簡易檢索 / 詳目顯示

研究生: 周鳳儀
Feng-yi Chou
論文名稱: 雲端開放平台之虛擬機器佈建機制
Network-Constrained Virtual Machine Deployment Strategy in Open Cloud Platform
指導教授: 陳俊良
Jiann-liang Chen
口試委員: 楊竹星
Chu-sing Yang
林宗男
Tsung-nan Lin
陳維美
Wei-mei Chen
朱彥銘
Yen-ming Chu
學位類別: 碩士
Master
系所名稱: 電資學院 - 電機工程系
Department of Electrical Engineering
論文出版年: 2012
畢業學年度: 100
語文別: 英文
論文頁數: 66
中文關鍵詞: 雲端運算網路使用率OpenFlowEucalyptus
外文關鍵詞: Cloud Computing, Network Utilization, OpenFlow, Eucalyptus
相關次數: 點閱:213下載:14
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 雲端運算(Cloud Computing)為近年來新興的一項概念,透過網際網路,可提供使用者豐富的應用程式與虛擬化資源,如儲存空間、CPU、記憶體等。相較於傳統資料中心,雲端資料中心可減少龐大的管理成本,而虛擬機器在雲端資料中心之服務佔有重要角色。由於雲端資料中心可能分佈於許多地區,而每個地區的資料中心其網路狀態不盡相同, 因此,虛擬機器佈建的位置將影響使用者存取的效能。

    本研究使用Eucalyptus建置一雲端資料中心,並提出Network Utilization Constrained演算法,其係基於目前使用者與節點控制器間之網路使用率決定虛擬機器佈建的位置,並透過OpenFlow Switch管理使用者與虛擬機器間的流量。

    本研究針對節點控制器位於同一網域與不同網域進行分析,包含兩種情境,一種為正常情況下,另一種為節點控制器發生網路瓶頸的情況,根據結果顯示,於相同網域中,採用本研究提出之演算法所建置之虛擬機器其檔案傳輸時間與Eucalyptus內建之Round Robin與Greedy演算法比較,可提升2.63%與68.72%,若發生網路瓶頸,則可提升32.79%與60.24%。而於不同網域中,可提升21.99%與52.10%,發生網路瓶頸時,可提升22.74%與49.86%。


    Cloud computing emerges as a novel application service layers. It provides diversity of applications and virtualization resources, such as storage services, CPU, and memory. Thus, when it is compared with the traditional data center, cloud data center becomes very attractive solution for enterprises where enormous management cost could be reduced. Virtual machines hold important role for cloud data center service. Since the data center may be distributed over many regions, and the network conditions within cloud data center is different, so the deployment of virtual machines will influence service performance obtained by users.

    This study implements Eucalyptus cloud computing platform as a cloud data center system, and proposes network utilization constrained scheduling algorithm that works according to the current network status between users and associated node controllers for deploying the services. In addition by OpenFlow switch is implemented to manage the intended flow within users and virtual machines.

    The experiment is conducted upon node controller in the same and different subnet. For each experiment two scenarios are performed, First scenario is conducted within normal network condition, second scenario is considering bottleneck event at node controller. The experiment results indicate that in the same subnet, the virtual machines deployed with network utilization constrained scheduling algorithm can improve the transmission time 2.63% and 68.72% compare to traditional Round Robin and Greedy algorithms consecutively. In considering bottleneck event, the proposed method can improve 32.79% and 60.24%. In the different subnet scenario, the proposed mechanism improves 21.99% and 52.10%, eventually with bottleneck event the system is improved as 22.74% and 49.86%.

    摘要 Abstract 致謝 Contents List of Figures List of Tables Chapter 1 Introduction 1.1 Motivation 1.2 Contribution 1.3 Organization of This Thesis Chapter 2 Background Knowledge 2.1 Cloud Computing 2.1.1 Cloud Computing Essential Characteristics 2.1.2 Cloud Computing Service Models 2.1.3 Cloud Computing Deployment Models 2.2 Open Source Cloud Computing Platforms 2.2.1 Eucalyptus 2.2.2 OpenNebula 2.2.3 Abicloud 2.2.4 Nimbus 2.3 Cloud Virtualization 2.3.1 Citrix Xen 2.3.2 Kernel-based Virtual Machine 2.4 OpenFlow 2.4.1 OpenFlow Switch 2.4.2 NOX Controller Chapter 3 Proposed Virtual Machine Deployment Strategy 3.1 System Overview 3.2 VM Scheduling Algorithm 3.3 Proposed Network Utilization Constrained Algorithm 3.4 Virtual Machine Deployment Mechanism Chapter 4 System Design and Performance Analysis 4.1 System Design 4.1.1 OpenFlow Switch Design 4.1.2 Eucalyptus Design 4.2 System Implementation 4.3 Performance Analysis Chapter 5 Conclusion and Future Work 5.1 Conclusion 5.2 Future Work References

    [1] NIST, http://www.nist.gov/itl/cloud/index.cfm
    [2] K. Bakshi, “Considerations for Cloud Data Center: Framework, architecture and adoption,” Proceedings of the IEEE Aerospace Conference, pp.1-7, Mar. 2011.
    [3] B. Sosinsky (2011). Cloud Computing Bible. Indianapolis: Wiley.
    [4] J. Hurwitz, R. Bloor, M. Kaufman, F. Halper (2010). Cloud Computing For Dummies. Hoboken:Wiley.
    [5] A.T. Velte, T.J. Velte, R. Elsenpeter (2009). Cloud Computing: A Practical Approach. McGrawHill.
    [6] R.L. Krutz, R.D. Vines (2010). Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Indianapolis: Wiley.
    [7] Cloud Computing Use Cases White Paper version 4.0, July 2010.
    [8] Sun, Introduction to Cloud Computing Architecture White Paper, June 2009.
    [9] S. Wind, “Open Source Cloud Computing Management Platforms,” Proceedings of the IEEE Conference on Open Systems, pp.175-179, Sept. 2011.
    [10] Eucalyptus, http://www.eucalyptus.com
    [11] T. Cordeiro, D. Damalio, N. Pereira, P. Endo, A. Palhares, G.Goncalves, D. Sadok, J. Kelner, B. Melander, V. Souza, and J.-E. Mangs, “Open Source Cloud Computing Platforms,” Proceedings of the 9th International Conference on Grid and Cooperative Computing, pp.366-371, Nov. 2010.
    [12] D. Nurmi, R.Wolski, C. Grzegorczyk, G. Obertelli, S.Soman, L.Youseff, and D. Zagorodnov, “The Eucalyptus Open-source Cloud-computing System,” Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, pp.124-131, May 2009.
    [13] OpenNebula, http://www.opennebula.org
    [14] B. Takayuki, K. Hitoshi, K. Ryo, I. Takayuki, H. Toshihiro and S. Mitsuhisa, “D-Cloud: Design of a Software Testing Environment for Reliable Distributed Systems Using Cloud Computing Technology,” Proceedings of the 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp.631-636, May 2010.
    [15] P. Sempolinski and D. Thain, “A Comparison and Critique of Eucalyptus, OpenNebula and Nimbus,” Proceedings of the IEEE Second International Conference on Cloud Computing Technology and Science, pp.417-426, Dec. 2010.
    [16] Abicloud, http://www.abiquo.com
    [17] M. Mahjoub, A. Mdhaffar, R. B. Halima, M. Jmaiel, “A Comparative Study of the Current Cloud Computing Technologies and Offers,” Proceedings of the First International Symposium on Network Cloud Computing and Applications, pp.131-134, Nov. 2011.
    [18] Nimbus, http://www.nimbusproject.org/
    [19] S. Wind, “Open source cloud computing management platforms: Introduction, comparison, and recommendations for implementation,” Proceedings of the IEEE Conference on Open Systems, pp.175-179, Sept. 2011.
    [20] L. Fagui, Z. Hao and Z. Haiyan, “A Xen-Based Secure Virtual Disk Access-Control Method,” Proceedings of the International Conference on Multimedia Information Networking and Security, pp.375-378, Nov. 2010.
    [21] S.B. Nigmandjanovich and C.W. Ahn, “Policy-based dynamic resource allocation for virtual machines on Xen-enabled virtualization environment,” Proceedings of the 2nd International Conference on Advanced Computer Control, pp.353-355, Mar. 2010.
    [22] M. Eto and H. Umeno, “Design and implementation of content based page sharing method in Xen,” Proceedings of the International Conference on Control, Automation and Systems, pp.2919-2922, Oct. 2008.
    [23] J. Che, Q. He, Q. Gao and D. Huang, “Performance Measuring and Comparing of Virtual Machine Monitors,” Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp.381-386, Dec. 2008.
    [24] W. Jiang, Y. Zhou, Y. Cui, W. Feng, Y. Chen, Y. Shi and Q. Wu, “CFS Optimizations to KVM Threads on Multi-Core Environment,” Proceedings of the 15thInternational Conference on Parallel and Distributed Systems, pp.348-354, Dec. 2009.
    [25] Q. Liu, C. Weng, M. Li and Y. Luo, “An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds,” Proceedings of the IEEE Conference on Security & Privacy, pp.56-62, Dec. 2010.
    [26] OpenFlow, http://www.openflow.org/
    [27] N. Mckeown, T. Anderson, H. Balakrishnan, G. Paruldar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, “OpenFlow: Enabling Innovation in Campus Networks,” Proceedings of the ACM SIGCOMM Computer Communication, Vol.38, Apr. 2008.
    [28] OpenFlow Switch Specification v1.1.0, http://www.openflow.org/documents/openflow-spec-v1.1.0.pdf
    [29] NOX, http://www.noxrepo.org/
    [30] N. Gude, T. Koponen, J. Pettit, B. Pfaff, N. McKeown, S. Shenker, M. Casado, “NOX: Towards an Operating System for Networks,” Proceedings of the ACM SIGCOMM Computer Communication, pp.105-110, July, 2008.
    [31] I. Houidi, M. Mechtri, W. Louati, and D. Zeglache, “Cloud Service Delivery Across Multiple Cloud Platforms,” Proceedings of the IEEE International Conference on Services Computing, pp.741-742, Jul. 2011
    [32] B. Boughzala, R. Ben Ali, M. Lemay, Y. Lemieux, and O. Cherkaoui, “OpenFlow Supporting Inter-Domain Virtual Machine Migration,” Proceedings of the 8th International Conference on Wireless and Optical Communications Networks, pp.1-7, May 2011.
    [33] H. Shimonishi, and S. Ishii, “Virtualized network infrastructure using OpenFlow,” Proceedings of the IEEE Network Operations and Management Symposium Workshops, pp74-79, Apr. 2010.

    QR CODE