The document provides an overview of the internship experience working on a virtual desktop infrastructure (VDI) project for a university library in Addis Ababa, Ethiopia. The project involved setting up a VDI using Dell servers and storage, and Cisco networking equipment to support 350 thin clients. Key tasks included labeling thin clients, checking electrical load capacity, and configuring the Dell blade enclosure, PowerEdge servers, Storage Center storage arrays, and Cisco switches to connect the thin clients.
VIRTUALIZATION: Basics of Virtualization, Types of Virtualizations, Implementation Levels of Virtualization, Virtualization Structures, Tools and Mechanisms, Virtualization of CPU, Memory, I/O Devices, Virtual Clusters and Resource management, Virtualization for Data-center Automation, Introduction to MapReduce, GFS, HDFS, Hadoop, Framework.)
EMC IT's Journey to Cloud :
PHASE 2: BUSINESS PRODUCTION
VIRTUAL DESKTOP
Follow EMC’s rollout of Virtual Desktop to empower users and automate desktop management.
Micro Server Design - Open Compute ProjectHitesh Jani
The Micro Server is a cluster of Low Power, High Density Servers which can be applied in growing workloads such as Distributed Computing, Cloud Computing, Internet of Things (IoT) and Big Data.
Cloud computing, its types, its services, advantages and disadvantages.
Touch screen technology.
Database system, advantages and disadvantages.
Cores and their differences.
VIRTUALIZATION: Basics of Virtualization, Types of Virtualizations, Implementation Levels of Virtualization, Virtualization Structures, Tools and Mechanisms, Virtualization of CPU, Memory, I/O Devices, Virtual Clusters and Resource management, Virtualization for Data-center Automation, Introduction to MapReduce, GFS, HDFS, Hadoop, Framework.)
EMC IT's Journey to Cloud :
PHASE 2: BUSINESS PRODUCTION
VIRTUAL DESKTOP
Follow EMC’s rollout of Virtual Desktop to empower users and automate desktop management.
Micro Server Design - Open Compute ProjectHitesh Jani
The Micro Server is a cluster of Low Power, High Density Servers which can be applied in growing workloads such as Distributed Computing, Cloud Computing, Internet of Things (IoT) and Big Data.
Cloud computing, its types, its services, advantages and disadvantages.
Touch screen technology.
Database system, advantages and disadvantages.
Cores and their differences.
Types of Cloud services: Software as a Service, Platform as a Service – Infrastructure as a Service, Database as a Service, Monitoring as a Service, Communication as services. Service providers- Google App Engine, Amazon EC2, Microsoft Azure, Sales force
Learn about the IBM SmartCloud Desktop Infrastructure.The SmartCloud Desktop Infrastructure solution with VMware View running on IBM Flex System simplifies IT manageability and control. It delivers high fidelity user experiences across devices and networks. The features of VMware View that are included in the SmartCloud Desktop Infrastructure solution provide enhanced security, high availability, centralized management and control, and scalability. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
Virtual appliance creation and optimization in cloudeSAT Journals
Abstract The large scale IaaS systems could store virtual appliances in several repositories. The deployment time could heavily vary depending on the connection properties of the repository storing the appliance. A virtual appliance is a virtual machine image designed to run on a virtualization platform i.e. Virtual Box, Xen, VMware Workstation. Virtual appliance delivery requires the modification of the underlying IaaS systems. IaaS is the virtual delivery of computing resources in the form of hardware, networking, and storage services This concept will reduce the variance in deployment time by introducing the concept of online active repositories and appliance optimization. To provide efficient delivery time in IaaS and to increase the efficiency of IaaS (Infra structure as a service) system To calculate the delivery time when deployed it in the virtualized platform Combining the both online and manual repositories for calculating the delivery time To construct the appliance in online using various online repositories The constructed appliance is deployed in the virtualized platform (using virtual box). And the appliance is optimized for increasing the efficiency and decreasing the delivery time. The delivery time of the online appliance is compared with the appliance which has been created manually. Keywords- Cloud Computing, Virtualization, Virtual Appliance.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IDC Tech Spotlight: From Silicon To CloudJames Price
The topic of cloud computing has received a tremendous amount of attention in the last year. This whitepaper discusses some of the aspects of the delivery of IT Infrastructure as a service.
Dynamic resource allocation using virtual machines for cloud computing enviro...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Types of Cloud services: Software as a Service, Platform as a Service – Infrastructure as a Service, Database as a Service, Monitoring as a Service, Communication as services. Service providers- Google App Engine, Amazon EC2, Microsoft Azure, Sales force
Learn about the IBM SmartCloud Desktop Infrastructure.The SmartCloud Desktop Infrastructure solution with VMware View running on IBM Flex System simplifies IT manageability and control. It delivers high fidelity user experiences across devices and networks. The features of VMware View that are included in the SmartCloud Desktop Infrastructure solution provide enhanced security, high availability, centralized management and control, and scalability. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
Virtual appliance creation and optimization in cloudeSAT Journals
Abstract The large scale IaaS systems could store virtual appliances in several repositories. The deployment time could heavily vary depending on the connection properties of the repository storing the appliance. A virtual appliance is a virtual machine image designed to run on a virtualization platform i.e. Virtual Box, Xen, VMware Workstation. Virtual appliance delivery requires the modification of the underlying IaaS systems. IaaS is the virtual delivery of computing resources in the form of hardware, networking, and storage services This concept will reduce the variance in deployment time by introducing the concept of online active repositories and appliance optimization. To provide efficient delivery time in IaaS and to increase the efficiency of IaaS (Infra structure as a service) system To calculate the delivery time when deployed it in the virtualized platform Combining the both online and manual repositories for calculating the delivery time To construct the appliance in online using various online repositories The constructed appliance is deployed in the virtualized platform (using virtual box). And the appliance is optimized for increasing the efficiency and decreasing the delivery time. The delivery time of the online appliance is compared with the appliance which has been created manually. Keywords- Cloud Computing, Virtualization, Virtual Appliance.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IDC Tech Spotlight: From Silicon To CloudJames Price
The topic of cloud computing has received a tremendous amount of attention in the last year. This whitepaper discusses some of the aspects of the delivery of IT Infrastructure as a service.
Dynamic resource allocation using virtual machines for cloud computing enviro...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxbudabrooks46239
Short Economic Essay
Please answer MINIMUM 400 word
I need this maximum in 2,5 hour because now I’m doing the online final exam and the clock is ticking.
Question:
What is the purpose of the term sheet and why is it important? Be sure to write a detailed long essay to this question. Think about who the term sheet is written for, why it is written, and what does it need to convey.
Cloud Computing: Virtualization and Resiliency for
Data Center Computing
Valentina Salapura
IBM T. J. Watson Research Center
Yorktown Heights, NY, USA
[email protected]
Index Terms — Cloud computing, data center management,
data center optimization, virtualization, Infrastructure as a
service (IaaS), Platform as a service (PaaS), Software as a service
(SaaS), high availability, disaster recovery, virtual appliance.
INTRODUCTION
Cloud computing is being rapidly adopted across the IT
industry, driven by the need to reduce the total cost of
ownership of increasingly more demanding workloads. Within
companies, private clouds are offering a more efficient way to
manage and use private data centers. In the broader
marketplace, public clouds offer the promise of buying
computing capabilities based on a utility model. This utility
model enables IT consumers to purchase compute resources on
demand to fit current business needs and scale expenses
associated with computing resources. Thus, cloud computing
offers IT to be treated as an ongoing variable operating expense
billed by usage rather than requiring capital expenditures that
must be planned years in advance. Advantageously, operating
expenses can be charged against the revenue generated by these
expenses directly. In contrast, capital expenses incurred by the
purchase of a system need to be paid at the time of purchase,
but can only be depreciated to reduce the taxable income over
the lifetime of the system.
THE MAIN ATTRIBUTES OF CLOUD COMPUTING
The main attributes of cloud computing are scalable,
shared, on-demand computing resources delivered over the
network, and pay-per-use pricing. This offers flexibility in
using as few or as many IT resources as needed at any point in
time. Thus, users do not need to predict future resources they
might need, and to commit to capital investment in hardware.
This is especially advantageous for start-ups, and small and
medium businesses which might otherwise not be able to afford
the IT infrastructure they need to support their growing
business. At the same time, redirecting capital investment from
IT infrastructure to the core business is attractive even for large
and financially strong businesses.
From a technical perspective, cloud computing brings the
benefits of virtualization and multi-tenancy to scale-out
systems. Virtualization techniques allow multiple system
images to share the same hardware resources: CPU
virtualization techniques create multiple virtual hardware
systems, while network virtualization .
Implementation of the Open Source Virtualization Technologies in Cloud Computingneirew J
The “Virtualization and Cloud Computing” is a recent buzzword in the digital world. Behind this fancy
poetic phrase there lies a true picture of future computing for both in technical and social perspective.
Though the “Virtualization and Cloud Computing are recent but the idea of centralizing computation and
storage in distributed data centres maintained by any third party companies is not new but it came in way
back in 1990s along with distributed computing approaches like grid computing, Clustering and Network
load Balancing. Cloud computing provide IT as a service to the users on-demand basis. This service has
greater flexibility, availability, reliability and scalability with utility computing model. This new concept of
computing has an immense potential in it to be used in the field of e-governance and in the overall IT
development perspective in developing countries like Bangladesh.
Implementation of the Open Source Virtualization Technologies in Cloud Computingijccsa
The “Virtualization and Cloud Computing” is a recent buzzword in the digital world. Behind this fancy
poetic phrase there lies a true picture of future computing for both in technical and social perspective.
Though the “Virtualization and Cloud Computing are recent but the idea of centralizing computation and
storage in distributed data centres maintained by any third party companies is not new but it came in way
back in 1990s along with distributed computing approaches like grid computing, Clustering and Network
load Balancing. Cloud computing provide IT as a service to the users on-demand basis. This service has
greater flexibility, availability, reliability and scalability with utility computing model. This new concept of
computing has an immense potential in it to be used in the field of e-governance and in the overall IT
development perspective in developing countries like Bangladesh.
A Dell PowerEdge MX environment using OpenManage Enterprise and OpenManage En...Principled Technologies
Compared to a Cisco UCS-X environment using Intersight, the Dell environment streamlined making changes to VLANs and helped avoid interventions during scheduled firmware updates
Conclusion
We executed two management scenarios in a Dell PowerEdge MX environment with Dell OpenManage Enterprise and OpenManage Enterprise Modular and a Cisco UCS X-Series chassis environment with Cisco Intersight. We learned that the Dell solution’s single-part profile modification for performing VLAN updates was quicker and simpler than the Cisco solution’s two-part profile deployment, requiring 40 percent less time and two-thirds as many steps. We also compared the firmware updating process on the solutions. Being able to schedule these updates to occur automatically from the online Dell repository offered an advantage over having to manually execute the same tasks from the Cisco Intersight repositories. Namely, administrators do not need to take action during maintenance windows but can instead schedule them ahead of time. Saving time on routine tasks frees administrators to pursue innovation, and being able to avoid middle-of-the-night duties helps companies provide a better work experience for admins. Together, these advantages help make Dell PowerEdge MX servers a good candidate for companies considering upgrading the older Cisco UCS servers in their data centers.
Need for Virtualization – Pros and cons of Virtualization – Types of Virtualization –System VM, Process VM, Virtual Machine monitor – Virtual machine properties - Interpretation and binary translation, HLL VM - supervisors – Xen, KVM, VMware, Virtual Box, Hyper-V.
Deploying Applications in Today’s Network InfrastructureCisco Canada
This presentation prepares networking engineers for the fundamentals of deploying application in today’s server virtualization infrastructure. The objectives for this presentation is to share best practices, tips and tricks on how best to implement Cisco technology such as Cisco UCS and Cisco Nexus 1000v with any virtualization stack. During this presentation we will analyze and dissect two server virtualization use cases recently architected. These use cases consist of a multi -tenant private cloud and virtual desktop infrastructure for thousands of users.
Basics of Cloud Computing and tools required to get into the cloud world. Simply put, cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
On the other hand DeskStream employs client-side desktop virtualization technology to offer an optimized and high performance Dynamic Virtual Desktops (DVDs) by combining the best of centralized IT management and client computing together to deliver truly anywhere, anytime personalized desktop execution on any device resulting in significant cost savings and uncompromised user experience.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Chapter 3
1. CHAPTER 3
OVERALL INTERNSHIP EXPERIENCE, PRACTICALKNOWLEDGE
3.1 Virtualization Desktop Infrastructure
VDI was the first project I have been exposed to. It was Library project for Addis Ababa University
at College of Health Science. The projects objective was to bring the latest technology to our
country especially in education sector since it is cost efficient.
Virtualization is combined environment to manage all resources from one interface. And it can be
seen like a big computer consisting of three main important things. These are:
RAM – The ability to process many things at one time.
Memory – The capacity to store files
Processor – The brain of the system which processes different tasks.
At the time I started working, all the passive works including the civil work, design and supply of
equipment’s were completed. The first thing I started doing was to be familiar with the working
environments and began my work with reading the floor designs which gives brief description of
where the thin clients are placed and how they are interconnected with the server room. From the
design I understood that the project design was divided into two wings. i.e. The right wing and the
left wing where the thin clients, cameras, IP-TV, smart boards and AC’s are placed.
Right Wing Server Room Left Wing
Fig 2. Floor Plan for CHS Library Project
2. The first task given from my supervisor Mr.Abiy was to label thin clients with respect to their
cablings from the patch panel inside the rack. It was that time when I learned to operate with
Labeling machine. There were 350 thin clients which can be able to support the same number of
students at one time.
On my earlier working days, one thing I observed was that it need very great care to check the load
checkup with power supply before starting up the electric power. It was great experience when I
saw expert in electrical engineer came and check the load and capacity by using software.
The first time the engineer from client side came and checked the power connectivity, he couldn’t
verify that we were ready to start the server. He told us to change the power cable, which takes
power from the Ethiopian Electric Power Corporation (EEPCo) to the Power Distribution Unit
(PDU), from which the server takes power. Saying that it was insufficient to carry that much of
power which the system requires. So, we changed the cable to newer one and it was good this time
he came up to check and program the PDU. After that we were able to start the whole system to
start with the active works.
3.2 Technical Details of VDI
3.2.1 How does VDI work?
Virtualization is centralized desktop delivery solution. The concept of VDI is to store and run
desktop workloads including a windows client operating system, applications, and data in a server
based virtual machine (VM) in a data center and allow user to interact with the desktop presented
onto a user via Remote Desktop Protocol (RDP).
With VDI, a virtual desktop is isolated from the client’s device and runs in a VM maintained in a
data center. Here, the device can be desktop, laptop or thin client. A VDI user interacts with one’s
virtual desktop through RDP which provides a rich desktop experience. Similar to session-based
remote desktops, VDI provides a server session with a full fidelity desktop environment that is
virtualized within a server-based hypervisor. The premise on VDI is that all users are running
virtual desktops on VM’s. The key technical components making a VDI reality include:
Windows Server 2012 R2 with Hyper-V: A virtualization host which runs VM’s and is
essentially a grid in the virtualization solution infrastructure.
3. Microsoft Application Virtualization: A dynamic application deployment vehicle based on
user profiles and transparent to local operating system
Microsoft Remote Desktop Services: A single and consistent URL for accessing resources
published in multiple RDSHs and terminal servers
System Center Management Suite with Virtual Machine Manager (SCVMM): is a
comprehensive management solution for managing enterprise IT life cycle. And it
simplifies the deployment, provisioning and management of virtualization hosts and VM’s.
In VDI deployment, there are two models:
In Static mode, there is one-to-one mapping of VM’s to users. Each user is assigned with
a designated VM. Since VM’s are commonly stored on a Storage Area Network (SAN)
and execute on a server, a larger number of users will likely to significant SAN
requirements.
In a Dynamic architecture, on the other hand, there is only one master image of the desktop
stored. All user personalization, profile, applications, etc. are stored separately from
desktop, a VM cloned from the master image is combined with the user’s personal data
and applications dynamically delivered to the user device based on roaming profiles. This
delivers a personalized desktop experience by dynamically provisioning a base image. It
simplifies the overall VM management by reducing the number of desktop images
maintained.
For the library project at college of health science at Addis Ababa University, we deployed the
dynamic mode since the students do not sit on the same spot every time they come to the library.
So, they will be authenticated before login to their account. This enables all students the
personalized desktop experience to store their files on their VM.
3.2.2 Considerations for VDI solution:
Infrastructure with hypervisor hosts
Virtual machine management
Application Provisioning
Connection Management
Image management
4. Licensing
3.3 Power Unit
the VDI uses 3 phase wire which came from Ethiopian Electric Power Corporation. The Power
goes to the PDU through breakers mounted. all equipment's use the uninterruptible power supply
since they can be easily damaged if we supplied them with under rated or over rated power.
There is load balancing for the power supply. And the power distribution unit capacity was
169KVA, which will be only about 20% to be used by the system. So, it’s enough to supply the
power required by all devices inside the server room and thin clients used by end users.
The PDU consists of battery to store power in case the power is down from the line, so that the
service won’t be disrupted, and no machine fails due to the power fluctuations.
Since the power usage of the project is centralized in the server room, it produces much heat. So,
it requires cooling system. That’s why air conditioners needed to be automatic. And since the
project is deployed for medical students in the library, it is required that the hot air to be sucked
out and recycled to environment by taking in cool air which creates good environment and make
the students to effectively study there. That’s why it’s used LG – Inverters which is the best air
conditioners in the market.
3.4 Servers
3.4.1 Dell M1000e
This VDI project used Dell M1000e dell blade enclosure. The Dell PowerEdge M1000e Modular
Blade Enclosure is the rock-solid foundation for Dell’s blade server architecture, providing an
extremely reliable, flexible and efficient platform for building any IT infrastructure. The M1000e
enclosure is built from the ground up to combat data center sprawl and IT complexity, delivering
one of the most energy efficient, flexible and manageable blade server implementations on the
market.
The system can include up to 16 half-height blades (server modules), eight full-height blades, or a
mixture of the two blade types. To function as a system, a blade is inserted into a Dell PowerEdge
M1000e enclosure (chassis) that supports power supplies, fan modules, a Chassis Management
Controller (CMC) module, and at least one I/O module for external network connectivity. The
5. power supplies, fans, CMC, optional iKVM module, and I/O modules are shared resources of the
blades in the enclosure.
Enclosure represents an evolution of the entire rack-mounted infrastructure consolidating and
repackaging featured infrastructure elements-computing, storage, networking, and power into a
single infrastructure in a box that accelerates data center integration and optimization. The Blade
System enclosure infrastructure is adaptive and scalable.
Dell also offered some Cisco Catalyst switches for this blade enclosure. Cisco offers a range of
switches for blade -systems from the main vendors.
An M1000e enclosure offers several ways for management. The M1000e offers ‘out of band’
management: a dedicated VLAN for management. The server has two-part network LAN. The
storage and servers are connected through, Blade switch. File Servers are dedicated servers used
to store end user’s files they have four cables from which two of the cables are used to connect to
storage and the other two cables are used to give space to machines. The servers have two network
cards to control the switches. There is back bone link between the two switches.
Fig. 4 Front of M1000e Blade Enclosure Fig. 5 Back of Enclosure
6. For management, there is Chassis Management Controller(CMC), used to manage server,
networks and storage. And this Management is conducted by using Vmware hypervisor. The
hypervisor takes too small size. Only about 300Mb’s. The hypervisor for management is vSphere.
The CMC modules in the enclosure offer management ethernet and do not rely on network
connections made via I/O switches inside the blade. In this project case, physically isolated LAN
is created for management allowing management access to all enclosures even when the entire
infrastructure is down. Each M1000e chassis can hold two CMC modules.
3.4.2 Power Edge M630
Inside the blade enclosure we used 7 of M630 blade servers which deliver the compute power the
client demanding applications require. It is Designed for use with the PowerEdge M1000e blade
enclosure, the M630 offers exceptional scalability in environments ranging from IT as a service
providers and private clouds to remote and branch offices.
Fig. 6 Blade Enclosure and Power Edge M630
Blade Enclosure M1000e
Power Edge
M630 Servers
7. On the servers we used VMware ESXi, the industry leading, purpose built bare metal hypervisor.
ESXi is installed directly onto physical server enabling it to be partitioned into multiple logical
servers referred to as Virtual Machines. Virtual servers are hosted on physical server.
The VMware ESXi acts as an Operating System. It creates a layer to give storage and allows to go
to the network. In this project, we have 7 Virtual Machines. To present storage to windows, we
use ESXi Software.
3.5 SCv2080 Storage System
The other part of the VDI is Storage where data are going to be kept. The storage used here is
block storage, which is an IP storage. The IP Storage is approach to use the IP over storage area
network (SAN). There are duplicate of the storage just to back up the first memory in case it is
failed or corrupted due to different reasons.
The SCv2080 storage system provides the central processing capabilities for the Storage Center
Operating System (OS) and management of RAID storage. The Storage Center OS generates alert
messages for temperature, fan, drive, power, and storage controller conditions. Use the Dell
Storage Client to view these alerts. The SCv2080 also has LED indicators that signify possible
problems with the Storage Center. The storage system holds the physical drives that provide
Fig. 7 Storage Center
8. storage for the Storage Center. If additional storage is needed, the SCv2080 also supports a single
SC180 expansion enclosure.
To insert drives into storage center, there are certain steps to follow.
Step 1: Open the drawer by opening drawer latches.
Step 2: Unlock the key on the drive to be inserted as shown in Fig. 8 (a)
Step 3: Hold the drive by the driver carrier and slide it most of the way into the slot. And Using
both hands (thumbs and forefingers), apply downward pressure firmly and equally across the
driver carrier as shown in Fig. 8 (b)
Step 4: Close the drawer.
a) Locate the two lock-release buttons situated midway along the runners on each
side of the drawer.
b) Press the lock-release buttons inward and use your body to push the drawer
toward the chassis until the locks disengage.
c) Place your hands on the front bezel and continue to push the drawer inward
until the bezel is flush with the chassis and the front drawer locks engage like
as in Fig. 8 (c)
Fig. 8 Steps to insert drives
a b
c
9. The Storage system comes with two redundant power supply units, five redundant cooling fans,
and up to two redundant storage controllers. The storage controller contains multiple I/O ports that
provide communication with front -end servers and back-end storage.
iSCSI is an acronym for Internet small computer systems interface, an IP based storage networking
standard for linking data storage facilities. It’s used as an initiator to facilitate storage to be
controlled over distances.
3.6 Dell Compellent FS8600
The Dell Compellent FS8600 is uniquely suited to overcome the challenges presented by explosive
file data growth and file sprawl. With the combination of the Dell Fluid File System’s (FluidFS)
scale-out single namespace and Compellent Storage Center’s Data Progression and Dynamic
Capacity, we can reduce management overhead as well as leverage the platform’s unique storage
efficiencies and cost of ownership attributes while providing class-leading availability and data
protection.
To further enhance performance, the FS8600 leverages the strengths of the Dell Storage Center
platform such as:
Automated tiering to keep frequently accessed data on high-performance
drives, and move passive data to lower cost, capacity-optimized drives
Thin provisioning to provide on-demand allocation of blocks
Optimization for solid-state drives
Unified block and file management through Dell Storage Manager (DSM)
During the implementation, we have used two of FS8600 as file servers with two controllers each.
Only one is used at a time and the other one is used as back up. And there is back bone connectivity
among the two controllers.
3.7 Physical Connectivity and Networking
As mentioned earlier, the project has two wings which are known to be left wing and right wing
as shown in Fig 3. below. Both wings have their own end devices and they have patch panels from
which the devices are connected to the switches. The cables needed to be tested using the network
10. tester, by plugging one end of tester to the patch panel and the other to its respective end device.
If all signals sent cannot be received to the other end, we do maintenance with its respective color
code and we re-punch the cables. Likewise, we checked and confirmed all network cables that they
work properly.
Fig 3. Right and left and wing racks
Both wings are in their own respective racks, being connected to the server by fiber optic cables.
The fiber cables are spliced and directly go to fiber patch panel. So, they can be connected to the
switches. And the switches are trunked by fiber cables so that the speed of data transfer will be
high. The wings take data from distribution switches.
The connection for thin clients are made by using cat6 cables. On one end we used Keystone and
on the other end, they are connected to patch panels which are connected to the switches using
RG-45 patch cords. To connect the cisco router and the distribution switch, the use of transceiver
module was necessary for the fiber cables.
42 U
2 U
2 U
2 U
2 U
2 U
2 U
2 U
2 U
2 U
2 U
2 U
2 U
Right Wing Rack
42 U
2 U
2 U
2 U
2 U
2 U
2 U
2 U
2 U
2 U
2 U
2 U
2 U
Left Wing RackPower Strip
Switches
Patch Panels
1 U 1 U
11. 3.7.1 CISCO Catalyst 3850
The Catalyst 3850-12S switch is used at distribution layer to aggregate the data received from the
access layer switches before it is transmitted to the core layer for routing to its final destination.
The switch controls the flow of network traffic using policies and delineates broadcast domains by
performing routing functions between virtual LANs (VLANs) defined at the access layer.
VLANs allow to segment the traffic on a switch into separate subnetworks. For example, in a
university where we deployed the project, it might be required to separate traffic according to
faculty, students, and guests. Distribution layer switches are typically high-performance devices
that have high availability and redundancy to ensure reliability. Those switches are Ethernet
switches to which you can connect devices such as Cisco, IP Phones, Cisco Wireless Access
Points, workstations, and other network devices such as servers, routers, and other switches.
The switch supports one hot-swappable network module that provides uplink ports to connect to
other devices. The switch should only be operated with either a network module or a blank module
installed. For the VDI project at the one of wing to connect to the core network we have used blank
module installed because we had no uplink ports.
3.7.2 CISCO Catalyst 2960 – X Series
The Catalyst 2960 series switches enable entry-layer enterprise, medium-sized, and branch office
networks to provide enhanced LAN services. The Catalyst 2960 series switches,
Core
12. shown in Figure below are appropriate for access layer implementations where access to power
and space is limited.
The Catalyst 2960 switches we have used offered us the following:
Multilayered switching
QoS features to support IP communications
Access control lists
Fast Ethernet and Gigabit Ethernet connectivity
Up to 48 ports
The Cisco Catalyst 2960-X Series provide easy device onboarding, configuration, monitoring,
and troubleshooting. These fully managed switches can provide advanced Layer 2 and Layer 3
features as well as optional Power over Ethernet Plus (PoE+) power. Designed for operational
simplicity to lower total cost of ownership, they enable scalable, secure, and energy-efficient
business operations with intelligent services. The switches deliver enhanced application visibility,
network reliability, and network resiliency.
An external redundant power supply option is supported on the Cisco Catalyst 2960-X Series
Switches. These switches come with one fixed power supply and an option for an external
redundant power supply [RPS].
Fig. 8 Cisco 2960
3.7.3 Dell N4032 Switch
It provides a stacking feature that allows multiple switches to operate as a single unit. Any Ethernet
port type on the front panel can be used in creating links, including 10GbaseT. Since we couldn’t
find 10G switch supplied for us, we used these switches.
A single switch in the stack (known as the Master switch) manages all the units in the stack using
a single IP address, which allows the user to access every port in the stack from this one address.
This IP address is copied from the Master to the Standby when the Standby is created. If for any
13. reason the Master fails, the Standby takes over as Master keeping the IP address of the stack the
same. This allows continuous management of the stack.
3.8 Configuration and Management
3.8.1 Switches configuration
There are different configurations which were done on each device used. For example, for the
switches there are a lot of configurations like,
Telnet
SSH
Enabling Password and secret
Spanning-tree
Dedicating VLAN’s
IP helper address
Trunking etc.
3.8.2 Surveillance Camera
The cameras must be configured to properly work and record each activity. The cameras we used
were all 360-degree view recorders. After they are properly mounted on the ceiling and the data
wires are connected to the patch panels we can manage them and view each of the camera.
At the time our supervisor Mr. Abiy gave us task to configure camera, with my friends, first we
identified which ports are connected to the camera. Then Abiy told us to install Axis IP software,
because that was the software which can identify the cameras and displays their IP by filtering
their MAC addresses. But one challenge we faced was the power which the switch gave to the
cameras was not enough. So, we needed to add Axis PoE devices for each of the camera to give
additional power.
The storage spaces for the cameras are dedicated to them from the main storage center. And they
are given the best quality of image by adjusting it from the settings. Another important thing in the
configuration of the camera is to protect them from unauthorized access. In this case there are three
levels of access. i.e Administrator, Viewer, and Guest each with different privilege.
14. 3.8.3 Configuration steps for thin clients
Two connection servers are created for both wings using Vmware connection server. Those
connection servers are used for end users. To connect all thin clients to the connection server, the
clients must join domain created by the server. There are certain configurations we did on the thin
clients.
Step 1: Check all connectivity of thin clients and monitor, i.e. Power cables, HDMI cable,
keyboard, mouse and patch cord that they are correctly plugged and power them on.
Step 2: Change the computer name so that it can be easily traced back in case it needs maintenance
by going to System properties. For example: RW-P6-D10 means the PC is on right wing, patch
panel number 6 and its on section D-10.
Step 3: Join thin clients to be member of Domain. Then login with domain admin.
Step 4: Protect the local disk, uninstall other software’s which came with thin clients by default.
Step 5: Update VMware client software to 6.5 version.
Step 6: Change the wallpaper to designed AAU logo by removing the old one from the root folder.
Step 7: Create Connection Server on all clients, i.e. we created two connections, and make sure
they are secured by checking the SSL security. This mode determines how the clients proceeds
when it cannot verify that our connection to the server is not secure.
Step 8: Finally protect all thin clients and only activate user mode.
3.9 Managing and Administering
The name and identity of each students are added, managed and authenticated by using Active
directory software. Its great software which has good security. The students can be grouped to
easily manage them. And we got the names from the college of health science registrar and they
were written in Microsoft excel software. The file format the active directory use is .vcf . so, we
converted it. And gave the names to the software to authenticate each user. So, at the first time the
student came, he is given default password and he will be prompted to change the default password,
then after he confirms, he will be successfully logged in. The next time he come he is expected to
15. enter the new password to login. Their files are redirected to the server so at any time the students
came, they will get their files back.
3.9.1 Storage Center Management
The whole storage system can be controlled from one interface. Even remotely, the administrator
can check which part is failed without going to the server room. For example, To determine which
hard drive failed, use the Dell Storage Client Software.
Step 1: Click the Hardware tab.
Step 2: In the Hardware tab navigation pane, select and expand the failed storage system.
Step 3: In the Hardware Alerts area, find the hardware alert that identifies the enclosure with the
failed hard drive.
Fig. 9 Managing the hard drives
16. 3.10 Data Center enhancement and Fire detection & suppression system at Zemen Bank
This was my second project I participated during my internship time. The first time we went to the
main data center, it was required to get authenticated before entering the server room since critical
files of the bank are stored there. The first task we did there was, to mount new rack for backup
system with new tape drives to store their files. There are different components used for the new
backup system. And the data will be redirected to the drives through fiber optic cables.
After we successfully mounted the components according to the design, since the devices were
brought from dell company, and IPCOM partnered with them, they give technical support during
the implementation of the project. Accordingly, Mr. James from Kenya came to configure the new
backup system. Dell provides full guarantee and servicing for three years.
Fig.10 The new backup system
17. The next work we did at Zemen bank was to enhance the existing system they were using. This
includes to redesign the whole data center to improve their system since the bank system needs to
update its technology and their services.
Being as an electrical engineer, it was really upsetting to see how the cables are managed inside
the server room. Even if just simple problem was there, one cannot identify which cable is what
and the technical experts need to trace back all cables one by one to see what the problem was.
That is very annoying task and if one made mistake, the whole system may fail to work. Even
power cables, data cables, and telephone lines are all assorted with one another and it was
untechnical for such big company to work like that.
Inside the main server rack which holds of different switches and routers, we consulted the
technical officers to help us identify the cables. After that we identified all cables one by one by
tracing back all of them. And in the documentation, number of ports on the patch panel and where
each cable is connected to are identified too. It was very tiresome task to find each cable and it
took us many days.
For further improvement, new small rack which consists of patch panel and switch is introduced
for employees on that floor. Then we identified all employee’s connection and redirected them to
the new rack. This simplified our work. The other consideration for this enhancement project was
to mount new air conditioner to cool the room temperature to required level by sucking out hot air
from the room and taking in cool air to the server room. There was existing two AC’s since new
server is added, it was expected to add new AC.
One challenge we faced was that our client Zemen bank is expected to give service 24/7 and unless
at some time the service is down, we couldn’t have done the implementation. So, we consulted
with officers whom it concerns, and they agreed to down the service during Ethiopian Epiphany
holiday. Until the service is down there being a lot of works to be done. Days before the holiday
we identified all cables and managed them one by one.
There was temperature sensor which displays the real time room temperature, but ICT operators
are expected to go to server room every time they want to check it by passing all security layers
successfully. Then, we placed the display out of server room by extending using cat6 wire. So, any
time the staff want to check the room condition he can check it without entering the room.
18. Fig. 10 a) Checking the power outlet b) Identifying wires
During epiphany, we managed to implement the new design including new ceilings and addition
of fire detection and suppression system. Environmental protection is most important thing in
production environment like this. Fire prevention and building codes require that most new
structures have some sort of fire protection system installed. Understanding how these systems
operate is important for fire fighter safety and effective customer service. A fire detection system
recognizes when a fire is occurring and activates the fire alarm system. It alert occupants and
automatically activate fire suppression systems. The fire suppression system takes an oxygen from
the environment which is one element in burning of things.
At the midnight the service was down, and all racks are moved according to their designs. And
new cable management is made onto all racks and new ceiling is made for the server room. Finally,
after working the whole night, we finalized the whole work and powered on the service. During
the operation, the team from HP company and ICT officers of Zemen bank was with us the whole
night.
Finally, the new look of the data center is impressive and attractive. In addition, all documentation
is made for them, that will make further troubleshooting and enhancement of the server room to
be simple and easy. The company finally told us that they are very interested by the service IPCOM
did for them.
19. 3.11 Project at Addis Ababa University, 6 kilo
There are two projects at Addis Ababa university which I saw, The first one is Implementation of
new modular data center for the new registrar and the second one is network and IPTV installation
at presidential lobby. Though, the first one is still on progress I have actively participated on the
later one.
3.11.1 Modular Datacenter
A modular data center can be defined as more of an approach to data center design that incorporates
contained units, many times in the form of prefabricated modules. The data center infrastructure
has evolved far beyond a centralized solution. Now, with cloud computing, more data demands,
and distributed environments — there is a greater than ever need for agility. In creating a more
flexible data center solution, organizations are seeing the direct benefits in working with modular
designs. A modular data center is an approach that implies a prefabricated module or a method for
delivering data center infrastructure in a modular fashion. A modular solution takes the best ideas
for design, reliability and efficiency and packages every-thing into a prefabricated, repeatable and
operationally optimized module. Now data centers can grow and expand while using efficient
modular technologies.
Exploring the modular product and provider markets, as well as the benefits that a modular
approach can provide will allow any company to better align their IT infrastructure with the needs
of an evolving business environment.
3.11.2 IPTV
IPTV is different, improved technology than “traditional” cable or satellite TV, and it allows for
more flexibility within the network. IPTV enables two-way interactivity, versus a traditional one-
way cable or satellite broadcast network. The two-way IPTV network means viewers have more
options to interact, personalize and control their viewing experience, IP technology also allows for
more flexibility within home network. With IPTV, it lets users to watch shows recorded from DVR
on TV. It can also connect gaming consoles, laptops and other devices to home network using the
ethernet port.
20. At the presidential lobby, we used 16 LCD Tv’s each with 46 inches, grouped into 3. Which means,
4 screens are mounted together to display the same image.
All LCD are wall mounted, so the first step was to build the frame to hold screens on the wall. The
direction of connectivity of HDMI cable will be as the following image. The arrows represent the
direction of the arrows represent to where the HDMI cable would be plugged in. One TV will be
considered as a master to control all the other TV’s, in this case TV 3 is assumed to be the one.
Fig.11 a) split tv design b) mounting TV’s
(C) After mounting IPTV
After properly aligning all tv’s by using mechanical parts of the support, its an easy task to
configure all tv settings using their remote control. Even those tv’s can be connected to internet
since we have punched RJ 45 cables at the back of those tv’s. They have also space to copy files
from USB drives to store and play them.
`3
1 2
4