You searched for subject:(Virtualization)
.
Showing records 1 – 30 of
677 total matches.
◁ [1] [2] [3] [4] [5] … [23] ▶

Rice University
1.
Gibson, Riley.
Improving Fairness in I/O Scheduling for Virtualized Environments.
Degree: MS, Engineering, 2017, Rice University
URL: http://hdl.handle.net/1911/105516
► Modern virtualization systems must balance fair access to I/O resources while still maintaining high utilization of those resources. It is difficult to balance fairness and…
(more)
▼ Modern
virtualization systems must balance fair access to I/O resources while still maintaining high utilization of those resources. It is difficult to balance fairness and efficiency when scheduling disk accesses due to the non-uniform nature of disk I/O. Current open source
virtualization systems, including Xen and KVM, utilize the stock Linux disk scheduler to provide access to storage. Although the Linux disk scheduler can provide good I/O performance for individual virtual machines, it does not necessarily provide equal access to disk I/O resources across competing virtual machines. This can result in unfair and unpredictable application I/O performance behavior among virtual machines.
This thesis presents the Virtual Deadline I/O Scheduler, a new disk scheduler that improves the fairness of scheduling I/O resources across virtual machines. The virtual deadline scheduler makes the Linux deadline I/O scheduler
virtualization-aware, enabling it to schedule I/O requests more adaptively and fairly. In particular, request deadlines are dynamically determined based upon the level of service that has been provided to the vir- tual machine from which the request originated. The virtual deadline scheduler increases fairness of I/O performance while minimizing aggregate performance degradation.
Advisors/Committee Members: Rixner, Scott (advisor).
Subjects/Keywords: virtualization
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Gibson, R. (2017). Improving Fairness in I/O Scheduling for Virtualized Environments. (Masters Thesis). Rice University. Retrieved from http://hdl.handle.net/1911/105516
Chicago Manual of Style (16th Edition):
Gibson, Riley. “Improving Fairness in I/O Scheduling for Virtualized Environments.” 2017. Masters Thesis, Rice University. Accessed March 02, 2021.
http://hdl.handle.net/1911/105516.
MLA Handbook (7th Edition):
Gibson, Riley. “Improving Fairness in I/O Scheduling for Virtualized Environments.” 2017. Web. 02 Mar 2021.
Vancouver:
Gibson R. Improving Fairness in I/O Scheduling for Virtualized Environments. [Internet] [Masters thesis]. Rice University; 2017. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/1911/105516.
Council of Science Editors:
Gibson R. Improving Fairness in I/O Scheduling for Virtualized Environments. [Masters Thesis]. Rice University; 2017. Available from: http://hdl.handle.net/1911/105516

University of Debrecen
2.
Gurgez, Pinar.
Server Virtualization
.
Degree: DE – Informatikai Kar, University of Debrecen
URL: http://hdl.handle.net/2437/245388
► Server virtualization is the partitioning of a physical server into smaller virtual servers to maximize your server resources. In server virtualization, the resources of the…
(more)
▼ Server
virtualization is the partitioning of a physical server into smaller virtual servers to maximize your server resources. In server
virtualization, the resources of the server itself are hidden, or masked from users and the software is used to divide the physical server into multiple virtual environments, called virtual or private servers. This is in contrast to dedicate one server to a single application or task. This technology brings positive transformations such as reduced hardware costs, improved server provisioning and deployment, better disaster recovery solutions, efficient and economic use of energy, and increased staff productivity to companies that adopt it.
Industry will continue to adopt
virtualization for many reasons: collections of inefficient servers can be replaced with fewer machines; software can be tested while isolated in harmless virtual partitions; and data centers can gracefully (and virtually) conform to shifting work models, new technologies and changing corporate priorities.
The future of enterprise IT management will be based on virtual computing.
Advisors/Committee Members: Adamkó, Attila (advisor).
Subjects/Keywords: Virtualization
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Gurgez, P. (n.d.). Server Virtualization
. (Thesis). University of Debrecen. Retrieved from http://hdl.handle.net/2437/245388
Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Gurgez, Pinar. “Server Virtualization
.” Thesis, University of Debrecen. Accessed March 02, 2021.
http://hdl.handle.net/2437/245388.
Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Gurgez, Pinar. “Server Virtualization
.” Web. 02 Mar 2021.
Note: this citation may be lacking information needed for this citation format:
No year of publication.
Vancouver:
Gurgez P. Server Virtualization
. [Internet] [Thesis]. University of Debrecen; [cited 2021 Mar 02].
Available from: http://hdl.handle.net/2437/245388.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.
Council of Science Editors:
Gurgez P. Server Virtualization
. [Thesis]. University of Debrecen; Available from: http://hdl.handle.net/2437/245388
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

NSYSU
3.
Chen, Wei-Min.
An Overview of Virtualization Technologies for Cloud Computing.
Degree: Master, Computer Science and Engineering, 2012, NSYSU
URL: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0907112-213746
► Cloud computing is a new concept that incorporates many existing technologies, such as virtualization. Virtualization is important for the establishment of cloud computing. With virtualization,…
(more)
▼ Cloud computing is a new concept that incorporates many existing technologies, such as
virtualization.
Virtualization is important for the establishment of cloud computing. With
virtualization, cloud computing can virtualize the hardware resources into a huge resource pool for users to utilize. This thesis begins with an introduction to how a widely used service model classifies cloud computing into three layers. From the bottom up, they are IaaS, PaaS, and SaaS. Some service provides are taken as examples for each service model, such as Amazon
Beanstalk and Google App Engine for PaaS; Amazon CloudFormation and Microsoft mCloud for IaaS. Next, we turn our discussion to the hypervisors and the technologies for virtualizing hardware resources, such as CPUs, memory, and devices. Then, storage and network
virtualization techniques are discussed. Finally, the conclusions and the future directions of
virtualization are drawn.
Advisors/Committee Members: Shiann-Rong Kuang (chair), Ming-Chao Chiang (committee member), Chun-Wei Tsai (chair), Chu-Sing Yang (chair).
Subjects/Keywords: virtualization; Cloud computing
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Chen, W. (2012). An Overview of Virtualization Technologies for Cloud Computing. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0907112-213746
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Chen, Wei-Min. “An Overview of Virtualization Technologies for Cloud Computing.” 2012. Thesis, NSYSU. Accessed March 02, 2021.
http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0907112-213746.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Chen, Wei-Min. “An Overview of Virtualization Technologies for Cloud Computing.” 2012. Web. 02 Mar 2021.
Vancouver:
Chen W. An Overview of Virtualization Technologies for Cloud Computing. [Internet] [Thesis]. NSYSU; 2012. [cited 2021 Mar 02].
Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0907112-213746.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Chen W. An Overview of Virtualization Technologies for Cloud Computing. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0907112-213746
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

AUT University
4.
Aghel Masjedi, Amir.
A study on the performance of virtualization programs
.
Degree: 2013, AUT University
URL: http://hdl.handle.net/10292/5323
► Virtualization has become a very popular research topic in recent years. Virtualization is used in varied applications such as e-Learning, business-to-business communication, social networking, computer…
(more)
▼ Virtualization has become a very popular research topic in recent years.
Virtualization is used in varied applications such as e-Learning, business-to-business communication, social networking, computer simulation and enterprise development. These advances are due to the availability of high-speed computers, fiber-optic-enabled internet connections and advanced
virtualization programs. However, only a very small amount of research has been conducted, most especially on the performance of
virtualization programs. Thus little is known about the performance of the various
virtualization programs such as VMware Workstation and VirtualBox. When dealing with
virtualization, performance is of primary importance. This thesis reports on the performance of different
virtualization programs, such as VMware Workstation 7 and Oracle VM VirtualBox 4 using MS Windows 7 guest-and host-operating systems. The chosen research methodology for this research is a mixed research methodology based on both qualitative and quantitative. A mixed research methodology allows the researcher to easily collect primary data via qualitative methods and then analyze the data using quantitative methods. The main purpose of this study is to find any performance differences in between VMware Workstation and VirtualBox based on Windows 7 guest and host OSs. Various experiments were conducted regarding the performance of VMware Workstation, VirtualBox and Microsoft Windows Virtual PC using Windows 7 and Linux Mint guest OSs and Windows 7 host OS. Findings of the experiments revealed that there are performance differences among VMware Workstation, VirtualBox and Virtual PC. In
virtualization, it is generally thought that VMware Workstation is superior to other
virtualization programs. However empirical results obtained from this study show that the performance of VMware Workstation and VirtualBox are similar. VMware Workstation has many features but its performance is not very different from VirtualBox. Virtual PC on the other hand is not a reliable product for serious
virtualization as it lacks features, performance and support for different host and guest OSs. The overall findings of this study show that VMware Workstation and VirtualBox both meet performance and feature requirements for creating reliable virtual environments. This study opens a new path for research in the area related to performance of
virtualization programs. Data gathered from this study was used to make meaningful conclusions in Chapter 6. The conclusion explores possible directions for future research on the performance of
virtualization programs. Findings of this study may help businesses to select appropriate
virtualization program as part of their information technology infrastructure and thereby benefit from using
virtualization technology.
Advisors/Committee Members: Sarkar, Nurul (advisor).
Subjects/Keywords: Performance;
Virtualization programs
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Aghel Masjedi, A. (2013). A study on the performance of virtualization programs
. (Thesis). AUT University. Retrieved from http://hdl.handle.net/10292/5323
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Aghel Masjedi, Amir. “A study on the performance of virtualization programs
.” 2013. Thesis, AUT University. Accessed March 02, 2021.
http://hdl.handle.net/10292/5323.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Aghel Masjedi, Amir. “A study on the performance of virtualization programs
.” 2013. Web. 02 Mar 2021.
Vancouver:
Aghel Masjedi A. A study on the performance of virtualization programs
. [Internet] [Thesis]. AUT University; 2013. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10292/5323.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Aghel Masjedi A. A study on the performance of virtualization programs
. [Thesis]. AUT University; 2013. Available from: http://hdl.handle.net/10292/5323
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
5.
SASANK, HYDERKHAN.
Performance analysis of TCP in KVM virtualized environment.
Degree: 2015, , Department of Communication Systems
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10793
► The requirement of high quality services is increasing day by day. So, in order to meet up with this requirement new technologies are being…
(more)
▼ The requirement of high quality services is increasing day by day. So, in order to meet up with this requirement new technologies are being developed one of them being virtualization. The main agenda of introducing virtualization is that though virtualization needs more powerful devices to run the hypervisor, the technique also helps to increase consolidation which makes efficient use of resources like increase in the CPU utilization. The virtualization technique helps us to run more VM’s (Virtual Machine) on the same platform i.e. on the same hypervisor. In virtualization as number of VM’s share the CPU will there be any effect on the performance of TCP with the performance influencing factors of virtualization. While TCP being the most widely used protocol and most reliable protocol can performance of TCP vary if different TCP congestion control mechanism are used in the virtualized environment are the main aims of this research. In this study, we investigate the performance influencing factor of TCP in the virtualized environment and whether those influencing factors have any role to play with the performance of the TCP. Also which TCP congestion control mechanism is best suitable in order to download files when virtualization is used will be investigated by setting up a client-server test bed. The different TCP congestion control mechanism which have been used are CUBIC, BIC, Highspeed, Vegas, Veno, Yeah, Westwood, LP, Scalable, Reno, Hybla. Total download time has been compared in order to know which congestion control algorithm performs better in the virtualized environment. The method that has been used to carry out the research is by experimentation. That is by changing the RAM sizes and CPU cores which are the performance influencing factors in virtualization and then analyzing the total download time while downloading a file by changing the TCP congestion control mechanisms by running a single guest VM. Apart from changing only congestion control mechanisms the other network parameters which effect the performance of the TCP such as Delay have been injected while downloading the file, to match up with the real time scenarios. Results collected include average download time of a file by changing the different memory sizes and different CPU cores. Average Download time for different TCP congestion controls mechanisms with inclusion of the parameter that effects the total download time such as Delay. From the results we got we can see that there is a slight influence on the performance of TCP by the performance influencing factors memory sizes and CPU cores allotted to the VM in the KVM virtualized environment and of all the TCP congestion control algorithms having TCP – BIC and TCP- YEAH performs the best in the KVM virtualized environment. The performance of TCP – LP is the least in the KVM virtualized environment.
Subjects/Keywords: Hypervisor; Performance; Virtualization .
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
SASANK, H. (2015). Performance analysis of TCP in KVM virtualized environment. (Thesis). , Department of Communication Systems. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10793
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
SASANK, HYDERKHAN. “Performance analysis of TCP in KVM virtualized environment.” 2015. Thesis, , Department of Communication Systems. Accessed March 02, 2021.
http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10793.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
SASANK, HYDERKHAN. “Performance analysis of TCP in KVM virtualized environment.” 2015. Web. 02 Mar 2021.
Vancouver:
SASANK H. Performance analysis of TCP in KVM virtualized environment. [Internet] [Thesis]. , Department of Communication Systems; 2015. [cited 2021 Mar 02].
Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10793.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
SASANK H. Performance analysis of TCP in KVM virtualized environment. [Thesis]. , Department of Communication Systems; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10793
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Limerick
6.
Schramm, Martin.
Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor.
Degree: 2011, University of Limerick
URL: http://hdl.handle.net/10344/1688
► peer-reviewed
Trusted Computing is a relatively new approach to computer security in which a system should be permanently maintained in a well-defined state - and…
(more)
▼ peer-reviewed
Trusted Computing is a relatively new approach to computer security in which a system should be permanently maintained in a well-defined state - and therefore it will reside in a trustworthy state. The word "trustworthy" in this context means that the system always behaves in a specific
way as defined by the platform manufacturer and/or the administrator/owner. A key element
of this approach is to employ a security module, which is implemented in hardware, and which is tied to the platform so as to serve as a trust anchor. Based on that ’root of trust’ and other features, an effective security architecture is proposed in this research.
Virtualization techniques, which were formerly developed for server consolidation, cost reduction, and conservation of energy are now gaining more and more interest in the field of trusted computing. Virtualization can greatly enhance the security of a system by isolating
applications, or even whole operating systems, by splitting the computer system into smaller parts, whose integrity can be more easily assured.
This project is concerned with the development of a system that will effectively combine the isolation features of the virtualization schemes with a state-of-the-art hardware security module. This system will provide reliable protection against sophisticated software-based
attacks and will withstand elementary hardware-based attacks. The building block approach of this proposed security architecture makes sure that many different application fields can archive a high level of security by combining the appropriate components.
The research examines some emerging approaches to computer security and proposes a novel security architecture based on a hardware trust anchor. An experimental system is developed to provide a ’proof-of-concept’ model for evaluation. The target application area for the architecture is the embedded computing space, in particular x86 based architectures. The selection of hardware elements and the choice of hypervisor are discussed and justified. The
assumptions on the features of the architecture are evaluated and validated in the context of potential security improvements. Future research in this niche area is proposed.
Advisors/Committee Members: Heffernan, Donal.
Subjects/Keywords: computer security; virtualization
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Schramm, M. (2011). Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor. (Thesis). University of Limerick. Retrieved from http://hdl.handle.net/10344/1688
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Schramm, Martin. “Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor.” 2011. Thesis, University of Limerick. Accessed March 02, 2021.
http://hdl.handle.net/10344/1688.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Schramm, Martin. “Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor.” 2011. Web. 02 Mar 2021.
Vancouver:
Schramm M. Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor. [Internet] [Thesis]. University of Limerick; 2011. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10344/1688.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Schramm M. Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor. [Thesis]. University of Limerick; 2011. Available from: http://hdl.handle.net/10344/1688
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Virginia Tech
7.
Chiba, Daniel Juzer.
Optimizing Boot Times and Enhancing Binary Compatibility for Unikernels.
Degree: MS, Computer Engineering, 2018, Virginia Tech
URL: http://hdl.handle.net/10919/88865
► Unikernels are lightweight, single-purpose virtual machines designed for the cloud. They provide enhanced security, minimal resource utilisation, fast boot times, and the ability to optimize…
(more)
▼ Unikernels are lightweight, single-purpose virtual machines designed for the cloud. They provide enhanced security, minimal resource utilisation, fast boot times, and the ability to optimize performance for the target application. Despite their numerous advantages, unikernels face significant barriers to their widespread adoption. We identify two such obstacles as unscalable boot procedures in hypervisors and the difficulty in porting native applications to unikernel models. This work presents a solution for the first based on the popular Xen hypervisor, and demonstrates a significant performance benefit when running a large number of guest VMs. The HermiTux unikernel aims to overcome the second obstacle by providing the ability to run unmodified binaries as unikernels. This work adds to HermiTux, enabling it to retain some of the important advantages of unikernels such as fast system calls and modularity.
Advisors/Committee Members: Ravindran, Binoy (committeechair), Min, Chang Woo (committee member), Broadwater, Robert P. (committee member).
Subjects/Keywords: Virtualization; Unikernel; Hypervisor
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Chiba, D. J. (2018). Optimizing Boot Times and Enhancing Binary Compatibility for Unikernels. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/88865
Chicago Manual of Style (16th Edition):
Chiba, Daniel Juzer. “Optimizing Boot Times and Enhancing Binary Compatibility for Unikernels.” 2018. Masters Thesis, Virginia Tech. Accessed March 02, 2021.
http://hdl.handle.net/10919/88865.
MLA Handbook (7th Edition):
Chiba, Daniel Juzer. “Optimizing Boot Times and Enhancing Binary Compatibility for Unikernels.” 2018. Web. 02 Mar 2021.
Vancouver:
Chiba DJ. Optimizing Boot Times and Enhancing Binary Compatibility for Unikernels. [Internet] [Masters thesis]. Virginia Tech; 2018. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10919/88865.
Council of Science Editors:
Chiba DJ. Optimizing Boot Times and Enhancing Binary Compatibility for Unikernels. [Masters Thesis]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/88865

Virginia Tech
8.
Shirole, Sushrut Madhukar.
Performance Optimizations for Isolated Driver Domains.
Degree: MS, Computer Science and Applications, 2014, Virginia Tech
URL: http://hdl.handle.net/10919/49107
► In most of today's operating system architectures, device drivers are tightly coupled with other kernel components. In such systems, a fault caused by a malicious…
(more)
▼ In most of today's operating system architectures, device drivers are tightly coupled with other kernel components. In such systems, a fault caused by a malicious or faulty device driver often leads to complete system failure, thereby reducing the overall reliability of the system. Even though a majority of the operating systems provide protection mechanisms at the user level, they do not provide the same level of protection for kernel components. Using
virtualization, device drivers can be executed in separate, isolated virtual machines, called driver domains. Such domains provide the same level of isolation to device drivers as operating systems provide to user level applications. Domain-based isolation has the advantage that it is compatible with existing drivers and transparent to the kernel.
However, domain-based isolation incurs significant performance overhead due to the necessary interdomain communication. This thesis investigates techniques for reducing this overhead. The key idea is to replace the interrupt-based notification between domains with a spinning-based approach, thus trading CPU capacity for increased throughput.
We implemented a prototype, called the Isolated Device Driver system (IDDR), which includes front-end and back-end drivers and a communication module. We evaluated the impact of our optimizations for a variety of block devices. Our results show that our solution matches or outperforms Xen's isolated driver domain in most scenarios we considered.
Advisors/Committee Members: Back, Godmar Volker (committeechair), Cameron, Kirk W. (committee member), Bisset, Keith R. (committee member).
Subjects/Keywords: Virtualization; Device drivers
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Shirole, S. M. (2014). Performance Optimizations for Isolated Driver Domains. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/49107
Chicago Manual of Style (16th Edition):
Shirole, Sushrut Madhukar. “Performance Optimizations for Isolated Driver Domains.” 2014. Masters Thesis, Virginia Tech. Accessed March 02, 2021.
http://hdl.handle.net/10919/49107.
MLA Handbook (7th Edition):
Shirole, Sushrut Madhukar. “Performance Optimizations for Isolated Driver Domains.” 2014. Web. 02 Mar 2021.
Vancouver:
Shirole SM. Performance Optimizations for Isolated Driver Domains. [Internet] [Masters thesis]. Virginia Tech; 2014. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10919/49107.
Council of Science Editors:
Shirole SM. Performance Optimizations for Isolated Driver Domains. [Masters Thesis]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/49107

Brunel University
9.
Al Atawi, Abdullah.
A software-defined survivability approach for wireless sensor networks in future Internet of the Things.
Degree: PhD, 2018, Brunel University
URL: http://bura.brunel.ac.uk/handle/2438/20191
;
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.814395
► The Internet of the Things (IoT) is evolving rapidly, and its significant impacts are expected to affect many application domains. Challenges in areas that humans…
(more)
▼ The Internet of the Things (IoT) is evolving rapidly, and its significant impacts are expected to affect many application domains. Challenges in areas that humans have been striving to understand, measure, or predict—such as wildlife, healthcare, or environmental hazards—are likely to be addressed by the time IoT emerges. The underlying elements of IoT are wireless sensor networks (WSNs), which consist of a large number of sensor nodes. In the IoT sphere, sensor nodes represent tangible objects—Things—that monitor changes, collect information, and eventually send it through the Internet to a recipient party. Inherently, however, a wireless sensor node relies on limited computational resources with a limited power source. These undesirable qualities result in a low level of dependability. This research explores the viability of applying the unfolding network programmability concepts to overcome survivability obstacles in WSNs and the IoT. In particular, it examines the viability of software-defined networking (SDN) in network lifetime maximisation, failure detection, and failure recovery problems in WSNs. Software-defined networking is a new network programmability concept that separates the traditionally-tied control and data planes. It offloads the route computations and management from network devices to a logically centralised controller. This separation directly leads to better allocation of computational resources for the network nodes and allows endless orchestration possibilities for the controller. This thesis proposes an SDN-based solution to increase the survivability and resilience of WSN environments. Following an approach that conforms with the centralised nature of SDN environments and considers the limited resources of the WSN. A routing algorithm based on A-star was developed for WSNs, then deployed within an SDN environment to maximise the network lifetime. Apart from finding the path with the lowest energy burden, the algorithm offloads most of the control traffic from sensor nodes to the controller. This algorithm resulted in improved resource utilisation among the nodes due to plane decoupling. Additionally, it increased the lifetime of the network by 22.6% compared to the widely explored LEACH protocol. This thesis also investigates different failure detection and recovery practices in the SDN architecture. The simulation results show that adopting bidirectional forwarding detection (BFD) with the asynchronous echo mode for WSN in an SDN environment reduces control traffic for failure detection to between 27% and 48%. The thesis also evaluates the performance of multiple recovery approaches when adopting the premises of SDN. The simulation results indicate that path protection, using group tables from the OpenFlow protocol, has a recovery time up to eight times shorter than the restoration time. The results of the study reveal that using protection as a failure recovery technique significantly reduces control traffic overhead.
Subjects/Keywords: IoT; Virtualization; Recovery
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Al Atawi, A. (2018). A software-defined survivability approach for wireless sensor networks in future Internet of the Things. (Doctoral Dissertation). Brunel University. Retrieved from http://bura.brunel.ac.uk/handle/2438/20191 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.814395
Chicago Manual of Style (16th Edition):
Al Atawi, Abdullah. “A software-defined survivability approach for wireless sensor networks in future Internet of the Things.” 2018. Doctoral Dissertation, Brunel University. Accessed March 02, 2021.
http://bura.brunel.ac.uk/handle/2438/20191 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.814395.
MLA Handbook (7th Edition):
Al Atawi, Abdullah. “A software-defined survivability approach for wireless sensor networks in future Internet of the Things.” 2018. Web. 02 Mar 2021.
Vancouver:
Al Atawi A. A software-defined survivability approach for wireless sensor networks in future Internet of the Things. [Internet] [Doctoral dissertation]. Brunel University; 2018. [cited 2021 Mar 02].
Available from: http://bura.brunel.ac.uk/handle/2438/20191 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.814395.
Council of Science Editors:
Al Atawi A. A software-defined survivability approach for wireless sensor networks in future Internet of the Things. [Doctoral Dissertation]. Brunel University; 2018. Available from: http://bura.brunel.ac.uk/handle/2438/20191 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.814395
10.
Monteiro, Narciso Artur Caldas Sousa.
Optimization, high availability and redundancy in information communications and technology using networks and systems virtualization architectures.
Degree: 2010, Instituto Politécnico do Porto
URL: http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/1929
► Mestrado em Engenharia Informática
In an era marked by the so-called technological revolution, where computing power has become a critical production factor, just like manpower…
(more)
▼ Mestrado em Engenharia Informática
In an era marked by the so-called technological revolution, where computing power has become a critical production factor, just like manpower was in the industrial revolution, very quickly this dispersal of computing power for numerous facilities and sites became unsustainable, both economically as well in terms of maintenance and management. This constringency led to the need of adopting new strategies for the provision of information systems equally capable but in a more consolidated way, while also increasing the desired levels of the classic set of information assurances: availability, confidentiality, authenticity and integrity. At this point enters a topic not as new as it may seem, virtualization, which after two decades of oblivion presents itself as the best candidate to solve the problem technology faces today. Throughout this thesis, it will be explained what this technology represents and what approach should be taken in the evolution of a systems architecture classical model into a model based in optimization, high availability, redundancy and consolidation of information communications and technology, using networks and systems virtualization. A number of good management principles to adopt will also be taken into account to ensure quality standards in providing services, culminating in a practical application of this model to the infrastructure of the company Metro do Porto, SA. Briefly, this document can almost be classified as a step by step manual for the understanding and implementation of this model, transversal to any infrastructure without extremely particular needs or constraints which derail conversion.
Numa era marcada pela chamada revolução tecnológica, em que o poder de computação se tornou um factor crítico de produção, tal como a mão-de-obra o foi na revolução industrial, rapidamente esta dispersão do poder de computação por inúmeros equipamentos e locais tornou-se insustentável, quer ao nível económico como de manutenção e gestão.
Este constrangimento levou à necessidade de adopção de novas estratégias para a disponibilização de sistemas de informação igualmente capazes mas de forma mais consolidada, procurando simultaneamente aumentar os níveis desejáveis do clássico paradigma dos factores a garantir na informação: disponibilidade, confidencialidade, autenticidade e integridade. É neste ponto que entra um tema não tão novo como parece, a virtualização, que após duas décadas de esquecimento se apresenta como o maior candidato à resolução do problema que a tecnologia enfrenta. Ao longo desta tese, será explicado o que esta tecnologia representa e qual a abordagem a ter na evolução de um modelo clássico de arquitectura de sistemas para um modelo baseado em optimização, alta disponibilidade, redundância e consolidação de tecnologias de informação e comunicações com recurso à virtualização de redes e sistemas. Serão igualmente tidos em conta um número de bons princípios de gestão a adoptar de forma a garantir parâmetros de qualidade na…
Advisors/Committee Members: Costa, António Cardoso, Brandão, António Morim.
Subjects/Keywords: Virtualization; Consolidation; Optimization; Availability; Redundancy
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Monteiro, N. A. C. S. (2010). Optimization, high availability and redundancy in information communications and technology using networks and systems virtualization architectures. (Thesis). Instituto Politécnico do Porto. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/1929
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Monteiro, Narciso Artur Caldas Sousa. “Optimization, high availability and redundancy in information communications and technology using networks and systems virtualization architectures.” 2010. Thesis, Instituto Politécnico do Porto. Accessed March 02, 2021.
http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/1929.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Monteiro, Narciso Artur Caldas Sousa. “Optimization, high availability and redundancy in information communications and technology using networks and systems virtualization architectures.” 2010. Web. 02 Mar 2021.
Vancouver:
Monteiro NACS. Optimization, high availability and redundancy in information communications and technology using networks and systems virtualization architectures. [Internet] [Thesis]. Instituto Politécnico do Porto; 2010. [cited 2021 Mar 02].
Available from: http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/1929.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Monteiro NACS. Optimization, high availability and redundancy in information communications and technology using networks and systems virtualization architectures. [Thesis]. Instituto Politécnico do Porto; 2010. Available from: http://www.rcaap.pt/detail.jsp?id=oai:recipp.ipp.pt:10400.22/1929
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
11.
Mori, Mika.
Studies on Topology Design for Improving Network Robustness in Network Virtualization : ネットワーク仮想化技術のためのロバスト性を考慮したトポロジ設計に関する研究; ネットワーク カソウカ ギジュツ ノ タメ ノ ロバストセイ オ コウリョシタ トポロジ セッケイ ニ カンスル ケンキュウ.
Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学
URL: http://hdl.handle.net/10061/7649
Subjects/Keywords: Network virtualization
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Mori, M. (n.d.). Studies on Topology Design for Improving Network Robustness in Network Virtualization : ネットワーク仮想化技術のためのロバスト性を考慮したトポロジ設計に関する研究; ネットワーク カソウカ ギジュツ ノ タメ ノ ロバストセイ オ コウリョシタ トポロジ セッケイ ニ カンスル ケンキュウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/7649
Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Mori, Mika. “Studies on Topology Design for Improving Network Robustness in Network Virtualization : ネットワーク仮想化技術のためのロバスト性を考慮したトポロジ設計に関する研究; ネットワーク カソウカ ギジュツ ノ タメ ノ ロバストセイ オ コウリョシタ トポロジ セッケイ ニ カンスル ケンキュウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed March 02, 2021.
http://hdl.handle.net/10061/7649.
Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Mori, Mika. “Studies on Topology Design for Improving Network Robustness in Network Virtualization : ネットワーク仮想化技術のためのロバスト性を考慮したトポロジ設計に関する研究; ネットワーク カソウカ ギジュツ ノ タメ ノ ロバストセイ オ コウリョシタ トポロジ セッケイ ニ カンスル ケンキュウ.” Web. 02 Mar 2021.
Note: this citation may be lacking information needed for this citation format:
No year of publication.
Vancouver:
Mori M. Studies on Topology Design for Improving Network Robustness in Network Virtualization : ネットワーク仮想化技術のためのロバスト性を考慮したトポロジ設計に関する研究; ネットワーク カソウカ ギジュツ ノ タメ ノ ロバストセイ オ コウリョシタ トポロジ セッケイ ニ カンスル ケンキュウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10061/7649.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.
Council of Science Editors:
Mori M. Studies on Topology Design for Improving Network Robustness in Network Virtualization : ネットワーク仮想化技術のためのロバスト性を考慮したトポロジ設計に関する研究; ネットワーク カソウカ ギジュツ ノ タメ ノ ロバストセイ オ コウリョシタ トポロジ セッケイ ニ カンスル ケンキュウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/7649
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

University of Alberta
12.
Nickurak, Jeremy.
Slimming virtual machines based on filesystem profile
data.
Degree: MS, Department of Computing Science, 2010, University of Alberta
URL: https://era.library.ualberta.ca/files/vt150k608
► Virtual machines (VMs) are useful mechanisms for better resource utilization, support for special software configurations, and the movement of packaged software across systems. Exploiting VM…
(more)
▼ Virtual machines (VMs) are useful mechanisms for
better resource utilization, support for special software
configurations, and the movement of packaged software across
systems. Exploiting VM advantages in a production setting, however,
often requires computer systems with the smallest possible
disk-size footprint. Administrators and programmers who create VMs,
however, may need a robust set of tools for development. This
introduces an important conflict: Minimalism demands that packaged
software be as small as possible, while completeness demands that
nothing required is missing. We present a system called Lilliputia,
which combines resource usage monitoring (through a Linux FUSE
filesystem we created called StatFS), with a filtered cloning
system, which copies an existing physical or virtual machine into a
smaller clone. Finally, we show how Lilliputia can reduce the size
of the Trellis Network-Attached-Storage (NAS) Bridge Appliance and
the Chemical Shift to 3D Structure protein structure predictor to
10-30% of their original size.
Subjects/Keywords: virtual machines; virtualization; fuse; filesystems
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Nickurak, J. (2010). Slimming virtual machines based on filesystem profile
data. (Masters Thesis). University of Alberta. Retrieved from https://era.library.ualberta.ca/files/vt150k608
Chicago Manual of Style (16th Edition):
Nickurak, Jeremy. “Slimming virtual machines based on filesystem profile
data.” 2010. Masters Thesis, University of Alberta. Accessed March 02, 2021.
https://era.library.ualberta.ca/files/vt150k608.
MLA Handbook (7th Edition):
Nickurak, Jeremy. “Slimming virtual machines based on filesystem profile
data.” 2010. Web. 02 Mar 2021.
Vancouver:
Nickurak J. Slimming virtual machines based on filesystem profile
data. [Internet] [Masters thesis]. University of Alberta; 2010. [cited 2021 Mar 02].
Available from: https://era.library.ualberta.ca/files/vt150k608.
Council of Science Editors:
Nickurak J. Slimming virtual machines based on filesystem profile
data. [Masters Thesis]. University of Alberta; 2010. Available from: https://era.library.ualberta.ca/files/vt150k608

University of Alberta
13.
Macdonell, A. Cameron.
Shared-Memory Optimizations for Virtual Machines.
Degree: PhD, Department of Computing Science, 2011, University of Alberta
URL: https://era.library.ualberta.ca/files/h702q7744
► Virtual machine environments are becoming more common due to the increased performance of commodity hardware and the emergence of cloud computing for large scale applications.…
(more)
▼ Virtual machine environments are becoming more common
due to the increased performance of commodity hardware and the
emergence of cloud computing for large scale applications. As the
use of virtual machines continues to grow, performance critical
applications will require efficient mechanisms to achieve their
tasks. We introduce Nahanni as a mechanism for shared memory
communication in virtual machine environments. Nahanni allows
virtualized applications, those running inside virtual machines, to
communicate through shared memory for both data movement and
synchronization when VMs are co-located on the same host machine.
We describe the design, implementation, and evaluation of Nahanni
as part of the QEMU/KVM virtualization platform. We have modified
existing communication layers to measure the performance benefit of
Nahanni. Through microbenchmarks and applications, we demonstrate
that shared memory is a useful and efficient communication
mechanism in virtualized environments. Further, we discuss how the
design and implementation of Nahanni enables a new class of
applications, ones that use structured data, to benefit from the
use of shared memory.
Subjects/Keywords: shared memory; virtualization; KVM
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Macdonell, A. C. (2011). Shared-Memory Optimizations for Virtual Machines. (Doctoral Dissertation). University of Alberta. Retrieved from https://era.library.ualberta.ca/files/h702q7744
Chicago Manual of Style (16th Edition):
Macdonell, A Cameron. “Shared-Memory Optimizations for Virtual Machines.” 2011. Doctoral Dissertation, University of Alberta. Accessed March 02, 2021.
https://era.library.ualberta.ca/files/h702q7744.
MLA Handbook (7th Edition):
Macdonell, A Cameron. “Shared-Memory Optimizations for Virtual Machines.” 2011. Web. 02 Mar 2021.
Vancouver:
Macdonell AC. Shared-Memory Optimizations for Virtual Machines. [Internet] [Doctoral dissertation]. University of Alberta; 2011. [cited 2021 Mar 02].
Available from: https://era.library.ualberta.ca/files/h702q7744.
Council of Science Editors:
Macdonell AC. Shared-Memory Optimizations for Virtual Machines. [Doctoral Dissertation]. University of Alberta; 2011. Available from: https://era.library.ualberta.ca/files/h702q7744

Cornell University
14.
Williams, Daniel.
Towards Superclouds.
Degree: PhD, Computer Science, 2013, Cornell University
URL: http://hdl.handle.net/1813/33842
► Cloud computing has emerged as an economically attractive utility model for computational resources. An increasing number of industries, from businesses to governments, are embracing cloud…
(more)
▼ Cloud computing has emerged as an economically attractive utility model for computational resources. An increasing number of industries, from businesses to governments, are embracing cloud computing. However, the economic benefits of the cloud computing model come at a price: the loss of control over how services and applications can use computing resources. In other words, cloud computing is fundamentally provider-centric. Cloud providers (the providers of computational resources), not cloud users (the consumers of computational resources), dictate rules and policies governing how computational resources can be used. For large enterprise application workloads, adhering to cloud provider rules and policies may be prohibitive. This dissertation explores the question: how can large enterprise workloads efficiently utilize and control computational resources from a variety of providers in the cloud computing model? The main contributions of this dissertation relate to a fundamental change to the cloud computing model. Instead of a provider-centric model, we propose a user-centric model in which the cloud user can maintain control over how computational resources obtained from cloud providers can be used. We have devised a new abstraction, called cloud extensibility, to enable the implementation of provider-level functionality by cloud users. Leveraging cloud extensibility, we describe steps towards a user-centric cloud computing model that grants cloud users-including large enterprises-control over resources obtained from one or more cloud providers. We call this new model the supercloud model. More specifically, we focus on three key areas in which current providercentric cloud computing models do not expose the necessary control or lack the features to support large enterprise workloads without significant reconfiguration effort. First, clouds are not interoperable, restricting workloads to a single provider and hindering incremental migration to the cloud. Second, clouds lack support for complex enterprise network configurations, including flow policies between application components and low-level network features (e.g., IP addresses, multicast, VLANs). Finally, high utilization of cloud resources cannot be applied through techniques like oversubscription, and existing techniques do not apply well to common workload patterns. We subsequently make three contributions, embodied in the design, implementation and evaluation of three systems that leverage cloud extensibility. Cloud extensibility itself is instantiated in the first system, a nested
virtualization layer called the Xen-Blanket. The Xen-Blanket additionally enables cloud interoperability by homogenizing existing cloud interfaces and services. The second system, VirtualWire, provides a virtual network abstraction to support complex enterprise networks in which the cloud user manages the network control logic. Finally, we present Overdriver, a system that enables high resource utilization through memory oversubscription and the handling of the resulting-often…
Advisors/Committee Members: Weatherspoon, Hakim (chair), Pond, Steven F. (committee member), Myers, Andrew C. (committee member).
Subjects/Keywords: Cloud Computing; Virtualization; Operating Systems
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Williams, D. (2013). Towards Superclouds. (Doctoral Dissertation). Cornell University. Retrieved from http://hdl.handle.net/1813/33842
Chicago Manual of Style (16th Edition):
Williams, Daniel. “Towards Superclouds.” 2013. Doctoral Dissertation, Cornell University. Accessed March 02, 2021.
http://hdl.handle.net/1813/33842.
MLA Handbook (7th Edition):
Williams, Daniel. “Towards Superclouds.” 2013. Web. 02 Mar 2021.
Vancouver:
Williams D. Towards Superclouds. [Internet] [Doctoral dissertation]. Cornell University; 2013. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/1813/33842.
Council of Science Editors:
Williams D. Towards Superclouds. [Doctoral Dissertation]. Cornell University; 2013. Available from: http://hdl.handle.net/1813/33842

North Carolina State University
15.
Thakwani, Ashish.
Process-level Isolation using Virtualization.
Degree: MS, Computer Science, 2010, North Carolina State University
URL: http://www.lib.ncsu.edu/resolver/1840.16/2031
► We presents dfork, a new abstraction for performance and security isolation of processes. Whereas the normal fork system call provides a private address space for…
(more)
▼ We presents dfork, a new abstraction for performance and security isolation of processes. Whereas the normal fork system call provides a private address space for a child process, dfork leverages
virtualization and other techniques to also provide a separate kernel and file system container. Further, unlike many existing
virtualization-based approaches, dfork can be used recursively with no cumulative performance penalty, so an isolated process can itself spawn further isolated subprocesses. In contrast to existing software sandbox approaches, our system does not require an a priori policy in order to provide strong security guarantees. Finally, we show that the dfork approach is hypervisor agnostic – our implementation works under both the bare-metal Xen hypervisor and the OS-hosted VMware Workstation hypervisor.
We have implemented the dfork model under Linux in a system we call Isolar. This implementation creates Xen or VMware domains that are NFS booted from a union file system. The end result is an environment that can isolate the effects of malicious activity up to and including a complete takeover of the guest kernel, including kernel-level rootkits. Further, the user may elect to selectively commit changes to the underlying file system, accepting some changes, keeping some isolated, and discarding others entirely. This is especially useful in understanding and reverting changes made by an isolated kernel-level rootkit. This thesis discusses the dfork architecture, provides an example implementation, presents a quantitative analysis of the security and performance isolation provided, and gauges the performance impact of the implementation as a whole.
Advisors/Committee Members: Peng Ning, Committee Member (advisor), Xuxian Jiang, Committee Member (advisor), Vincent W. Freeh, Committee Chair (advisor).
Subjects/Keywords: Security; Rootkit; Sandbox; Virtualization
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Thakwani, A. (2010). Process-level Isolation using Virtualization. (Thesis). North Carolina State University. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/2031
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Thakwani, Ashish. “Process-level Isolation using Virtualization.” 2010. Thesis, North Carolina State University. Accessed March 02, 2021.
http://www.lib.ncsu.edu/resolver/1840.16/2031.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Thakwani, Ashish. “Process-level Isolation using Virtualization.” 2010. Web. 02 Mar 2021.
Vancouver:
Thakwani A. Process-level Isolation using Virtualization. [Internet] [Thesis]. North Carolina State University; 2010. [cited 2021 Mar 02].
Available from: http://www.lib.ncsu.edu/resolver/1840.16/2031.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Thakwani A. Process-level Isolation using Virtualization. [Thesis]. North Carolina State University; 2010. Available from: http://www.lib.ncsu.edu/resolver/1840.16/2031
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
16.
Ratazzi, Edward Paul.
Understanding and Improving Security of the Android Operating System.
Degree: PhD, Electrical Engineering and Computer Science, 2016, Syracuse University
URL: https://surface.syr.edu/etd/592
► Successful realization of practical computer security improvements requires an understanding and insight into the system's security architecture, combined with a consideration of end-users' needs…
(more)
▼ Successful realization of practical computer security improvements requires an understanding and insight into the system's security architecture, combined with a consideration of end-users' needs as well as the system's design tenets. In the case of Android, a system with an open, modular architecture that emphasizes usability and performance, acquiring this knowledge and insight can be particularly challenging for several reasons. In spite of Android's open source philosophy, the system is extremely large and complex, documentation and reference materials are scarce, and the code base is rapidly evolving with new features and fixes. To make matters worse, the vast majority of Android devices in use do not run the open source code, but rather proprietary versions that have been heavily customized by vendors for product differentiation.
Proposing security improvements or making customizations without sufficient insight into the system typically leads to less-practical, less-efficient, or even vulnerable results. Point solutions to specific problems risk leaving other similar problems in the distributed security architecture unsolved. Far-reaching general-purpose approaches may further complicate an already complex system, and force end-users to endure significant performance and usability degradations regardless of their specific security and privacy needs. In the case of vendor customization, uninformed changes can introduce access control inconsistencies and new vulnerabilities. Hence, the lack of methodologies and resources available for gaining insight about Android security is hindering the development of practical security solutions, sound vendor customizations, and end-user awareness of the proprietary devices they are using.
Addressing this deficiency is the
subject of this dissertation. New approaches for analyzing, evaluating and understanding Android access controls are introduced and used to create an interactive database for use by security researchers as well as system designers and end-user product evaluators. Case studies using the new techniques are described, with results uncovering problems in Android's multiuser framework and vendor-customized System Services. Finally, the new insights are used to develop and implement a novel
virtualization-based security architecture that protects sensitive resources while preserving Android's open architecture and expected levels of performance and usability.
Advisors/Committee Members: Wenliang Du.
Subjects/Keywords: android; security; virtualization; Engineering
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Ratazzi, E. P. (2016). Understanding and Improving Security of the Android Operating System. (Doctoral Dissertation). Syracuse University. Retrieved from https://surface.syr.edu/etd/592
Chicago Manual of Style (16th Edition):
Ratazzi, Edward Paul. “Understanding and Improving Security of the Android Operating System.” 2016. Doctoral Dissertation, Syracuse University. Accessed March 02, 2021.
https://surface.syr.edu/etd/592.
MLA Handbook (7th Edition):
Ratazzi, Edward Paul. “Understanding and Improving Security of the Android Operating System.” 2016. Web. 02 Mar 2021.
Vancouver:
Ratazzi EP. Understanding and Improving Security of the Android Operating System. [Internet] [Doctoral dissertation]. Syracuse University; 2016. [cited 2021 Mar 02].
Available from: https://surface.syr.edu/etd/592.
Council of Science Editors:
Ratazzi EP. Understanding and Improving Security of the Android Operating System. [Doctoral Dissertation]. Syracuse University; 2016. Available from: https://surface.syr.edu/etd/592

University of Houston
17.
Palagummi, Mydhili.
Evaluation study of virtual network embedding for short-lived virtual networks.
Degree: MS, Engineering Technology, 2015, University of Houston
URL: http://hdl.handle.net/10657/1269
► Cloud services are currently being extensively used for server hosting, data storage, scientific and research purposes. Virtualization technology is an essential element for these services.…
(more)
▼ Cloud services are currently being extensively used for server hosting, data storage, scientific and research purposes.
Virtualization technology is an essential element for these services.
Virtualization enables the creation of multiple virtual instances on physical or hardware infrastructure. Network
virtualization is a recent advancement in this field through which virtual networks can be created over real physical networks (also called as substrate networks). Such virtual networks facilitate testing and quick deployment of new technologies, better utilization of hardware and provide more flexibility to users.
A crucial element of network
virtualization is the stage in which the virtual networks are created on the substrate network. This process is of critical nature as the number of virtual networks that are created on the substrate are high. Hence the placement of these virtual networks needs to be done in a strategic way. The creation of virtual networks on a substrate network is referred to as Virtual network embedding. Determining the best way to place or create multiple virtual networks on a substrate network while satisfying a given set of constraints is referred to as Virtual network embedding problem. The technique or algorithms used to solve this problem are known as virtual network embedding algorithms.
In this thesis we evaluate and compare six virtual network embedding algorithms for embedding short-lived virtual networks on substrate networks with fat-tree topology and UUNET topology. We discuss different metrics to evaluate the performance of embedding algorithms and compare the algorithms based on these metrics. In particular, we examine the probability of success of embedding a virtual network, average substrate path length and the distribution pattern of virtual networks in the substrate network for six different algorithms. The aim of this thesis work is to compare the performance of virtual network embedding algorithms, observe the nuances of the approaches that contribute to optimal results and investigate the embedding for the case of short-lived virtual networks.
Advisors/Committee Members: Lent, Ricardo (advisor), Moges, Mequanint A. (committee member), Yuan, Xiaojing (committee member), Lent, Ricardo (committee member).
Subjects/Keywords: Virtual network embedding; Network virtualization
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Palagummi, M. (2015). Evaluation study of virtual network embedding for short-lived virtual networks. (Masters Thesis). University of Houston. Retrieved from http://hdl.handle.net/10657/1269
Chicago Manual of Style (16th Edition):
Palagummi, Mydhili. “Evaluation study of virtual network embedding for short-lived virtual networks.” 2015. Masters Thesis, University of Houston. Accessed March 02, 2021.
http://hdl.handle.net/10657/1269.
MLA Handbook (7th Edition):
Palagummi, Mydhili. “Evaluation study of virtual network embedding for short-lived virtual networks.” 2015. Web. 02 Mar 2021.
Vancouver:
Palagummi M. Evaluation study of virtual network embedding for short-lived virtual networks. [Internet] [Masters thesis]. University of Houston; 2015. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10657/1269.
Council of Science Editors:
Palagummi M. Evaluation study of virtual network embedding for short-lived virtual networks. [Masters Thesis]. University of Houston; 2015. Available from: http://hdl.handle.net/10657/1269

University of Manchester
18.
D'Antras, Bernard.
Low overhead dynamic binary translation for ARM.
Degree: PhD, 2017, University of Manchester
URL: https://www.research.manchester.ac.uk/portal/en/theses/low-overhead-dynamic-binary-translation-for-arm(ace6e774-ba6a-418f-90bb-653be79ed70c).html
;
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.728019
► Driven by Moore's Law, many computer architectures - ARM, x86, MIPS, PowerPC, SPARC - have evolved from 32-bit to 64-bit. To support existing applications, these…
(more)
▼ Driven by Moore's Law, many computer architectures - ARM, x86, MIPS, PowerPC, SPARC - have evolved from 32-bit to 64-bit. To support existing applications, these have all kept support for a 32-bit compatibility mode. However, this comes at a cost in hardware complexity, power consumption and development time. Dynamic binary translation - recompiling binaries into the new instruction set at runtime - can be used instead of specific hardware for this purpose. While this approach has previously been used to assist architecture transition, these translators have all traded-off performance and transparency, a measure of how accurately they emulate the 32-bit environment. This thesis addresses ARM's transition from AArch32 to AArch64 through MAMBO-X64, a dynamic binary translator developed to support this transition. A range of novel optimizations were devised to improve translation performance while maintaining strict transparency. This follows a common theme of exploiting existing hardware features such as hardware return prediction, virtual memory and virtualization extensions to offset translation overheads. HyperMAMBO-X64 - a variant of MAMBO-X64 integrated in a hypervisor - was also developed to support system-level translation while remaining transparent to guest operating systems. Results demonstrate that the cost of binary translation is reduced, delivering performance competitive with the manufacturer's hardware. Performance in several benchmarks even exceeds that from the integrated compatibility mode. Thus MAMBO-X64 not only provides a means for architectural upgrade, but also an alternative to the expense of the legacy support currently employed.
Subjects/Keywords: 005.4; Binary Translation; Virtualization; ARM
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
D'Antras, B. (2017). Low overhead dynamic binary translation for ARM. (Doctoral Dissertation). University of Manchester. Retrieved from https://www.research.manchester.ac.uk/portal/en/theses/low-overhead-dynamic-binary-translation-for-arm(ace6e774-ba6a-418f-90bb-653be79ed70c).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.728019
Chicago Manual of Style (16th Edition):
D'Antras, Bernard. “Low overhead dynamic binary translation for ARM.” 2017. Doctoral Dissertation, University of Manchester. Accessed March 02, 2021.
https://www.research.manchester.ac.uk/portal/en/theses/low-overhead-dynamic-binary-translation-for-arm(ace6e774-ba6a-418f-90bb-653be79ed70c).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.728019.
MLA Handbook (7th Edition):
D'Antras, Bernard. “Low overhead dynamic binary translation for ARM.” 2017. Web. 02 Mar 2021.
Vancouver:
D'Antras B. Low overhead dynamic binary translation for ARM. [Internet] [Doctoral dissertation]. University of Manchester; 2017. [cited 2021 Mar 02].
Available from: https://www.research.manchester.ac.uk/portal/en/theses/low-overhead-dynamic-binary-translation-for-arm(ace6e774-ba6a-418f-90bb-653be79ed70c).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.728019.
Council of Science Editors:
D'Antras B. Low overhead dynamic binary translation for ARM. [Doctoral Dissertation]. University of Manchester; 2017. Available from: https://www.research.manchester.ac.uk/portal/en/theses/low-overhead-dynamic-binary-translation-for-arm(ace6e774-ba6a-418f-90bb-653be79ed70c).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.728019

Universitat Politècnica de València
19.
Reaño González, Carlos.
On the Enhancement of Remote GPU Virtualization in High Performance Clusters
.
Degree: 2017, Universitat Politècnica de València
URL: http://hdl.handle.net/10251/86219
► Graphics Processing Units (GPUs) are being adopted in many computing facilities given their extraordinary computing power, which makes it possible to accelerate many general purpose…
(more)
▼ Graphics Processing Units (GPUs) are being adopted in many computing facilities given their extraordinary computing power, which makes it possible to accelerate many general purpose applications from different domains. However, GPUs also present several side effects, such as increased acquisition costs as well as larger space requirements. They also require more powerful energy supplies. Furthermore, GPUs still consume some amount of energy while idle and their utilization is usually low for most workloads.
In a similar way to virtual machines, the use of virtual GPUs may address the aforementioned concerns. In this regard, the remote GPU
virtualization mechanism allows an application being executed in a node of the cluster to transparently use the GPUs installed at other nodes. Moreover, this technique allows to share the GPUs present in the computing facility among the applications being executed in the cluster. In this way, several applications being executed in different (or the same) cluster nodes can share one or more GPUs located in other nodes of the cluster. Sharing GPUs should increase overall GPU utilization, thus reducing the negative impact of the side effects mentioned before. Reducing the total amount of GPUs installed in the cluster may also be possible.
In this dissertation we enhance one framework offering remote GPU
virtualization capabilities, referred to as rCUDA, for its use in high-performance clusters. While the initial prototype version of rCUDA demonstrated its functionality, it also revealed concerns with respect to usability, performance, and support for new GPU features, which prevented its used in production environments. These issues motivated this thesis, in which all the research is primarily conducted with the aim of turning rCUDA into a production-ready solution for eventually transferring it to industry. The new version of rCUDA resulting from this work presents a reduction of up to 35% in execution time of the applications analyzed with respect to the initial version. Compared to the use of local GPUs, the overhead of this new version of rCUDA is below 5% for the applications studied when using the latest high-performance computing networks available.; Las unidades de procesamiento gráfico (Graphics Processing Units, GPUs) están siendo utilizadas en muchas instalaciones de computación dada su extraordinaria capacidad de cálculo, la cual hace posible acelerar muchas aplicaciones de propósito general de diferentes dominios. Sin embargo, las GPUs también presentan algunas desventajas, como el aumento de los costos de adquisición, así como mayores requerimientos de espacio. Asimismo, también requieren un suministro de energía más potente. Además, las GPUs consumen una cierta cantidad de energía aún estando inactivas, y su utilización suele ser baja para la mayoría de las cargas de trabajo.
De manera similar a las máquinas virtuales, el uso de GPUs virtuales podría hacer frente a los inconvenientes mencionados. En este sentido, el mecanismo de virtualización remota de GPUs permite…
Advisors/Committee Members: Duato Marín, José Francisco (advisor), Silla Jiménez, Federico (advisor).
Subjects/Keywords: GPGPU;
CUDA;
Virtualization;
InfiniBand
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Reaño González, C. (2017). On the Enhancement of Remote GPU Virtualization in High Performance Clusters
. (Doctoral Dissertation). Universitat Politècnica de València. Retrieved from http://hdl.handle.net/10251/86219
Chicago Manual of Style (16th Edition):
Reaño González, Carlos. “On the Enhancement of Remote GPU Virtualization in High Performance Clusters
.” 2017. Doctoral Dissertation, Universitat Politècnica de València. Accessed March 02, 2021.
http://hdl.handle.net/10251/86219.
MLA Handbook (7th Edition):
Reaño González, Carlos. “On the Enhancement of Remote GPU Virtualization in High Performance Clusters
.” 2017. Web. 02 Mar 2021.
Vancouver:
Reaño González C. On the Enhancement of Remote GPU Virtualization in High Performance Clusters
. [Internet] [Doctoral dissertation]. Universitat Politècnica de València; 2017. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10251/86219.
Council of Science Editors:
Reaño González C. On the Enhancement of Remote GPU Virtualization in High Performance Clusters
. [Doctoral Dissertation]. Universitat Politècnica de València; 2017. Available from: http://hdl.handle.net/10251/86219

University of Minnesota
20.
BAI, YAN.
Power Consumption of Virtual Machines in Cloud Computing: Measurement and Enhancement.
Degree: MS, Computer Science, 2016, University of Minnesota
URL: http://hdl.handle.net/11299/182708
► Virtualization is one of the cornerstone technologies that makes utility computing platforms such as cloud computing a reality. With the accelerating adoption of cloud computing,…
(more)
▼ Virtualization is one of the cornerstone technologies that makes utility computing platforms such as cloud computing a reality. With the accelerating adoption of cloud computing, the virtualizaion-based cloud platforms are consuming a significant amount of energy. However, the design of a green and efficient virtualization technology remains an open issue to both industry and academia. In this thesis, we for the first time investigate the virtual machine's (VM's) power consumption while supporting different services and applications (e.g., web, database and streaming). In particular, we establish a cloud computing platform in the The University of Minnesota Duluth. This platform consist of both Xen and KVM nodes and the VMs can be easily accessed from the Internet. Our real-world measurement indicates that the existing virtulization technologies add considerable energy overhead to the data centers. For example, a busy virtualized database server can consume 30% more energy than its non-virtualized counterparts. To address such a problem, we propose a shared-memory-based enhancement to reduces the extra interrupts and memory copies for cloud virtualization. The evaluation indicates that our approach can reduce VM's energy consumption by 11% without noticeable loss of its running performance.
Subjects/Keywords: Cloud Computing; Energy Efficiency; Virtualization
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
BAI, Y. (2016). Power Consumption of Virtual Machines in Cloud Computing: Measurement and Enhancement. (Masters Thesis). University of Minnesota. Retrieved from http://hdl.handle.net/11299/182708
Chicago Manual of Style (16th Edition):
BAI, YAN. “Power Consumption of Virtual Machines in Cloud Computing: Measurement and Enhancement.” 2016. Masters Thesis, University of Minnesota. Accessed March 02, 2021.
http://hdl.handle.net/11299/182708.
MLA Handbook (7th Edition):
BAI, YAN. “Power Consumption of Virtual Machines in Cloud Computing: Measurement and Enhancement.” 2016. Web. 02 Mar 2021.
Vancouver:
BAI Y. Power Consumption of Virtual Machines in Cloud Computing: Measurement and Enhancement. [Internet] [Masters thesis]. University of Minnesota; 2016. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/11299/182708.
Council of Science Editors:
BAI Y. Power Consumption of Virtual Machines in Cloud Computing: Measurement and Enhancement. [Masters Thesis]. University of Minnesota; 2016. Available from: http://hdl.handle.net/11299/182708

Texas A&M University
21.
Zeng, Yukun.
EmuEdge: A Hybrid Emulator for Reproducible and Realistic Edge Computing Experiments.
Degree: MS, Computer Science, 2018, Texas A&M University
URL: http://hdl.handle.net/1969.1/174393
► Numerous recent research efforts have been devoted to edge computing due to its key role in enabling emerging IoT applications. Prior to deploying edge technologies…
(more)
▼ Numerous recent research efforts have been devoted to edge computing due to its key role in enabling emerging IoT applications. Prior to deploying edge technologies to real world environments, they need to be adequately tested, validated and tuned on a testing platform. However, to the best of our knowledge, a testing platform for edge computing that provides both networking and computing realism with low costs is still missing. In this thesis, we propose EmuEdge, a hybrid emulator based on Xen and Linux’s netns for full-stack edge computing emulation. Supporting both containers and VMs, EmuEdge is the first that takes advantage of both OS-level and full system
virtualization in edge computing emulation. The hybrid design of EmuEdge ensures on-demand isolations on both computation and networking while maintaining the flexibility of scaling with lightweight containers. Besides, our system supports real-world network replay and is fully configurable with EmuEdge APIs. Through extensive experiments, we prove that EmuEdge provides realistic computation isolation and network fidelity comparing to state-of-the-art emulators. We also demonstrate EmuEdge’s compatibility with an actual edge computing platform and the emulation results are qualitatively similar to physical experiments.
Advisors/Committee Members: Stoleru, Radu (advisor), Da Silva, Dilma (committee member), Hou, I-Hong (committee member).
Subjects/Keywords: edge computing; network emulation; virtualization
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Zeng, Y. (2018). EmuEdge: A Hybrid Emulator for Reproducible and Realistic Edge Computing Experiments. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/174393
Chicago Manual of Style (16th Edition):
Zeng, Yukun. “EmuEdge: A Hybrid Emulator for Reproducible and Realistic Edge Computing Experiments.” 2018. Masters Thesis, Texas A&M University. Accessed March 02, 2021.
http://hdl.handle.net/1969.1/174393.
MLA Handbook (7th Edition):
Zeng, Yukun. “EmuEdge: A Hybrid Emulator for Reproducible and Realistic Edge Computing Experiments.” 2018. Web. 02 Mar 2021.
Vancouver:
Zeng Y. EmuEdge: A Hybrid Emulator for Reproducible and Realistic Edge Computing Experiments. [Internet] [Masters thesis]. Texas A&M University; 2018. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/1969.1/174393.
Council of Science Editors:
Zeng Y. EmuEdge: A Hybrid Emulator for Reproducible and Realistic Edge Computing Experiments. [Masters Thesis]. Texas A&M University; 2018. Available from: http://hdl.handle.net/1969.1/174393

Kaunas University of Technology
22.
Žąsytis,
Žygimantas.
Virtualizavimo infrastruktūros parinkimas ir
taikymas mažose ir vidutinio dydžio įmonėse.
Degree: Master, Informatics
Engineering, 2009, Kaunas University of Technology
URL: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2009~D_20090831_153947-24680
;
► Magistro darbe apžvelgiamos virtualizavimo programos. Nustatomi jų trūkumai ir privalumai kuriant virtualizavimo infrastruktūra įmonės IT skyriui. Parenkamas tinkamiausias virtualizavimo būdas IT skyriui.
Due to the…
(more)
▼ Magistro darbe apžvelgiamos virtualizavimo
programos. Nustatomi jų trūkumai ir privalumai kuriant
virtualizavimo infrastruktūra įmonės IT skyriui. Parenkamas
tinkamiausias virtualizavimo būdas IT
skyriui.
Due to the flexibility of virtualization
there is a good chance that there is a virtual design or system to
meet the most demanding needs and because of this virtualization is
merely duplicating the revolution in open systems by supplying a
wide variety of solutions and meet any IT
needs.
Advisors/Committee Members: Žilevičius, Vilius (Master’s degree committee chair), Lenkevičius, Antanas (Master’s degree session secretary), Matickas, Jonas Kazimieras (Master’s degree committee member), Paradauskas, Bronius (Master’s degree committee member), Rėklaitis, Vytautas (Master’s degree committee member), Rubliauskas, Dalius (Master’s degree committee member), Rutkauskienė, Danguolė (Master’s degree committee member), Mamčenko, Jelena (Master’s degree committee member), Targamadzė, Aleksandras (Master’s degree committee member), Maciulevičius, Stasys (Master’s thesis supervisor), Marcinkevičius, Romas (Master’s thesis reviewer).
Subjects/Keywords: Virtualizacija; Virtualūs
serveriai; Virtualizavimo
programos;
Virtualization; Virtual
server; Virtualization
programs
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Žąsytis,
Žygimantas. (2009). Virtualizavimo infrastruktūros parinkimas ir
taikymas mažose ir vidutinio dydžio įmonėse. (Masters Thesis). Kaunas University of Technology. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2009~D_20090831_153947-24680 ;
Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Chicago Manual of Style (16th Edition):
Žąsytis,
Žygimantas. “Virtualizavimo infrastruktūros parinkimas ir
taikymas mažose ir vidutinio dydžio įmonėse.” 2009. Masters Thesis, Kaunas University of Technology. Accessed March 02, 2021.
http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2009~D_20090831_153947-24680 ;.
Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
MLA Handbook (7th Edition):
Žąsytis,
Žygimantas. “Virtualizavimo infrastruktūros parinkimas ir
taikymas mažose ir vidutinio dydžio įmonėse.” 2009. Web. 02 Mar 2021.
Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Vancouver:
Žąsytis,
Žygimantas. Virtualizavimo infrastruktūros parinkimas ir
taikymas mažose ir vidutinio dydžio įmonėse. [Internet] [Masters thesis]. Kaunas University of Technology; 2009. [cited 2021 Mar 02].
Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2009~D_20090831_153947-24680 ;.
Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Council of Science Editors:
Žąsytis,
Žygimantas. Virtualizavimo infrastruktūros parinkimas ir
taikymas mažose ir vidutinio dydžio įmonėse. [Masters Thesis]. Kaunas University of Technology; 2009. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2009~D_20090831_153947-24680 ;
Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

AUT University
23.
Jawale, Nirbhay.
Locating and extracting digital evidence from hosted virtual desktop infrastructures: cloud context
.
Degree: 2012, AUT University
URL: http://hdl.handle.net/10292/4582
► The development of virtualization started in 1960, when VMware introduced partitioning of large mainframes for better hardware utilization. (Virtualization History, 2010) Since then virtualization has…
(more)
▼ The development of
virtualization started in 1960, when VMware introduced partitioning of large mainframes for better hardware utilization. (
Virtualization History, 2010) Since then
virtualization has matured and been adopted to a wide extent in the industry. Recent developments include branching into areas of server
virtualization, storage and application
virtualization and, very recently, desktop
virtualization. Desktop
virtualization has so far been through two models: the Client hosted model, which is typically operated from the user’s workstation using Windows Virtual PC; and the VMware workstation or Java Virtual Machine (VM). However, recently a third model has emerged, called the server hosted model or Hosted virtual desktop (HVD), which is a virtualized form of desktop (VM) delivered to users from the cloud infrastructure. In other words
virtualization in computing has progressed to an extent where desktops can be virtualized and accessed from anywhere. The server hosted model has already surpassed 1% market share of the worldwide professional PC market, with estimates indicating that this is a rapidly growing area.
This study investigates the adequacy of current digital forensic procedures on hosted virtual desktops (HVDs) as there does not appear to be specific methods of locating and extracting evidences from this infrastructure. Using the Forensic Iterative Development Model (FIDM), HVDs deployed in private cloud were simulated to reflect three different computer crime (quasiexperimental) scenarios. It was found that current digital forensic procedures may not be adequate for locating and extracting evidence, since the infrastructure in scenario 2 and 3 introduces complications such as non-persistent disk modes and segregating data in a multitenant environment. However in scenario 1, findings illustrate that all standard investigation techniques can be followed as a result of the persistent user environment. Furthermore, suggestions are made to extend the current research in the areas of techniques to acquire virtual machines from hypervisors, hashing evidence and forensic readiness in environments consisting HVDs.
Advisors/Committee Members: Narayanan, Ajit (advisor).
Subjects/Keywords: Cloud forensics;
Cloud Computing;
Desktop Virtualization;
Hosted desktop virtualization
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Jawale, N. (2012). Locating and extracting digital evidence from hosted virtual desktop infrastructures: cloud context
. (Thesis). AUT University. Retrieved from http://hdl.handle.net/10292/4582
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Jawale, Nirbhay. “Locating and extracting digital evidence from hosted virtual desktop infrastructures: cloud context
.” 2012. Thesis, AUT University. Accessed March 02, 2021.
http://hdl.handle.net/10292/4582.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Jawale, Nirbhay. “Locating and extracting digital evidence from hosted virtual desktop infrastructures: cloud context
.” 2012. Web. 02 Mar 2021.
Vancouver:
Jawale N. Locating and extracting digital evidence from hosted virtual desktop infrastructures: cloud context
. [Internet] [Thesis]. AUT University; 2012. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/10292/4582.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Jawale N. Locating and extracting digital evidence from hosted virtual desktop infrastructures: cloud context
. [Thesis]. AUT University; 2012. Available from: http://hdl.handle.net/10292/4582
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

KTH
24.
Sällberg, Kristian.
A Data Model Driven Approach to Managing Network Functions Virtualization : Aiding Network Operators in Provisioning and Configuring Network Functions.
Degree: Radio Systems Laboratory (RS Lab), 2015, KTH
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-171233
► This master’s thesis explains why certain network services are difficult to provision and configure using IT automation and cloud orchestration software. An improvement is…
(more)
▼ This master’s thesis explains why certain network services are difficult to provision and configure using IT automation and cloud orchestration software. An improvement is proposed and motivated. This proposed improvement enables network operators to define a set of data models describing how to provision and interconnect a set of Virtual Network Functions (VNFs) (and possibly existing physical network functions) to form networks. Moreover, the proposed solution enables network operators to change the configuration at runtime. The work can be seen as a step towards self managing and auto scaling networks. The proposed approach is compared to a well known cloud management system (OpenStack) in order to evaluate if the proposed approach decreases the amount of time needed for network operators to design network topologies and services containing VNFs. Data is collected through observations of network operators, interviews, and experiment. Analysis of this data shows that the proposed approach can decrease the amount of time required for network operators to design network topologies and services. This applies if the network operators are already acquainted with the data modeling language YANG. The amount of time required to provision VNFs so that they respond to connections can also be decreased using the proposed approach. The proposed approach does not offer as much functionality as OpenStack, as it is limited to VNF scenarios.
Denna masteruppsats förklarar varför vissa nätverkstjänster är svåra att skapa och konfigurera med IT-automationsverktyg och mjukvara för molnorkestrering. En förbättring föreslås och motiveras. Den föreslagna förbättringen tillåter nätverksoperatörer att definiera en mängd datamodeller, för att beskriva hur Virtuella Nätverksfunktioner (VNF:er) skall instantieras och kopplas ihop till nätverkstjänster. Dessutom tillåter lösningen nätverksoperatörer att ändra konfiguration under tiden nätverken hanterar trafik. Arbetet kan ses som ett steg mot självhanterande och automatiskt skalande nätverk. Den föreslagna lösningen jämförs med ett välkänt molnorkestreringsverktyg (OpenStack) för att utvärdera om den föreslagna lösningen sänker mängden tid som nätverksoperatörer behöver för att designa nätverkstopologier och tjänster som innehåller VNF:er. Data samlas in genom observationer av nätverksoperatörer, intervjuer, och experiment. Analys av datan visar att den föreslagna lösningen kan minska tiden som behövs för att designa nätverkstopologier och tjänster. Fallen där detta är applicerbart, är när VNF:er närvarar i nätverk. Dessa är enklare att skapa, konfigurera, och ändra under tiden de exekverar, med den föreslagna metoden. Detta kräver också att nätverksoperatören är bekant med datamodelleringsspråket YANG. Tiden det tar att provisionera VNF:er, tills dess att de svarar till anslutningar, kan sänkas med hjälp av den föreslagna metoden. Den förslagna metoden erbjuder väsentligt begränsad funktionalitet jämfört med OpenStack, den fokuserar på att hantera…
Subjects/Keywords: NFV; SDN; VNF; Virtualization; NFV; SDN; VNF; Virtualization
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Sällberg, K. (2015). A Data Model Driven Approach to Managing Network Functions Virtualization : Aiding Network Operators in Provisioning and Configuring Network Functions. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-171233
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Sällberg, Kristian. “A Data Model Driven Approach to Managing Network Functions Virtualization : Aiding Network Operators in Provisioning and Configuring Network Functions.” 2015. Thesis, KTH. Accessed March 02, 2021.
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-171233.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Sällberg, Kristian. “A Data Model Driven Approach to Managing Network Functions Virtualization : Aiding Network Operators in Provisioning and Configuring Network Functions.” 2015. Web. 02 Mar 2021.
Vancouver:
Sällberg K. A Data Model Driven Approach to Managing Network Functions Virtualization : Aiding Network Operators in Provisioning and Configuring Network Functions. [Internet] [Thesis]. KTH; 2015. [cited 2021 Mar 02].
Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-171233.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Sällberg K. A Data Model Driven Approach to Managing Network Functions Virtualization : Aiding Network Operators in Provisioning and Configuring Network Functions. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-171233
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Illinois – Urbana-Champaign
25.
Estrada, Zachary.
Dynamic reliability and security monitoring: a virtual machine approach.
Degree: PhD, Electrical & Computer Engr, 2016, University of Illinois – Urbana-Champaign
URL: http://hdl.handle.net/2142/95458
► While one always works to prevent attacks and failures, they are inevitable and situational awareness is key to taking appropriate action. Monitoring plays an integral…
(more)
▼ While one always works to prevent attacks and failures, they are inevitable and situational awareness is key to taking appropriate action. Monitoring plays an integral role in ensuring reliability and security of computing systems. Infrastructure as a Service (IaaS) clouds significantly lower the barrier for obtaining scalable computing resources and allow users to focus on what is important to them. Can a similar service be offered to provide on-demand reliability and security monitoring?
Cloud computing systems are typically built using virtual machines (VMs). VM monitoring takes advantage of this and uses the hypervisor that runs VMs for robust reliability and security monitoring. The hypervisor provides an environment that is isolated from failures and attacks inside customers’ VMs. Furthermore, as a low-level manager of computing resources, the hypervisor has full access to the infrastructure running above it. Hypervisor-based VM monitoring leverages that information to observe the VMs for failures and attacks. However, existing VM monitoring techniques fall short of “as-a-service” expectations because they require a priori VM modifications and require human interaction to obtain necessary information about the underlying guest system. The research presented in this dissertation closes those gaps by providing a flexible VM monitoring framework and automated analysis to support that framework.
We have developed and tested a dynamic VM monitoring framework called Hypervisor Probes (hprobes). The hprobe framework allows us to monitor the execution of both the guest OS and applications from the hypervisor. To supplement this monitoring framework, we use dynamic analysis techniques to investigate the relationship between hardware events visible to the hyper-visor and OS constructs common across OS versions. We use the results of this analysis to parametrize the hprobe-based monitors without requiring any user input. Combining the dynamic VM monitoring framework and analysis frameworks allows us to provide on-demand hypervisor based monitors for cloud VMs.
Advisors/Committee Members: Iyer, Ravishankar K (advisor), Kalbarczyk, Zbigniew T (advisor), Iyer, Ravishankar K (Committee Chair), Bailey, Michael D (committee member), Campbell, Roy H (committee member), Hwu, Wen-Mei W (committee member).
Subjects/Keywords: virtualization; emulation; security; reliability; hprobes; cloud; hardware-asssisted virtualization; dynamic analysis
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Estrada, Z. (2016). Dynamic reliability and security monitoring: a virtual machine approach. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/95458
Chicago Manual of Style (16th Edition):
Estrada, Zachary. “Dynamic reliability and security monitoring: a virtual machine approach.” 2016. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed March 02, 2021.
http://hdl.handle.net/2142/95458.
MLA Handbook (7th Edition):
Estrada, Zachary. “Dynamic reliability and security monitoring: a virtual machine approach.” 2016. Web. 02 Mar 2021.
Vancouver:
Estrada Z. Dynamic reliability and security monitoring: a virtual machine approach. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2016. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/2142/95458.
Council of Science Editors:
Estrada Z. Dynamic reliability and security monitoring: a virtual machine approach. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2016. Available from: http://hdl.handle.net/2142/95458

Georgia State University
26.
Hu, Qian.
Towards a Virtualized Next Generation Internet.
Degree: PhD, Computer Science, 2015, Georgia State University
URL: https://scholarworks.gsu.edu/cs_diss/95
► A promising solution to overcome the Internet ossification is network virtualization in which Internet Service Providers (ISPs) are decoupled into two tiers: service providers…
(more)
▼ A promising solution to overcome the Internet ossification is network
virtualization in which Internet Service Providers (ISPs) are decoupled into two tiers: service providers (SPs), and infrastructure providers (InPs). The former maintain and customize virtual network(s) to meet the service requirement of end-users, which is mapped to the physical network infrastructure that is managed and deployed by the latter via the Virtual Network Embedding (VNE) process. VNE consists of two major components: node assignment, and link mapping, which can be shown to be NP-Complete.
In the first part of the dissertation, we present a path-based ILP model for the VNE problem. Our solution employs a branch-and-bound framework to resolve the integrity constraints, while embedding the column generation process to effectively obtain the lower bound for branch pruning. Different from existing approaches, the proposed solution can either obtain an optimal solution or a near-optimal solution with guarantee on the solution quality.
A common strategy in VNE algorithm design is to decompose the problem into two sequential sub-problems: node assignment (NA) and link mapping (LM). With this approach, it is inexorable to sacrifice the solution quality since the NA is not holistic and not-reversible. In the second part, we are motivated to answer the question: Is it possible to maintain the simplicity of the Divide-and-Conquer strategy while still achieving optimality? Our answer is based on a decomposition framework supported by the Primal-Dual analysis of the path-based ILP model.
This dissertation also attempts to address issues in two frontiers of network
virtualization: survivability, and integration of optical substrate. In the third part, we address the survivable network embedding (SNE) problem from a network flow perspective, considering both splittable and non-splittable flows. In addition, the explosive growth of the Internet traffic calls for the support of a bandwidth abundant optical substrate, despite the extra dimensions of complexity caused by the heterogeneities of optical resources, and the physical feature of optical transmission. In this fourth part, we present a holistic view of motivation, architecture, and challenges on the way towards a virtualized optical substrate that supports network
virtualization.
Advisors/Committee Members: Xiaojun Cao.
Subjects/Keywords: Network Virtualization; Virtual Network Embedding; Network Survivability; Optical Virtualization
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Hu, Q. (2015). Towards a Virtualized Next Generation Internet. (Doctoral Dissertation). Georgia State University. Retrieved from https://scholarworks.gsu.edu/cs_diss/95
Chicago Manual of Style (16th Edition):
Hu, Qian. “Towards a Virtualized Next Generation Internet.” 2015. Doctoral Dissertation, Georgia State University. Accessed March 02, 2021.
https://scholarworks.gsu.edu/cs_diss/95.
MLA Handbook (7th Edition):
Hu, Qian. “Towards a Virtualized Next Generation Internet.” 2015. Web. 02 Mar 2021.
Vancouver:
Hu Q. Towards a Virtualized Next Generation Internet. [Internet] [Doctoral dissertation]. Georgia State University; 2015. [cited 2021 Mar 02].
Available from: https://scholarworks.gsu.edu/cs_diss/95.
Council of Science Editors:
Hu Q. Towards a Virtualized Next Generation Internet. [Doctoral Dissertation]. Georgia State University; 2015. Available from: https://scholarworks.gsu.edu/cs_diss/95

Universidade Nova
27.
Costa, Daniela Cristina Basílio da.
Green IT adoption via virtualization.
Degree: 2013, Universidade Nova
URL: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/9174
► Dissertação apresentada como requisito parcial para obtenção do grau de Mestre em Estatística e Gestão de Informação
This study attempts to test and validate the…
(more)
▼ Dissertação apresentada como requisito parcial para obtenção do grau de Mestre em Estatística e Gestão de Informação
This study attempts to test and validate the theoretical framework proposed by Bose and Luo (2011) that identifies and examines the factors that contribute to the assessment of a firm’s readiness to go green via IT-enable virtualization. The conceptual framework is based on three theoretical foundations: (1) technology-organization-environment (TOE) framework; (2) process virtualization theory (PVT); and (3) diffusion of innovation (DOI) theory. To test the framework, data were collected from 251 firms in Portugal and partial least square (PLS) was used to estimate the research model. The study found that environmental context (i.e., competition intensity and regulatory support) influences Green IT adoption more than the technological and organizational contexts. The research also confirmed that the pre-stage of adoption (i.e., Green IT initialization) influences the formal stage of adoption (i.e., Green IT integration), which in turn influences the post-adoption stage (i.e., Green IT maturation). As sustainable products and practices become increasingly relevant, the study adds new knowledge to this emergent area of IS research and provides valuable insights to IS managers and decision makers.
Advisors/Committee Members: Oliveira,Tiago André Gonçalves Félix de.
Subjects/Keywords: Green IT; Virtualization; Process virtualization; Green IT framework; Technology-organization-environment (TOE); Process virtualization theory (PVT); Diffusion of innovation (DOI)
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Costa, D. C. B. d. (2013). Green IT adoption via virtualization. (Thesis). Universidade Nova. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/9174
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Costa, Daniela Cristina Basílio da. “Green IT adoption via virtualization.” 2013. Thesis, Universidade Nova. Accessed March 02, 2021.
http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/9174.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Costa, Daniela Cristina Basílio da. “Green IT adoption via virtualization.” 2013. Web. 02 Mar 2021.
Vancouver:
Costa DCBd. Green IT adoption via virtualization. [Internet] [Thesis]. Universidade Nova; 2013. [cited 2021 Mar 02].
Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/9174.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Costa DCBd. Green IT adoption via virtualization. [Thesis]. Universidade Nova; 2013. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/9174
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of New Mexico
28.
Hoffman, John.
A Dynamically Reconfigurable Parallel Processing Framework with Application to High-Performance Video Processing.
Degree: Electrical and Computer Engineering, 2013, University of New Mexico
URL: http://hdl.handle.net/1928/23332
► Digital video processing demands have and will continue to grow at unprecedented rates. Growth comes from ever increasing volume of data, demand for higher resolution,…
(more)
▼ Digital video processing demands have and will continue to grow at unprecedented rates. Growth comes from ever increasing volume of data, demand for higher resolution, higher frame rates, and the need for high capacity communications. Moreover, economic realities force continued reductions in size, weight and power requirements. The ever-changing needs and complexities associated with effective video processing systems leads to the consideration of dynamically reconfigurable systems. The goal of this dissertation research was to develop and demonstrate the viability of integrated parallel processing system that effectively and efficiently apply pre-optimized hardware cores for processing video streamed data. Digital video is decomposed into packets which are then distributed over a group of parallel video processing cores. Real time processing requires an effective task scheduler that distributes video packets efficiently to any of the reconfigurable distributed processing nodes across the framework, with the nodes running on FPGA reconfigurable logic in an inherently Virtual' mode. The developed framework, coupled with the use of hardware techniques for dynamic processing optimization achieves an optimal cost/power/performance realization for video processing applications. The system is evaluated by testing processor utilization relative to I/O bandwidth and algorithm latency using a separable 2-D FIR filtering system, and a dynamic pixel processor. For these applications, the system can achieve performance of hundreds of 640x480 video frames per second across an eight lane Gen I PCIe bus. Overall, optimal performance is achieved in the sense that video data is processed at the maximum possible rate that can be streamed through the processing cores. This performance, coupled with inherent ability to dynamically add new algorithms to the described dynamically reconfigurable distributed processing framework, creates new opportunities for realizable and economic hardware
virtualization.'
Advisors/Committee Members: Pattichis, Marios, Christodoulou, Christos, Payman, Zarkesh-Ha, Lopezleiva, Carlos.
Subjects/Keywords: FPGA; Dynamic Partial Reconfiguration; DPR; Video Processing; FPGA Framework; Reconfigurable Computing; Hardware Virtualization; Virtualization; Firmware Virtualization
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Hoffman, J. (2013). A Dynamically Reconfigurable Parallel Processing Framework with Application to High-Performance Video Processing. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/23332
Chicago Manual of Style (16th Edition):
Hoffman, John. “A Dynamically Reconfigurable Parallel Processing Framework with Application to High-Performance Video Processing.” 2013. Doctoral Dissertation, University of New Mexico. Accessed March 02, 2021.
http://hdl.handle.net/1928/23332.
MLA Handbook (7th Edition):
Hoffman, John. “A Dynamically Reconfigurable Parallel Processing Framework with Application to High-Performance Video Processing.” 2013. Web. 02 Mar 2021.
Vancouver:
Hoffman J. A Dynamically Reconfigurable Parallel Processing Framework with Application to High-Performance Video Processing. [Internet] [Doctoral dissertation]. University of New Mexico; 2013. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/1928/23332.
Council of Science Editors:
Hoffman J. A Dynamically Reconfigurable Parallel Processing Framework with Application to High-Performance Video Processing. [Doctoral Dissertation]. University of New Mexico; 2013. Available from: http://hdl.handle.net/1928/23332

Brno University of Technology
29.
Müller, Pavel.
Virtualizace platformy x86: Virtualization for the x86 platform.
Degree: 2019, Brno University of Technology
URL: http://hdl.handle.net/11012/17404
► A thesis describes a virtualization of x86 platform. In the first part the virtualization, its utilization and specific types of virtualization are described in a…
(more)
▼ A thesis describes a
virtualization of x86 platform. In the first part the
virtualization, its utilization and specific types of
virtualization are described in a general way. The specific types of
virtualization are full
virtualization, paravirtualization,
virtualization on core level, hardware
virtualization and application
virtualization. There is also described a general function of virtual machine, reasons of
virtualization implementing, current development, focusing on future development and
virtualization security. In the second part the thesis tries to find a solution with establishment charges of
virtualization. To test purposes the following software programs were used. The first one is freeware benchmark Sandra from SiSoft company and second one is a software created on the basis of the thesis. For the tests the CPU overhead both an arithmetic-logical unit and a unit for work with numbers and floating decimal point, a RAM data transmission efficiency and a hard disk logging rate were chosen. The following test machines were described: VMWare, VirtualBox and Xen. In the third and the last part of the thesis is a description of network interface
virtualization methods with a utilization of tun and tap system. In each particular step a virtual network interface creation and implementation are presented. Model situations of communication among virtual and physical machines with usage of these devices are described at the end of the thesis.
Advisors/Committee Members: Pelka, Tomáš (advisor), Kyselý, František (referee).
Subjects/Keywords: virtualizace; paravirtualizace; VirtualBox; VMWare; Xen; tun; tap; x86 virtualization; virtualization; paravirtualization; VirtualBox; VMWare; Xen; tun; tap; x86 virtualization
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Müller, P. (2019). Virtualizace platformy x86: Virtualization for the x86 platform. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/17404
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Müller, Pavel. “Virtualizace platformy x86: Virtualization for the x86 platform.” 2019. Thesis, Brno University of Technology. Accessed March 02, 2021.
http://hdl.handle.net/11012/17404.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Müller, Pavel. “Virtualizace platformy x86: Virtualization for the x86 platform.” 2019. Web. 02 Mar 2021.
Vancouver:
Müller P. Virtualizace platformy x86: Virtualization for the x86 platform. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Mar 02].
Available from: http://hdl.handle.net/11012/17404.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Müller P. Virtualizace platformy x86: Virtualization for the x86 platform. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/17404
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of California – Berkeley
30.
Sherry, Justine Marie.
Middleboxes as a Cloud Service.
Degree: Computer Science, 2016, University of California – Berkeley
URL: http://www.escholarship.org/uc/item/4kj7g8dz
► Today's networks do much more than merely deliver packets. Through the deployment of middleboxes, enterprise networks today provide improved security – e.g., filtering malicious content…
(more)
▼ Today's networks do much more than merely deliver packets. Through the deployment of middleboxes, enterprise networks today provide improved security – e.g., filtering malicious content – and performance capabilities – e.g., caching frequently accessed content. Although middleboxes are deployed widely in enterprises, they bring with them many challenges: they are complicated to manage, expensive, prone to failures, and challenge privacy expectations.In this thesis, we aim to bring the benefits of cloud computing to networking.We argue that middlebox services can be outsourced to cloud providers in asimilar fashion to how mail, compute, and storage are today outsourced. We beginby presenting APLOMB, a system that allows enterprises to outsource middleboxprocessing to a third party cloud or ISP. For enterprise networks, APLOMB canreduce costs, ease management, and provide resources for scalability andfailover. For service providers, APLOMB offers new customers and businessopportunities, but also presents new challenges. Middleboxes have tighterperformance demands than existing cloud services, and hence supporting APLOMBrequires redesigning software at the cloud. We re-consider classical cloudchallenges including fault-tolerance and privacy, showing how to implementmiddlebox software solutions with throughput and latency 2-4 orders of magnitudemore efficient than general-purpose cloud approaches. %Some of the technologies discussed in this thesis are presently being adopted by industrial systems used by cloud providers and ISPs.
Subjects/Keywords: Computer science; Middleboxes; Network Functions Virtualization; Networks
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Sherry, J. M. (2016). Middleboxes as a Cloud Service. (Thesis). University of California – Berkeley. Retrieved from http://www.escholarship.org/uc/item/4kj7g8dz
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Sherry, Justine Marie. “Middleboxes as a Cloud Service.” 2016. Thesis, University of California – Berkeley. Accessed March 02, 2021.
http://www.escholarship.org/uc/item/4kj7g8dz.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Sherry, Justine Marie. “Middleboxes as a Cloud Service.” 2016. Web. 02 Mar 2021.
Vancouver:
Sherry JM. Middleboxes as a Cloud Service. [Internet] [Thesis]. University of California – Berkeley; 2016. [cited 2021 Mar 02].
Available from: http://www.escholarship.org/uc/item/4kj7g8dz.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Sherry JM. Middleboxes as a Cloud Service. [Thesis]. University of California – Berkeley; 2016. Available from: http://www.escholarship.org/uc/item/4kj7g8dz
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
◁ [1] [2] [3] [4] [5] … [23] ▶
.