The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Middleboxes (MBs) are ubiquitous in modern data centre (DC) due to their crucial role in implementing network security, management and optimisation. In order to meet network policy's requirement on correct traversal of an ordered sequence of MBs, network administrators rely on static policy based routing or VLAN stitching to steer traffic flows. However, dynamic virtual server migration in virtual...
Users of computer systems wish to keep their personal data safe, updated, fair and accessible by other terminals, like personal computers, smart phones, portable consoles and PDAs. To perform these activities, one technology has become popular in our daily lives: data synchronization. Companies that provide this kind of service must do it with the greatest availability possible since their clients...
In this paper, we address the problem of prolonged latency periods for user log-in and log-off in User Virtualization using Virtual Pooled Desktops. These latency periods are caused due to large chunks of User Profile data transferred over the network in order to achieve User Virtualization. Thus we require efficient and quick ‘synchronization’ of data from the client to the server. Data transfer...
With the prevalence of virtualization technology, virtual machine networks (VMN) have been widely used in host network applications. To provide fault tolerance and non-stop features to network applications and preserve the network consistency among virtual machines (VM), the distributed snapshot technique of virtual machine networks regains the attention of academia. While existing approaches still...
Virtualization is one of the main technologies currently used to deploy computing systems due to the high reliability and rapid crash recovery it offers in comparison to physical nodes. These features are mainly achieved by continuously producing snapshots of the status of running virtual machines. In earlier works, the snapshot of each individual VM is performed independently, ignoring the memory...
Virtualization has significantly improved hardware utilization, thus, allowing IT service providers to offer a wide range of application, platform and infrastructure solutions through low-cost, commoditized hardware. In this paper we focus on one such layer: storage virtualization, which enables a host system to map a guest VM''s file system to almost any storage media. A file system maintains track...
Memory failures are common in clusters, and their destructive effects (e.g., increasing downtime and losing data) make users suffer great loss. Current memory availability strategies mostly require extra expensive hardware. Software approaches based on check pointing technologies intend to reduce the expense, but their high overhead limits the practical usage. In this paper, we present a novel system...
Multiprocessor operating systems (OSs) pose several unique and conflicting challenges to System Virtual Machines (System VMs). For example, most existing system VMs resort to gang scheduling a guest OS's virtual processors (VCPUs) to avoid OS synchronization overhead. However, gang scheduling is infeasible for some application domains, and is inflexible in other domains. In an overcommitted environment,...
Host identification, today, can be done at many layers of the network protocol stack depending on the identifiable parameter used for classification. But, these generally include fields from TCP/IP/MAC packets; that can be spoofed or manipulated very easily to misguide the identification process or include intolerable error into. Identification on wireless networks can be done with better precision...
This paper describes an extension of the Consensus Service proposed by Guerraoui and Schiper. The objective is to provide a standard way to implement agreement protocols resilient to Byzantine faults using an intrusion tolerant service built upon virtual machines technology. This is achieved through the implementation of a Generic Consensus Service (GCS). GCS separates specificities of different agreement...
With the number of applications running upon the virtualized system increased, the virtual network circumstance becomes more and more complicated; the consequent security problems thereby have been a concern for industrial and academic fields. However, the current solutions are mostly confined to the enforcement of several patchy-works on system which still requires proficient hacking skills for administrators...
As multi-core processors become increasingly mainstream, architects have likewise become more interested in how best to make use of the computing capacity of the CPU, for instance, through multiple simultaneous threads or processes of execution with OpenMP or MPI. At the same time, the increasingly mature and prevailing virtualization technique in server consolidation and HPC promotes the emergence...
Virtual clusters are the new ways for managing the computing resources in the cluster environment. Users are presented with virtual clusters instead of physical ones. The storage system for supporting the running clusters is critical in such systems for efficient store of virtual machine images. We have used the CAS (Content Addressable Storage) based storage for manage the large number of virtual...
Traditional desktop delivery model is based on a large number of distributed PCs executing operating system and desktop applications. Managing traditional desktop environments is incredibly challenging and costly. Tasks like installations, configuration changes, security measures require time-consuming procedures and dedicated deskside support. Also these distributed desktops are typically underutilized,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.