SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 05 | May -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 45
Virtualization Technique for Effective Resource Utilization and
Dedicated Resource Management
Megha V R1, Dr G N Srinivasan2
1Software Engineering, R.V College of Engineering, Bengaluru, Karnataka, India
2Professor –RV College of Engineering, Bengaluru, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract- In these modern days, for numerously
triggering trendy application with various technology
adoption leading to growth in the need of the enormous
resources such as CPU’s, Memory, NIC ports, HBA ports
and so forth. For this growing need for resources, which
in turn impacts both the users and also many
organization in a cost effective way, Also resources may
not be utilized completely always leading to wastage.
Virtualization with commodity hypervisors holds the
promise of solving this problem of logical partitioning of
resources in a single box. What commodity hypervisors
cannot do is create efficient partitions of dedicated
resources which are not shared with other partitions.
This capability is critical in certain enterprise class
environments.
1. Introduction
Secured partition is a software layer consistingofa Partition
Machine Monitor (PMM), its associated service partitions,
and firmware/drivers provided for the guest partitions.
Secured Partition creates and manages guest partitions
which have dedicated non-shared computing resources1.
These s-PAR guest partitions will be referred to as Soft
Machines (SMs).
This is implemented as a hardware assisted virtual machine
which is optimized for non-shared computing resources.
Each SM provides the capabilities of a physical server and is
isolated from other partitions through the containment
properties of the underlying Ultravisor software layer.
Secured partition can operate on top of BIOS along with the
usage of Ultravisor to perform tasks such as virtual address
to physical address translation, physical device emulation,
and physical-to-virtual interrupt translation.
An improved feature for Secured partition includes the
virtualization of the processor’s native virtualization
instructions itself. [1]Thus Secured partition is capable of
hosting commodity hypervisors, such as VMware©, Xen©,
and HyperV, which require these instructions for
operation. With this additional feature, the Secured
partition operating environment will be able to directly host
Windows, Linux, and any other operating systems in logical
partitions alongside partitions with commodityhypervisors
hosting their own operating systems.
2. Background Research
Hypervisors are becoming popular becauseoftheirabilityto
make more efficient use of server resources through
virtualization and sharing of resources among the logical
partitions (virtual machines) that they create. S-Par
technology has the ability to be extended to this class of
logical partitioning but initial design focus is on the creation
of secure logical partitions with dedicated hardware
resources (i.e., CPUs, memory, and I/O). This capability is
critical in many enterprise class environments.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 05 | May -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 46
3. Methodology
Each operating environment or partition is visible to the
data center as an independent server capable of hosting any
operating system which is supported by the underlying
hardware. Not only the operating system also other
hardware’s such as NIC HBA Cores Chassis can also be
virtualized. Secured partition isuniqueintworespects:(1)it
has an advanced architectural design which makes it more
scalable and secure than current logical partitioning
technologies and (2) it is the only logical partitioning
software in its class that is based on Intel’s x64 processors.
Other logical partitioning technologies in this class are
developed by IBM (LPARs) and SUN (LDOMs) and execute
only on each company’s respective proprietary processor
technology.
4. Architecture
Figure 4.1 displays the environment of a logically
partitioned server. The hardware resources, which lie
at the bottom of the stack, consistofallofthehardware
resources of a single server. This includes all
components for processing (processors, cores, chip
sets), memory, and IO (storage and networking).
The Ultravisor kernel executes at the bottom of the
software stack and maintains complete control of
memory management (for both internal server
memory and IO memory mapping), actual IO port
space, configuration space, and interrupts for all
components which reside higher in the stack. Above
the Ultravisor kernel reside machine monitors (UMM,
PMM, and VMM
Figure 4.1: Virtualization system model
Which create all logical partitions in the server. The
components of the stack encased by the lavender area in the
figure comprise the two tiered stack of s-Par.
Secured partition has its own machine monitor (PMM) that
manages the s-Par sVMs and guest SMs. The sVMs provide
system management, command, console, and IO servicesfor
the SMs. The PMM is optimized to manage dedicated
computing and IO resources.
Secured partition creates and manages guest SMs which
have dedicated, non-shared resources. The SMs have
properties and features which support ClearPath operating
systems and enable mainframe enterprise class IO control
and recovery. The virtual machine monitor in the figure,
VMM, creates and manages virtualized logical partitions. [2]
The VMM is optimized to manage shared computing and IO
resources. Multiple PMMs and/or VMMs can run
concurrently. A separate machine monitor instance is
activated for each guest of each PMM and/or VMM. Each
machine monitor instance is only aware of the resources
assigned to it and the Ultravisor maintains isolation of all of
the partitions.
5. Advantages
5.1 Security: Boundaries enforced by hardware rather than
by software
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 05 | May -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 47
5.2 Error containment: Hardware mechanisms prevent
propagation of fatal errors across boundaries
5.3 Performance: Better and more predictable. Directaccess
to cores, memory, and I/O slots
6 Description Modules
6.1 Hardware Elements
Secured partition based partitioning can run independently
in one or more hardware partitions. Secured partition is not
dependent on hardware partitions and is capable of running
on any server withtherequiredprocessorhardwareassisted
virtualization technology.
6.2 Guests
A guest utilizes a portion of host resources generally to
perform useful (to the guest) work. From the s-Par
perspective, guests are pure consumers and provide no
useful work to other partitions.
6.3 Virtualization
[3] The key premise of server virtualization is to provide
virtual instances of basic computing resources. It is not so
much a new layer of new abstractions, as it is an extensionof
an existing platform firmware layer.
6.4 Service Partitions
Service partitions may be software partitions or virtual
partitions. Service partitions are partitions of the host that
provide services for guests and other services as required.
Service partitions are providedbymultipleimplementations
and different layers of the architecture. Multiple service
partitions can be configured to provide redundant services
to prevent single points of failure.
7. CONCLUSION
The Secured partition solution is not constrained to a
proprietary hardware platform, and its partitions are
capable of supporting any operating system which can be
hosted by Intel Xeon x64 processors. In addition, Secured
partition is capable of supporting a virtualization
environment similar to Micro partitioning which can create
VMs which share resources alongside logical partitionswith
dedicated resources.
REFERENCES
[1]CombiningVirtualization,ResourceCharacterization,and
Resource Management to Enable EfficientHigh Performance
Compute Platforms Through Intelligent Dynamic Resource
Allocation D. Roe_, D. Thompson_, and M. Wong_ Sandia
National Laboratories MS _9159 / _9152 P.O. Box 969,
Livermore, CA U.S.A.
[2] Chris Wolf, Erick M. Halter, Virtualization: From the
Desktop to the Enterprise, Apress 2005.
[3]Combining Virtualization, resourcecharacterization, and
Resource management to enable efficient high
performance platforms through intelligent dynamic
resource allocation. P. Pébay; D. Roe; D. Thompson; M.
Wong 2010 IEEE International Symposium on Parallel &
Distributed Processing, Workshops and Phd Forum
(IPDPSW)

More Related Content

What's hot

Virtualization
VirtualizationVirtualization
Virtualization
jworth
 
IBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex System
IBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex SystemIBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex System
IBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex System
IBM India Smarter Computing
 
Imp (distributed vmm)
Imp (distributed vmm)Imp (distributed vmm)
Imp (distributed vmm)
Punit Gupta
 
Technology
TechnologyTechnology
Technology
sam ran
 
Sccm hands-on-lab
Sccm hands-on-labSccm hands-on-lab
Sccm hands-on-lab
DPA
 
Intel vmcs-shadowing-paper
Intel vmcs-shadowing-paperIntel vmcs-shadowing-paper
Intel vmcs-shadowing-paper
Ahmed Sallam
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Optimized License Management for the Datacenter
Optimized License Management for the DatacenterOptimized License Management for the Datacenter
Optimized License Management for the Datacenter
Flexera
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
ebuc
 
Security challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governanceSecurity challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governance
Adam Bert Lacay
 
10215 A 01
10215 A 0110215 A 01
10215 A 01
Juanchi_43
 
SP1_Battlecard
SP1_BattlecardSP1_Battlecard
SP1_Battlecard
Larry Yurdin
 
IBM SmartCloud Desktop Infrastructure
IBM SmartCloud Desktop Infrastructure IBM SmartCloud Desktop Infrastructure
IBM SmartCloud Desktop Infrastructure
IBM India Smarter Computing
 
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
DDLS
 
Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the network
Wiliam Ferraciolli
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the network
Wiliam Ferraciolli
 
Lecture 3 more on servers and services
Lecture 3   more on servers and servicesLecture 3   more on servers and services
Lecture 3 more on servers and services
Wiliam Ferraciolli
 
Private cloud server virtualization
Private cloud server virtualization Private cloud server virtualization
Private cloud server virtualization
Pierre-Juan Labeyrie
 
SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012
capriguy84
 
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk Corporation
 

What's hot (20)

Virtualization
VirtualizationVirtualization
Virtualization
 
IBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex System
IBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex SystemIBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex System
IBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex System
 
Imp (distributed vmm)
Imp (distributed vmm)Imp (distributed vmm)
Imp (distributed vmm)
 
Technology
TechnologyTechnology
Technology
 
Sccm hands-on-lab
Sccm hands-on-labSccm hands-on-lab
Sccm hands-on-lab
 
Intel vmcs-shadowing-paper
Intel vmcs-shadowing-paperIntel vmcs-shadowing-paper
Intel vmcs-shadowing-paper
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Optimized License Management for the Datacenter
Optimized License Management for the DatacenterOptimized License Management for the Datacenter
Optimized License Management for the Datacenter
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
 
Security challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governanceSecurity challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governance
 
10215 A 01
10215 A 0110215 A 01
10215 A 01
 
SP1_Battlecard
SP1_BattlecardSP1_Battlecard
SP1_Battlecard
 
IBM SmartCloud Desktop Infrastructure
IBM SmartCloud Desktop Infrastructure IBM SmartCloud Desktop Infrastructure
IBM SmartCloud Desktop Infrastructure
 
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
 
Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the network
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the network
 
Lecture 3 more on servers and services
Lecture 3   more on servers and servicesLecture 3   more on servers and services
Lecture 3 more on servers and services
 
Private cloud server virtualization
Private cloud server virtualization Private cloud server virtualization
Private cloud server virtualization
 
SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012
 
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
 

Similar to IRJET-Virtualization Technique for Effective Resource Utilization and Dedicated Resource Management

IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET Journal
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
eSAT Publishing House
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
eSAT Journals
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
Ravindra Dastikop
 
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
Editor IJCATR
 
Mid term report
Mid term reportMid term report
Mid term report
lokesh039
 
Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)
rajsandhu1989
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
Neha417639
 
A Comparison of PowerVM and x86-Based Virtualization Performance (October 2009)
A Comparison of PowerVM and x86-Based Virtualization Performance (October 2009)A Comparison of PowerVM and x86-Based Virtualization Performance (October 2009)
A Comparison of PowerVM and x86-Based Virtualization Performance (October 2009)
IBM India Smarter Computing
 
A Comparison of PowerVM and x86-Based Virtualization Performance
A Comparison of PowerVM and x86-Based Virtualization PerformanceA Comparison of PowerVM and x86-Based Virtualization Performance
A Comparison of PowerVM and x86-Based Virtualization Performance
IBM India Smarter Computing
 
VSS-1.pdf
VSS-1.pdfVSS-1.pdf
VSS-1.pdf
RiyaBatool
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
Gaurav Marwaha
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
Rahul Hada
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
Louis Göhl
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptx
Vivek Shelke
 
hitachi-datasheet-compute-blade-logical-partitioning-lpar.pdf hitachi compute...
hitachi-datasheet-compute-blade-logical-partitioning-lpar.pdf hitachi compute...hitachi-datasheet-compute-blade-logical-partitioning-lpar.pdf hitachi compute...
hitachi-datasheet-compute-blade-logical-partitioning-lpar.pdf hitachi compute...
Chandra Vengala
 
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
eSAT Publishing House
 
Chap 2 virtulizatin
Chap 2 virtulizatinChap 2 virtulizatin
Chap 2 virtulizatin
Raj Sarode
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
Siddharth Coontoor
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
Dr. Sunil Kr. Pandey
 

Similar to IRJET-Virtualization Technique for Effective Resource Utilization and Dedicated Resource Management (20)

IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
 
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
 
Mid term report
Mid term reportMid term report
Mid term report
 
Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
 
A Comparison of PowerVM and x86-Based Virtualization Performance (October 2009)
A Comparison of PowerVM and x86-Based Virtualization Performance (October 2009)A Comparison of PowerVM and x86-Based Virtualization Performance (October 2009)
A Comparison of PowerVM and x86-Based Virtualization Performance (October 2009)
 
A Comparison of PowerVM and x86-Based Virtualization Performance
A Comparison of PowerVM and x86-Based Virtualization PerformanceA Comparison of PowerVM and x86-Based Virtualization Performance
A Comparison of PowerVM and x86-Based Virtualization Performance
 
VSS-1.pdf
VSS-1.pdfVSS-1.pdf
VSS-1.pdf
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptx
 
hitachi-datasheet-compute-blade-logical-partitioning-lpar.pdf hitachi compute...
hitachi-datasheet-compute-blade-logical-partitioning-lpar.pdf hitachi compute...hitachi-datasheet-compute-blade-logical-partitioning-lpar.pdf hitachi compute...
hitachi-datasheet-compute-blade-logical-partitioning-lpar.pdf hitachi compute...
 
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
 
Chap 2 virtulizatin
Chap 2 virtulizatinChap 2 virtulizatin
Chap 2 virtulizatin
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
AlvianRamadhani5
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
sachin chaurasia
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...
cannyengineerings
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
Height and depth gauge linear metrology.pdf
Height and depth gauge linear metrology.pdfHeight and depth gauge linear metrology.pdf
Height and depth gauge linear metrology.pdf
q30122000
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 

Recently uploaded (20)

NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
Height and depth gauge linear metrology.pdf
Height and depth gauge linear metrology.pdfHeight and depth gauge linear metrology.pdf
Height and depth gauge linear metrology.pdf
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 

IRJET-Virtualization Technique for Effective Resource Utilization and Dedicated Resource Management

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 05 | May -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 45 Virtualization Technique for Effective Resource Utilization and Dedicated Resource Management Megha V R1, Dr G N Srinivasan2 1Software Engineering, R.V College of Engineering, Bengaluru, Karnataka, India 2Professor –RV College of Engineering, Bengaluru, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract- In these modern days, for numerously triggering trendy application with various technology adoption leading to growth in the need of the enormous resources such as CPU’s, Memory, NIC ports, HBA ports and so forth. For this growing need for resources, which in turn impacts both the users and also many organization in a cost effective way, Also resources may not be utilized completely always leading to wastage. Virtualization with commodity hypervisors holds the promise of solving this problem of logical partitioning of resources in a single box. What commodity hypervisors cannot do is create efficient partitions of dedicated resources which are not shared with other partitions. This capability is critical in certain enterprise class environments. 1. Introduction Secured partition is a software layer consistingofa Partition Machine Monitor (PMM), its associated service partitions, and firmware/drivers provided for the guest partitions. Secured Partition creates and manages guest partitions which have dedicated non-shared computing resources1. These s-PAR guest partitions will be referred to as Soft Machines (SMs). This is implemented as a hardware assisted virtual machine which is optimized for non-shared computing resources. Each SM provides the capabilities of a physical server and is isolated from other partitions through the containment properties of the underlying Ultravisor software layer. Secured partition can operate on top of BIOS along with the usage of Ultravisor to perform tasks such as virtual address to physical address translation, physical device emulation, and physical-to-virtual interrupt translation. An improved feature for Secured partition includes the virtualization of the processor’s native virtualization instructions itself. [1]Thus Secured partition is capable of hosting commodity hypervisors, such as VMware©, Xen©, and HyperV, which require these instructions for operation. With this additional feature, the Secured partition operating environment will be able to directly host Windows, Linux, and any other operating systems in logical partitions alongside partitions with commodityhypervisors hosting their own operating systems. 2. Background Research Hypervisors are becoming popular becauseoftheirabilityto make more efficient use of server resources through virtualization and sharing of resources among the logical partitions (virtual machines) that they create. S-Par technology has the ability to be extended to this class of logical partitioning but initial design focus is on the creation of secure logical partitions with dedicated hardware resources (i.e., CPUs, memory, and I/O). This capability is critical in many enterprise class environments.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 05 | May -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 46 3. Methodology Each operating environment or partition is visible to the data center as an independent server capable of hosting any operating system which is supported by the underlying hardware. Not only the operating system also other hardware’s such as NIC HBA Cores Chassis can also be virtualized. Secured partition isuniqueintworespects:(1)it has an advanced architectural design which makes it more scalable and secure than current logical partitioning technologies and (2) it is the only logical partitioning software in its class that is based on Intel’s x64 processors. Other logical partitioning technologies in this class are developed by IBM (LPARs) and SUN (LDOMs) and execute only on each company’s respective proprietary processor technology. 4. Architecture Figure 4.1 displays the environment of a logically partitioned server. The hardware resources, which lie at the bottom of the stack, consistofallofthehardware resources of a single server. This includes all components for processing (processors, cores, chip sets), memory, and IO (storage and networking). The Ultravisor kernel executes at the bottom of the software stack and maintains complete control of memory management (for both internal server memory and IO memory mapping), actual IO port space, configuration space, and interrupts for all components which reside higher in the stack. Above the Ultravisor kernel reside machine monitors (UMM, PMM, and VMM Figure 4.1: Virtualization system model Which create all logical partitions in the server. The components of the stack encased by the lavender area in the figure comprise the two tiered stack of s-Par. Secured partition has its own machine monitor (PMM) that manages the s-Par sVMs and guest SMs. The sVMs provide system management, command, console, and IO servicesfor the SMs. The PMM is optimized to manage dedicated computing and IO resources. Secured partition creates and manages guest SMs which have dedicated, non-shared resources. The SMs have properties and features which support ClearPath operating systems and enable mainframe enterprise class IO control and recovery. The virtual machine monitor in the figure, VMM, creates and manages virtualized logical partitions. [2] The VMM is optimized to manage shared computing and IO resources. Multiple PMMs and/or VMMs can run concurrently. A separate machine monitor instance is activated for each guest of each PMM and/or VMM. Each machine monitor instance is only aware of the resources assigned to it and the Ultravisor maintains isolation of all of the partitions. 5. Advantages 5.1 Security: Boundaries enforced by hardware rather than by software
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 05 | May -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 47 5.2 Error containment: Hardware mechanisms prevent propagation of fatal errors across boundaries 5.3 Performance: Better and more predictable. Directaccess to cores, memory, and I/O slots 6 Description Modules 6.1 Hardware Elements Secured partition based partitioning can run independently in one or more hardware partitions. Secured partition is not dependent on hardware partitions and is capable of running on any server withtherequiredprocessorhardwareassisted virtualization technology. 6.2 Guests A guest utilizes a portion of host resources generally to perform useful (to the guest) work. From the s-Par perspective, guests are pure consumers and provide no useful work to other partitions. 6.3 Virtualization [3] The key premise of server virtualization is to provide virtual instances of basic computing resources. It is not so much a new layer of new abstractions, as it is an extensionof an existing platform firmware layer. 6.4 Service Partitions Service partitions may be software partitions or virtual partitions. Service partitions are partitions of the host that provide services for guests and other services as required. Service partitions are providedbymultipleimplementations and different layers of the architecture. Multiple service partitions can be configured to provide redundant services to prevent single points of failure. 7. CONCLUSION The Secured partition solution is not constrained to a proprietary hardware platform, and its partitions are capable of supporting any operating system which can be hosted by Intel Xeon x64 processors. In addition, Secured partition is capable of supporting a virtualization environment similar to Micro partitioning which can create VMs which share resources alongside logical partitionswith dedicated resources. REFERENCES [1]CombiningVirtualization,ResourceCharacterization,and Resource Management to Enable EfficientHigh Performance Compute Platforms Through Intelligent Dynamic Resource Allocation D. Roe_, D. Thompson_, and M. Wong_ Sandia National Laboratories MS _9159 / _9152 P.O. Box 969, Livermore, CA U.S.A. [2] Chris Wolf, Erick M. Halter, Virtualization: From the Desktop to the Enterprise, Apress 2005. [3]Combining Virtualization, resourcecharacterization, and Resource management to enable efficient high performance platforms through intelligent dynamic resource allocation. P. Pébay; D. Roe; D. Thompson; M. Wong 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW)