This document discusses data center networks. It describes how data centers contain large numbers of interconnected computing and storage nodes. It discusses challenges in data center network design including large scale, high energy consumption, and strict service requirements. It also describes different types of data center network infrastructures including intra and inter data center networks. For intra data center networks, it covers electrical, electrical/optical, and electrical/wireless topologies as well as traffic control methods.
Class lecture by Prof. Raj Jain on Data Center Network Topologies. The talk covers Google’s Data Center, Cooling Plant, Modular Data Centers, Containerized Data Center, Unstructured Cabling, Structured Cabling, Data Center Equipment Cabinets, Data Center Physical Layout, ANSI/TIA-942-2005 Standard, ANSI/TIA-942-2005 Standard, Data Center Network Topologies, Data Center Networks, Switch Locations, ToR vs EoR, Hierarchical Network Design, Access Aggregation Connections, Data Center Networking Issues, DCN Requirements, 4-Post Architecture at Facebook, Clos Networks, Fat-Tree DCN Example. Video recording available on You
This Presentation will useful to Enrich your knowledge on Cloud Computing Regarding to Networking. Use this presentation for Your reference purpose. Thankyou
Introduction to Cloud Computing Data Center and Network Issues to Internet Research Lab at NTU, Taiwan. Another definition of cloud computing and comparison of traditional IT warehouse and current cloud data center. (ppt slide for download.) Take a opensource data center management OS, OpenStack, as an example. Underlying network issues inside a cloud DC.
Class lecture by Prof. Raj Jain on Data Center Network Topologies. The talk covers Google’s Data Center, Cooling Plant, Modular Data Centers, Containerized Data Center, Unstructured Cabling, Structured Cabling, Data Center Equipment Cabinets, Data Center Physical Layout, ANSI/TIA-942-2005 Standard, ANSI/TIA-942-2005 Standard, Data Center Network Topologies, Data Center Networks, Switch Locations, ToR vs EoR, Hierarchical Network Design, Access Aggregation Connections, Data Center Networking Issues, DCN Requirements, 4-Post Architecture at Facebook, Clos Networks, Fat-Tree DCN Example. Video recording available on You
This Presentation will useful to Enrich your knowledge on Cloud Computing Regarding to Networking. Use this presentation for Your reference purpose. Thankyou
Introduction to Cloud Computing Data Center and Network Issues to Internet Research Lab at NTU, Taiwan. Another definition of cloud computing and comparison of traditional IT warehouse and current cloud data center. (ppt slide for download.) Take a opensource data center management OS, OpenStack, as an example. Underlying network issues inside a cloud DC.
Data Center Infrastructure Management Powerpoint Presentation SlidesSlideTeam
Introducing Data Center Infrastructure Management PowerPoint Presentation Slides. You can present key drivers for sustainable infrastructure by using our readily available PPT slide deck. The PowerPoint slide deck helps to illustrate the market size, key funding areas of infrastructure, key technology trends in infrastructure in a presentable manner. Further, the slideshow also showcases the asset management process with lifecycle and framework. Utilize our visually-attention-grabbing asset infrastructure PowerPoint templates to mention inventory assets for manufacturing companies. Showcase the deterioration modeling and the types of deterioration modeling such as asset and risk assessment deterioration modeling with the help of asset infrastructure PPT visual. With this infrastructure management PPT slide deck, explain each deterioration modeling in detail using this PPT slideshow. It is possible to depict asset management decision journey, and performance and cost functions by downloading this PPT presentation. https://bit.ly/3c8cORj
Basics of Virtualization:
What is Virtual and Virtualization?
Why do we need Virtualization?
Benefits of Virtualization.
Before and after Virtualization.
How Virtualization works?
Virtual Machines.
VMware
Types of Virtualization:
1. Server Virtualization
2. Storage virtualization
3. I/O virtualization
4. Network virtualization
5. Client virtualization
6. Desktop virtualization
7. Application Virtualization
Security of software defined networking (sdn) and cognitive radio network (crn)Ameer Sameer
Security of Software Defined Networking (SDN)
Overview
Definition Software Defined Networking (SDN)
SDN security & Security Challenges
SDN Attack Surface & Attacks Examples
SDN Threat Model
Open Research issues SDN
Future Research Directions
Simulator for Software Defined Networking
Security of Cognitive Radio Network (CRN)
Overview
Definition Cognitive Network
Security of Cognitive Radios & Threats
Security issues in cognitive radio
Attacks and the proposed defense mechanisms
Open Research issues in Cognitive Radio
Evaluation Methodologies for Cognitive Networking
Future Research Directions
Simulator for Cognitive Radio
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
Every business has a data center, regardless of the size. Even the smallest business has it. It is an ever-growing part of business in the modern world and a key business parameter, since data center influences the functioning of business enterprise. Imagine what happens to the business operation when the data center is interrupted. Any interruption can lead to serious breakdown. That is why efficient backup strategy is essential.
These slides will cover the essential characteristics of cloud computing in the data center. Why should you consider adopting cloud architecture? We'll show you.
Presentation detailed about SDN (Software Defined Network) overview . It covers from basics like different controllers and touches upon some technical details.
Covers Terminologies used, OpenFlow, Controllers, Open Day light, Cisco ONE, Google B4, NFV,etc
We will worked on CLOUD COMPTUING still from 2year's we had finally research many concepts releated to Cloud security, we had woking on our Idiea's and timly we will share our research concepts
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsEurotech
Smart Energy Smart Grid and Smart Infrastructure - Many Applications and Devices
An introduction to Eurotech' s IoT Field-to-Application Building Blocks for the Energy and Utility Industry
A Distributed computing architeture consists of very lightweight software agents installed on a number of client systems , and one or more dedicated distributed computing managment servers.
A network operations center, also known as a "network management center", is one or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network.
Data Center Infrastructure Management Powerpoint Presentation SlidesSlideTeam
Introducing Data Center Infrastructure Management PowerPoint Presentation Slides. You can present key drivers for sustainable infrastructure by using our readily available PPT slide deck. The PowerPoint slide deck helps to illustrate the market size, key funding areas of infrastructure, key technology trends in infrastructure in a presentable manner. Further, the slideshow also showcases the asset management process with lifecycle and framework. Utilize our visually-attention-grabbing asset infrastructure PowerPoint templates to mention inventory assets for manufacturing companies. Showcase the deterioration modeling and the types of deterioration modeling such as asset and risk assessment deterioration modeling with the help of asset infrastructure PPT visual. With this infrastructure management PPT slide deck, explain each deterioration modeling in detail using this PPT slideshow. It is possible to depict asset management decision journey, and performance and cost functions by downloading this PPT presentation. https://bit.ly/3c8cORj
Basics of Virtualization:
What is Virtual and Virtualization?
Why do we need Virtualization?
Benefits of Virtualization.
Before and after Virtualization.
How Virtualization works?
Virtual Machines.
VMware
Types of Virtualization:
1. Server Virtualization
2. Storage virtualization
3. I/O virtualization
4. Network virtualization
5. Client virtualization
6. Desktop virtualization
7. Application Virtualization
Security of software defined networking (sdn) and cognitive radio network (crn)Ameer Sameer
Security of Software Defined Networking (SDN)
Overview
Definition Software Defined Networking (SDN)
SDN security & Security Challenges
SDN Attack Surface & Attacks Examples
SDN Threat Model
Open Research issues SDN
Future Research Directions
Simulator for Software Defined Networking
Security of Cognitive Radio Network (CRN)
Overview
Definition Cognitive Network
Security of Cognitive Radios & Threats
Security issues in cognitive radio
Attacks and the proposed defense mechanisms
Open Research issues in Cognitive Radio
Evaluation Methodologies for Cognitive Networking
Future Research Directions
Simulator for Cognitive Radio
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
Every business has a data center, regardless of the size. Even the smallest business has it. It is an ever-growing part of business in the modern world and a key business parameter, since data center influences the functioning of business enterprise. Imagine what happens to the business operation when the data center is interrupted. Any interruption can lead to serious breakdown. That is why efficient backup strategy is essential.
These slides will cover the essential characteristics of cloud computing in the data center. Why should you consider adopting cloud architecture? We'll show you.
Presentation detailed about SDN (Software Defined Network) overview . It covers from basics like different controllers and touches upon some technical details.
Covers Terminologies used, OpenFlow, Controllers, Open Day light, Cisco ONE, Google B4, NFV,etc
We will worked on CLOUD COMPTUING still from 2year's we had finally research many concepts releated to Cloud security, we had woking on our Idiea's and timly we will share our research concepts
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsEurotech
Smart Energy Smart Grid and Smart Infrastructure - Many Applications and Devices
An introduction to Eurotech' s IoT Field-to-Application Building Blocks for the Energy and Utility Industry
A Distributed computing architeture consists of very lightweight software agents installed on a number of client systems , and one or more dedicated distributed computing managment servers.
A network operations center, also known as a "network management center", is one or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network.
System Programming
Operating System
Shell Programming
File Management
Process Management
Signals
Thread Management
Interprocess Communication
Network Interprocess Communication
Background
Applications of Differential Equations
First order linear differential equations
Homogeneous ODE
Second Order Differential Equations
Laplace Transform Method
Algorithm Analysis
Computational Complexity
Introduction to Basic Data
Structures
Graph Theory
Graph Algorithms
Greedy Algorithms
Divide and Conquer
Dynamic Programming
Introduction to Linear Programming
Flow Network
Cloud and Edge Computing Systems
IoT Systems
IoT and 5G Applications
Mobile Cloud Computing
Edge and Fog Computing
Mobile Ad hoc Cloud
Private Edge Cloud
Keynote Talk on Recent Advances in Mobile Grid and Cloud ComputingSayed Chhattan Shah
Due to recent advances in mobile computing and networking technologies it has become feasible to integrate various mobile devices such as robots, aerial vehicles, sensors, and smart phones with grid and cloud computing systems. This integration enables design and development of next generation of applications through sharing of computing resources in mobile environments and also introduces several challenges due to dynamic and unpredictable network.
In this talk, we will discuss applications and challenges involved in design and development of mobile grid and cloud computing systems, cloud robots, and innovative architectures for creating energy efficient and robust mobile cloud.
Background
Mobile Grid and Cloud Computing
Cloud Robotics
Mobile Ad hoc Computational Grid and Cloud
Opportunities
Research Challenges
Future Research Directions
Conclusion
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
1. Sayed Chhattan Shah
Department of Information Communications Engineering
Hankuk University of Foreign Studies Korea
www.mgclab.com
Data Center Network
2. Data Center Network
Data centers are developed to house a large-scale networked
computer system in a centralized and controlled environment
Inside a data center, a large number of computing and
storage nodes are interconnected by a specially designed
network, called data center network
3. Data Center Network
Challenges and requirements for the DCN design and operations
o Large Scale
Modern DC to contain hundreds of thousands of servers
Microsoft is hosting over 1 million servers in over 100 data centers
o Wide Variety of Applications
• Web search, Web mail, and interactive Games
• Infrastructure services such as distributed file systems and
distributed execution engines
The diversified services and applications in DCs define a variety of
different traffic characteristics
4. Data Center Network
Challenges and requirements for the DCN design and operations
o High Energy Consumption
The annual data center energy consumption in the USA was
estimated to be more than 100 billion kWh in 2011
• 7.4 billion USD annual electricity cost
o Strict Service Requirement
24 hours availability, which demands high system robustness
Network failures from hardware, software, and human errors can be
inevitable
• Constant monitoring and agile failure recovery are required
5. Data Center Network Infrastructure
The data center network infrastructure interconnects end devices in
a data center and across data centers
DCN Infrastructure is categorized based on two dimensions
o Transmission technology
o Scale
7. Data Center Network Infrastructure
Intra Data Center Networks
o Highly complex since they interconnect a massive amount of
devices with critical performance requirements
o Ethernet is commonly used in data center networks
8. Data Center Network Infrastructure
The nodes can be configured to operate
o Ethernet-switched mode
Ethernet MAC addressing is flat
Require no address configuration. Server interfaces come ready for plug-n-play
deployment with manufacturer configured addresses
o IP-routed mode
IP-routed networks more scalable
IP addressing is hierarchical makes the size of forwarding tables smaller
Disadvantage of hierarchical routing is that if a virtual machine is migrated to a
different host
• IP address needs to change to reflect its new topological position, which means
loss of live TCP connections
• A solution such as mobile IP is required
• Forwarding tables in all intermediate routers are updated
9. Data Center Network Infrastructure
Intra data center network topologies
o Electrical Element Based Topologies
o Electrical and Optical Element Based Topologies
o Electrical and Wireless Element Based Topologies
10. Electrical Element Based Topologies
Switch-centric topologies
o Switches take the primary responsibility in network construction and
data transmission
o The switches are usually connected by hierarchy topologies and the
servers are generally connected to the low-level switches at network
edge
11. Electrical Element Based Topologies
Tree-based network architectures
o Unable to handle the growing demand of cloud computing
The higher layers of the three-tier DCN are highly oversubscribed
o Tree-based network architectures are not scalable, fault tolerance, and
energy efficient
12. Electrical Element Based Topologies
Switch-centric topologies
o Fat-Tree interconnects identical commodity Ethernet switches
The advantage of Fat-Tree is that all switches are identical and cheap
commodity products can be used for all switches.
There are multiple equal cost paths between any two hosts
A drawback of Fat-Tree is its high cabling complexity
• A 48-ary Fat-Tree is with 27,648 servers, 2,880 switches, and 82,944 cables
The scalability is one of the
major issues and maximum
number of pods is equal to the
number of ports in each switch
13. Electrical Element Based Topologies
Switch-centric topologies
o Core switches and aggregation switches forms a complete bipartite
graph, and each edge switch is connected to two aggregation switches
o VL2 reduces the number of cables leveraging higher speed
switch-to-switch links
10 Gbps for switch-to-switch links and 1 Gbps for server-to-switch links
14. Electrical Element Based Topologies
Switch-centric topologies
o Jellyfish constructs a degree-bounded random regular graph at
the edge layer
o An arbitrary server in Jellyfish can reach more servers in fewer
hops compared to Fat-Tree
A random graph is obtained by
starting with a set of n isolated
vertices and adding successive
edges between them at random.
15. Electrical Element Based Topologies
Server-centric topologies
o In switch-centric topologies, servers are merely endpoints
in the network
o In server-centric topologies, servers act as not only end
hosts, but also relay nodes for each other
16. Electrical Element Based Topologies
Server-centric topologies
o In a level-0 DCell, n servers are connected to a switch
o A level-1 DCell is constructed using n + 1 level-0 Dcells
Specifically, one port of each server of each level-0 DCell connects to a
server in another level-0 Dcell
o The highlight of DCell is its excellent scalability
A level-3 DCell can support
• 3,263,442 servers with 4-port servers
and 6-port switches
17. Electrical Element Based Topologies
Server-centric topologies
o A level-0 BCube consists of n servers connected to an n-port
switch, which is the same as a level-0 Dcell
o BCube makes use of more switches when constructing higher
level architecture
19. Electrical and Optical Element Based Topologies
Combine
conventional
electrical
switching with
optical
switching
Optical
network
connects ToR
electrical
switches
High capacity optical links are offered to pairs of
racks transiently according to the traffic demand
20. Electrical and Optical Element Based Topologies
Helios is organized as a 2-level multi-rooted tree of pod
switches and core switches
o Core switches consist of both electrical switches and optical switches
Helios estimates bandwidth demand and decides where to
forward traffic, the electrical network or the optical network
On each of the pod switches, the uplinks
are equipped with a optical transceiver.
Half of the uplinks are connected to the
electrical switches, while the other half are
connected to the optical switch through a
optical multiplexer.
21. Electrical and Optical Element Based Topologies
Explores the feasibility of a totally optical core network among
ToR switches
Optical transceivers connected to a ToR switch use separated
send and receive fibers
o The multiplexers multiplex optical signals from many fibers to a single fiber
o The Wavelength Selective Switch forward optical signal to the 4 ports
according to the wavelength
Switching time 14ms
22. Electrical and Wireless Element Based Topologies
A hybrid network architecture is designed by adding 60 GHz
wireless links to the traditional electronic-based architecture
for extra capacity
Each ToR switch is equipped with one or more 60 GHz
devices with directional antennas
23. Electrical and Wireless Element Based Topologies
Wireless devices with rotatable directional antennas are
placed on top-of-rack
o Ceiling reflectors act as specular mirrors to reflect signals
o Electromagnetic absorbers are placed near each antenna to prevent
any local reflection and scattering
3-D flyways
o reduce the interference footprint
o avoid blocking obstacles
o provide an indirect line-of-sight path
for reliable communication
25. Data Center Network Infrastructure
Inter Data Center Networks
o Geographically distributed data centers have been built
Services from a local data center generally incur low latency
Data backup and restore across geo-distributed data centers
can help avoid single point of failure
26. Data Center Network Infrastructure
Choice of the data center locations are influenced by multiple factors
o Geography
Regions with minimum possibility of natural disasters
Climate which support free cooling
o Electricity
Cost, reliability, and cleanliness of the electricity are important
o Connectivity
High quality of network connectivity
o Business
Business friendly regulations and economic development incentives
27. Data Center Network Operations
On the basis of the network hardware infrastructure, data
center network operation ensures data transport from sources
to destinations with various objectives
o Bandwidth guarantee
o Balanced load
o Energy efficiency
28. Data Center Network Operations
Traffic Control in Data Center Networks
o To direct data traffic from sources and destinations
o Traditional approach
Each switch learns the network topology based on exchanged
messages and constructs a forwarding table for packet forwarding
29. Data Center Network Operations
Traffic Control in Data Center Networks
Path Selection
o Packets are forwarded in DCNs are decided by various protocols
Spanning tree
Routing algorithm
Multipath routing
Encoding path information in the packets
30. Data Center Network Operations
Traffic Control in Data Center Networks
Path Selection
o DCell fault-tolerant routing
o BCube source routing protocol
o Traffic aware routing for FiConn
o Xpath
Best path is selected according to various metrics
• hop distance
• path bandwidth
• link load
• MTU
31. Data Center Network Operations
Traffic Control in Data Center Networks
Rate Control
o Essential for congestion control, loading balancing, and
guaranteed bandwidth in a network
o It can be implemented at end hosts or in network
Rate limiting at end hosts can be implemented explicitly using tool
provided by the OS
Ethernet flow control use a PAUSE frame to pause the sender for a
time indicated in unit of quanta
32. Data Center Network Operations
Traffic Control in Data Center Networks
Priority Management
o Priority management delivers differentiated quality of service by
handling a packet based on its priority rather than the order of
arrival
33. Data Center Network Operations
Network Utilization
How to fully utilize the available bandwidth?
o Allocates paths for large flows based on the estimated demand
o Centralized traffic engineering, multipath routing, and rate limiting at
network edge
o Traffic limiting at end hosts, traffic path reconfiguration in network, and
priority differentiation
34. Data Center Network Operations
Bandwidth Sharing
o Bandwidth is still shared in a best effort manner
o Malicious tenants can unfairly improve their network
performance
establish multiple TCP connections
Use UDP
o Efforts on bandwidth sharing often focus on two aspects
Minimum bandwidth guarantee
Bandwidth proportionality under different payment schemes
35. Data Center Network Operations
Bandwidth Sharing
o Minimum bandwidth guarantee
Ensures the amount of bandwidth that a tenant has paid for
The most common method is bandwidth reservation
o Bandwidth proportionality under different payment schemes
Without introducing extra SLAs on bandwidth, bandwidth
proportionality ensure that the allocated resource amount for a
tenant is proportional to what the tenant has paid for other
resources
• CPU
• memory
36. Data Center Network Operations
Service Latency
o Shortest Remaining Time First is known to be the optimal
algorithm for minimizing average flow completion time over a
single link
The flow with the least packets remaining is selected to be sent first
preemptively
o Deadline-Driven Delivery introduces deadline aware rating
allocation for flows
Switches allocate bandwidth based on its capacity and the desired
rates when a flow starts or finishes
37. Data Center Network Operations
Energy Consumption
o The most common approach for energy conservation in data
centers is to power off idle elements such as links, ports, and
switches
38. Data Center Network Operations
Energy Consumption
o The most common approach for energy conservation in data
centers is to power off idle elements such as links, ports, and
switches
ElasticTree is a typical power manager to dynamically choose a set
of active switches and links that can accommodate the traffic
demand and power down unneeded links and switches as many as
possible
GreenTE optimizes the routing to maximize the number of links that
can be put into sleep while maintaining the performance
41. Resource Management in Cloud Data Centers
In a traditional data center each physical machine can only
serve one application at a time
In a Virtualized Cloud Data Center when a service request is
processed, a prebuilt image is used to create one or more VM
instances
o When the VM instances are deployed, they are provisioned with specific CPU,
memory, and disk capacity
o VMs are deployed on PMs, each of which may be shared by multiple VMs
42. Resource Management in Cloud Data Centers
Objectives of resource management schemes
o Completion time
o Load balancing
o Throughput
o Utilization of resources
o Failure management
o Energy consumption
o Incentives
o Multiple objectives
43. Resource Management in Cloud Data Centers
Clouds utilize hardware virtualization, which enables a
physical machine to run multiple virtual machines
A cloud hosts multiple applications on the VMs
o Since the load of each VM on a PM varies over time, a PM may
become overloaded
Overloaded PMs migrate their VMs to under-loaded PMs
• Process of selecting migration VMs and destination PMs is complex and
generates high delay and overhead
PM predict VM resource demand
• PM does not know which VMs to migrate out
44. Resource Management in Cloud Data Centers
The key challenges related to energy efficiency
o How to optimally solve the trade-off between energy savings and
delivered performance?
o How to determine when, which VMs, and where to migrate in order to
minimize energy consumption by the system, while minimizing migration
overhead and ensuring SLA?
o How to develop efficient decentralized and scalable algorithms for
resource allocation?
o How to develop comprehensive solution by combining several allocation
policies with different objectives?
45. Resource Management in Cloud Data Centers
Most energy-efficient resource allocation solutions focus on
minimizing energy consumption or costs, and do not consider
dynamic service requirements of consumers that can be changed on
demand in Cloud computing environments
Need for autonomic energy-aware resource management
mechanisms and policies
46. Resource Management in Cloud Data Centers
Energy-Aware Data Centre Resource Allocation
o The problem of VM allocation can be divided in two parts
Admission of new requests for VM provisioning and placing the VMs
on hosts
• A bin packing problem with variable bin sizes and prices
• Allocate each VM to a host that provides the least increase of power
consumption due to this allocation
Optimization of current allocation of VMs
• Select VMs that need to be migrated
• Chosen VMs are placed on hosts
47. Resource Management in Cloud Data Centers
Minimization of power consumption in a heterogeneous
cluster of computing nodes
o The main technique applied to minimize power consumption is
concentrating the workload to the minimum of physical nodes
and switching idle nodes off
48. Resource Management in Cloud Data Centers
As the workload changes, resources allocated to applications
could automatically scale from
o the horizontal direction
adding more VMs
• may take dozens of seconds
o the vertical direction
allocating more resources to deployed VMs
• needs additional support from both the host operation system
49. Resource Management in Cloud Data Centers
Design of resource management scheme that consider
o Characteristics of physical machines
Processing power, memory, storage, energy consumption, queue
length, switch time, price
o Virtual Machines
o Application requirements
Size, data, deadline, price
o Network Environment
Bandwidth, Link quality, lifetime, traffic, energy consumption, price