Academic literature on the topic 'Distributed virtualization. eng'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Distributed virtualization. eng.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Distributed virtualization. eng"

1

Mikkilineni, Rao, Giovanni Morana, Daniele Zito, and Marco Di Sano. "Service Virtualization Using a Non-von Neumann Parallel, Distributed, and Scalable Computing Model." Journal of Computer Networks and Communications 2012 (2012): 1–10. http://dx.doi.org/10.1155/2012/604018.

Full text
Abstract:
This paper describes a prototype implementing a high degree of transaction resilience in distributed software systems using a non-von Neumann computing model exploiting parallelism in computing nodes. The prototype incorporates fault, configuration, accounting, performance, and security (FCAPS) management using a signaling network overlay and allows the dynamic control of a set of distributed computing elements in a network. Each node is a computing entity endowed with self-management and signaling capabilities to collaborate with similar nodes in a network. The separation of parallel computin
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Lifeng, Celimuge Wu, Tsutomu Yoshinaga, Xianfu Chen, Tutomu Murase, and Yusheng Ji. "Multihop Data Delivery Virtualization for Green Decentralized IoT." Wireless Communications and Mobile Computing 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/9805784.

Full text
Abstract:
Decentralized communication technologies (i.e., ad hoc networks) provide more opportunities for emerging wireless Internet of Things (IoT) due to the flexibility and expandability of distributed architecture. However, the performance degradation of wireless communications with the increase of the number of hops becomes the main obstacle in the development of decentralized wireless IoT systems. The main challenges come from the difficulty in designing a resource and energy efficient multihop communication protocol. Transmission control protocol (TCP), the most frequently used transport layer pr
APA, Harvard, Vancouver, ISO, and other styles
3

Choi, Jin-young, Minkyoung Cho, and Jik-Soo Kim. "Employing Vertical Elasticity for Efficient Big Data Processing in Container-Based Cloud Environments." Applied Sciences 11, no. 13 (2021): 6200. http://dx.doi.org/10.3390/app11136200.

Full text
Abstract:
Recently, “Big Data” platform technologies have become crucial for distributed processing of diverse unstructured or semi-structured data as the amount of data generated increases rapidly. In order to effectively manage these Big Data, Cloud Computing has been playing an important role by providing scalable data storage and computing resources for competitive and economical Big Data processing. Accordingly, server virtualization technologies that are the cornerstone of Cloud Computing have attracted a lot of research interests. However, conventional hypervisor-based virtualization can cause pe
APA, Harvard, Vancouver, ISO, and other styles
4

Ravichandran, S., and J. Sathiamoorthy. "An Innovative Performance of Refuge using Stowage Main Servers in Cloud Computing Equipment." Asian Journal of Computer Science and Technology 10, no. 1 (2021): 13–17. http://dx.doi.org/10.51983/ajcst-2021.10.1.2695.

Full text
Abstract:
Distributed computing has been imagined as the cutting edge engineering of IT Enterprise. It moves the application programming and information bases to the incorporated enormous server farms, where the administration of the information and administrations may not be completely dependable. There are various security issues for distributed computing as it envelops numerous innovations including networks, information bases, working frameworks, virtualization, asset planning, exchange the board, load adjusting, simultaneousness control and memory the executives. Putting away information in an outs
APA, Harvard, Vancouver, ISO, and other styles
5

Xu, Yansen, and Ved P. Kafle. "An Availability-Enhanced Service Function Chain Placement Scheme in Network Function Virtualization." Journal of Sensor and Actuator Networks 8, no. 2 (2019): 34. http://dx.doi.org/10.3390/jsan8020034.

Full text
Abstract:
A service function chain (SFC) is an ordered virtual network function (VNF) chain for processing traffic flows to deliver end-to-end network services in a virtual networking environment. A challenging problem for an SFC in this context is to determine where to deploy VNFs and how to route traffic between VNFs of an SFC on a substrate network. In this paper, we formulate an SFC placement problem as an integer linear programing (ILP) model, and propose an availability-enhanced VNF placing scheme based on the layered graphs approach. To improve the availability of SFC deployment, our scheme distr
APA, Harvard, Vancouver, ISO, and other styles
6

Benomar, Zakaria, Francesco Longo, Giovanni Merlino, and Antonio Puliafito. "Cloud-based Network Virtualization in IoT with OpenStack." ACM Transactions on Internet Technology 22, no. 1 (2022): 1–26. http://dx.doi.org/10.1145/3460818.

Full text
Abstract:
In Cloud computing deployments, specifically in the Infrastructure-as-a-Service (IaaS) model, networking is one of the core enabling facilities provided for the users. The IaaS approach ensures significant flexibility and manageability, since the networking resources and topologies are entirely under users’ control. In this context, considerable efforts have been devoted to promoting the Cloud paradigm as a suitable solution for managing IoT environments. Deep and genuine integration between the two ecosystems, Cloud and IoT, may only be attainable at the IaaS level. In light of extending the
APA, Harvard, Vancouver, ISO, and other styles
7

Jayakumar, N., and A. M. Kulkarni. "A Simple Measuring Model for Evaluating the Performance of Small Block Size Accesses in Lustre File System." Engineering, Technology & Applied Science Research 7, no. 6 (2017): 2313–18. http://dx.doi.org/10.48084/etasr.1557.

Full text
Abstract:
Storage performance is one of the vital characteristics of a big data environment. Data throughput can be increased to some extent using storage virtualization and parallel data paths. Technology has enhanced the various SANs and storage topologies to be adaptable for diverse applications that improve end to end performance. In big data environments the mostly used file systems are HDFS (Hadoop Distributed File System) and Lustre. There are environments in which both HDFS and Lustre are connected, and the applications directly work on Lustre. In Lustre architecture with out-of-band storage vir
APA, Harvard, Vancouver, ISO, and other styles
8

Bhardwaj, Akashdeep, and Sam Goundar. "Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks." International Journal of Cloud Applications and Computing 7, no. 3 (2017): 59–75. http://dx.doi.org/10.4018/ijcac.2017070103.

Full text
Abstract:
With the rise in cyber-attacks on cloud environments like Brute Force, Malware or Distributed Denial of Service attacks, information security officers and data center administrators have a monumental task on hand. Organizations design data center and service delivery with the aim of catering to maximize device provisioning & availability, improve application performance, ensure better server virtualization and end up securing data centers using security solutions at internet edge protection level. These security solutions prove to be largely inadequate in times of a DDoS cyber-attack. In t
APA, Harvard, Vancouver, ISO, and other styles
9

Baciu, George, Yungzhe Wang, and Chenhui Li. "Cognitive Visual Analytics of Multi-Dimensional Cloud System Monitoring Data." International Journal of Software Science and Computational Intelligence 9, no. 1 (2017): 20–34. http://dx.doi.org/10.4018/ijssci.2017010102.

Full text
Abstract:
Hardware virtualization has enabled large scale computational service delivery models with high cost leverage and improved resource utilization on cloud computing platforms. This has completely changed the landscape of computing in the last decade. It has also enabled large–scale data analytics through distributed high performance computing. Due to the infrastructure complexity, end–users and administrators of cloud platforms can rarely obtain a full picture of the state of cloud computing systems and data centers. Recent monitoring tools enable users to obtain large amounts of data with respe
APA, Harvard, Vancouver, ISO, and other styles
10

Vidal, Ivan, Borja Nogales, Diego Lopez, Juan Rodríguez, Francisco Valera, and Arturo Azcorra. "A Secure Link-Layer Connectivity Platform for Multi-Site NFV Services." Electronics 10, no. 15 (2021): 1868. http://dx.doi.org/10.3390/electronics10151868.

Full text
Abstract:
Network Functions Virtualization (NFV) is a key technology for network automation and has been instrumental to materialize the disruptive view of 5G and beyond mobile networks. In particular, 5G embraces NFV to support the automated and agile provision of telecommunication and vertical services as a composition of versatile virtualized components, referred to as Virtual Network Functions (VNFs). It provides a high degree of flexibility in placing these components on distributed NFV infrastructures (e.g., at the network edge, close to end users). Still, this flexibility creates new challenges i
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Distributed virtualization. eng"

1

Cruz, Daniel Igarashi. "FLEXLAB : Middleware de virtualização de hardware para gerenciamento centralizado de computadores em rede /." São José do Rio Preto : [s.n.], 2008. http://hdl.handle.net/11449/98696.

Full text
Abstract:
Orientador: Marcos Antônio Cavenaghi<br>Banca: Renata Spolon Lobato<br>Banca: Ronaldo Lara Gonçalves<br>Resumo: O gerenciamento de um conglomerado de computadores em rede é uma atividade potencialmente complexa devido à natureza heterogênea destes equipamentos. Estas redes podem apresentar computadores com diferentes configurações em sua camada de software básico e aplicativos em função das diferenças de configuração de hardware em cada nó da rede. Neste cenário, cada computador torna-se uma entidade gerenciada individualmente, exigindo uma atividade manual de configuração da imagem de sistema
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Distributed virtualization. eng"

1

Verma, Chitresh, and Rajiv Pandey. "Mobile Cloud Computing Integrating Cloud, Mobile Computing, and Networking Services Through Virtualization." In Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5339-8.ch010.

Full text
Abstract:
Mobile computing is a critical technology area which is actively integrated with field of cloud computing. It is broadly an application of virtualization technology at both ends of client server architecture. The mobile and cloud computing is a natural combination as mobile devices have limited computing and storage capacity, thus to reap the benefits of high end computing, cloud is the answer. Thus, amalgamation of mobile platform with cloud platform is inevitable. This chapter shall deliberate on the various aspects of mobile computing, mobile cloud computing and its relationship with virtualization technology. The detailed integration aspects and virtualization shall be signified through case study and suitable real time examples. The chapter shall envisage a case study, modeling the virtualization in the context of mobile cloud.
APA, Harvard, Vancouver, ISO, and other styles
2

Mikkilineni, Rao, Giovanni Morana, and Ian Seyler. "Implementing Distributed, Self-Managing Computing Services Infrastructure using a Scalable, Parallel and Network-Centric Computing Model." In Achieving Federated and Self-Manageable Cloud Infrastructures. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-1631-8.ch004.

Full text
Abstract:
This chapter introduces a new network-centric computing model using Distributed Intelligent Managed Element (DIME) network architecture (DNA). A parallel signaling network overlay over a network of self-managed von Neumann computing nodes is utilized to implement dynamic fault, configuration, accounting, performance, and security management of both the nodes and the network based on business priorities, workload variations and latency constraints. Two implementations of the new computing model are described which demonstrate the feasibility of the new computing model. One implementation provides service virtualization at the Linux process level and another provides virtualization of a core in a many-core processor. Both point to an alternative way to assure end-to-end transaction reliability, availability, performance, and security in distributed Cloud computing, reducing current complexity in configuring and managing virtual machines and making the implementation of Federation of Clouds simpler.
APA, Harvard, Vancouver, ISO, and other styles
3

Gharajeh, Mohammad Samadi. "Applications of Virtualization Technology in Grid Systems and Cloud Servers." In Advances in Computer and Electrical Engineering. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2785-5.ch001.

Full text
Abstract:
Grid systems and cloud servers are two distributed networks that deliver computing resources (e.g., file storages) to users' services via a large and often global network of computers. Virtualization technology can enhance the efficiency of these networks by dedicating the available resources to multiple execution environments. This chapter describes applications of virtualization technology in grid systems and cloud servers. It presents different aspects of virtualized networks in systematic and teaching issues. Virtual machine abstraction virtualizes high-performance computing environments to increase the service quality. Besides, grid virtualization engine and virtual clusters are used in grid systems to accomplish users' services in virtualized environments, efficiently. The chapter, also, explains various virtualization technologies in cloud severs. The evaluation results analyze performance rate of the high-performance computing and virtualized grid systems in terms of bandwidth, latency, number of nodes, and throughput.
APA, Harvard, Vancouver, ISO, and other styles
4

Kitanov, Stojan, Borislav Popovski, and Toni Janevski. "Quality Evaluation of Cloud and Fog Computing Services in 5G Networks." In Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5339-8.ch086.

Full text
Abstract:
Because of the increased computing and intelligent networking demands in 5G network, cloud computing alone encounters too many limitations, such as requirements for reduced latency, high mobility, high scalability, and real-time execution. A new paradigm called fog computing has emerged to resolve these issues. Fog computing distributes computing, data processing, and networking services to the edge of the network, closer to end users. Fog applied in 5G significantly improves network performance in terms of spectral and energy efficiency, enable direct device-to-device wireless communications, and support the growing trend of network function virtualization and separation of network control intelligence from radio network hardware. This chapter evaluates the quality of cloud and fog computing services in 5G network, and proposes five algorithms for an optimal selection of 5G RAN according to the service requirements. The results demonstrate that fog computing is a suitable technology solution for 5G networks.
APA, Harvard, Vancouver, ISO, and other styles
5

Bhardwaj, Akashdeep, and Sam Goundar. "Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks." In Research Anthology on Combating Denial-of-Service Attacks. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5348-0.ch028.

Full text
Abstract:
With the rise in cyber-attacks on cloud environments like Brute Force, Malware or Distributed Denial of Service attacks, information security officers and data center administrators have a monumental task on hand. Organizations design data center and service delivery with the aim of catering to maximize device provisioning &amp; availability, improve application performance, ensure better server virtualization and end up securing data centers using security solutions at internet edge protection level. These security solutions prove to be largely inadequate in times of a DDoS cyber-attack. In this paper, traditional data center design is reviewed and compared to the proposed three tier data center. The resilience to withstand against DDoS attacks is measured for Real User Monitoring parameters, compared for the two infrastructure designs and the data is validated using T-Test.
APA, Harvard, Vancouver, ISO, and other styles
6

Baciu, George, Yungzhe Wang, and Chenhui Li. "Cognitive Visual Analytics of Multi-Dimensional Cloud System Monitoring Data." In Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5339-8.ch070.

Full text
Abstract:
Hardware virtualization has enabled large scale computational service delivery models with high cost leverage and improved resource utilization on cloud computing platforms. This has completely changed the landscape of computing in the last decade. It has also enabled large–scale data analytics through distributed high performance computing. Due to the infrastructure complexity, end–users and administrators of cloud platforms can rarely obtain a full picture of the state of cloud computing systems and data centers. Recent monitoring tools enable users to obtain large amounts of data with respect to many utilization parameters of cloud platforms. However, they fail to get the maximal overall insight into the resource utilization dynamics of cloud platforms. Furthermore, existing tools make it difficult to observe large-scale patterns, making it difficult to learn from the past behavior of cloud system dynamics. In this work, the authors describe a perceptual-based interactive visualization platform that gives users and administrators a cognitive view of cloud computing system dynamics.
APA, Harvard, Vancouver, ISO, and other styles
7

Popescu, George V. "Distributed Indexing Networks for Efficient Large-Scale Group Communication." In Handbook of Research on P2P and Grid Systems for Service-Oriented Computing. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-686-5.ch015.

Full text
Abstract:
Recently a new category of communication network paradigms has emerged: overlay networks for content distribution and group communication, application level multicast and distributed hash tables for efficient indexing and look-up of network resources, etc. As these ideas mature, new Internet architectures emerge. The authors describe here an autonomic, self-optimizing, network virtualization middleware architecture designed for large scale distributed applications. The proposed architecture uses end-hosts and proxies at the edge of the network as the forwarding nodes for distributing content to multiple receivers using simple point-to-point communication. Routing nodes have the capability to process the content prior to forwarding to meet the heterogeneous requirements of receivers. The proposed architecture builds upon a new network abstraction. Distributed indexing networks (DIN) is a new paradigm of communication networks design that relies on assigning indices to communication entities, communication infrastructure nodes and distributed infrastructure resources to control and disseminate information. DINs are in essence overlay networks whose topology is defined by a set of connectivity rules on indices assigned to network nodes. DINs route data packets using network indices (identifiers) and descriptors contained in the application level routing header; messages are routed hop by hop by querying at each node an application level routing indexing structure. As an application of DINs, the authors present an index-based routing multicast protocol together with its distribution tree optimization algorithm. To support applications involving large dynamic multicast groups, the application level multicast scheme uses hierarchical group membership aggregation and stateless forwarding within clusters of network nodes. The authors define the information space (IS) as the multidimensional space that indexes all information available in the network. The information includes infrastructure information (network nodes addresses, storage nodes location), network measurements data, distributed content descriptors, communication group identifiers, real-time published streams and other application dependent communication semantics, etc. The entity communication interest (ECI) is the vector describing the time-dependent information preferences of a network entity (multicast group client, user, etc.). Communication control architecture partitions the IS into interest cells mapped to multicast communication groups. The proposed control algorithm uses proximity-based clustering of network nodes and hierarchical communication interest aggregation to achieve scalability. The authors show that large-scale group communication in the proposed distributed indexing networks requires low computation overhead with a controlled degradation of the end-to-end data path performance.
APA, Harvard, Vancouver, ISO, and other styles
8

Yeboah-Boateng, Ezer Osei. "Cyber-Security Concerns with Cloud Computing." In Advances in Systems Analysis, Software Engineering, and High Performance Computing. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1721-4.ch005.

Full text
Abstract:
Information is modeled into virtual objects to create value for its owner. The value chain involves stakeholders with varied responsibilities in the cyber-market. Cloud computing emerged out of virtualization, distributed and grid computing, and has altered the value creation landscape, through strategic and sensitive information management. It offers services that use resources in a utility fashion. The flexible, cost-effective service models are opportunities for SMEs. Whilst using these tools for value-creation is imperative, a myriad of security concerns confront both providers and end-users. Vulnerabilities and threats are key concerns, so that value created is strategically aligned with corporate vision, appropriated and sustained. What is the extent of impact? Expert opinions were elicited of 4 C-level officers and 10 security operatives. Shared technology issues, malicious insiders and service hijacking are considered major threats. Also, an intuitive strategic model for Value-Creation Cloud-based Cyber-security is proposed as guidance in fostering IT-enabled initiatives.
APA, Harvard, Vancouver, ISO, and other styles
9

Yeboah-Boateng, Ezer Osei. "Cyber-Security Concerns With Cloud Computing." In Cyber Security and Threats. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5634-3.ch049.

Full text
Abstract:
Information is modeled into virtual objects to create value for its owner. The value chain involves stakeholders with varied responsibilities in the cyber-market. Cloud computing emerged out of virtualization, distributed and grid computing, and has altered the value creation landscape, through strategic and sensitive information management. It offers services that use resources in a utility fashion. The flexible, cost-effective service models are opportunities for SMEs. Whilst using these tools for value-creation is imperative, a myriad of security concerns confront both providers and end-users. Vulnerabilities and threats are key concerns, so that value created is strategically aligned with corporate vision, appropriated and sustained. What is the extent of impact? Expert opinions were elicited of 4 C-level officers and 10 security operatives. Shared technology issues, malicious insiders and service hijacking are considered major threats. Also, an intuitive strategic model for Value-Creation Cloud-based Cyber-security is proposed as guidance in fostering IT-enabled initiatives.
APA, Harvard, Vancouver, ISO, and other styles
10

Kitanov, Stojan, Borislav Popovski, and Toni Janevski. "Quality Evaluation of Cloud and Fog Computing Services in 5G Networks." In Enabling Technologies and Architectures for Next-Generation Networking Capabilities. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-6023-4.ch001.

Full text
Abstract:
Because of the increased computing and intelligent networking demands in 5G network, cloud computing alone encounters too many limitations, such as requirements for reduced latency, high mobility, high scalability, and real-time execution. A new paradigm called fog computing has emerged to resolve these issues. Fog computing distributes computing, data processing, and networking services to the edge of the network, closer to end users. Fog applied in 5G significantly improves network performance in terms of spectral and energy efficiency, enable direct device-to-device wireless communications, and support the growing trend of network function virtualization and separation of network control intelligence from radio network hardware. This chapter evaluates the quality of cloud and fog computing services in 5G network, and proposes five algorithms for an optimal selection of 5G RAN according to the service requirements. The results demonstrate that fog computing is a suitable technology solution for 5G networks.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Distributed virtualization. eng"

1

Mishra, Prateek, Sanjay Kumar Yadav, and Sunil Arora. "TCB Minimization towards Secured and Lightweight IoT End Device Architecture using Virtualization at Fog Node." In 2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2020. http://dx.doi.org/10.1109/pdgc50313.2020.9315850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Meckler, Milton. "Design for Sustainable Data Center Energy Use and Eco-Footprint." In ASME 2010 4th International Conference on Energy Sustainability. ASMEDC, 2010. http://dx.doi.org/10.1115/es2010-90116.

Full text
Abstract:
What does remain a growing concern for many users of Data Centers is their continuing availability following the explosive growth of internet services in recent years, The recent maximizing of Data Center IT virtualization investments has resulted in improving the consolidation of prior (under utilized) server and cabling resources resulting in higher overall facility utilization and IT capacity. It has also resulted in excessive levels of equipment heat release, e.g. high energy (i.e. blade type) servers and telecommunication equipment, that challenge central and distributed air conditioning
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!