230 likes | 474 Views
Overview. Why High Availability?Why Virtualized?Why Desktop Applications?Implementation SketchDiscussionFuture Work. Why High Availability? . Malware (viruses, worms, spyware, etc.) are still a problemPatches and software bugs can cause problemsFixing or reinstalling is time consuming and difficult for most computer usersApplication downtime means decreased user productivity.
E N D
1. High Availability of Virtualized Desktop Applications Todd Deshane
CS Seminar Fall 2006
Advisor: Jeanna Matthews
2. Overview Why High Availability?
Why Virtualized?
Why Desktop Applications?
Implementation Sketch
Discussion
Future Work
3. Why High Availability? Malware (viruses, worms, spyware, etc.) are still a problem
Patches and software bugs can cause problems
Fixing or reinstalling is time consuming and difficult for most computer users
Application downtime means decreased user productivity
4. Virtualization
Level of abstraction
Which types of virtualization are of interest to us?
Architecture Virtualization (Virtualization of underlying hardware i.e. x86)
OS Virtualization (virtualization of underlying kernel)
5. Architecture Virtualization
6. OS Virtualization
7. Why Virtualized? More effective use of hardware
Desktop utilization less than 10%
Isolation of guests
Guests run different applications
Recovery of compromised guests
Restarting or rolling back a guest is easier than restarting or rolling back a physical computer
8. Why Desktop Applications? Desktop users’ increased reliance on power of computers
Increased sophistication of attacks
Distributed botnets
Criminal attacks on data and resources
Virtualization and HA cluster research traditionally focused on servers
9. Implementation Sketch Rapid Recovery System
Isolated virtual machine appliances
Intrusion detection and restoration
High Availability Cluster
Redundancy of applications
Heartbeat monitoring
Application Service Provider
Central application server
On-demand software
10. Rapid Recovery System
11. Rapid Recovery System Key Features
Network Intrusion Detection
Data Protection
Fast Restoration
File System Intrusion Detection
Read and write limiting
To be added:
Contract-based data access
12. High Availability (HA) Cluster
13. High Availability (HA) Cluster
14. High Availability (HA) Cluster Key Features
Heartbeat Monitoring
System or Data Fail-over
Reliability
Resource Management
Data redundancy
System redundancy
Configurable Policies
15. Application Service Provider (ASP)
16. Application Service Provider (ASP) Key Features
Central Application Server
Single backend storage connection point
Stateless Configuration Possible
17. Implementation Integration ASPs are put into virtual machine appliances
Rapid recovery system protects user data and settings and restores ASPs
High availability cluster provides redundancy of application servers and heartbeat monitoring
18. Discussion Users increasingly rely on desktop applications
Attack sophistication is increasing
Combine virtualization, HA cluster, and rapid recovery technologies
High availability of virtualized desktop applications
Attack resistant desktop experience
Rapid application and data recovery
19. Discussion Application deployment model
ASPs can be local or remote
User chooses which ASP version to use
Software Redundancy
Most faults occur in software
System will also support hardware redundancy (if available)
20. Future Work Deployment and testing of HA cluster technology
Virtualization performance and usage testing on the desktop
Enhance and test the implementation of the rapid recovery system
System integration of these existing technologies
21. Questions?
22. Backup Slides
23. Implementation Details Virtual Environment:
Xen (VMM)
OpenVZ (OS virtualization)
High Availability Cluster
Linux-HA
File Server:
Openfiler
24. References Matthews et al. Data Protection and Rapid Recovery From Attack With A Virtual Private File Server and Virtual Machine Appliances
www.linux-ha.org/
http://www.openfiler.com/
http://en.wikipedia.org/wiki/Application_service_provider