The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In computing era, a virtual version of a stratagem or resource, such as computer network resources, server, storage device, or a combination of these usually refers as virtualization where the framework segregates the resources into one or more execution instances. A Virtual Machine (VM) created on the host hardware as a software is called a hypervisor or a VM manager. Nowadays, hypervisor based virtualization...
In Infrastructure-as-a-Service (IaaS) clouds, users remotely manage the systems in virtual machines (VMs) called user VMs, e.g., Through VNC. To allow users to manage their VMs even on failures inside the VMs, IaaS usually provides out-of-band remote management. This VM management is performed indirectly via a VNC server in a privileged VM called the management VM. However, it is discontinued when...
The smallest instance offered by Amazon EC2 comes with 615MB memory and a 7.9GB disk image. While small by today's standards, embedded web servers with memory footprints well under 100kB, indicate that there is much to be saved. In this work we investigate how large VM-populations the open Stack hyper visor can be made to sustain, by tuning it for scalability and minimizing virtual machine images...
For Infrastructure-as-a-Service (IaaS) clouds, stepping-stone attacks via hosted virtual machines (VMs) are critical. This type of attack uses compromised VMs as stepping stones for attacking the outside hosts. Not only compromised VMs but also IaaS providers are regarded as attackers. For self-protection, IaaS clouds should perform active response against stepping-stone attacks. However, it is difficult...
The Nexos Project is a joint effort between Marquette University, the University of Buffalo, and the University of Mississippi to build curriculum materials and a supporting experimental laboratory for hands-on projects in computer systems courses. The approach focuses on inexpensive, flexible, commodity embedded hardware, freely available development and debugging tools, and a fresh implementation...
Load balancing device is an important part of cloud platform. One of the most common applications of load balancing is to provide a single powerful virtual machine from multiple servers. In multi-core environment, the load balancing device can run multiple physically parallel load-balancing processes to increase overall performance. An important issue when operating a load-balanced service is how...
Server consolidation using virtual machines (VMs) makes it difficult to execute processes as the administrators intend. A process scheduler in each VM is not aware of the other VM and schedules only processes in one VM independently. To solve this problem, process scheduling across VMs is necessary. However, such system-wide scheduling is vulnerable to denial-of-service (DoS) attacks from a compromised...
A cloud computing provider can dynamically allocate virtual machines (VM) based on the needs of the customers, while maintaining the privileged access to the Management Virtual Machine that directly manages the hardware and supports the guest VMs. The customers must trust the cloud providers to protect the confidentiality and integrity of their applications and data. However, as the VMs from different...
The benefits of virtualization are typically considered to be server consolidation, (leading to the reduction of power and cooling costs) increased availability, isolation, ease of operating system deployment and simplified disaster recovery. High Performance Computing (HPC) environments pose one main challenge for virtualization: the need to maximize throughput with minimal loss of CPU and I/O efficiency...
Automated regression test suites are an essential software engineering practice: they provide developers with rapid feedback on the impact of changes to a system's source code. The inclusion of a test case in an automated test suite requires that the system's build process can automatically provide all the environmental dependencies of the test. These are external elements necessary for a test to...
CORE (Common Open Research Emulator) is a network emulation tool that uses virtualization provided by FreeBSD jails, Linux OpenVZ containers, and Linux namespaces containers. Here the modular architecture is described that makes supporting these three platforms possible, and the relative performance of each is compared. Initial work in integrating this tool with higher-fidelity link- and physical-...
Clouds are complex systems subject to an increasing number of anomalies and threats. In this paper we briefly revisit the issues related to Windows guest cloud service resilience and later provide some preliminary results on the resilience of Windows cloud guests via virtualization. In particular, we propose an architecture, Cloud Resilience for Windows (CReW). CReW can transparently monitor guest...
Server virtualization is the key technology for data center. It can be used to integrate servers, reduce hardware cost, reduce space and power consumption in data center. Dynamic migration is an important feature of server virtualization technology that makes it possible for a virtual server to migrate from one PC to another at run-time. By using dynamic migration, service interruptions caused by...
Virtual application appliances (VAA) (i.e., prebuilt virtual machines (VM) for specific scientific applications) are useful mechanisms to deal with the packaging of complex software systems and heterogeneous software environments (e.g., library version conflicts on different clusters and clouds). As an experience paper, we discuss some basic techniques for creating VAAs (e.g., virtual disk repositories...
Live migration of virtual machines relocates running VM across physical hosts with unnoticeable service downtime. However, propagating changing VM memory at low cost, especially for write-intensive applications or at relatively low network bandwidth, is still uncovered. This paper presents Microwiper, an improvement of memory propagation in live migration. Our idea is twofold. We propose ordered propagation...
Virtualization has been also used as desktop utility and supports VM migration, which is a function to migrate a VM (Virtual Machine) from a physical host to another. However, it cannot migrate hardware configuration of peripherals. We focus on USB devices as peripherals and provide the USB device connection method by combination of MAT and USB/IP for the global migration. In our system, MAT is implemented...
In current virtualized cloud platforms, resource provisioning strategy is still a big challenge. Provisioning will gain low resource utilization based on peak workload, and provisioning based on average work loads will sacrifice the potential revenue of cloud customers because of bad user experiences. VM-based performance isolation also restrains resource flowing on demand. As to memory, this eventually...
Virtual Interacting Network CommunIty (Vinci) is a software architecture that exploits virtualization to secure a community cloud, i.e. a cloud system shared among communities with distinct security levels and reliability requirements. A community consists of a set of users, their applications, a set of services and of shared resources. Users with distinct privileges and applications with distinct...
Despite advances in high performance inter-domain communication for virtual machines (VM), data intensive applications developed for VMs based on traditional remote procedure call (RPC) mechanism still suffer from performance degradation due to the inherent inefficiency of data serialization/deserilization operation. This paper presents VMRPC, a light-weight RPC framework specifically designed for...
The virtualization technology has been developed rapidly with the growth of the hardware supported virtualization technologies and the appearance of the various services. Many researchers are concentrating on developing the virtualization technologies which are recognized as the most significant core technology of the IT applications such as green IT and cloud computing. The major processor companies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.