Cs seminar 20061207


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cs seminar 20061207

  1. 1. High Availability of Virtualized Desktop Applications Todd Deshane CS Seminar Fall 2006 Advisor: Jeanna Matthews
  2. 2. Overview <ul><li>Why High Availability? </li></ul><ul><li>Why Virtualized? </li></ul><ul><li>Why Desktop Applications? </li></ul><ul><li>Implementation Sketch </li></ul><ul><li>Discussion </li></ul><ul><li>Future Work </li></ul>
  3. 3. Why High Availability? <ul><li>Malware (viruses, worms, spyware, etc.) are still a problem </li></ul><ul><li>Patches and software bugs can cause problems </li></ul><ul><li>Fixing or reinstalling is time consuming and difficult for most computer users </li></ul><ul><li>Application downtime means decreased user productivity </li></ul>
  4. 4. Virtualization <ul><li>Level of abstraction </li></ul><ul><li>Which types of virtualization are of interest to us? </li></ul><ul><ul><li>Architecture Virtualization (Virtualization of underlying hardware i.e. x86) </li></ul></ul><ul><ul><li>OS Virtualization (virtualization of underlying kernel) </li></ul></ul>
  5. 5. Architecture Virtualization Virtual Machine Monitor (VMM) provides an interface to the underlying hardware Guest Operating Systems “think” they have full access to the underlying hardware
  6. 6. OS Virtualization Virtualization Layer in kernel provides interface to kernel Guest Operating Systems (Virtual Private Servers) “think” they have full access to the underlying kernel
  7. 7. Why Virtualized? <ul><li>More effective use of hardware </li></ul><ul><ul><li>Desktop utilization less than 10% </li></ul></ul><ul><li>Isolation of guests </li></ul><ul><ul><li>Guests run different applications </li></ul></ul><ul><li>Recovery of compromised guests </li></ul><ul><ul><li>Restarting or rolling back a guest is easier than restarting or rolling back a physical computer </li></ul></ul>
  8. 8. Why Desktop Applications? <ul><li>Desktop users’ increased reliance on power of computers </li></ul><ul><li>Increased sophistication of attacks </li></ul><ul><ul><li>Distributed botnets </li></ul></ul><ul><ul><li>Criminal attacks on data and resources </li></ul></ul><ul><li>Virtualization and HA cluster research traditionally focused on servers </li></ul>
  9. 9. Implementation Sketch <ul><li>Rapid Recovery System </li></ul><ul><ul><li>Isolated virtual machine appliances </li></ul></ul><ul><ul><li>Intrusion detection and restoration </li></ul></ul><ul><li>High Availability Cluster </li></ul><ul><ul><li>Redundancy of applications </li></ul></ul><ul><ul><li>Heartbeat monitoring </li></ul></ul><ul><li>Application Service Provider </li></ul><ul><ul><li>Central application server </li></ul></ul><ul><ul><li>On-demand software </li></ul></ul>
  10. 10. Rapid Recovery System
  11. 11. Rapid Recovery System <ul><li>Key Features </li></ul><ul><ul><li>Network Intrusion Detection </li></ul></ul><ul><ul><li>Data Protection </li></ul></ul><ul><ul><li>Fast Restoration </li></ul></ul><ul><ul><li>File System Intrusion Detection </li></ul></ul><ul><ul><ul><li>Read and write limiting </li></ul></ul></ul><ul><li>To be added: </li></ul><ul><ul><li>Contract-based data access </li></ul></ul>
  12. 12. High Availability (HA) Cluster With a passive stand-by system, fail-over can happen almost instantaneously
  13. 13. High Availability (HA) Cluster With a shared disk, data recovery can happen almost instantaneously
  14. 14. High Availability (HA) Cluster <ul><li>Key Features </li></ul><ul><ul><li>Heartbeat Monitoring </li></ul></ul><ul><ul><li>System or Data Fail-over </li></ul></ul><ul><ul><li>Reliability </li></ul></ul><ul><ul><li>Resource Management </li></ul></ul><ul><ul><ul><li>Data redundancy </li></ul></ul></ul><ul><ul><ul><li>System redundancy </li></ul></ul></ul><ul><ul><ul><li>Configurable Policies </li></ul></ul></ul>
  15. 15. Application Service Provider (ASP) Application server serves requests for applications Thin clients request applications for server
  16. 16. Application Service Provider (ASP) <ul><li>Key Features </li></ul><ul><ul><li>Central Application Server </li></ul></ul><ul><ul><li>Single backend storage connection point </li></ul></ul><ul><ul><li>Stateless Configuration Possible </li></ul></ul>
  17. 17. Implementation Integration <ul><li>ASPs are put into virtual machine appliances </li></ul><ul><li>Rapid recovery system protects user data and settings and restores ASPs </li></ul><ul><li>High availability cluster provides redundancy of application servers and heartbeat monitoring </li></ul>
  18. 18. Discussion <ul><li>Users increasingly rely on desktop applications </li></ul><ul><li>Attack sophistication is increasing </li></ul><ul><li>Combine virtualization, HA cluster, and rapid recovery technologies </li></ul><ul><li>High availability of virtualized desktop applications </li></ul><ul><ul><li>Attack resistant desktop experience </li></ul></ul><ul><ul><li>Rapid application and data recovery </li></ul></ul>
  19. 19. Discussion <ul><li>Application deployment model </li></ul><ul><ul><li>ASPs can be local or remote </li></ul></ul><ul><ul><li>User chooses which ASP version to use </li></ul></ul><ul><li>Software Redundancy </li></ul><ul><ul><li>Most faults occur in software </li></ul></ul><ul><li>System will also support hardware redundancy (if available) </li></ul>
  20. 20. Future Work <ul><li>Deployment and testing of HA cluster technology </li></ul><ul><li>Virtualization performance and usage testing on the desktop </li></ul><ul><li>Enhance and test the implementation of the rapid recovery system </li></ul><ul><li>System integration of these existing technologies </li></ul>
  21. 21. Questions?
  22. 22. Backup Slides
  23. 23. Implementation Details <ul><li>Virtual Environment: </li></ul><ul><ul><li>Xen (VMM) </li></ul></ul><ul><ul><li>OpenVZ (OS virtualization) </li></ul></ul><ul><li>High Availability Cluster </li></ul><ul><ul><li>Linux-HA </li></ul></ul><ul><li>File Server: </li></ul><ul><ul><li>Openfiler </li></ul></ul>
  24. 24. References <ul><li>Matthews et al. Data Protection and Rapid Recovery From Attack With A Virtual Private File Server and Virtual Machine Appliances </li></ul><ul><li>www. linux - ha .org/ </li></ul><ul><li>http://www.openfiler.com/ </li></ul><ul><li>http://en.wikipedia.org/wiki/Application_service_provider </li></ul>