The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Heterogeneous memory management combined with server virtualization in datacenters is expected to increase the software and OS management complexity. State-of-the-art solutions rely exclusively on the hypervisor (VMM) for expensive page hotness tracking and migrations, limiting the benefits from heterogeneity. To address this, we design HeteroOS, a novel application-transparent OS-level solution for...
Network Functions Virtualization allows Communication Service Providers to extend their traditional service portfolio to new models of service offerings, such as Virtualized Network Functions as a Service (VNFaaS), in which network functions can be traded following the “on-demand” Cloud paradigm. Incremental deployment and interoperability with legacy infrastructure, in particular Wide Area Network...
Since the demand for more bandwidth, agile infrastructures and services grows, it becomes challenging for Service Providers like GEANT to manage the proprietary underlay, while keeping costs low. In such a scenario, Software Defined Networking (SDN), open hardware and open source software prove to be key components to address those challenges. After one year of development, SDX-L2 and BoD, the SDN-ization...
One of the considerable use cases for network functions virtualization (NFV) is the IP multimedia subsystem (IMS). With the emergence of software defined network (SDN) and NFV, the mobile network operators (MNOs) that are deploying the IMS look to make a gain from these leading technologies to mitigate hardware costs and reduce time to market. With the use especially of the NFV approach, the MNO looks...
Virtualization has been widely used as a key technology in cloud computing. Although facilitating the deployment of applications, virtualization introduces huge processing overheads, among which is network I/O virtualization that has become a critical bottleneck of a virtual system. DPDK-vhost is currently the fastest para-virtualized network I/O backend, however it performs poorly when exchanging...
Virtualization is the creation of components, such as hardware platform, operating system, storage, processing power, memory, or network resource, in virtual environments. The applications of virtualization are spreading rapidly and the critical systems are working on virtualization infrastructures. However; the effects of security vulnerabilities which may occur can also be high. In this study, security...
To meet the deadlines of interactive applications, congestion-agnostic transport protocols like UDP are increasingly used side-by-side with congestion-responsive TCP. As bandwidth is not totally virtualized in data centers, service outage may occur (for some applications) when such diverse traffics contend for the small buffers in the switches. In this paper we present SDN-GCC, a simple and practical...
Cloud computing is revolutionizing how organizations treat computing resources. The privileged virtual machine is a key component in systems that use virtualization, but poses a dependability risk for several reasons. The activation of residual software faults that exist in every software project is a real threat and can impact the correct operation of the entire virtualized system. To study this...
Virtualization technology is well established in the server and desktop spaces, and has been spreading across embedded system market. This technology allows for the coexistence and execution of multiples operating systems on top of the same hardware platform, with proven technological and economic benefits. Hardware extensions for easing virtualization have been added into several commercial off-the-shelf...
In today's cloud centred business environment, security of cloud solutions is a critical issue. Since virtualization is the foundational element of cloud computing and helps to achieve the benefits of cloud computing, security from virtualization becomes a major goal for the cloud based systems. Virtualization aims to create virtual versions of resources such as processors, memory, storage, network...
Fog and edge computing leverage resources of end users and edge devices rather than centralized clouds. Isolation is a core security challenge for such paradigms: just like traditional clouds, fog and edge infrastructures are based on virtualization to share physical resources among several self-contained execution environments like virtual machines and containers. Yet, isolation may be threatened...
While large-scale simulations have been the hallmark of the High Performance Computing (HPC) community for decades, Large Scale Data Analytics (LSDA) workloads are gaining attention within the scientific community not only as a processing component to large HPC simulations, but also as standalone scientific tools for knowledge discovery. With the path towards Exascale, new HPC runtime systems are...
Nowadays, Graphics Processing Unit (GPU) is essential for general-purpose high-performance computing, because of its dominant performance in parallel computing compare to that of CPU. There have been many successful trials on the use of GPU in virtualized environment. Especially, NVIDIA Docker obtained a most practical way to bring GPU into the container-based virtualized environment. However, most...
FPGA-based accelerators are becoming first class citizens in data centers. Adding FPGAs in data centers can lead to higher compute densities with improved energy efficiency for latency critical workloads, such as financial applications. However FPGA deployment in datacenters brings difficulties both to application developers, and cloud providers. Application writers need to deal with the interfacing...
In the last years an increasing number of attacks targeting energy consumption in computing systems have been designed and deployed. In this paper we propose a methodology that can be used to limit the effect of all types of power attacks by using the isolation properties guaranteed by virtualization systems. We describe the idea underlying our approach and we present the power consumption measurements...
Current cloud deployment scenarios imply a need for fast testing of user oriented software in diverse, heterogeneous and often unknown hardware and network environments, making it difficult to ensure optimal or reproducible in-site testing. The current paper proposes the use of container based lightweight virtualization with a ready-to-run, just-intime deployment strategy in order to minimize time...
Attacks on memory, revealing secrets, for example, via DMA or cold boot, are a long known problem. In this paper, we present TransCrypt, a concept for transparent and guest-agnostic, dynamic kernel and user main memory encryption using a custom minimal hypervisor. The concept utilizes the address translation features provided by hardware-based virtualization support of modern CPUs to restrict the...
Power consumption and high compute density are the key factors to be considered when building a compute node for the upcoming Exascale revolution. Current architectural design and manufacturing technologies are not able to provide the requested level of density and power efficiency to realise an operational Exascale machine. A disruptive change in the hardware design and integration process is needed...
The integration of Internet of Things (IoT) and Cloud computing has brought the rising of IoT Clouds able to provide different kinds of IoT as a Service solutions consisting of various micro-services deployed in IoT devices (including sensors and actuators) interacting with different Infrastructure, Platform, and Software as Service (i.e., IaaS, PaaS, SaaS) running in the Clouds' data centres. On...
The MIL-STD-1553B standard specifies a bidirectional data bus that has been used in defense and aerospace industry in a vast number of systems. However, its use for simulation and development environments might lead to unnecessary restriction on the design and usability due to the high cost incurred for hardware and harness procurement. Since Ethernet networks are nowadays extensible present in simulation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.