The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The universal diagram of creation of the virtual practical works for a row of disciplines of ICT is offered. Use the VirtualBox virtualization system for different variants of the practical works organization is considered. The diagram of the organization of a workshop on installation of the selected UNIXserver is provided. The conclusion about need of a combination of operation for a display class...
Virtualization supplies a straightforward approach to high availability through iterative replications of virtual machine (VM) checkpoints that encapsulate the protected services. Unfortunately, traditional VM replication solutions suffer from deficiencies in either response latency or state recovery consistency, which constrains the adoption of VM replication in production. In this paper, we extend...
Migration of a virtual machine is basically moving the VM running on a physical machine (source node) to another physical machine (target node). It is done as, while the VM is running on the source node, and without disturbing any dynamic framework connections, indeed after the VM is moved to the target node. It is considered — live□, since the unique VM is running, while the migration is in progress...
Virtualization technology and the ease with which virtual machines (VMs) can be migrated within the LAN have changed the scope of resource management from allocating resources on a single server to manipulating pools of resources within a data center. We expect WAN migration of virtual machines to likewise transform the scope of provisioning resources from a single data center to multiple data centers...
In recent years, desktop virtualization trends to be a new extension of virtualization framework. The existing desktop virtualization systems suffer performance degradation in terms of response time and video quality. However, previous remote access approaches are designed for standalone architectures and require semantic information which is not transparent to OS. So they are not feasible in desktop...
In this paper, we develop LMSS(Load-balance Mirror Service System) by using LVS to monitor the connection of the client, and MLN to dynamically deploy the virtual machine so as to establish mirror service cluster, thus ensuring the quality of mirror service. Besides, we also use tunnel technology to make the mirror servers deployed in different areas integrate as a single-entry virtual mirror cluster...
Traditional physical networking components form the basis of the Internet and the backbone of most enterprise networks. Virtual networking is essential in connecting virtual machines among themselves and to the physical world in any virtualization platform. In order to produce work ready IT graduates with practical, hands-on networking experience, it is desirable to provide an integrated virtual and...
We propose Distributed Service Control (DSC) technique for securing critical services. One of the main aims of DSC is to deal with the attacks by minimising the attack surface between two hosts. In our model, light weight security policies are enforced at the client machines to ensure that the client can access the services using legitimate traffic only. This will minimise the number of attacks that...
Virtualisation is one of the important technologies for the realisation of cloud computing. A Virtual Machine Monitor (VMM) is an additional software layer which has complete control on the physical resources and enables to run multiple operating systems on a scalable computer. Recently some of the techniques have been proposed to develop Trusted Virtual domains. A trusted virtual domain (TVD) enables...
In cloud-computing environments, migration of virtual machines (VMs) between data centers can solve many problems such as load balancing and power saving. One of the difficulties in wide-area migration, however, is the “address-warping” problem, in which the address of the VM warps from the source server to the destination server. This confuses or complicates the status of the WAN, and the LANs connected...
Host identification, today, can be done at many layers of the network protocol stack depending on the identifiable parameter used for classification. But, these generally include fields from TCP/IP/MAC packets; that can be spoofed or manipulated very easily to misguide the identification process or include intolerable error into. Identification on wireless networks can be done with better precision...
The benefits of virtualization are typically considered to be server consolidation, (leading to the reduction of power and cooling costs) increased availability, isolation, ease of operating system deployment and simplified disaster recovery. High Performance Computing (HPC) environments pose one main challenge for virtualization: the need to maximize throughput with minimal loss of CPU and I/O efficiency...
Cloud computing delivery model can significantly reduce enterprise IT costs and complexities. This technology can handle the rapidly gowning environment and provide more flexible resources sharing and hence it has become as anew information technology infrastructure recently. In contrast to traditional enterprise IT solution, cloud computing moves the application software and databases to the servers...
We have constructed a virtual machine PC cluster that uses a virtual machine as worker nodes, and proposed a method that acquires insufficient resources dynamically from cloud computing systems while basic computation is performed on its own local clusters. Virtual machine environments enable us to manage computer resources flexibly and make use of migration. For data access, we have used iSCSI protocol...
Because of the increasing volume of information distribution and data accumulation by means of broadband networks, the amount of available information is increasing in recent years. In this study, we aim to acquire insufficient resources dynamically from cloud computing systems while basic computation is performed on its own local clusters. Scalable resource management is achieved by monitoring resource...
Internet Small Computer System Interface (iSCSI) is a protocol that can run on a TCP/IP transport layer in order to transfer SCSI commands to allow block-level access on storage devices which is standardized by IETF. Hypervisor Storage is the storage abstraction layer on Virtual Machines. This paper examines the performance of iSCSI protocol implementation accessing Hypervisor Storage in Virtual Machine's...
Virtual clusters are the new ways for managing the computing resources in the cluster environment. Users are presented with virtual clusters instead of physical ones. The storage system for supporting the running clusters is critical in such systems for efficient store of virtual machine images. We have used the CAS (Content Addressable Storage) based storage for manage the large number of virtual...
As multi-core processors become increasingly the mainstream, people have likewise become more interested in how best to make use of the computing capacity of the CPU. Although many methods, running multi-thread application for example, have been adopted to increase the CPU utilization, most multi-core PC's and workstation's CPU cycles are idle, even during peak hours. So it is an efficient solution...
Traditional experimental platforms, which are built based on physical machines, have many disadvantages on diversity, security and repeatability. The development of virtual experimental platforms proposed a solution to this problem, but the construction of the network supporting environment remains a challenging task. This paper presents the design and implementation of a virtual network supporting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.