142,450 research outputs found

    Designing a VM-level vertical scalability service in current cloud platforms: A new hope for wearable computers

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Public clouds are becoming ripe for enterprise adoption. Many companies, including large enterprises, are increasingly relying on public clouds as a substitute for, or a supplement to, their own computing infrastructures. On the other hand, cloud storage service has attracted over 625 million users. However, apart from the storage service, other cloud services, such as the computing service, have not yet attracted the end users’ interest for economic and technical reasons. Cloud service providers offers horizontal scalability to make their services scalable and economical for enterprises while it is still not economical for the individual users to use their computing services due to the lack of vertical scalability. Moreover, current virtualization technologies and operating systems, specifically the guest operating systems installed on virtual machines, do not support the concept of vertical scalability. In addition, network remote access protocols are meant to administer remote machines but they are unable to run the non-administrative tasks such as playing heavy games and watching high quality videos remotely in a way that makes the users feel as if they are sitting locally on their personal machines. On the other hand, the industry is yet unable to make efficient wearable computers a reality due to the limited size of the wearable devices, where it is infeasible to place efficient processors and big enough hard disks. This paper aims to highlight the need for the vertical scalability service and design the appropriate cloud, virtualization layer, and operating system services to incorporate vertical scalability in current cloud platforms in a way that will make it economically and technically efficient for the end users to use cloud virtual machines as if they are using their personal laptops. Through these services, the cloud takes wearable computing to the next stage and makes wearable computers a reality

    PicoGrid: A Web-Based Distributed Computing Framework for Heterogeneous Networks Using Java

    Get PDF
    We propose a framework for distributed computing applications in heterogeneous networks. The system is simple to deploy and can run on any operating systems that support the Java Virtual Machine. Using our developed system, idle computing power in an organization can be harvested for performing computing tasks. Agent computers can enter and leave the computation at any time which makes our system very flexible and easily scalable. Our system also does not affect the normal use of client machines to guarantee satisfactory user experience. System tests show that the system has comparable performance to the theoretical case and the computation time is significantly reduced by utilizing multiple computers on the network

    Flexible virtual machine networking using netmap passthrough

    Get PDF
    The rising interest in Network Function Virtualization (NFV) requires Virtual Machines (VMs) to operate with diversified networking workloads, from traditional, bulk TCP transfers to novel ones featuring extremely high packet rates. In response, researchers have explored and proposed new solutions for high performance VM networking, including optimizations to virtual network adapters (such as VirtIO) to support high speed bulk traffic, and alternative frameworks for userspace networking and physical or virtual passthrough. To date, we are still missing a comprehensive solution that supports such extreme workloads across multiple operating systems and hypervisors, while at the same time addressing other requirements such as ease of configuration, operating system independence, scalability and isolation. In this paper we present ptnet, an approach to network I/O virtualization that provides high performance for both traditional TCP/IP and high packet rate applications. ptnet leverages the features of the netmap framework (including virtualization and passthrough support), and defines a simple yet performant network device model that can be easily supported in different operating systems and hypervisors. We prove the effectiveness of our approach by comparing ptnet's performance with one of the state of the art I/O virtualization solutions, namely VirtIO on Linux and QEÎŒKVM. ptnet is available under a BSD license as part of the netmap distributions on github

    Finding Forensic Evidence In the Operating System\u27s Graphical User Interface

    Get PDF
    A branch of cyber security known as memory forensics focuses on extracting meaningful evidence from system memory. This analysis is often referred to as volatile memory analysis, and is generally performed on memory captures acquired from target systems. Inside of a memory capture is the complete state of a system under investigation, including the contents of currently running as well as previously executed applications. Analysis of this data can reveal a significant amount of activity that occurred on a system since the last reboot. For this research, the Windows operating system is targeted. In particular, the graphical user interface component that includes the taskbar, start menu and notification system will be examined for possible forensic artifacts. The techniques presented in this research are valuable to a forensic investigator trying to find evidence. They are also useful for penetration testers trying to determine if a tool has left any evidence behind for investigators to find. The research described in this thesis led to development of a scanning technique that served as the basis for a Volatility plugin that automates finding GUI related artifacts. To support this research, a lab consisting of three virtual machines (VM) was created using VMware. Two Windows 10 virtual machines were created for generating artifacts and one Linux was created for scanning the Windows machines. These machines were connected to a live router briefly for gathering network information. This these explores the strengths and limitations of this searching discovered during research. Lastly, future applications of this research are covered

    A Performance Comparison between Enlightenment and Emulation in Microsoft Hyper-V

    Get PDF
    Microsoft MS Hyper-V is a native hypervisor that enables platform virtualization on x86-64 systems It is a microkernelized hypervisor where a host operating system provides the drivers for the hardware This approach leverages MS Hyper-V to support enlightenments the Microsoft name for Paravirtualization in addition to the hardware emulation virtualization technique This paper provides a quantitative performance comparison using different tests and scenarios between enlightened and emulated Virtual Machines VMs hosted by MS Hyper-V server 2012 The experimental results show that MS enlightenments improve performance by a factor of more than tw

    Virtual Machines and Networks - Installation, Performance Study, Advantages and Virtualization Options

    Full text link
    The interest in virtualization has been growing rapidly in the IT industry because of inherent benefits like better resource utilization and ease of system manageability. The experimentation and use of virtualization as well as the simultaneous deployment of virtual software are increasingly getting popular and in use by educational institutions for research and teaching. This paper stresses on the potential advantages associated with virtualization and the use of virtual machines for scenarios, which cannot be easily implemented and/or studied in a traditional academic network environment, but need to be explored and experimented by students to meet the raising needs and knowledge-base demanded by the IT industry. In this context, we discuss various aspects of virtualization - starting from the working principle of virtual machines, installation procedure for a virtual guest operating system on a physical host operating system, virtualization options and a performance study measuring the throughput obtained on a network of virtual machines and physical host machines. In addition, the paper extensively evaluates the use of virtual machines and virtual networks in an academic environment and also specifically discusses sample projects on network security, which may not be feasible enough to be conducted in a physical network of personal computers; but could be conducted only using virtual machines
    • 

    corecore