Discuss about the Network and Security.
Sensitive instructions: the sensitive instruction sets are those which tends to interact with the system hardware. Both the control and behavior sensitive instructions fall in this category of instruction set (Pan and Liu 2015). The control sensitive instructions are those which can change the configuration of the resources. On the other hand the instructions that are dependent on the resource configuration for its result, is called the behavior sensitive instruction set.
For the virtualization it can be said Virtualization empowers the servers or specifically the data centers to concentrate on the requirements of business applications. In addition with that the virtualization also makes the resource allocation to the application more complex (Ferdaus et al., 2014). To overcome these complexities of allocation of the resources, the administrators try to oversubscribe the physical assets on a host with the goal of expanding the quantity of workloads on a host. The oversubscription of the resources happens when the requests from the clients for the resource exceeds the actual amount of the available physical resources. By doing this the different resources like the servers, services, storage spaces are shared. While the different strategies are developed to use the resources optimally, its observed that the most of the resources remains idle at the highest work load. So the different benefits of suing the oversubscription of the resources are
Figure1: Utilization of the physical resources.
(Source: Householder et al., 2014 pp-2)
Drawbacks of Oversubscription: The process of oversubscribing the available resources is not free from different flaws and drawbacks. Like
The virtualization of the CPU utilization is a complex issue. Since the allocation of the different tasks to the core are done using the Hypervisor than the guest OS. So to measure the CPU utilization the user has to use different hypervisor aware performance counters. This counter can be used to tack the CPU utilization of a virtual processor that is assigned to some virtual machine (Mishra et al. 2012 ). The different components of the hypervisor components are guest runtime, hypervisor run time, total runtime, total intercepts /sec, hyper calls cost, hypercalls/sec etc.
RAM utilization: Both in the host and virtual machines the measurement of the memory utilization is difficult. In case of the virtual machines if it is suspected that the memory is leaked or is not optimally oversubscribed then at first it is determined that what is to be checked. After that the counters like, Ballooning, VMkernel, vSphere etc. (Baucke et al. 2013).
I/O utilization: In the virtual networks the input and output operations are limited and the users have a limited scope for the I/o operation to the virtual services.
Indication for configuration change depending on the resource consumption by the physical machines
A server or a physical machine with a low load will run cooler, and have lower chances of failure. Once the CPU achieves the most extreme temperature, the quality of the processes become much lower with higher amount of burdens (Oki et al. 2015). The reality of the matter is that the cooling framework will make fans move speedier and that will raise the likelihood of a disappointment on the fans. There is another issue, with such a high load, if the heat is not taken out of the closed area in an effective way, then the entire server will have a higher temperature, influencing different parts of the virtual system. So for reliable processing and great speed of processing, it’s recommended to increase the capacity of the system.
Indication for the configuration change depending on the resource allocation by the virtual machine
It is often seen that the high CPU usage helps in increasing the host ready time and the queuing of the processors too. Moreover it can be said that if the CPU is constantly used at a high rate (like 90%) of its capacity then the service provided by it is impacted. Therefore comparing the CPU usage of a virtual machine with other machines available in the host, increasing the CPU limit, and upgrading the number CPUs or cores would help in maintaining the same level of services by the provider.
Justification about the change in the configuration when the resource consumption is 30%
As the host installed have the different number of available processors and cores. When the resource consumption is at 30% then there is no need of increasing the capacity. Moreover it can be said that the provider can accommodate more number of requests from the clients and process them
Goldberg and Popek proposed some requirements that are helpful for a computer system to efficiently manage the system virtualization. They proposed three types of instruction sets, which are privileged, non- privileged and sensitive.
Privileged instruction: These are the instructions that are trapped in the system if the system is in user mode and is executed if the system is in kernel mode. This privileged instruction sets are used to separate the user space kernel space.it is required because the kernel space accesses hardware resources directly and the user space do that in an indirect way (Gracia-Moran et al. 2014). If the privilege instructions are tried to execute in the non-privileged mode then the system triggers an alarm and execute that in the privileged environment.
Non privileged instructions: these are the instructions that are executed in the user mode in the virtual system. For the execution it requires the user space rather than the kernel space.
Bai, T. and Rabara, S.A., 2015, August. Design and Development of Integrated, Secured and Intelligent Architecture for Internet of Things and Cloud Computing. In Future Internet of Things and Cloud (FiCloud), 2015
Bari, M.F., Boutaba, R., Esteves, R., Granville, L.Z., Podlesny, M., Rabbani, M.G., Zhang, Q. and Zhani, M.F., 2013. Data center network virtualization: A survey. Communications Surveys & Tutorials, IEEE, 15(2), pp.909-928.
Barroso, L.A., Clidaras, J. and Hölzle, U., 2013. The datacenter as a computer: An introduction to the design of warehouse-scale machines.Synthesis lectures on computer architecture, 8(3), pp.1-154.
Baucke, S., Green, H., Kempf, J. and Tatipamula, M., Telefonaktiebolaget LM Ericsson (Publ), 2013. Using MPLS for virtual private cloud network isolation in openflow-enabled cloud computing. U.S. Patent 8,560,663.
Beloglazov, A., 2013. Energy-efficient management of virtual machines in data centers for cloud computing.
Beloglazov, A., Abawajy, J. and Buyya, R., 2012. Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future generation computer systems, 28(5), pp.755-768.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2017). Network And Security. Retrieved from https://myassignmenthelp.com/free-samples/network-and-security.
"Network And Security." My Assignment Help, 2017, https://myassignmenthelp.com/free-samples/network-and-security.
My Assignment Help (2017) Network And Security [Online]. Available from: https://myassignmenthelp.com/free-samples/network-and-security
[Accessed 27 January 2021].
My Assignment Help. 'Network And Security' (My Assignment Help, 2017) <https://myassignmenthelp.com/free-samples/network-and-security> accessed 27 January 2021.
My Assignment Help. Network And Security [Internet]. My Assignment Help. 2017 [cited 27 January 2021]. Available from: https://myassignmenthelp.com/free-samples/network-and-security.
MyAssignmenthelp.com has been recognized as the safest dissertation help company in Australia. We conduct a rigorous interview process to select most experienced and talented dissertation experts. This is how, we fulfill students search can someone do my dissertation perfectly or who can write my dissertation plagiarism free and provide them needed academic assistance. Apart from writing help. we also provide dissertation editing services to help students submit perfectly written dissertation.
Answer: Problem Description One of the recent computer security breaches that have been reported is of Missouri-based health care provider Blue Spring Family Care. It has been reported that the Protected Health Information (PHI) of 44,979 patients has been exposed as an outcome of the attack. The systems were infected with a variety of malware including ransomware. The Blue Spring Family Care reported that their computer vendor had detected t...
Read MoreAnswer: Introduction: Cyber security in any organization can be defined as the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this. This has been one of the most challenging problem with the advancement in technology. Most of the companies have integrated technology in their operations and failed to account the risks that this technology places the company. Over the...
Read MoreAnswer: Intellectual property may be defined as a commercial product of human intellect, which is valuable either in the abstract or concrete form like a protectable trademark, human intellect or a trade secret (Bently & Sherman, 2014). As per the approach of Berti’s (2009), it can be stated that the intellectual property system is nothing but a crossroads. The developed countries are said to be more associated with the level of enfo...
Read MoreAnswer: Threat Category Control Description Classification Type Accidental Corruption of information Proper shut down of the system The proper shut down of the system will help to save the files containing the information in a proper way. administration prevent Installation of the anti virus. The implementation of the antivirus will protect the data from the a...
Read MoreAnswers: 1. 1. NAT means network address translation, which practically implies that a router or a firewall is translating addresses that come from the incoming interface, into different addresses flowing from the outgoing interface; conversely, when the response to the traffic comes back, it will re-transform the addresses in the original values. The typical case for NAT is to allow sharing of public IP addresses - which are a scarce resourc...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I am writing to you to let you know that I am extremely impressed with your recent work. You\'ve dedicated years of service to this company, and your work exemplifies and principles now more than ever. Thank you for all that you have done to help us ...
Australia
Very good experience, so happy with the result. Very highly and strongly recommend this website.
Australia
I got a good price and quality work was provided to me in a short period of time. I scored really well in my assignment. All the rework was done in time which is great.
Australia
They have provided me with work having 0% plagiarism which really helped me to score well in my assignment.
Australia