Evaluation of Different Hypervisors Performance in the Private Cloud with SIGAR Framework
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 2
Abstract
To make cloud computing model Practical and to have essential characters like rapid elasticity, resource pooling, on demand access and measured service, two prominent technologies are required. One is internet and second important one is virtualization technology. Virtualization Technology plays major role in the success of cloud computing. A virtualization layer which provides an infrastructural support to multiple virtual machines above it by virtualizing hardware resources such as CPU, Memory, Disk and NIC is called a Hypervisor. It is interesting to study how different Hypervisors perform in the Private Cloud. Hypervisors do come in Paravirtualized, Full Virtualized and Hybrid flavors. It is novel idea to compare them in the private cloud environment. This paper conducts different performance tests on three hypervisors XenServer, ESXi and KVM and results are gathered using SIGAR API (System Information Gatherer and Reporter) along with Passmark benchmark suite. In the experiment, CloudStack 4.0.2 (open source cloud computing software) is used to create a private cloud, in which management server is installed on Ubuntu 12.04 – 64 bit operating system. Hypervisors XenServer 6.0, ESXi 4.1 and KVM (Ubuntu 12.04) are installed as hosts in the respective clusters and their performances have been evaluated in detail by using SIGAR Framework, Passmark and NetPerf.
Authors and Affiliations
P. Vijaya Reddy, Dr. Lakshmi Rajamani
The Novelty of A-Web based Adaptive Data-Driven Networks (DDN) Management & Cooperative Communities on the Internet Technology
Nowadays, the area of adaptive data science of all data-driven properties on the Internet remains generally envision through integrated web entity maintenance. In this connection, several clients can collaborate with web...
Physiological Responese Measrement to Identify Online Visual Representation Designs
This research involved the identification and validation of text-related visual display design principles from the literature. Representations were designed and developed that illustrated the intent of each visual displa...
Investigation of Adherence Degree of Agile Requirements Engineering Practices in Non-Agile Software Development Organizations
Requirements are critical for the success of software projects. Requirements are practically difficult to produce, as the hardest stage of building a software system is to decide what the system should do. Moreover, requ...
THYROID DIAGNOSIS BASED TECHNIQUE ON ROUGH SETS WITH MODIFIED SIMILARITY RELATION
Because of the patient’s inconsistent data, uncertain Thyroid Disease dataset is appeared in the learning process: irrelevant, redundant, missing, and huge features. In this paper, Rough sets theory is used in data discr...
Exploiting SCADA vulnerabilities using a Human Interface Device
SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infras-tructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Lo...