142,450 research outputs found
Designing a VM-level vertical scalability service in current cloud platforms: A new hope for wearable computers
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Public clouds are becoming ripe for enterprise adoption. Many companies, including large enterprises, are increasingly relying on public clouds as a substitute for, or a supplement to, their own computing infrastructures. On the other hand, cloud storage service has attracted over 625 million users. However, apart from the storage service, other cloud services, such as the computing service, have not yet attracted the end usersâ interest for economic and technical reasons. Cloud service providers offers horizontal scalability to make their services scalable and economical for enterprises while it is still not economical for the individual users to use their computing services due to the lack of vertical scalability. Moreover, current virtualization technologies and operating systems, specifically the guest operating systems installed on virtual machines, do not support the concept of vertical scalability. In addition, network remote access protocols are meant to administer remote machines but they are unable to run the non-administrative tasks such as playing heavy games and watching high quality videos remotely in a way that makes the users feel as if they are sitting locally on their personal machines. On the other hand, the industry is yet unable to make efficient wearable computers a reality due to the limited size of the wearable devices, where it is infeasible to place efficient processors and big enough hard disks. This paper aims to highlight the need for the vertical scalability service and design the appropriate cloud, virtualization layer, and operating system services to incorporate vertical scalability in current cloud platforms in a way that will make it economically and technically efficient for the end users to use cloud virtual machines as if they are using their personal laptops. Through these services, the cloud takes wearable computing to the next stage and makes wearable computers a reality
PicoGrid: A Web-Based Distributed Computing Framework for Heterogeneous Networks Using Java
We propose a framework for distributed computing applications in heterogeneous networks. The system is simple to deploy and can run on any operating systems that support the Java Virtual Machine. Using our developed system, idle computing power in an organization can be harvested for performing computing tasks. Agent computers can enter and leave the computation at any time which makes our system very flexible and easily scalable. Our system also does not affect the normal use of client machines to guarantee satisfactory user experience. System tests show that the system has comparable performance to the theoretical case and the computation time is significantly reduced by utilizing multiple computers on the network
Flexible virtual machine networking using netmap passthrough
The rising interest in Network Function Virtualization (NFV) requires Virtual Machines (VMs) to operate with diversified networking workloads, from traditional, bulk TCP transfers to novel ones featuring extremely high packet rates. In response, researchers have explored and proposed new solutions for high performance VM networking, including optimizations to virtual network adapters (such as VirtIO) to support high speed bulk traffic, and alternative frameworks for userspace networking and physical or virtual passthrough. To date, we are still missing a comprehensive solution that supports such extreme workloads across multiple operating systems and hypervisors, while at the same time addressing other requirements such as ease of configuration, operating system independence, scalability and isolation. In this paper we present ptnet, an approach to network I/O virtualization that provides high performance for both traditional TCP/IP and high packet rate applications. ptnet leverages the features of the netmap framework (including virtualization and passthrough support), and defines a simple yet performant network device model that can be easily supported in different operating systems and hypervisors. We prove the effectiveness of our approach by comparing ptnet's performance with one of the state of the art I/O virtualization solutions, namely VirtIO on Linux and QEÎŒKVM. ptnet is available under a BSD license as part of the netmap distributions on github
Finding Forensic Evidence In the Operating System\u27s Graphical User Interface
A branch of cyber security known as memory forensics focuses on extracting meaningful evidence from system memory. This analysis is often referred to as volatile memory analysis, and is generally performed on memory captures acquired from target systems. Inside of a memory capture is the complete state of a system under investigation, including the contents of currently running as well as previously executed applications. Analysis of this data can reveal a significant amount of activity that occurred on a system since the last reboot. For this research, the Windows operating system is targeted. In particular, the graphical user interface component that includes the taskbar, start menu and notification system will be examined for possible forensic artifacts. The techniques presented in this research are valuable to a forensic investigator trying to find evidence. They are also useful for penetration testers trying to determine if a tool has left any evidence behind for investigators to find.
The research described in this thesis led to development of a scanning technique that served as the basis for a Volatility plugin that automates finding GUI related artifacts. To support this research, a lab consisting of three virtual machines (VM) was created using VMware. Two Windows 10 virtual machines were created for generating artifacts and one Linux was created for scanning the Windows machines. These machines were connected to a live router briefly for gathering network information.
This these explores the strengths and limitations of this searching discovered during research. Lastly, future applications of this research are covered
A Performance Comparison between Enlightenment and Emulation in Microsoft Hyper-V
Microsoft MS Hyper-V is a native hypervisor that enables platform virtualization on x86-64 systems It is a microkernelized hypervisor where a host operating system provides the drivers for the hardware This approach leverages MS Hyper-V to support enlightenments the Microsoft name for Paravirtualization in addition to the hardware emulation virtualization technique This paper provides a quantitative performance comparison using different tests and scenarios between enlightened and emulated Virtual Machines VMs hosted by MS Hyper-V server 2012 The experimental results show that MS enlightenments improve performance by a factor of more than tw
Recommended from our members
The assessment of benchmarks executed on bare-metal and using para-virtualization
A
full
assessment
of
para-Âvirtualization
is
important,
because
without
knowledge
about
the
various
overheads,
users
can
not
understand
whether
using
virtualization
is
a
good
idea
or
not.
In
this
paper
we
are
very
interested
in
assessing
the
overheads
of
running
various
benchmarks
on
bare-Ââmetal,
as
well
as
on
para-Ââvirtualization.
The
idea
is
to
see
what
the
overheads
of
para-Ââ
virtualization
are,
as
well
as
looking
at
the
overheads
of
turning
on
monitoring
and
logging.
The
knowledge
from
assessing
various
benchmarks
on
these
different
systems
will
help
a
range
of
users
understand
the
use
of
virtualization
systems.
In
this
paper
we
assess
the
overheads
of
using
Xen,
VMware,
KVM
and
Citrix,
see
Table
1.
These
different
virtualization
systems
are
used
extensively
by
cloud-Ââusers.
We
are
using
various
Netlib1
benchmarks,
which
have
been
developed
by
the
University
of
Tennessee
at
Knoxville
(UTK),
and
Oak
Ridge
National
Laboratory
(ORNL).
In
order
to
assess
these
virtualization
systems,
we
run
the
benchmarks
on
bare-Ââmetal,
then
on
the
para-Ââvirtualization,
and
finally
we
turn
on
monitoring
and
logging.
The
later
is
important
as
users
are
interested
in
Service
Level
Agreements
(SLAs)
used
by
the
Cloud
providers,
and
the
use
of
logging
is
a
means
of
assessing
the
services
bought
and
used
from
commercial
providers.
In
this
paper
we
assess
the
virtualization
systems
on
three
different
systems.
We
use
the
Thamesblue
supercomputer,
the
Hactar
cluster
and
IBM
JS20
blade
server
(see
Table
2),
which
are
all
servers
available
at
the
University
of
Reading.
A
functional
virtualization
system
is
multi-Ââlayered
and
is
driven
by
the
privileged
components.
Virtualization
systems
can
host
multiple
guest
operating
systems,
which
run
on
its
own
domain,
and
the
system
schedules
virtual
CPUs
and
memory
within
each
Virtual
Machines
(VM)
to
make
the
best
use
of
the
available
resources.
The
guest-Ââoperating
system
schedules
each
application
accordingly.
You
can
deploy
virtualization
as
full
virtualization
or
para-Ââvirtualization.
Full
virtualization
provides
a
total
abstraction
of
the
underlying
physical
system
and
creates
a
new
virtual
system,
where
the
guest
operating
systems
can
run.
No
modifications
are
needed
in
the
guest
OS
or
application,
e.g.
the
guest
OS
or
application
is
not
aware
of
the
virtualized
environment
and
runs
normally.
Para-Ââvirualization
requires
user
modification
of
the
guest
operating
systems,
which
runs
on
the
virtual
machines,
e.g.
these
guest
operating
systems
are
aware
that
they
are
running
on
a
virtual
machine,
and
provide
near-Âânative
performance.
You
can
deploy
both
para-Ââvirtualization
and
full
virtualization
across
various
virtualized
systems.
Para-Ââvirtualization
is
an
OS-Ââassisted
virtualization;
where
some
modifications
are
made
in
the
guest
operating
system
to
enable
better
performance.
In
this
kind
of
virtualization,
the
guest
operating
system
is
aware
of
the
fact
that
it
is
running
on
the
virtualized
hardware
and
not
on
the
bare
hardware.
In
para-Ââvirtualization,
the
device
drivers
in
the
guest
operating
system
coordinate
the
device
drivers
of
host
operating
system
and
reduce
the
performance
overheads.
The
use
of
para-Ââvirtualization
[0]
is
intended
to
avoid
the
bottleneck
associated
with
slow
hardware
interrupts
that
exist
when
full
virtualization
is
employed.
It
has
revealed
[0]
that
para-Ââ
virtualization
does
not
impose
significant
performance
overhead
in
high
performance
computing,
and
this
in
turn
this
has
implications
for
the
use
of
cloud
computing
for
hosting
HPC
applications.
The
âapparentâ
improvement
in
virtualization
has
led
us
to
formulate
the
hypothesis
that
certain
classes
of
HPC
applications
should
be
able
to
execute
in
a
cloud
environment,
with
minimal
performance
degradation.
In
order
to
support
this
hypothesis,
first
it
is
necessary
to
define
exactly
what
is
meant
by
a
âclassâ
of
application,
and
secondly
it
will
be
necessary
to
observe
application
performance,
both
within
a
virtual
machine
and
when
executing
on
bare
hardware.
A
further
potential
complication
is
associated
with
the
need
for
Cloud
service
providers
to
support
Service
Level
Agreements
(SLA),
so
that
system
utilisation
can
be
audited
Virtual Machines and Networks - Installation, Performance Study, Advantages and Virtualization Options
The interest in virtualization has been growing rapidly in the IT industry
because of inherent benefits like better resource utilization and ease of
system manageability. The experimentation and use of virtualization as well as
the simultaneous deployment of virtual software are increasingly getting
popular and in use by educational institutions for research and teaching. This
paper stresses on the potential advantages associated with virtualization and
the use of virtual machines for scenarios, which cannot be easily implemented
and/or studied in a traditional academic network environment, but need to be
explored and experimented by students to meet the raising needs and
knowledge-base demanded by the IT industry. In this context, we discuss various
aspects of virtualization - starting from the working principle of virtual
machines, installation procedure for a virtual guest operating system on a
physical host operating system, virtualization options and a performance study
measuring the throughput obtained on a network of virtual machines and physical
host machines. In addition, the paper extensively evaluates the use of virtual
machines and virtual networks in an academic environment and also specifically
discusses sample projects on network security, which may not be feasible enough
to be conducted in a physical network of personal computers; but could be
conducted only using virtual machines
- âŠ