Wednesday, December 4, 2019

Virtualization in Database Server

Question: Discuss about the Virtualization in Database Server. Answer: Introduction Database server has been in state of modification and development for the operations of the organization (Mahajan et al., 2017). The database server modification had been largely dependent on the development of the technology and equipments. ACL Realty is a major estate firm that works well for providing the customers with benefit of estate related guidance and support. ACL Realty self manages the data centre for the 10 x86 64 bits server connection on Windows Server 2008 R2, MS SQL and file services. They need to form some modifications in their server system. The following report had been made for providing the board members an insight on the role and modification of the server and the technologies used. It is probable that the modification of the server would require some highly modified and developed technology. The report would highlight the brief description and benefit of using virtualization, virtual machine and vApp for improving the operations of servers at ACL. Virtualization in ACL Role of Virtualization in Data Center Environment The benefits of using Data Center Environment at ACL for the data center environment include the benefit of faster redeployment, less requirements of physical database, and easier and better backups. Faster Redeployment: The deployment of virtualization would allow the users for deploying the server with less time exhaustion. It is possible that the server might get crashed or disrupted due to some issues and the redeployment of the server would take large amount of time (Ren et al., 2013). However, the use of virtualization would allow the users for quicker redeployment of the network server for the database environment. Less Requirements of Physical Database: The virtualization would allow the users for quickly deploying the server without much need of components (Kang et al., 2013). The physical components would be used for deploying the manual database. However, for case of virtual database, many components for making the server would not be required. Easier and Better Backups: The virtualization would allow the users for making faster backups in case of disasters. The backups made in the virtual network would be convenient in terms of disaster recovery of data. Need and Importance of Virtualization Virtualization in network server would be helpful for providing the ease of automated data server for recording and manipulating the data required for the organization (Rost, 2015). The virtualization provides the ease of data recovery and server deployment for the organization. The needs and importance of virtualization have been explained in the following paragraphs. Need: The virtualization provides the ease of virtual machine migration for any database server modification (Jain Paul, 2013). The virtualization provides the implementation of long distance data migration operations for the organization. The primary need of the virtualization include the migration of physical database to the cloud network. It is important for forming the migration that would allow connectivity between two long distance located database servers. Importance: The importance of virtualization of database servers at ACL Realty include, Improvement of the prevailing infrastructure of database Quick and effective management of information system Providing Instant capacity of operations Example of using Virtualized Database According to Swathi, Srikanth and Reddy (2014), Amazon provides cloud based service for its users by the name of Amazon AWS. They had been using virtualization for providing their users with ease of network technology and cloud services. They had deployed many cloud based virtualized technology database for their operations and customers such as Xen, Rackspace, Ubuntus cloud server, and Engine Yard Ruby application. Virtual Machine in ACL Realty Key Attributes of Virtual Machine (VM) The key attributes for installing virtual machine in ACL include the functional attributes that would help the organization for managing their 10 x86 64 bits server for providing their customers with appropriate state related information. The key attributes of virtual machine includes simple installation, application aware, scalable operations, and affordable system. Simple Installation: The virtual machine is very efficient and it does not require any particular complex operations for installing the virtual machine (Mashtizadeh et al., 2014). The operations of installment of the virtual machine is simplified and managed for providing the adaption of the new and efficient system development. The simple installation of the virtual machine would allow the users for forming an effective and smart application development in the organization. Application aware: It is important for being aware to the application required for implementation at virtual machine (Gao et al., 2013). The application needed for realizing the importance of the system development in ACL Realty would require the system administrator for realizing the application and the requirements of the organization for implementing the virtualization. The virtualization would have to be assisted in developing the operations for implementing the new database server in the organization. Scalable operations: The scalable operations in the organization would have to be considered for implementing the virtualization in the organization (Mashtizadeh et al., 2014). The scalable operations should be considered too for implementing the virtualization in the organization. The scalable operations would be effectively managed by the deployment of the virtualization database server. Affordable system: The affordable operations due to the implementation of the virtualized database server are another major attribute of deploying the Virtual Machine (Gao et al., 2013). The system development in the ACL would have to consider the affordable implementation of the virtualized machine for enabling the database server of the operations. Important Points for Consideration in VM sever The security of the data and the accessibility of the information on the virtual machine server should be considered for using the VM server at ACL Realty. Security of stored data: Since the VM server is a wireless server for accessing the database information by using server access, it is important for keeping the data and information private and secured. According to Rajasekaran et al. (2016), the security measures in the VM server would be established by using the firewall, intrusion detection, prevention, and antivirus. Most of the server infiltration is done by deploying some malware or antivirus. Hence it is important for regulating the security measures and deploying effective podcasts in the system. Accessibility of information: The accessibility of information should be limited to a specific number of people and users (Gorgolewski et al., 2017). The users of the VM server would be authorized by using some specific measures of accessing. The authentication and authorization would be done by deploying the encryption and identification process. The identification would be managed by the use of pass code verification or passphrase encryption. Virtual Appliance in ACL Realty Definition of Virtual Appliance and vApp Virtual Appliance: The virtual appliance is an image file of virtual machine that consists of a single application along with preconfigured operating system environment (Li et al., 2014). The appliance is helpful for simplifying the delivery and functional operations of the applications. vApp: The vApp represents the multi-tiered software solution that consists of a collection of virtual machines working as a single unit. According to Avula, Gudapati and Kodukula (2013), the vApp container is a form of technical resource pool consisting of product information (like name, properties, vendor, and license), power on/off sequence, and supporting the import or export of vApps as OVF packages. Usage of Virtual Appliance in ACL Realty The virtual appliance is a subset of the broader software class applications of virtual machine and it is used by using hypervisor (Li et al., 2014). The installation of software in a virtual machine and then packing them in an image file (.ISO) can be termed as virtual appliance. The Virtual Appliance are used in the following scenarios, Transfer of Software Application: The transfer of software application in a server from one system to another can be done by using the virtual appliance. The virtual appliance is helpful for providing the support to other users. Webpage UX: The deployment of the virtual appliance would be helpful for providing the ease of Webpage User Interface (UX). They require permit for supporting the formation of appliance configuration by the help of webpage interface. Host Single Application: The virtual appliance is helpful for providing the ease of deploying applications in the network (Avula, Gudapati Kodukula, 2013). It provides the building of server for hosting a single application for the user. Main Virtual Appliance Providers Providers VMware Products vSphere Key features Desktop level virtualization and free server virtualization Site URL https://www.vmware.com/au.html Providers Microsoft Products Hyper V Key features Hypervisor for supporting non-Linux applications and new windows server released by Microsoft Site URL https://technet.microsoft.com/en-us/library/mt169373(v=ws.11).aspx Providers Oracle Products Sun Solaris, Solaris Zones, LDoms and xVM Key features Sun Solaris is an operating system Solaris Zones, LDoms and xVM are multiple virtualization software solutions Site URL https://www.oracle.com/virtualization/vm-server-for-x86/index.html Table 1: Details of Main Virtual Appliance Providers References Avula, T., Gudapati, R., Kodukula, S. (2013). A Novel Framework for Virtual Desktop Environment with vApp.International Journal of Computer Applications,71(12). Gao, Y., Guan, H., Qi, Z., Hou, Y., Liu, L. (2013). A multi-objective ant colony system algorithm for virtual machine placement in cloud computing.Journal of Computer and System Sciences,79(8), 1230-1242. Gorgolewski, K. J., Alfaro-Almagro, F., Auer, T., Bellec, P., Capot?, M., Chakravarty, M. M., ... Eklund, A. (2017). BIDS apps: Improving ease of use, accessibility, and reproducibility of neuroimaging data analysis methods.PLOS Computational Biology,13(3), e1005209. Jain, R., Paul, S. (2013). Network virtualization and software defined networking for cloud computing: a survey.IEEE Communications Magazine,51(11), 24-31. Kang, J. M., Bannazadeh, H., Rahimi, H., Lin, T., Faraji, M., Leon-Garcia, A. (2013, June). Software-defined infrastructure and the future central office. InCommunications Workshops (ICC), 2013 IEEE International Conference on(pp. 225-229). IEEE. Li, J., Doyle, M. A., Saeed, I., Wong, S. Q., Mar, V., Goode, D. L., ... Hunter, S. M. (2014). Bioinformatics pipelines for targeted resequencing and whole-exome sequencing of human and mouse genomes: a virtual appliance approach for instant deployment.PloS one,9(4), e95217. Mahajan, I., Gupta, S., Kaur, H., Kumar, D. (2017). Extended Weighted Page Rank Based on VOL by Finding User Activities Time and Page Reading Time, Storing them Directly on Search Engine Database Server.International Journal of Engineering Works,4(2), 41-48. Mashtizadeh, A. J., Cai, M., Tarasuk-Levin, G., Koller, R., Garfinkel, T., Setty, S. (2014, June). XvMotion: Unified Virtual Machine Migration over Long Distance. InUSENIX Annual Technical Conference(pp. 97-108). Rajasekaran, S., Ni, Z., Chawla, H. S., Shah, N., Wood, T., Berger, E. (2016, June). Scalable cloud security via asynchronous virtual machine introspection. In8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 16)(Vol. 29, pp. 36-41). USENIX Association. Ren, J., Pentikousis, K., Westphal, C., Liu, W., Wang, J. (2013). The Role of Virtualization in Information-centric Network Deployment.E-LETTER. Rost, P., Berberana, I., Maeder, A., Paul, H., Suryaprakash, V., Valenti, M., ... Fettweis, G. (2015). Benefits and challenges of virtualization in 5G radio access networks.IEEE Communications Magazine,53(12), 75-82. Swathi, T., Srikanth, K., Reddy, S. R. (2014). Virtualization in cloud computing.International Journal of Computer Science and Mobile Computing, ISSN, 540-546.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.