contains the following components: GVE Site Service, GVE
Agent Service, and Virtual Machine Disk Database.
ARCHITECTURE OF GVE
GVE Web Service

User Info. Service

GVE Site Service

User Info.
Database

Agent Web
Service

GVE AGENT

VMM

Registry Service

VM Image
Database

Registry
Database
GVE SITE SERVICE
 Works on a computer center’s access point.
 Manages host resources inside the center by communicating
with the GVE Agent Services that run on the host resources.
 The GVE Site Service includes three main components:
 the GVE Web Service,
 the User Information Service and
 the User Information Database
GVE WEB SERVICE
 The GVE Web Service itself is the component which is
responsible of the business logic of the GVE Site Service.
 It decides to which virtual machine requests should be sent to
and defines the policies of resource allocation.
 Web service technologies provide a framework for developing
distributed applications that run on the Internet
 For further purpose it needs the User Information Service
USER INFORMATION SERVICE
 GVE Site Service has to store data that may be concurrently
used by other components in the GVE
 Grid technologies enable large-scale sharing of resources
within formal or informal consortia of individuals and/or
institutions: what are sometimes called virtual organizations.
 In these settings, the discovery, characterization, and
monitoring of resources, services, and computations can be
challenging due to the considerable diversity, large numbers,
dynamic behavior, and geographical distribution of the
entities in which a user might be interested.
 Hence, information services are a vital part of any Grid
software infrastructure, providing fundamental mechanisms
for discovery and monitoring, and thus for planning and
adapting application behavior.
USER INFORMATION DATABASE
 The User Information Database records the management
policies and accounting information of virtual machine usage
 To check whether the resource quota of the user has been
reached before new resources are allocated
 It can control how long a resource has been granted to a user
GVE AGENT SERVICE
 Runs on the host resource
 Receives operation commands from the GVE Site Ser vice and
talks with the specific VMM
 Virtualization technology dependent
 For each type of VMM, a corresponding GVE Agent Ser vice should
be implemented
 GVE Agent Ser vice knows how to call management functions of
the underlying VMMs
 VMM is managed by a GVE Agent Service
 It provides VM from underlying VMMs to a GVE Site Service
 Registry Ser vice provides the following functions to access the
Registry Database, which stores the state of virtual machines,
the GVE Site information, the state of the virtual machine
request and management.
VM DISK DATABASE
 Might not be directly implemented by the GVE developer
 Stores the data which are needed for VM creation and
management
USE CASES OF THE GVE
User Info. Service

GCS

Request
Owned
VM

Request
new VM
Request
VM

Compute
allocated
resource

Manage
VM

Check
Identity
Release
VM

GVE Administrator
Manage
GVE
REQUEST A VM
 Actors of this use case are the GCS and
Database
 Provision of VM based on demand and
user
 GVE user provides the profile of the
requires Existing free virtual machine or
fulfill the user requirement
 User is registered to the GVE

the User Information
requirements of the
virtual machine he
creates a new VM to
MANAGE A VIRTUAL MACHINE
 Actors are the GCS and the User Information Database.
 GVE provides users with functions to manage the virtual
machines that they have acquired, for instances, start, stop,
suspend, resume, and migrate virtual machines.
 Requires either the GCS has acquired a virtual machine or the
GCS has provided details about the virtual machine to be
managed.
 Triggered when the GCS sends a request of managing virtual
machines.
 GCS receives a message notifying the success of the
operation or failure of the operation
RELEASE A VIRTUAL MACHINES
 Actors of this use case are the GCS and the User Information
Database.
 When a GVE user has finished a computational task on the
virtual machine and does not need it anymore, the user
releases a virtual machine.
 In case the allocated time for virtual machine usage has
passed, the GVE will stop the usage of the virtual machine.
 Before this use case is triggered, the GCS should provide
details about an acquired virtual machine.
 After this use case finishes, the virtual machine is stopped
and its profile is changed.
COMPUTE ALLOCABLE RESOURCES
 Actor of this use case is the GCS.
 Resources allocable to a GVE user should not exceed the
predefined resource quota for the user.
 Used to compute resources for user’s allocation.
 Each time a user requests a new virtual machine, the total
amount of resources that are allocated to the user at that time is
computed to check whether it exceeds the quota for the user.
 It demands information of the user information and the virtual
machine profile.
 If this use case successfully ends, the GVE has permissions to
allocate one resource with the given profile to the user.
 Otherwise, the resource quota for the user has been reached
then the GVE does not have the permission to allocate resources
with the given profile to the user.
CHECK IDENTITIES
 Actor of this use case is the User Information Database.
 The GVE identifies all users before they can perform any
operation on the GVE.
 The identity is also needed to know whom a virtual machine
belongs to and how many resources a user can acquire.
 It requires that the user has appropriate proof of his identity.
 It’s successful execution means the user is verified.
Otherwise, the user is not approved.
MANAGE THE GVE
 The correct setup of the GVE requires some pre-configurations
by an administrator.
 As a GVE is a distributed application, the administrator
identifies all components that build a new GVE and connect
them together.
 The Administrator also manages the identity of the different
entities that use the GVE. It includes registering or
unregistering of a Virtualization Agent and registering or
unregistering a user.
Grid Virtualization Engine

Weitere ähnliche Inhalte

Andere mochten auch (20)

Audience Feedback 1
Audience Feedback 1Audience Feedback 1
Audience Feedback 1
 
Basında Bugün Göztepe
Basında Bugün GöztepeBasında Bugün Göztepe
Basında Bugün Göztepe
 
Basında Bugün Göztepe
Basında Bugün GöztepeBasında Bugün Göztepe
Basında Bugün Göztepe
 
Corporate Presentation
Corporate PresentationCorporate Presentation
Corporate Presentation
 
Powerpoint unit 1 finished
Powerpoint unit 1 finishedPowerpoint unit 1 finished
Powerpoint unit 1 finished
 
кишечнополостные
кишечнополостныекишечнополостные
кишечнополостные
 
Basında Bugün Göztepe
Basında Bugün GöztepeBasında Bugün Göztepe
Basında Bugün Göztepe
 
العمليات الجبرية2
العمليات الجبرية2العمليات الجبرية2
العمليات الجبرية2
 
Josepg Campbell
Josepg CampbellJosepg Campbell
Josepg Campbell
 
Improving Cayenne's workflow
Improving Cayenne's workflowImproving Cayenne's workflow
Improving Cayenne's workflow
 
Can cannot- simple
Can   cannot- simpleCan   cannot- simple
Can cannot- simple
 
Array satu-dimensi
Array satu-dimensiArray satu-dimensi
Array satu-dimensi
 
Robert frost
Robert frostRobert frost
Robert frost
 
Mi sueño nayib 702
Mi sueño nayib 702Mi sueño nayib 702
Mi sueño nayib 702
 
Top romance
Top romanceTop romance
Top romance
 
Healthcare Media Mixology: Mobile + Media + Health
Healthcare Media Mixology: Mobile + Media + HealthHealthcare Media Mixology: Mobile + Media + Health
Healthcare Media Mixology: Mobile + Media + Health
 
Basında Bugün Göztepe
Basında Bugün GöztepeBasında Bugün Göztepe
Basında Bugün Göztepe
 
Learning Chinese the self-guided way
Learning Chinese the self-guided wayLearning Chinese the self-guided way
Learning Chinese the self-guided way
 
Lecture10 sram2
Lecture10 sram2Lecture10 sram2
Lecture10 sram2
 
Algoritma Matriks
Algoritma MatriksAlgoritma Matriks
Algoritma Matriks
 

Ähnlich wie Grid Virtualization Engine

Iaas cloudarchitectures
Iaas cloudarchitecturesIaas cloudarchitectures
Iaas cloudarchitecturespradeepas7
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET Journal
 
Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...IJECEIAES
 
Virtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.pptVirtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.pptMohammadArmanulHaque
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 
Role of Virtual Machine Live Migration in Cloud Load Balancing
Role of Virtual Machine Live Migration in Cloud Load BalancingRole of Virtual Machine Live Migration in Cloud Load Balancing
Role of Virtual Machine Live Migration in Cloud Load BalancingIOSR Journals
 
Types of Virtualization Solutions
Types of Virtualization SolutionsTypes of Virtualization Solutions
Types of Virtualization Solutions Array Networks
 
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...Editor IJCATR
 
The Future of Server Virtualization
The Future of Server VirtualizationThe Future of Server Virtualization
The Future of Server VirtualizationAhmed Banafa
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architectureAdeel Javaid
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudeSAT Journals
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudeSAT Publishing House
 
Datacenter migration using vmware
Datacenter migration using vmwareDatacenter migration using vmware
Datacenter migration using vmwareWilson Erique
 
Quick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-ukQuick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-ukAssespro Nacional
 
The Future of Computing: Exploring the Potential of Virtualization Server
The Future of Computing: Exploring the Potential of Virtualization ServerThe Future of Computing: Exploring the Potential of Virtualization Server
The Future of Computing: Exploring the Potential of Virtualization ServerFredReynolds2
 

Ähnlich wie Grid Virtualization Engine (20)

Iaas cloudarchitectures
Iaas cloudarchitecturesIaas cloudarchitectures
Iaas cloudarchitectures
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 
Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...
 
Virtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.pptVirtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.ppt
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
 
Role of Virtual Machine Live Migration in Cloud Load Balancing
Role of Virtual Machine Live Migration in Cloud Load BalancingRole of Virtual Machine Live Migration in Cloud Load Balancing
Role of Virtual Machine Live Migration in Cloud Load Balancing
 
Types of Virtualization Solutions
Types of Virtualization SolutionsTypes of Virtualization Solutions
Types of Virtualization Solutions
 
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
 
The Future of Server Virtualization
The Future of Server VirtualizationThe Future of Server Virtualization
The Future of Server Virtualization
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
Rabia45
Rabia45Rabia45
Rabia45
 
Cloud Services: Types of Cloud
Cloud Services: Types of CloudCloud Services: Types of Cloud
Cloud Services: Types of Cloud
 
Datacenter migration using vmware
Datacenter migration using vmwareDatacenter migration using vmware
Datacenter migration using vmware
 
Quick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-ukQuick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-uk
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
 
Unit 2
Unit 2Unit 2
Unit 2
 
The Future of Computing: Exploring the Potential of Virtualization Server
The Future of Computing: Exploring the Potential of Virtualization ServerThe Future of Computing: Exploring the Potential of Virtualization Server
The Future of Computing: Exploring the Potential of Virtualization Server
 

Kürzlich hochgeladen

UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 

Kürzlich hochgeladen (20)

UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 

Grid Virtualization Engine

  • 2. AGENDA Introduction Virtual Machine Based Grid System Architecture Of GVE Use Cases Of GVE Queries
  • 3. LET’S LEARN ABOUT GRID  Grid provides for the allocation and management of heterogeneous networked resources and makes them available to a large number of users.  A network of geographically distributed resources  Resources may be owned by diverse organizations.  Grid Computing involves more than one computer to solve the problem.  Grid Computing is used mainly for CPU intensive calculations which can be divided into multiple tiny tasks and which can be executed parallel on dif ferent nodes.
  • 4. LET’S LEARN ABOUT GRID Grid node TASK Control Server
  • 5. LET’S LEARN ABOUT VIRTUALIZATION  Virtualization, in computing, refers the act of creating a virtual version of something, including but not limited to a virtual computer hardware platform, operating system(OS), storage device, or computer network resources.  In computing, virtualization means to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments.  Devices, applications and human users are able to interact with the virtual resource as if it were a real single logical resource.
  • 6. LET’S LEARN ABOUT VIRTUALIZATION
  • 7. OBJECTIVE  Although great advances have been made in the field of Grid computing, users still expect to meet some difficulties when employing Grid resources. Qualities of service (QoS) of resource provision and performance Isolation and Customized runtime environment for Grid applications  Goal of a Grid infrastructure is to provide “flexible, secure, coordinated resource sharing.  The middleware of these approaches interact with physical resources at the same level as local users and applications do.  Virtualization technologies encompass a variety of mechanisms and techniques used to decouple the architecture and user-perceived behavior of hardware and software resources from their physical implementation.
  • 8. BENEFITS OF VM APPROACH Lower Hardware Cost Easier Management Isolation between Logical servers
  • 9. GRID VIRTUALIZATION ENGINE  Grid Virtualization Engine creates an abstract layer between users and underlying virtualization technologies.  Can also be simplified as software layer between various virtualization implementations, computing centers and Grid users.  Enables Users to operate VM’s and provide Virtual Distributed environments  Users can require and employ virtual machines via the access interface of GVE
  • 10. GRID VIRTUALIZATION ENGINE Computational Grid Computer Site Access Service Virtual Machine Host Resource Form virtualized distributed environments. GVE service operates on virtual machines in this level Host resources offer multiple virtual machines. The GVE Agent Service is implemented allows remote users to access resources of the computer Center
  • 11. ARCHITECTURE OF GVE  GVE provides functionalities for users to access virtual machines and virtual environments supported by distributed computing centers.  The GVE is designed in distributed and hierarchical flavors with standard Web service interface.  Current implementation of the GVE can work on popular VMMs, for instance, VMware server, and VMware ESX server.  GVE contains the following components: GVE Site Service, GVE Agent Service, and Virtual Machine Disk Database.
  • 12. ARCHITECTURE OF GVE GVE Web Service User Info. Service GVE Site Service User Info. Database Agent Web Service GVE AGENT VMM Registry Service VM Image Database Registry Database
  • 13. GVE SITE SERVICE  Works on a computer center’s access point.  Manages host resources inside the center by communicating with the GVE Agent Services that run on the host resources.  The GVE Site Service includes three main components:  the GVE Web Service,  the User Information Service and  the User Information Database
  • 14. GVE WEB SERVICE  The GVE Web Service itself is the component which is responsible of the business logic of the GVE Site Service.  It decides to which virtual machine requests should be sent to and defines the policies of resource allocation.  Web service technologies provide a framework for developing distributed applications that run on the Internet  For further purpose it needs the User Information Service
  • 15. USER INFORMATION SERVICE  GVE Site Service has to store data that may be concurrently used by other components in the GVE  Grid technologies enable large-scale sharing of resources within formal or informal consortia of individuals and/or institutions: what are sometimes called virtual organizations.  In these settings, the discovery, characterization, and monitoring of resources, services, and computations can be challenging due to the considerable diversity, large numbers, dynamic behavior, and geographical distribution of the entities in which a user might be interested.  Hence, information services are a vital part of any Grid software infrastructure, providing fundamental mechanisms for discovery and monitoring, and thus for planning and adapting application behavior.
  • 16. USER INFORMATION DATABASE  The User Information Database records the management policies and accounting information of virtual machine usage  To check whether the resource quota of the user has been reached before new resources are allocated  It can control how long a resource has been granted to a user
  • 17. GVE AGENT SERVICE  Runs on the host resource  Receives operation commands from the GVE Site Ser vice and talks with the specific VMM  Virtualization technology dependent  For each type of VMM, a corresponding GVE Agent Ser vice should be implemented  GVE Agent Ser vice knows how to call management functions of the underlying VMMs  VMM is managed by a GVE Agent Service  It provides VM from underlying VMMs to a GVE Site Service  Registry Ser vice provides the following functions to access the Registry Database, which stores the state of virtual machines, the GVE Site information, the state of the virtual machine request and management.
  • 18. VM DISK DATABASE  Might not be directly implemented by the GVE developer  Stores the data which are needed for VM creation and management
  • 19. USE CASES OF THE GVE User Info. Service GCS Request Owned VM Request new VM Request VM Compute allocated resource Manage VM Check Identity Release VM GVE Administrator Manage GVE
  • 20. REQUEST A VM  Actors of this use case are the GCS and Database  Provision of VM based on demand and user  GVE user provides the profile of the requires Existing free virtual machine or fulfill the user requirement  User is registered to the GVE the User Information requirements of the virtual machine he creates a new VM to
  • 21. MANAGE A VIRTUAL MACHINE  Actors are the GCS and the User Information Database.  GVE provides users with functions to manage the virtual machines that they have acquired, for instances, start, stop, suspend, resume, and migrate virtual machines.  Requires either the GCS has acquired a virtual machine or the GCS has provided details about the virtual machine to be managed.  Triggered when the GCS sends a request of managing virtual machines.  GCS receives a message notifying the success of the operation or failure of the operation
  • 22. RELEASE A VIRTUAL MACHINES  Actors of this use case are the GCS and the User Information Database.  When a GVE user has finished a computational task on the virtual machine and does not need it anymore, the user releases a virtual machine.  In case the allocated time for virtual machine usage has passed, the GVE will stop the usage of the virtual machine.  Before this use case is triggered, the GCS should provide details about an acquired virtual machine.  After this use case finishes, the virtual machine is stopped and its profile is changed.
  • 23. COMPUTE ALLOCABLE RESOURCES  Actor of this use case is the GCS.  Resources allocable to a GVE user should not exceed the predefined resource quota for the user.  Used to compute resources for user’s allocation.  Each time a user requests a new virtual machine, the total amount of resources that are allocated to the user at that time is computed to check whether it exceeds the quota for the user.  It demands information of the user information and the virtual machine profile.  If this use case successfully ends, the GVE has permissions to allocate one resource with the given profile to the user.  Otherwise, the resource quota for the user has been reached then the GVE does not have the permission to allocate resources with the given profile to the user.
  • 24. CHECK IDENTITIES  Actor of this use case is the User Information Database.  The GVE identifies all users before they can perform any operation on the GVE.  The identity is also needed to know whom a virtual machine belongs to and how many resources a user can acquire.  It requires that the user has appropriate proof of his identity.  It’s successful execution means the user is verified. Otherwise, the user is not approved.
  • 25. MANAGE THE GVE  The correct setup of the GVE requires some pre-configurations by an administrator.  As a GVE is a distributed application, the administrator identifies all components that build a new GVE and connect them together.  The Administrator also manages the identity of the different entities that use the GVE. It includes registering or unregistering of a Virtualization Agent and registering or unregistering a user.