Combo Offer 30% Off + 5% Extra OFF

Virtualization Solution For Cloud Assignment Sample

Order on WhatsApp Get Upto 50% off
Securing Higher Grades Costing Your Pocket? Book Your Assignment At The Lowest Price Now!
  • Order on Whatsapp
X

Virtualization Solution For Cloud Assignment Sample

1.0. Introduction

Get free samples written by our Top-Notch subject experts for taking online assignment help services in Australia.

Virtualization server or server virtualization is a special type of process in which it divides the physical server into many servers, and all those divided servers are unique and isolated by means of software applications. All those unique and isolated virtual servers that are divided by using the process of server virtualization can run their own operating systems independently. Using this server virtualization has many benefits, and some of its benefits are: due to this server virtualization, the ability of the servers are getting high. The cost that is required to operate the server is reduced, due to this server virtualization, the complexity of the servers is eliminated, the performance of the applications is increased, the workload on the server is reduced due to this server virtualization because it divides the main server into many smaller servers. So, these are some benefits that can be gotten from server virtualization. There are mainly three types of server virtualization present, and that is "full virtualization", "paravirtualization", and "OS-level virtualization". "Full virtualization "uses a hypervisor which is a type of software, and it connects with the physical server directly. In "paravirtualization", all the network working together and work as a cohesive unit. Unlike the other two virtualizations, "OS-level virtualization" uses the virtualization capability.

2.0. Part A: Virtualization design report

2.1. Features Supported

Virtualization is one of the most important technologies in today's world. In the field of information technology, virtualization is a very important technology. Virtualization achieves this position in the field of information technology due to its key features and the benefits that are obtained from virtualizations (Pahl et al., 2017). Virtualization has many key features, and by using this technology of virtualization, many benefits are obtained. Some of the key features are discussed in this context. By using virtualization, security is increased. In virtualization, it is able to control the execution of the guest program. All the operations that are performed in the guest program are again performed in the virtual machine, and when the operations are performed in the virtual machine, then it is able to manage and filter all the activity of the quest program. Due to this filter, virtual machines can prevent the system from any type of harmful effect that is generated from the guest program. Virtualization can create many separate computing environments, and this feature of virtualization helps to reduce power consumption. As this feature reduces the active servers so automatically, power consumption also reduces with the number of active servers. As virtualization is able to share the physical resources with many guests, similarly, it is also able to collect all the resources from many guests. Or it is able to collect all the guests and combine them into a single host.

2.2. Computer Hardware

To design a virtualization server, some hardware is required and without that computer hardware, completing this design is not possible. The most important and basic computer hardware required is CPU, memory and network access. This three-computer hardware are the basic requirements for designing any virtualizations. The CPU with the most clock speed is the best CPU for this design, and also, more cores are required in the CPU. Two CPU with 2.4 GHz and ten cores performed better than the two CPU with 3.0 GHz and four cores. So, for selecting the CPU, always keep in mind that do not go for the fastest CPU (von Leon et al., 2018). for design virtualization, select a CPU that have more clock speed and more cores. The fastest CPU is only required when the workload demands it. Memory is one of the most important hardware for design virtualization. In virtualization, more memory always helps in consolidation. For better consolidation, higher memory is required. For virtualization, at least DDR3 memory is required. With the example of a CPU that suppose, two ten core (total 20 cores) CPU support 40 threads of workload. Each core supports two threads of workload. If each thread of workload uses 2 GB, then a total of 80 GB memory is required by the server. So, more memory is required for better consolidation when the server uses more CPU.

2.3. Networking Requirements

To design virtualization at first, the requirement is a good bandwidth. Good and better bandwidth is always required to develop the design of virtualization. To work on more workload, a 10 GbE NIC is required. Installing this 10 GbE NIC helps in controlling the consolidation of heavy workload (Lv and Rong, 2017). At the time of heavy workload, a better network is needed so this 10 GbE NIC can fulfil that condition of heavy workload. Other than this 10 GbE NIC, another option is available for networking access, and that is 1 GbE NIC, but his networking access is unable to maintain the heavy workload condition. So, 10 GbE NIC is the best option for networking access.

2.4. Storage Requirements

Storage is the first requirement for achieving 100% virtualization. So, always keep in mind the selection of storage for virtualization. Generally, storage systems provide the "storage quality of service (QoS)", but after the arrival of virtual machines, the need for storage systems is changed. Storage systems now need to set and modify the "storage quality of service (QoS)" as per the requirements of virtual machines (Alkadi et al., 2020). "NFS" and "VMware's VVOLS" are the type of storage systems that can fulfil all the requirements of the storage quality of service (QoS).

2.5. Software Requirements

To install the vRealize for cloud deployment, some requirements have to meet. Those requirements are the "VMware ESXi", "VMware", "vCenter server", "vCloud director", "vRealize automation and VMware identity manager. vRealize cloud can be used for managing the VMware service. For managing the VMware, "vCenter server", "vCloud director", "vCloud air", "vRealize automation" and "vRealize operations manager are required (Ogunshile, 2018). These are some software that is required for designing virtualization. Without this software, designing any virtualization is not possible.

2.6. Topology Virtual

topology is made up with the help of light paths as a graph, and it is made up with the help of different nodes that combine the optical switch and the IP router nodes. A virtual link is created between the two nodes when a light path is present between the optical switches. All the virtual topologies are graphs that are generated randomly according to the uniform distributions (Cooperson and Chappell, 2017). Or it can be said that the maximum number of K of light paths of the nodes, the nodes randomly pick up the K destinations for forming a K light paths. L is denoted as the total number of light paths in the virtual topology.

3.0. Part B: Cost Analysis

A list of the cost for each item that is required for designing the virtualization is given below.


Costing Element

Cost

Storage

$ 5000

Network Equipment

$ 8000

Computer Hardware

$ 25000

Software

$ 15000

Total Cost

$ 51000


4.0. Conclusion

It can be concluded from the above discussion that for designing virtualization, some basic things are required and that some essential hardware is required for designing the virtualization. Few essential software is mentioned in the above discussion that is required for designing the virtualization. Networking requirements and the network access that are required for this design also mentioned and well discussed in the above discussion. Some advantages of virtualization and the process in which this virtualization works that also mentioned in the above discussion.

References

Journal
Alkadi, O., Moustafa, N. and Turnbull, B., 2020. A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions. IEEE Access, 8, pp.104893-104917.
Cooperson, D. and Chappell, C., 2017. Telefnicas UNICA architecture strategy for network virtualization. White paper.
Lv, J. and Rong, J., 2017. Virtualization security risk assessment for enterprise cloud services based on stochastic game nets model. IET Information Security, 12(1), pp.7-14.
Ogunshile, E.K.A., 2018. Leveraging Cloud Computing, Virtualization and Solar Technologies to Increase Performance and Reduce Cost in Small to Medium-sized Businesses. In CLOSER (pp. 310-321).
Pahl, C., Brogi, A., Soldani, J. and Jamshidi, P., 2017. Cloud container technologies: a state-of-the-art review. IEEE Transactions on Cloud Computing, 7(3), pp.677-692.
von Leon, D., Miori, L., Sanin, J., El Ioini, N., Helmer, S. and Pahl, C., 2018, March. A Performance Exploration of Architectural Options for a Middleware for Decentralised Lightweight Edge Cloud Architectures. In IoTBDS (pp. 73-84).

Free Download Full Sample Free Download Full Sample
Get best price for your work

offer valid for limited time only*

Get a callback
In a Hurry-Get a Callback

© Copyright 2021 | New Assignment Help | All rights reserved