04-03-2013, 04:24 PM
Designs of Virtual file system in Cloud Environment
Designs of Virtual.pdf (Size: 462.18 KB / Downloads: 44)
Abstract:
In this paper emphasis the virtual file system for storage of virtual image. The virtual machines raises the new challenges in the design and development of IaaS . The cloud middleware interacts with deployment and snapshot ting on clouds in a Amazon EC2 fashion. In this virtualization is also a technology based on cloud service providers and able to provide the data from data centers to users. The deploying the VM instances and to gather the number of users. To more challenge is to snapshot multiple images and persist them supervision tasks like stop VM`s temporarily and resume when required. This paper proposed new virtual file system for optimization of multi-deployment and multi-snapshot ting effectively.
INTRODUCTION
In this decade, Cloud computing is an increasingly popular paradigm for accessing computing resources. Infrastructure as a Service (IaaS) is the delivery of hardware (server, storage and network), and associated software (operating systems virtualization technology, file system), as a service. The foundation of any cloud computing stack begins with its infrastructure. IaaS cloud computing is the delivery of computing on demand as a shared service, avoiding the cost of investing in, operating and maintaining the hardware. In order to be fully functional, the infrastructure must be reliable and flexible to allow easy implementation and operation of applications running within the cloud. Leasing of computation time can be achieved by enabling users to deploy virtual machines (VMs) on the resources of the datacenter. The on-demand nature of IaaS is grave to make such leases attractive, it enables the users to shrink their resources according to their computational uses. This rising model fallout in new challenges relating to design and development of IaaS system. One along with regularly resulting pattern in the operation of IaaS is the necessity for Deploying a huge number of VMs on most of the nodes relative to a datacenter at the same instant of time. Starting from set of VM images earlier and stored in importunate fashion. For example this pattern occurs when the user wants to deploy a virtual clusters that executes in a distributed application or a group of environments for supporting a workflow. So, we refer this pattern as multi-deployment.
Cloud Infrastructure
In recent years, infrastructure-as-a-service (IaaS) cloud computing [14] has emerged as an attractive alternative to the acquisition and management of physical resources. The on demand provisioning it supports allows users to elastically expand and contract the resources available to them based on an immediate need a pattern that enables rapid turnaround when dealing with emergencies, working toward deadlines, or growing an institutional resource base. This pattern makes it convenient for institutions to configure private clouds that allow their users a seamless or near-seamless transition to community or commercial clouds supporting compatible virtual machine (VM) images and cloud interfaces. Such private clouds are typically configured by using open source IaaS implementations. To ensure on-demand availability, a provider needs to overprovision: keep a large proportion of nodes idle so that they can be used to satisfy an on-demand request, which could come at any time. The need to keep all these nodes idle leads to low utilization. The only way to improve it is to keep fewer nodes idle. But this means potentially rejecting a higher proportion of request to a point at which a provider no longer provides on-demand computing.
Virtualization
Virtualization, in its broadest sense is the emulation of one or more workstations/servers, within a single physical computer. In other words, it is the emulation of hardware within a software platform. This type of virtualization is sometimes referred to as full virtualization and it allows one physical computer to share its resources across a multitude of environments. This means that a single computer can essentially take the role of multiple computers. Virtualization is not only limited to the simulation of entire machines. In fact there are many different kinds of virtualization. One of these is in use by almost all modern machines today and is referred to as virtual memory. Although the physical locations of data may be scattered across a computers RAM and Hard Drive, the process of virtual memory makes it appear that the data is stored contiguously and in order.
Related work
In previous days transferring the image data and making that data available to virtual machine. That evolution can be done in both general terms and cloud environment. This specific environment is a relatively small cloud system with 72 physical machines. To find the best method of deployment given the size of the system and the performance of the network that is used for the deployments. The basic transfer methods we use are BitTorrent and multicast.
Bit torrent:
BitTorrent is a protocol for rapid distribution of files over local or wide area networks. It leverages the upload capacity of downloading hosts to speed up transfers and to scale to a large number of hosts. Files that are to be served are divided into multiple pieces. These pieces are then served to a number of receivers from the initial source of the file. Once a receiver has finished downloading a given piece, it can start uploading it to the other receivers. This increases the total upload capacity of the system. BitTorrent uses separate tracker software to allow receiving hosts to find other receiving hosts. The tracker is a server that has information about which hosts are downloading which files. More recently, distributed ways of tracking other downloading hosts have been added, making the tracker an optional component. One example is distributed hash tables. Metadata about the files to be shared is contained in a so called torrent file. This file contains hashes for the pieces of the files. These can be used to check the integrity of pieces before distributing them to other hosts. It also contains information about the tracker. Previous research on the scalability of BitTorrent has shown that it scales well to a very large number of simultaneous peers. It works well in very heterogeneous environments. For example, Izal et al. studied one publicly available torrent that was downloaded by a wide variety of users using many different connection types and found out that the users were mostly able to utilize the bandwidth available to them effectively.