184,242 research outputs found

    Micro-CernVM: Slashing the Cost of Building and Deploying Virtual Machines

    Full text link
    The traditional virtual machine building and and deployment process is centered around the virtual machine hard disk image. The packages comprising the VM operating system are carefully selected, hard disk images are built for a variety of different hypervisors, and images have to be distributed and decompressed in order to instantiate a virtual machine. Within the HEP community, the CernVM File System has been established in order to decouple the distribution from the experiment software from the building and distribution of the VM hard disk images. We show how to get rid of such pre-built hard disk images altogether. Due to the high requirements on POSIX compliance imposed by HEP application software, CernVM-FS can also be used to host and boot a Linux operating system. This allows the use of a tiny bootable CD image that comprises only a Linux kernel while the rest of the operating system is provided on demand by CernVM-FS. This approach speeds up the initial instantiation time and reduces virtual machine image sizes by an order of magnitude. Furthermore, security updates can be distributed instantaneously through CernVM-FS. By leveraging the fact that CernVM-FS is a versioning file system, a historic analysis environment can be easily re-spawned by selecting the corresponding CernVM-FS file system snapshot.Comment: Conference paper at the 2013 Computing in High Energy Physics (CHEP) Conference, Amsterda

    Evaluation and design of function for tracing diffusion of classified information for file operations with KVM

    Get PDF
    Cases of classified information leakage have become increasingly common. To address this problem, we have developed a function for tracing the diffusion of classified information within an operating system. However, this function suffers from the following two problems: first, in order to introduce the function, the operating system's source code must be modified. Second, there is a risk that the function will be disabled when the operating system is attacked. Thus, we have designed a function for tracing the diffusion of classified information in a guest operating system by using a virtual machine monitor. By using a virtual machine monitor, we can introduce the proposed function in various environments without modifying the operating system's source code. In addition, attacks aimed at the proposed function are made more difficult, because the virtual machine monitor is isolated from the operating system. In this paper, we describe the implementation of the proposed function for file operations and child process creation in the guest operating system with a kernel-based virtual machine. Further, we demonstrate the traceability of diffusing classified information by file operations and child process creation. We also report the logical lines of code required to introduce the proposed function and performance overheads

    Virtual horizontal machining center LOLA HBG 80 for program verification and monitoring

    Get PDF
    Ovaj rad opisuje konfigurisanje virtuelnog horizontalnog obradnog centra LOLA HBG80 u okviru sistema za programiranje i verifikaciju, kao i u okviru sistema otvorene arhitekture upravljanja. Horizontalni obradni centar LOLA HBG 80 podržan je ekvivalentnom virtuelnom mašinom u CAD/CAM okruženju (PTC Creo i Catia), STEP-NC mašinskom okruženju, kao i u upravljačkom sistemu. Virtuelna simulacija je od suštinske važnosti za obradu, a razvijene virtuelne mašine koriste se za verifikaciju programa i monitoring procesa obrade. Virtuelna mašina u sistemu za programiranje omogućava verifikaciju programa pre slanja na stvarnu mašinu i može da uključuje verifikaciju putanje alata (CLF-Cutter Location File) i verifikaciju G-koda. U radu se takođe govori o mogućnosti primene novog metoda programiranja poznatog kao STEP-NC i pripremi odgovarajućeg okruženja koje uključuje virtuelnu mašinu. Virtuelna mašina u sistemu upravljanja predstavlja poslednji nivo za konačnu verifikaciju programa, kao i sistem za nadzor procesa.This paper describes configuring the virtual horizontal machining center LOLA HBG80 within the programming and verification system and the open architecture control system. The horizontal machining center LOLA HBG 80 is represented by an equivalent virtual machine in a CAD/CAM environment (PTC Creo and Catia), STEP-NC Machine environment, and the control system. Virtual simulation is essential for machining, and the developed virtual machines are used for program verification and monitoring of the machining process. The virtual machine in the programming system allows the verification of the program before sending it to the real machine and includes verification of the tool path (CLF-Cutter Location File) and G-code. The paper also discusses the possibility of applying a new programming method known as STEP-NC and preparing an adequate environment that includes a virtual machine. The virtual machine in the control system represents the last level for the final program verification and the process monitoring system

    ANALISA PERFORMA SISTEM BERKAS EXT4 PADA KONDISI TERVIRTUALISASI

    Get PDF
    ABSTRAKBeragamnya sistem berkas yang diciptakan serta digunakan oleh komputer dan sistem operasi maka jurnal ini dibuat untuk mempelajari lebih dalam salah satu sistem berkas yaitu ext4 dalam hal performanya untuk melakukan serangkaian tugas dari sebuah sistem berkas dengan menggunakan program tolak ukur khusus unix pada kondisi tervisualisasi dalam mesin virtualKata Kunci--- Ext4, Virtualisasi, Performa, Mesin Virtual, Sistem BerkasABSTRACK Various file system that created and used by computer and operating system, so this journal is written for in depth learning about one of the file system called ext4 on how they complete various task of file system using a benchmarking program for unix in virtualized condition in virtual machine.Keyword--- Ext4, Virtualization, Performance, Vitual Machine, File Syste

    Virtual horizontal machining center LOLA HBG 80 for program verification and monitoring

    Get PDF
    Ovaj rad opisuje konfigurisanje virtuelnog horizontalnog obradnog centra LOLA HBG80 u okviru sistema za programiranje i verifikaciju, kao i u okviru sistema otvorene arhitekture upravljanja. Horizontalni obradni centar LOLA HBG 80 podržan je ekvivalentnom virtuelnom mašinom u CAD/CAM okruženju (PTC Creo i Catia), STEP-NC mašinskom okruženju, kao i u upravljačkom sistemu. Virtuelna simulacija je od suštinske važnosti za obradu, a razvijene virtuelne mašine koriste se za verifikaciju programa i monitoring procesa obrade. Virtuelna mašina u sistemu za programiranje omogućava verifikaciju programa pre slanja na stvarnu mašinu i može da uključuje verifikaciju putanje alata (CLF-Cutter Location File) i verifikaciju G-koda. U radu se takođe govori o mogućnosti primene novog metoda programiranja poznatog kao STEP-NC i pripremi odgovarajućeg okruženja koje uključuje virtuelnu mašinu. Virtuelna mašina u sistemu upravljanja predstavlja poslednji nivo za konačnu verifikaciju programa, kao i sistem za nadzor procesa.This paper describes configuring the virtual horizontal machining center LOLA HBG80 within the programming and verification system and the open architecture control system. The horizontal machining center LOLA HBG 80 is represented by an equivalent virtual machine in a CAD/CAM environment (PTC Creo and Catia), STEP-NC Machine environment, and the control system. Virtual simulation is essential for machining, and the developed virtual machines are used for program verification and monitoring of the machining process. The virtual machine in the programming system allows the verification of the program before sending it to the real machine and includes verification of the tool path (CLF-Cutter Location File) and G-code. The paper also discusses the possibility of applying a new programming method known as STEP-NC and preparing an adequate environment that includes a virtual machine. The virtual machine in the control system represents the last level for the final program verification and the process monitoring system

    Naked Object File System (NOFS): A Framework to Expose an Object-Oriented Domain Model as a File System

    Get PDF
    We present Naked Objects File System (NOFS), a novel framework that allows a developer to expose a domain model as a file system by leveraging the Naked Objects design principle. NOFS allows a developer to construct a file system without having to understand or implement all details related to normal file systems development. In this paper we explore file systems frameworks and object-oriented frameworks in a historical context and present an example domain model using the framework. This paper is based on a fully-functional implementation that is distributed as free/open source software, including virtual machine images to demonstrate and study the referenced example file systems

    Using a virtual machine to protect sensitive Grid resources

    Full text link
    Most Grid systems rely on their operating systems (OSs) to protect their sensitive files and networks. Unfortunately, modern OSs are very complex and it is difficult to completely avoid intrusions. Once intruders compromise the OS and gain system privilege, they can easily disable or bypass the OS security protections. This paper proposes a secure virtual Grid system, SVGrid, to protect sensitive system resources. SVGrid works by isolating Grid applications in Grid virtual machines. The Grid virtual machines' filesystem and network services are moved into a dedicated monitor virtual machine. All file and network accesses are forced to go through this monitor virtual machine, where SVGrid checks request parameters and only accepts the requests that comply with security rules. Because SVGrid enforces security policy in the isolated monitor virtual machine, it can continue to protect sensitive files and networks even if a Grid virtual machine is compromised. We tested SVGrid against attacks on Grid virtual machines. SVGrid was able to prevent all of them from accessing files and networks maliciously. We also evaluated the performance of SVGrid and found that performance cost was reasonable considering the security benefits of SVGrid. Furthermore, the experimental results show that the virtual remote procedure call mechanism proposed in this paper significantly improves system performance. Copyright © 2006 John Wiley & Sons, Ltd.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/56163/1/1134_ftp.pd
    corecore