- Open Access
Design and test bed experiments of server operation system using virtualization technology
© Huh and Seo. 2016
- Received: 3 July 2015
- Accepted: 21 January 2016
- Published: 1 April 2016
According to current researches, much of the electric power is being consumed by the server cooling system at the Data Center. Moreover, the power consumption rate increases when the number of the equipments and servers expands. Thus, the proposed server operation system has been designed to decrease power consumption rate and CO2 emission volume by minimizing the number of these equipments and simplifying the physical composition of the system. Virtualization technology was adopted in both designing and implementation phases to improve resource efficiency of the system. As a result, significant amount has been saved while constructing the server operation system in this paper. System’s performance has been evaluated using a virtual machine prior to its practical use through test bed experiments and the results confirms our expectation that the virtual hardwares will work as efficiently as actual ones.
- Virtual machine
- Server virtualization
- Test Bed
- CO2 emission
It’s been analyzed that about 65 % of the electric power consumption is consumed for the cooling system to suppress server overheating at the Data Center (where data is processed), bringing a negative effect on the environment. Particularly, the electric power is consumed during the operation process of storage server, main server and network equipments [e.g., network interface cards (NIC), etc.] so that the ‘Greening’ plan should be considered in the process in order to improve energy efficiency [1, 2]. For PCs and network equipments, a large amount of data can be processed rapidly with the high-performance CPU. However, high electric power consumption is required during the processing of such amount of data and heat value increases causing a negative impact to the environment. It is estimated that the IT sector-related electric power consumption and CO2 emission will be increased anticipating that the power consumption would rise from 3.1 % (2007) to 11.1 % (2030) while the CO2 emission would increase from 1.1 % (2007) to 4.7 % (2030) [2–4].
Most of firms, institutions and the users of servers have not been able to make the best use of server or network resources. The usual average utilization rate is under 20–30 % and the rest remain as unused resources. Moreover, systems are often constructed in excess of server or network’s capacity and they mostly fall into disuse after 5 years. Maintaining such systems for about 5 years doesn’t come cheap also. Therefore, physical and logical virtualization works are required to attend these problems [5–16].
Thus, in this paper, the server operation system that has considered the greening plan from the designing phase of the operating servers has been devised. During the test bed implementation, the traffics in this system were generated by IMGP, responses between DHCP server and DHCP client, ARP, Ping and mail transmissions and some of core areas of these traffics have been analyzed with Wireshark.
Similar to PCs and server computers, the virtual computer or the virtual machine is an assembly of virtual hardwares which are created by the virtualized operation system and also has BIOS, CPU, hard disk, network interface card, and so on.
The capacity of an emulation test bed scales when experimental nodes are mapped onto limited physical resources . For example, the DETER containers system [5, 7] can support experiments that are two orders of magnitude larger than the test bed.
Virtualization technique lets the user to share the same resources by separating applications and services from the actual resources using the middle layer and uses IT resource as the logical resource rather than the individual resource [18–24]. Server partitioning is a typical example of the virtualization technique and it lets the resource to be shared by partitioning a single large server into many smaller systems. Additionally, the storage virtualization technique makes it possible to produce a virtualized disk in the ‘disk pool’ which was created by drawing unused disks left in the several physical storage systems. By accessing this virtualized disk, the application server can go into action as if 1 TB-storage is attached to it while the actual maximum usable space being 300 MB.
Conversion to a virtualized system will bring about next several benefits so that we’ve performed the virtualization work for the server and network laying emphasis on them in this paper. The benefits are: reduction in the costs involving the Data Center Management and new investments; human resource efficiency related to the repetitive tasks; and achievement of environment-friendly IT  by being able to fulfill low-power operation by securing the rack space and working environment with constant temperature and humidity.
The virtualization technology can be largely divided into the application virtualization [25–39], server virtualization [26–28], network virtualization [29–31], desktop virtualization [32–35] and storage virtualization. We attempt to describe technical characteristics, trends and current foundation technologies for each category.
The technical characteristics of the application virtualization can be provided through virtualization process for the applications individually installed in the user’s PC. The user can instantly use his/her virtualized PC without installing necessary applications each time. This technique has been developed since decades ago and it is being termed and used as server-based computer, presentation virtualization or application streaming. Currently, the supporting technologies for the rich applications (e.g., 3D CAD) and smart-phones (e.g., IPv6) are being developed and applied and they are implemented with the Cloud SaaS foundation technology.
Server virtualization is an abstraction technique in which the level of computer resource utilization and flexibility are improved though the distribution of a single computing system into several resources by separating operation system from physical hardwares such as server, storage and others, and such techniques is expected to assume an important role in emission reduction [1, 2, 4]. The information resources to which the virtualization can be applied include the operation systems and hardwares such as servers, storage networks, and application programs. On the other hand, for the hardware virtualization technique, the virtualized hardwares are provided to each virtual computer offering an independent environment to have an advantage of running multiple operation systems.
The server virtualization is a technique that integrates workloads of dozens of physical servers in the Data Center with a few virtualized servers. Such virtualization has the benefits of reducing the costs related to the management and rack space securing, and of enhancing the applicability of resources including the power consumption in the aspect of environment-friendly IT. Server virtualization has started with the hardware partitioning technology during the UNIX-frame age and advanced to the host-based virtualization method (i.e., software emulation method). Today, the Hypervisor type server virtualization technology—the bare metal-based virtualization engine—has become a main stream technology. The foundation technology is realized through IaaS implementation.
Unrivaled in the virtualization technology, VMware, Inc. is now facing a challenge from the corporate giants like Citrix and Microsoft. Citrix has the advantage in the desktop virtualization field and using the advantage they are expanding their domain in the field of server virtualization. Their major product, XenServer takes a role of platform for cloud, server and desktop virtualizations. Also, they are reinforcing clouding function by adding the interworking function with Amazon cloud service. Microsoft is narrowing the technological gap between VMware by offering the Hyper-V virtualization system. They have the advantage of having world-wide window-based computer environment and variety of solutions. However, the fact that Hyper-V cannot support virtual hard disks is their weakness. Oracle Corp. is engaged in the market with the Oracle VM, which is an open technology. Red Hat Inc. possesses the Linux operation system which has integrated the kernel-based virtual machine with their corporate virtualization technology but their influence is minimal. As the name represents, VMware is a front-runner in the virtualization field and thus we’ve chosen their line of products in this paper.
The network virtualization means segmenting one or more physical networks that integrate available bandwidths (i.e., channel integration). Recently, the use of smart and mobile devices is flooding everywhere such that the mobility technology which continuously transmits the data fast and correctly is getting attentions. Although extension of the physical networks is needed to manage these data, logical-type network virtualization technique is required above all things. Such change brings out the questions for the existing network construction methods since mobile devices and their contents are the mainspring of server virtualization. Existing network structures have a hierarchical topology. That is, there exists several Ethernet switch layers set-up as a tree structure. This client–server based environment is not suitable for the new network structure.
Desktop virtualization, also called the server-side desktop virtualization, enables a user to virtually own dissimilar desktops with different operating programs such as Windows Vista or Windows 7. The Client-side desktop virtualization makes it possible to operate dissimilar virtual desktops within a PC and a separation between personal operating space and company operating space is possible with such method. Especially, since the emergence of the server-side virtual desktop technology (2006), which accesses the virtual desktop remotely, the technology that operates several client-based desktops have been developed and begun to appear in 1997. Currently, the bare metal-type client hypervisor, which is mounted directly on the hardware, has been developed and it continues to advance as an integrated technology that interworks with the server-side technology. This foundation technology is being implemented with the Cloud DaaS. Several PCs can be operated with a single PC through widely-used desktop virtualization works.
Storage virtualization is a technology that makes it possible to implement service by virtually allocating minimum necessary space instead of required space through the technology called ‘Thin-Provisioning’. Additionally, it provides an environment that can be used for the dissimilar storage systems integration. Currently, the technologies such as NAS, FC, SAN, IP-SAN continue to develop to take supporting role as a storage service in the virtual infrastructure environment. The storage virtualization provides the foundation technology for Cloud IaaS implementation. An explosive increase in the usage of storages has also brought forward increased pressures on everyday storage and data managements. As a result, satisfying the service levels for the usability and provisioning has become a huge task. Companies are now looking into the disk and tape storage virtualization technology to avoid such burden.
Designing of the server operation system
We’ve configured a network by creating several servers using the virtualization technique for three physical servers (IBM System ×3250 servers). A usable domain name has been given so that this network will have the servers which include various service elements under one domain name. Web server is constructed with Apache, PHP and MySQL, and the DNS server, with bind9. E-mails can be exchanged using Postfix.
The conditions of hardwares and softwares
Hardware—CPU: Intel(R) Core(TM)2 Duo CPU T7500,—Memory: 4 GB- HDD: 60 GB
System/software—Host OS: Windows 7,—Virtual Machine: VMWare Workstation 7.1, VMware VMware vSphere Client 4.1.0,—Guest OS: Ubuntu Server 10.10, Windows Server 2008
Status of IBM ×3250 server equipments (three same product lines)
Hardware—CPU: Intel Pentium(R) D 3.00 GHz,—Memory: 4 GB,—HDD: 160 GB
System/software—VMware ESXi 4.1.0
Traceroute test bed experiments
Once the line has been actually altered, OSPF automatically changes the routing table according to the altered line. Thus, because of the severed line, the packets cannot take Router 3 but they can be delivery by making a detour around Router 2 after the modification.
When analyzing the network with Wireshark, it is important to observe the time column. Network can slow down due to long delays, access errors and excessive packet requests to obtain data. One should check the time gaps between request and response, or acknowledgement response and normal response when the performance of the network degrades because of delays.
Packet time measurement method of Wireshark for performance evaluation
When Wireshark conducts capturing operation, a time stamp value will be drawn out from the libcap/WinPcap library. This time stamp is then stored together with the trace file so that the packet arrival time can be indicated when the file is opened.
Packet list pane on data link layer
Packet details pane on Network Layer
Performance evaluation of proposed server operation system: Example of mail transmission and reception on a network
sudo adduser test
For the analysis environment, a mail was sent to the user (test) after accessing the mail server of pknu.com (192.168.0.0/16) with STMP from dhcp-client. The transmitted mail will be stored in the user/Maildir/new/folder. Then, this temporary file will be transferred to cur folder (user/Maildir/cur) after it is opened and read using POP3 or IMAP. If one wishes to send a mail by using the stmp protocol, he/she should follow below process.
For telnet, enter below command to access 192.168.0.3 (mail.pknu.com) with a port number 25 (stmp)
telnet 192.168.0.3 25
Appropriate command for the STMP protocol will be needed to send a mail. To send a mail, enter below line.
mail from: firstname.lastname@example.org
After receiving a message 250 2.1.0 OK, enter the sender and relevant mail server names.
rcpt to: email@example.com
If one wants to check the mail sent previously by using STMP with POP3 protocol, enter below command to access one’s own mail server.
telnet 192.168.0.3 110
Access port number 110 (POP3) of mail.pknu.com (192.168.0.3) and enter the command.
user user (test)
pass user (test)
To check the mail sent by STMP previously with IMAP protocol, one needs to access one’s own mail server.
telnet 192.168.0.3 143
The rest of the procedure is the same as above but the port number should be 143 (IMAP).
a01 login test test
a02 select inbox
Performance analysis of the network operation system using Wireshark
The major traffics in the network server operation system are generated by IMGP, responses between DHCP server and DHCP client, ARP, Ping and mail transmissions, and some of core areas of the traffics have been analyzed with Wireshark.
The proposed system performance was evaluated prior to its practical use with a virtual machine and by making it possible to re-deploy resources and to recycle idle resources, we expect that the costs and resources involved could be reduced once such processes are applied to the existing systems.
JH has implemented the entire part of networking with three VMwares, tested mail transmission and reception process, and evaluated system’s performance with Wireshark, which has confirmed that the communication was successful. KS is a paper advisor who has provided a basic logic in preparing the dissertation and reviewed the entire system diagram for implementation, after confirming the feasibility of the networking process. Both authors read and approved the final manuscript.
The authors declare that they have no competing interests.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
- Shin J (2009) Technological trends in green IT. Korean Institute of Information Scientists and Engineers, pp 35–36 (in Korean) Google Scholar
- Baek JS (2009) Operating system virtualization for mobile desktop environment on windows, M.S. thesis, Department of computer and communications engineering POSTECH Graduate School of Information Technology, pp 2–8 (in Korean) Google Scholar
- Wang S, Xu DS, Yan SL (2010) Analysis and application of Wireshark in TCP/IP protocol teaching. In: IEEE EDT, pp 269–272Google Scholar
- Huh JH, Seo K (2013) Designing and implementation of networks learning systems by using virtual computers. In: The 9th international conference on MITA 2013, Bali, pp 68–71Google Scholar
- Huh JH (2012) Designing and implementation of networks learning systems by using virtual computers, M.S. thesis, Department of Computer Science Education, Graduate School of Education, Pukyong National University at Daeyeon, Busan, pp 2–18. (in Korean) Google Scholar
- Yao WM (2013) Increasing scalability in network simulation and testbed experiments, Ph.D. thesis, Purdue University, West Lafayette, pp 18–19Google Scholar
- DETER Team (2011) Building apparatus for multi-resolution networking experiment using containers. Technical Report ISI-TR-683, DeterLabGoogle Scholar
- Kernel-based virtual machine. http://www.linux-kvm.org
- VMware. http://www.vmware.com
- Oracle VM virtualbox. http://www.virtualbox.org
- LinuX containers. http://lxc.sourceforge.net
- Huh JH, Seo K (2014) Development of competency-oriented social multimedia computer network curriculum. J Multimedia Inf Syst 1(2):133–142Google Scholar
- Kim BH (2014) Establishment of IT resource integration system using server and network virtualization, Ph.D. thesis, Department of Computer Engineering The Graduate School of Korea National University of Transportation, pp 11–16 (in Korean) Google Scholar
- Baek SJ, Park SM, Yang SH, Song EH, Jeong YS (2010) Efficient server virtualization using grid service infrastructure. J Inf Process Syst 6(4):553–562View ArticleGoogle Scholar
- Ahn H, Jung B, Park J (2015) Effect of reagents on optical properties of asbestos and remote spectral sensing. J Converg 5:15–18Google Scholar
- Ju M, Ahn H, Yoo D, Kim H, Kim Y (2014) Feasibility test of wireless monitoring of changes of fish fauna according to habitat conditions of artificial lakes and wetlands. J Converg 5:19–22Google Scholar
- Peng G, Zeng K, Yang X (2013) A hybrid computational intelligence approach for the VRP problem. J Converg 4:1–4Google Scholar
- Liu J, Chung SH (2013) An efiicient load balancing scheme for multi-gateways in wireless mesh networks. J Inf Process Syst 9:365–378View ArticleGoogle Scholar
- Lv J, Guo J, Ren H (2014) Efficient greedy algorithms for influence maximization in social networks. J Inf Process Syst 10:1–12View ArticleGoogle Scholar
- Kolici V, Herrero A, Xhafa F (2014) On the performace of oracle grid engine queuing system for computing intensive applications. J Inf Process Syst 10:491–502View ArticleGoogle Scholar
- Feese S, Burscher MJ, Jonas K, Tröster G (2014) Sensing spatial and temporal coordination in teams using the smartphone. Hum Centric Comput Inf Sci 4:1–18View ArticleGoogle Scholar
- Elsayed E, Eldahshan K, Tawfeek S (2013) Automatic evaluation technique for certain types of open questions in semantic learning systems. Hum Centric Comput Inf Sci 3:1–15View ArticleGoogle Scholar
- Sinha A, Lobiyal DK (2013) Performance evaluation of data aggregation for cluster-based wireless sensor network. Hum Centric Comput Inf Sci 3:1–17View ArticleGoogle Scholar
- Sharma MJ, Leung VCM (2012) IP multimedia subsystem authentication protocol in LTE-heterogeneous networks. Hum Centric Comput Inf Sci 2:1–19View ArticleGoogle Scholar
- Vanus J, Kucera P, Martinek R, Koziorek J (2014) Development and testing of a visualization application software, implemented with wireless control system in smart home care. Hum Centric Comput Inf Sci 4:1–19View ArticleGoogle Scholar
- Ueno H, Hasegawa S, Hasegawa T (2010) Virtage: server virtualization with hardware transparency. Lecture notes in computer science (LNCS). Springer, Berlin, pp 404–413Google Scholar
- Paessler D (2008) Server virtualization and network management. Database Netw J 38(5):13–16Google Scholar
- Taylor C, Consolidation Server (2006) How to enhance utilization of servers and storage. Manuf Comput Solut 12(5):26Google Scholar
- Botero JF, Hesselbach X (2013) Greener networking in a network virtualization environment. Comput Net 57(9):2021–2039View ArticleGoogle Scholar
- Jain R, Paul S (2013) Network virtualization and software defined networking for cloud computing: a survey. IEEE Commun Mag 51(11):24–31View ArticleGoogle Scholar
- Zhao GY, Tang HF, Xiao LM, Li XQ (2013) Efficient inline deduplication on VM images in desktop virtualization environment. Appl Mech Mater 307:488–493View ArticleGoogle Scholar
- Wang X, Zhang B, Luo Y (2013) Optimizing interactive performance for desktop-virtualization environment optimizing interactive performance for desktop-virtualization environment. Lecture notes in computer science (LNCS), vol 7719. Springer, Berlin, pp 541–555Google Scholar
- Jang SM, Choi WH, Kim WY (2013) Client rendering method for desktop virtualization services. ETRI J 35(2):348–351View ArticleGoogle Scholar
- Cohen E, Paul W, Schmaltz S (2013) Theory of multi core hypervisor verification. Lecture notes in computer science (LNCS). Springer, Berlin, pp 1–27Google Scholar
- Thorpe S, Ray I, Grandison T, Barbir A (2013) Hypervisor event logs as a source of consistent virtual machine evidence for forensic cloud investigations. Lecture notes in computer science (LNCS). Springer, Berlin, pp 97–112Google Scholar
- Huh Jun-Ho, Seo Kyungryong (2015) Hybrid advanced metering infrastructure design for micro grid using the game theory model. Int J Softw Eng Appl 9(9):257–268Google Scholar
- Huh Jun-Ho, Lee Donghoon, Seo Kyungryong (2015) Implementation of graphic based network intrusion detection system for server operation. Int J Secur Appl 9(2):37–48Google Scholar
- Huh JH, Koh T, Kim NJ, Seo K (2015) Design and test bed experiments of smart grid-based PLC client node problem using OPNET. In: Proceedings of the 11th international conference on multimedia information technology and applications (MITA 2015), Tashkent, Uzbekistan, IEEE Region 10, Changwon Section, p 317–322Google Scholar
- Huh JH, Seo K (2015) Design and testbed of graphic-based server operation system using virtualization technology. In: The 2015 world congress on information technology applications and services proceedings of the “advanced mobile, communications, security, multimedia, vehicular, cloud, IoT, and computing” (World-IT 2015), p 96Google Scholar