Tesis sobre el tema "Virtualization architecture"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Virtualization architecture".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Köhler, Fredrik. "Network Virtualization in Multi-hop Heterogeneous Architecture". Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-38696.
Texto completoKorotich, Elena. "A Service Virtualization Architecture for Efficient Multimedia Delivery". Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23608.
Texto completoMetzker, Martin. "A network QoS management architecture for virtualization environments". Diss., Ludwig-Maximilians-Universität München, 2014. http://nbn-resolving.de/urn:nbn:de:bvb:19-177848.
Texto completoVerwaltungsaufgaben für Netzdienstgüte umfassen das Bereitstellen, Sichern und Berichten von Flusseigenschaften in Rechnernetzen. Während der letzen zwei Jahrzehnte entwickelte sich Virtualisierung zu einer Schlüsseltechnologie für Rechenzentren, bisher ohne Möglichkeiten zum Verwalten der Netzdienstgüte. Der Einsatz von Virtualisierung verschiebt den Fokus beim Betrieb von Rechenzentren weg von physischen Komponenten und Netzen, hin zu virtuellen Infrastrukturen (VI) und ihren Einsatzzwecken. VIs werden als unabhängige, voneinander isolierte Einheiten entwickelt und verwaltet. Ohne Netzdienstgüte, sind VIs nicht so vielseitig und effizient einsetzbar wie physische Aufbauten. Diese Arbeit schließt diese Lücke mit der Entwicklung einer Managementarchitektur zur Verwaltung der Netzdienstgüte in Virtualisierungsumgebungen. Zunächst werden Anforderungen aus realen Szenarios abgeleitet, mit denen Architekturen bewertet werden können. Zur Abgrenzung der speziellen Aufgabe Netzdienstgüteverwaltung innerhalb des allgemeinen Managementproblems, wird anschließend ein Lebenszyklusmodell für VIs vorgestellt. Die Entwicklung einer Taxonomie für Kopplungen und Komponenten ermöglicht technologiespezifische Adaptoren zur Integration von in Virtualisierungsumgebungen eingesetzten Technologien. Kerngedanke hinter der entwickelten Architektur ist eine Rückkopplungsschleife und ihre einhergehende Methode zur Strukturierung und Anordnung von Teilproblemen. Abschließend zeigt eine prototypische Implementierung, dass dieser Ansatz für Verwaltung und Durchsetzung von Netzdienstgüte in Virtualisierungsumgebungen geeignet ist. Die Architektur kann ihren Zweck sowie die gestellten Anforderungen erfüllen. Schlussendlich ist Netzdienstgüte ein Bereich von vielen beim Betrieb von Virtualisierungsumgebungen. Die Architektur zeigt Schnittstellen zu anderen Bereichen auf, deren Integration zukünftigen Arbeiten überlassen bleibt.
Barros, Bruno Medeiros de. "Security architecture for network virtualization in cloud computing". Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-18012017-094453/.
Texto completoVirtualização de redes é uma área de pesquisa que tem ganho bastante atenção nos últimos anos, motivada pela necessidade de se implementar sistemas de comunicação seguros e de alta performance em infraestruturas de computação em nuvem. Em particular, os esforços de pesquisa nesta área têm levado ao desenvolvimento de soluções de segurança que visam aprimorar o isolamento entre os múltiplos inquilinos de sistemas de computação em nuvem públicos, uma demanda reconhecidamente crítica tanto pela comunidade acadêmica quanto pela indústria de tecnologia. Mais recentemente, o advento das Redes Definidas por Software (do inglês Software-Defined Networks - SDN) e da Virtualização de Funções de Rede (do inglês Network Function Virtualization - NFV) introduziu novos conceitos e técnicas que podem ser utilizadas para abordar questões de isolamento de redes virtualizadas em sistemas de computação em nuvem com múltiplos inquilinos, enquanto aprimoram a capacidade de gerenciamento e a flexibilidade de suas redes. Similarmente, tecnologias de virtualização assistida por hardware como Single Root I/O Virtualization - SR-IOV permitem a implementação do isolamento de recursos de hardware, melhorando o desempenho de redes físicas e virtualizadas. Com o intuito de implementar uma solução de virtualização de redes que aborda de maneira eficiente o problema de isolamento entre múltiplos inquilinos, nós apresentamos três estratégias complementares para o isolamento de recursos de rede em sistemas computação em nuvem. As estratégias apresentadas são então aplicadas na avaliação de arquiteturas de virtualização de rede existentes, revelando lacunas de segurança associadas às tecnologias utilizadas atualmente, e abrindo caminho para o desenvolvimento de novas soluções. Nós então propomos uma arquitetura de segurança que utiliza as estratégias apresentadas, e tecnologias como SDN, NFV e SR-IOV, para implementar domínios de rede seguros. As análises teórica e experimental da arquitetura proposta mostram considerável redução das superfícies de ataque em redes virtualizadas, com um pequeno impacto sobre o desempenho da comunicação entre máquinas virtuais de inquilinos da nuvem.
Montanari, Luca. "A Network Function Virtualization Architecture for Distributed IoT Gateways". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13345/.
Texto completoOprescu, Mihaela Iuniana. "Virtualization and distribution of the BGP control plane". Phd thesis, Institut National Polytechnique de Toulouse - INPT, 2012. http://tel.archives-ouvertes.fr/tel-00785007.
Texto completoAthreya, Manoj B. "Subverting Linux on-the-fly using hardware virtualization technology". Thesis, Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34844.
Texto completoMcBride, Daniel C. "Mapping, awareness, and virtualization network administrator training tool (MAVNATT) architecture and framework". Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45900.
Texto completoTactical networks are becoming more critical in maintaining centers of gravity for military operations as cyberspace becomes contested at all levels of war. As a result, the growth of network centric operations and increased operational tempo in the cyber domain has created a significant training gap for tactical network administrators. This research suggests that a computer-based environment can integrate the operational network and a training network into the same system to allow tactical network administrators to concurrently administer the network and conduct realistic training on an identical virtual network. A review of commercial and open-source tools identifies the baseline for an architecture and framework for this system. The architecture consists of a modular design comprised of mapping, awareness, and virtualization modules. The framework integrates these modules by defining a network topology format, programming language, graphical user interface solution, and virtualization solution. This research concludes by providing an implementation that demonstrates desired capabilities. While we demonstrate that the project goals are attainable, there is a need for further research and development to deploy this capability to fleet units.
Korikawa, Tomohiro. "Parallel Memory System Architectures for Packet Processing in Network Virtualization". Doctoral thesis, Kyoto University, 2021. http://hdl.handle.net/2433/263787.
Texto completoWagner, Ralf [Verfasser] y Bernhard [Akademischer Betreuer] Mitschang. "Integration management : a virtualization architecture for adapter technologies / Ralf Wagner. Betreuer: Bernhard Mitschang". Stuttgart : Universitätsbibliothek der Universität Stuttgart, 2015. http://d-nb.info/106910650X/34.
Texto completoMetzker, Martin [Verfasser] y Dieter [Akademischer Betreuer] Kranzlmüller. "A network QoS management architecture for virtualization environments / Martin Metzker. Betreuer: Dieter Kranzlmüller". München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2014. http://d-nb.info/1065610645/34.
Texto completoCooper, Andrew. "Towards a trusted grid architecture". Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:42268964-c1db-4599-9dbc-a1ceb1015ef1.
Texto completoJensen, Deron Eugene. "System-wide Performance Analysis for Virtualization". PDXScholar, 2014. https://pdxscholar.library.pdx.edu/open_access_etds/1789.
Texto completoFurgiuele, Antonio. "Architecture of the cloud, virtualization takes command : learning from black boxes, data centers and an architecture of the conditioned environment". Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/81746.
Texto completoThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (p. 127-128).
A single manageable architecture of the Cloud has been one of the most important social and technical changes of the 21st century. Cloud computing, our newest public utility is an attempt to confront and control cultural risk, it has rendered the environment of our exchanges calculable, manageable, seemingly predictable, and most importantly as a new form of capital. Cloud computing in its most basic terms is the system of virtualization of data storage and program access into an instantaneous service utility. The transformation of computing into a service industry is one of the key changes of the Information Age, and its logic is tied to the highly guarded mechanisms of a black box, an architecture machine, or more commonly known as the data center. In 2008, on a day with without the usual fanfare or barrage of academic manifestoes, grand claims of paradigm shifts, virtualization quietly took command. A seemingly simple moment where a cloud, the Cloud, emerged as a new form of managerial space that tied a large system of users to the hidden mechanisms of large scaled factories of information, a network of data centers. The project positions the Cloud and the data center into the architectural discourse, both historically and materially, through an analysis of its relationship to an emergent digital sublime and how it is managed, controlled and propelled through the obscure typologies of its architecture and images. The study of the Cloud and the data center through the notion of the sublime, and the organizational structures of typology we can more critically assess architecture's relationship to this new phase of the Information Age.
by Antonio Furgiuele.
S.M.in History, Theory and Criticism of Art and Architecture
Zahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding". Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.
Texto completoPolito, Guillermo. "Virtualization support for application runtime specialization and extension". Thesis, Lille 1, 2015. http://www.theses.fr/2015LIL10025/document.
Texto completoAn application runtime is the set of software elements that represent an application during its execution. Application runtimes should be adaptable to different contexts. Advances in computing technology both in hardware and software indeed demand it. For example, on one side we can think on extending a programming language to enhance the developers' productivity. On the other side we can also think on transparently reducing the memory footprint of applications to make them fit in constrained resource scenarios e.g., low networks or limited memory availability. We propose Espell, a virtualization infrastructure for object-oriented high-level languages runtimes. Espell provides a general purpose infrastructure to control and manipulate object-oriented runtimes in different situations. A first-class representation of an object-oriented runtime, namely an "object space", provides a high-level API that allows the manipulation of such runtime and clarifies the contract between the language and the virtual machine. A hypervisor is the client of an object space and manipulates it either directly through mirror objects, either by executing arbitrary expressions into it. We implemented a Espell prototype on Pharo. We show with this prototype that this infrastructure supports language "bootstrapping" and application runtime "tailoring". Using bootstrapping we describe an object-oriented high-level language initialization in terms of itself. A bootstrapped language takes benefit of its own abstractions and shows easier to extend. We bootstrapped four languages presenting different programming models e.g., traits, first-class instance variables and mirror-based reflection. Application runtime tailoring is a technique that generates a specialized application by extracting the elements of a program that are used during execution. A tailored application encompasses only the classes and methods it needs and avoids the code bloat that appears from the usage of third-party libraries and frameworks. Our run-fail-grow tailoring technique based on Espell succeeds in creating specialized versions of applications, saving between a 95% and 99% of memory in comparison with Pharo's official distribution
Duan, Kewei. "Resource-oriented architecture based scientific workflow modelling". Thesis, University of Bath, 2016. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.698986.
Texto completoKhalifa, Ahmed Abdelmonem Abuelfotooh Ali. "Collaborative Computing Cloud: Architecture and Management Platform". Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/72866.
Texto completoPh. D.
Di, Santi Silvio. "5G Network Architecture". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/20432/.
Texto completoFoukas, Xenofon. "Towards a programmable and virtualized mobile radio access network architecture". Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31406.
Texto completoRaad, Patrick. "Protocol architecture and algorithms for distributed data center networks". Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066571/document.
Texto completoWhile many business and personal applications are being pushed to the cloud, offering a reliable and a stable network connectivity to cloud-hosted services becomes an important challenge to face in future networks. In this dissertation, we design advanced network protocols, algorithms and communication strategies to cope with this evolution in distributed data center architectures. We propose a user-centric distributed cloud network architecture that is able to: (i) migrate virtual resources between data centers with an optimized service downtime; (ii) offer resilient access to virtual resources; (iii) minimize the cloud access latency. We identify two main decision making problems: the virtual machine orchestration problem, also taking care of user mobility, and the routing locator switching configuration problem, taking care of both extra and intra data center link states. We evaluate our architecture using real test beds of geographically distributed data centers, and we also simulate realistic scenarios based on real mobility traces. We show that migrating virtual machines between data centers at negligible downtime is possible by enhancing overlay protocols. We then demonstrate that by linking cloud virtual resource mobility to user mobility we can get a considerable gain in the transfer rates. We prove by simulations using real traces that the virtual machine placement decision is more important than the routing locator switching decision problem when the goal is to increase the connection throughput: the cloud access performance is primarily affected by the former decision, while the latter decision can be left to intra data center traffic engineering solutions. Finally, we propose solutions to take profit from multipath transport protocols for accelerating cloud access performance in our architecture, and to let link-state intra data center routing fabrics piloting the cloud access routing locator switching
Dévigne, Clément. "Exécution sécurisée de plusieurs machines virtuelles sur une plateforme Manycore". Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066138/document.
Texto completoManycore architectures, which comprise a lot of cores, are a way to answer the always growing demand for digital data processing, especially in a context of cloud computing infrastructures. These data, which can belong to companies as well as private individuals, are sensitive by nature, and this is why the isolation problematic is primordial. Yet, since the beginning of cloud computing, virtualization techniques are more and more used to allow different users to physically share the same hardware resources. This is all the more true for manycore architectures, and it partially comes down to the architectures to guarantee that data integrity and confidentiality are preserved for the software it executes. We propose in this thesis a secured virtualization environment for a manycore architecture. Our mechanism relies on hardware components and a hypervisor software to isolate several operating systems running on the same architecture. The hypervisor is in charge of allocating resources for the virtualized operating systems, but does not have the right to access the resources allocated to these systems. Thus, a security flaw in the hypervisor does not imperil data confidentiality and integrity of the virtualized systems. Our solution is evaluated on a cycle-accurate virtual prototype and has been implemented in a coherent shared memory manycore architecture. Our evaluations target the hardware and performance overheads added by our mechanisms. Finally, we analyze the security provided by our solution
Roberts, Erik S. "Virtualization of AEGIS a study of the feasibility of applying open architecture to the surface navy's most complex automated weapon system". Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5473.
Texto completoRising costs of proprietary equipment in legacy electronic applications are increasingly drawing resources from vital programs. Growing interest in evaluating Open Architecture technology to replace closed systems is evidenced by the number of recent publications on the subject. Researchers have approached this topic from various angles, including lifecycle management, risk simulation, total cost of ownership, and knowledge-value added measures. This exploratory study uses open architecture hardware employing virtualization technology to test the feasibility of replacing legacy components of military systems. Virtualization has the potential to provide significant cost savings in terms of procurement, daily operation, and maintenance. Additionally, virtualization provides functional benefits such as load-balancing, greater processor utilization and storage flexibility, streamlined scalability, and simplified disaster recovery strategies. This thesis is original research in the form of a proof-of-concept study. It details performance results of a locally-constructed test platform, designed to simulate a portion of the U.S. Navy's AEGIS Weapon System. The scope of this work is to test the viability of using commodity-based hardware to achieve performance levels equal to, or greater than, current proprietary systems. Value-Added metrics are applied through cost comparisons between the test platform and typical AEGIS systems. While this study specifically targets AEGIS, the results can be generalized to non-military applications.
Nimgaonkar, Satyajeet. "Secure and Energy Efficient Execution Frameworks Using Virtualization and Light-weight Cryptographic Components". Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699986/.
Texto completoWailly, Aurélien. "End-to-end security architecture for cloud computing environments". Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0020/document.
Texto completoSince several years the virtualization of infrastructures became one of the major research challenges, consuming less energy while delivering new services. However, many attacks hinder the global adoption of Cloud computing. Self-protection has recently raised growing interest as possible element of answer to the cloud computing infrastructure protection challenge. Yet, previous solutions fall at the last hurdle as they overlook key features of the cloud, by lack of flexible security policies, cross-layered defense, multiple control granularities, and open security architectures. This thesis presents VESPA, a self-protection architecture for cloud infrastructures. Flexible coordination between self-protection loops allows enforcing a rich spectrum of security strategies. A multi-plane extensible architecture also enables simple integration of commodity security components.Recently, some of the most powerful attacks against cloud computing infrastructures target the Virtual Machine Monitor (VMM). In many case, the main attack vector is a poorly confined device driver. Current architectures offer no protection against such attacks. This thesis proposes an altogether different approach by presenting KungFuVisor, derived from VESPA, a framework to build self-defending hypervisors. The result is a very flexible self-protection architecture, enabling to enforce dynamically a rich spectrum of remediation actions over different parts of the VMM, also facilitating defense strategy administration. We showed the application to three different protection scheme: virus infection, mobile clouds and hypervisor drivers. Indeed VESPA can enhance cloud infrastructure security
Pham, Khoi Minh. "NEURAL NETWORK ON VIRTUALIZATION SYSTEM, AS A WAY TO MANAGE FAILURE EVENTS OCCURRENCE ON CLOUD COMPUTING". CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/670.
Texto completoLastera, Maxime. "Architecture sécurisée pour les systèmes d'information des avions du futur". Phd thesis, INSA de Toulouse, 2012. http://tel.archives-ouvertes.fr/tel-00938782.
Texto completoBielski, Maciej. "Nouvelles techniques de virtualisation de la mémoire et des entrées-sorties vers les périphériques pour les prochaines générations de centres de traitement de données basés sur des équipements répartis déstructurés". Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLT022/document.
Texto completoThis dissertation is positioned in the context of the system disaggregation - a novel approach expected to gain popularity in the data center sector. In traditional clustered systems resources are provided by one or multiple machines. Differently to that, in disaggregated systems resources are provided by discrete nodes, each node providing only one type of resources (CPUs, memory and peripherals). Instead of a machine, the term of a slot is used to describe a workload deployment unit. The slot is dynamically assembled before a workload deployment by the unit called system orchestrator.In the introduction of this work, we discuss the subject of disaggregation and present its benefits, compared to clustered architectures. We also add a virtualization layer to the picture as it is a crucial part of data center systems. It provides an isolation between deployed workloads and a flexible resources partitioning. However, the virtualization layer needs to be adapted in order to take full advantage of disaggregation. Thus, the main contributions of this work are focused on the virtualization layer support for disaggregated memory and devices provisioning.The first main contribution presents the software stack modifications related to flexible resizing of a virtual machine (VM) memory. They allow to adjust the amount of guest (running in a VM) RAM at runtime on a memory section granularity. From the software perspective it is transparent whether they come from local or remote memory banks.As a second main contribution we discuss the notions of inter-VM memory sharing and VM migration in the disaggregation context. We first present how regions of disaggregated memory can be shared between VMs running on different nodes. This sharing is performed in a way that involved guests which are not aware of the fact that they are co-located on the same computing node or not. Additionally, we discuss different flavors of concurrent accesses serialization methods. We then explain how the VM migration term gained a twofold meaning. Because of resources disaggregation, a workload is associated to at least one computing node and one memory node. It is therefore possible that it is migrated to a different computing node and keeps using the same memory, or the opposite. We discuss both cases and describe how this can open new opportunities for server consolidation.The last main contribution of this dissertation is related to disaggregated peripherals virtualization. Starting from the assumption that the architecture disaggregation brings many positive effects in general, we explain why it breaks the passthrough peripheral attachment technique (also known as a direct attachment), which is very popular for its near-native performance. To address this limitation we present a design that adapts the passthrough attachment concept to the architecture disaggregation. By this novel design, disaggregated devices can be directly attached to VMs, as if they were plugged locally. Moreover, all modifications do not involve the guest OS itself, for which the setup of the underlying infrastructure is not visible
Abdullah, Miran Taha. "Smart Client-Server Protocol and Architecture for Adaptive Multimedia Streaming". Doctoral thesis, Universitat Politècnica de València, 2018. http://hdl.handle.net/10251/103324.
Texto completoIn recent years, multimedia services consumption has increased and it is expected that this trend will continue in the near future, becoming the evaluation of Quality of Experience (QoE) as a very important issue for assessing the quality of providers' services. In this sense, the optimization of the QoE is progressively receiving much attention considering that current solutions are not based on the adaptation, feasibility, cost-effectiveness, and reliability. The present dissertation is focused on the characterization, design, development and evaluation of different multimedia applications aimed to optimize the QoE. Therefore, this work investigates the influence that the networks infrastructure, the videos' characteristics and the users' terminals present on QoE of the current Internet multimedia services. The work is based on a comprehensive research of subjective and objective assessments in heterogeneous networks. Challenges and research questions related to the state of the art are discussed in this dissertation. In the first phase of this dissertation, we design a test methodology for assessing QoE of live video streaming and video on demand platforms to be transmitted over Wi-Fi and cellular networks. From this initial step, we will propound the related research issues and questions to solve this dissertation. Our methodology considers the use of subjective and objective metrics to evaluate the QoE perceived by end-users. A set of laboratory experiments is conducted where our proposed methodology is applied. The obtained results are gathered and analyzed to extract the relations between Quality of Service (QoS) and QoE. From the results, we propose a QoS-QoE mapping which allows predicting QoE. In the next phase of the research, we develop QoE-optimization algorithms based on network system management for Wi-Fi and cellular networks. The algorithms use the key parameters that were taken into account for QoE assessment. The goal of these algorithms is to provide a flexible management system for the networks in order to achieve the desirable trade-off between QoE maximization and resource usage efficiency. Lastly, the system testbed is designed in order to evaluate the performance of generic multimedia services applications for the different environments under test. The system testbed is based on virtualization approach; it uses the shared resources of a physical hardware to virtualize all components. The virtualized testbed provides virtualized network functions for the different scenarios such as the Internet (Content Delivery Networks - CDNs) and wireless networks. Therefore, lightweight protocols and agile mechanisms are adopted in the system to provide enhanced service to end-users. The QoE results are reported to the service providers according to the parameters defined in the evaluation process. As a result, we have obtained a cost-effective system, which is considered as a feasible way for test evaluation.
En els últims anys, el consum de serveis multimèdia ha augmentat i es preveu que aquesta tendència continue en un futur pròxim, convertitnt el tema de l'avaluació de la Qualitat d'Experiència (QoE) una tasca molt im-portant per a valorar el servei dels proveïdors. En aquest sentit, l'optimització de la QoE rep cada vegada més atenció degut a que les solucions actuals no tenen en compte, l'adaptació, la viabilitat, el rendiment i la fiabilitat. La present memòria se centra en la caracterització, disseny, desenvolupament i avaluació de diferents aplicacions multimèdia, amb la finalitat d'optimitzar la QoE. Per tant, aquest treball investiga la influència que la infraestructura de les xarxes, les característiques dels videos i els terminals dels usuaris tenen sobre la QoE dels serveis multimèdia actuals d'Iinternet. Aquesta tesi es basa en una recerca exhaustiva de l'avaluació subjectiva i objectiva de QoE en xarxes heterogènies. Els desafiaments i preguntes relacionats amb l'estat de la tècnica es discuteixen en aquesta dissertació. En la primera fase, dissenyem la metodologia de prova per a avaluar la QoE de transmissió de video en directe i de plataformes de video baix demanda en xarxes Wi-Fi i cel·lulars. A partir d'aquest primer pas, proposem els problemes de recerca relacionats i les preguntes a resoldre a través d'a-questa tesi. La nostra metodologia fa ús de mètriques subjectives i objecti-ves per a avaluar la QoE dels usuaris finals. Es realitzen un conjunt d'expe-riments en laboratori on s'aplica la nostra metodología. Els resultats obtin-guts es recopilen i analitzen per a extraure les relacions entre la QoS i la QoE. A partir d'aquests resultats, esproposa un mapatge de QoS-QoE que ens permetrà predir la QoE. En la següent fase de la recerca, desenvolupem els algoritmes d'optimi-tzació de la QoE per a l'administració de xarxes Wi-Fi i cel·lulars. Els algo-ritmes utilitzen els paràmetres clau que es van tenir en compte per a l'ava-luació de QoE. L'objectiu d'aquests algoritmes és proporcionar un sistema de gestió flexible per ales xarxes que permetrá aconseguir un equilibri con-trolat entre la maximització de la QoE i l'us eficient dels recursos. Finalment, el banc de proves del sistema està dissenyat per a avaluar el rendiment de les aplicacions de serveis multimèdia genèrics en els diferents entorns de prova. El banc de proves del sistema es basa en l'enfocament de virtualització; usa els recursos compartits d'un equip físic que virtualitza tots els components. El banc de proves virtualitzat proporciona les funcions de xarxa virtualitzades per a diferents escenaris, com Internet (les xarxes de distribució de continguts - CDNs) i xarxes sense fils. Per tant, s'adopten protocols lleugers i mecanismes àgils en el sistema per a proporcionar un millor servei als usuaris finals. Els resultats de QoE son proporcionats als proveïdors de serveis d'acord amb els paràmetres que es defineixen en el procés de l'avaluació. Com a resultat, hem obtés un sistema que presenta un servei rendible i com a viable per a l'avaluació de la prova.
Abdullah, MT. (2018). Smart Client-Server Protocol and Architecture for Adaptive Multimedia Streaming [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/103324
TESIS
Sandberg, Andreas. "Understanding Multicore Performance : Efficient Memory System Modeling and Simulation". Doctoral thesis, Uppsala universitet, Avdelningen för datorteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-220652.
Texto completoCoDeR-MP
UPMARC
Ruwase, Olatunji O. "Improving Device Driver Reliability through Decoupled Dynamic Binary Analyses". Research Showcase @ CMU, 2013. http://repository.cmu.edu/dissertations/233.
Texto completoHnarakis, Ryan. "In Perfect Xen, A Performance Study of the Emerging Xen Scheduler". DigitalCommons@CalPoly, 2013. https://digitalcommons.calpoly.edu/theses/1121.
Texto completoNitu, Vlad-Tiberiu. "Improving energy efficiency of virtualized datacenters". Phd thesis, Toulouse, INPT, 2018. http://oatao.univ-toulouse.fr/23799/1/NITU_Vlad%20Tiberiu.pdf.
Texto completoSiqueira, Marcos Antonio de 1978. "Redes ópticas de transporte definidas por software com suporte à virtualização e operação autônoma com base em políticas". [s.n.], 2015. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260678.
Texto completoTese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação
Made available in DSpace on 2018-08-27T08:39:20Z (GMT). No. of bitstreams: 1 Siqueira_MarcosAntoniode_D.pdf: 7263131 bytes, checksum: fad0f39a012c338503de664fbec8fe8c (MD5) Previous issue date: 2015
Resumo: Esta tese apresenta uma proposta de arquitetura para controle de redes ópticas de transporte que utiliza o paradigma de redes definidas por software, com suporte a operação autonômica com base em políticas. A arquitetura é constituída pelos seguintes pilares: (i) modelagem dos elementos de rede, incluindo suas interconexões, restrições, capacidades, entre outros, utilizando a linguagem YANG; (ii) composição dos modelos dos elementos de rede e suas relações em um modelo que representa a rede, suportando transformações para representação da rede como grafos de propriedades; e (iii) um modelo de políticas baseado em objetos associados ao grafo de propriedades da rede que viabiliza a operação autonômica do controlador. A proposta foi validada através de provas de conceito realizadas por simulações, protótipos e experimentos, incluindo casos de uso de segmentação e virtualização da rede óptica de transporte, aplicações SDN para ajuste de parâmetros operacionais da rede com base em políticas, bem como a operação autônoma do controlador SDN com auxílio de ferramentas de simulação com rotinas de planejamento automatizado
Abstract: This thesis proposes an architecture for optical transport networks control, using the software defined networking paradigm, with support for policy-based autonomic operation. The architecture is composed of three pillars: (i) modeling of network elements, its interconnections, constraints and capabilities using the YANG language; (ii) composition of the network element models and its interconnections forming a network model, supporting transformations for representing the network as property graphs; and (iii) a policy model based on objects associated to the network graph designed for allowing autonomic operation of the network controller. The proposal has been validated through a set of proofs of concept performed via simulations, prototypes and experiments, including use cases for optical transport network slicing and virtualization, SDN applications for policy-based operational parameters adjustment, and autonomic operation of the SDN controller assisted by simulation tools with routines for automated planning
Doutorado
Engenharia de Computação
Doutor em Engenharia Elétrica
Nasim, Robayet. "Architectural Evolution of Intelligent Transport Systems (ITS) using Cloud Computing". Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-35719.
Texto completoBaksidestext: Intelligent Transport System (ITS) can utilize advances in Information and Communication Technology (ICT) and maximize the capacity of existing transportation systems without building new infrastructure. However, in spite of these technical feasibilities and significant performance-cost ratios, the deployment of ITS is limited in the real world because of several challenges associated with its architectural design. This thesis studies how to design an efficient deployable architecture for ITS, which can utilize the advantages of cloud computing and the publish/subscribe communication model. In particular, our aim is to offer an ITS infrastructure which provides the opportunity for transport authorities to allocate on-demand computing resources through virtualization technology, and supports a wide range of ITS applications. We propose to use an Infrastructure as a Service (IaaS) model to host large-scale ITS applications, and to use a publish/subscribe system as a building block for developing a low latency ITS application. We investigate different strategies to improve performance of an ITS application during service mobility such as utilizing multiple paths to spread network traffic, or deploying recent queue management schemes.
Artikel 4 Network Centric Performance Improvement for Live VM Migration finns i avhandlingen som manuskript. Nu publicerat konferenspaper.
Carbone, Martim. "Semantic view re-creation for the secure monitoring of virtual machines". Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44841.
Texto completoSrivastava, Abhinav. "Robust and secure monitoring and attribution of malicious behaviors". Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41161.
Texto completoKundu, Sajib. "Improving Resource Management in Virtualized Data Centers using Application Performance Models". FIU Digital Commons, 2013. http://digitalcommons.fiu.edu/etd/874.
Texto completoMinistr, Martin. "Virtuální platformy pro simulaci instrukčních sad". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-235424.
Texto completoHaddad, Ahmed. "GeRoFan : une architecture et un plan de contrôle basés sur la radio-sur-fibre pour la mutualisation des réseaux d'accès mobile de nouvelle génération". Thesis, Paris, ENST, 2013. http://www.theses.fr/2013ENST0025/document.
Texto completoCurrent radio access networks architectures are not suited in terms of capacity and backhauling capabilities to fit the continuing traffic increase of 4G cellular systems. The objective of the thesis is to propose an innovative and generic mobile backhauling network architecture, called GeRoFAN (Generic Radio-over-Fiber Access Network), for next generation mobile systems (WiMAX, 4G LTE). Two major technological innovations are used to implement GeRo-FAN: analog Radio-over-Fiber (RoF) and reflective amplified absorption modulators. The aim of this thesis is to design for such an architecture an original Control Plane (CP) and a signaling channel enabling to balance radio resources between a set of neighboring cells at the access/metropolitan scale according to traffic fluctuations. The transmission of several radio frequencies by means of an analog RoF link suffers from several impairments that may degrade the capacity of the radio system. The originality of the GeRoFAN-CP consists in mapping radio frequencies with optical carriers by means of Sub-Carrier Multiplexing (SCM) in order to optimize the Shannon’s capacity within the various cells covered by the system according to the current traffic load. For that purpose, a deep analysis and modeling of the various physical layer impairments impacting the quality of the radio signal is carried out. Unlike comparable approaches, the GeRoFAN-CP is as independent as possible from the radio layer protocols. Thus, the "radio MAC-agnostic" nature of the GeRoFAN-CP enables to federate multiple operators using different radio technologies onto the same backhauling optical infrastructure. Subcarrier and wavelength division multiplexing (SCM/WDM) as well as WDM optical routing capabilities are exploited onto the GeRoFAN transparent architecture. More globally, the GeRoFAN-CP enables a form of "radio frequency virtualization" while promoting new business models for Telecom service providers. The last part of the thesis focuses on the business value of the GeRoFAN paradigm. The expectations of the different stake-holders and main regulatory/organizational entities that could be involved in the deployment of GeRoFAN infrastructures should be addressed in order to achieve a smooth deployment of this new type of mobile backhauling. Economics of the GeRoFAN architecture are investigated in terms of OpEx/CapEx valuation and investment profitability, especially in reference to digitized RoF. Two business models are then proposed to study how GeRoFAN contributes to enriching the cellular backhauling service value chain
Kominos, Charalampos Gavriil. "Performance analysis of different virtualization architectures using OpenStack". Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-318099.
Texto completoAmaral, Marcelo. "Improving resource efficiency in virtualized datacenters". Doctoral thesis, Universitat Politècnica de Catalunya, 2019. http://hdl.handle.net/10803/666753.
Texto completoEn els últims anys hi ha hagut un gran creixement del Internet of Things (IoT) i els seus protocols. La creixent difusió de dispositius electrònics amb capacitats d'identificació, computació i comunicació esta establint les bases de l’aparició de serveis altament distribuïts i del seu entorn de xarxa. L’esmentada situació implica que hi ha una creixent demanda de plataformes de processament i gestió avançada de dades per IoT. Aquestes plataformes requereixen suport per a múltiples protocols al Edge per connectivitat amb el objectes, però també necessiten d’una organització de dades interna i capacitats avançades de processament de dades per satisfer les demandes de les aplicacions i els serveis que consumeixen dades IoT. Una de les aproximacions inicials per abordar aquesta demanda és la integració entre IoT i el paradigma del Cloud computing. Hi ha molts avantatges d'integrar IoT amb el Cloud. IoT genera quantitats massives de dades i el Cloud proporciona una via perquè aquestes dades viatgin a la seva destinació. Però els models actuals del Cloud no s'ajusten del tot al volum, varietat i velocitat de les dades que genera l'IoT. Entre les noves tecnologies que sorgeixen al voltant del IoT per proporcionar un escenari nou, el paradigma del Fog Computing s'ha convertit en la més rellevant. Fog Computing es va introduir fa uns anys com a resposta als desafiaments que plantegen moltes aplicacions IoT, incloent requisits com baixa latència, operacions en temps real, distribució geogràfica extensa i mobilitat. També aquest entorn està cobert per l'arquitectura de xarxa MEC (Mobile Edge Computing) que proporciona serveis de TI i capacitats Cloud al edge per la xarxa mòbil dins la Radio Access Network (RAN) i a prop dels subscriptors mòbils. El Fog aborda casos d’us amb requisits que van més enllà de les capacitats de solucions només Cloud. La interacció entre Cloud i Fog és crucial per a l'evolució de l'anomenat IoT, però l'abast i especificació d'aquesta interacció és un problema obert. Aquesta tesi té com objectiu trobar les decisions de disseny i les tècniques adequades per construir un sistema distribuït escalable per IoT sota el paradigma del Fog Computing per a ingerir i processar dades. L'objectiu final és explorar els avantatges/desavantatges i els desafiaments en el disseny d'una solució des del Edge al Cloud per abordar les oportunitats que les tecnologies actuals i futures portaran d'una manera integrada. Aquesta tesi descriu un enfocament arquitectònic que aborda alguns dels reptes tècnics que hi ha darrere de la convergència entre IoT, Cloud i Fog amb especial atenció a reduir la bretxa entre el Cloud i el Fog. Amb aquesta finalitat, s'introdueixen nous models i tècniques per explorar solucions per entorns IoT. Aquesta tesi contribueix a les propostes arquitectòniques per a la ingesta i el processament de dades IoT mitjançant 1) proposant la caracterització d'una plataforma per a l'allotjament de workloads IoT en el Cloud que proporcioni capacitats de processament de flux de dades multi-tenant, les interfícies a través d'una tecnologia centrada en dades incloent la construcció d'una infraestructura avançada per avaluar el rendiment i validar la solució proposada. 2) estudiar un enfocament arquitectònic seguint el paradigma Fog que aborda alguns dels reptes tècnics que es troben en la primera contribució. La idea és estudiar una extensió del model que abordi alguns dels reptes centrals que hi ha darrere de la convergència de Fog i IoT. 3) Dissenyar una plataforma distribuïda i escalable per a realitzar operacions IoT en un entorn de dades en moviment. La idea després d'estudiar el processament de dades en el Cloud, i després d'estudiar la conveniència del paradigma Fog per resoldre els desafiaments de IoT a prop del Edge, és definir els protocols, les interfícies i la gestió de dades per resoldre la ingestió i processament de dades d’una manera més eficient
Marchal, Xavier. "Architectures et fonctions avancées pour le déploiement progressif de réseaux orientés contenus". Thesis, Université de Lorraine, 2019. http://www.theses.fr/2019LORR0049/document.
Texto completoInternet historical protocols (TCP/IP) that were used to interconnect the very first comput-ers are no longer suitable for the massive distribution of content that is now being made. New content-based network protocols (Information-Centric Networking) are currently being designed to optimize these exchanges by betting on a paradigm shift where content, rather than machines, are addressable across the Internet. However, such a change can only be made gradually and if all operational imperatives are met. Thus, this thesis aims to study and remove the main tech-nological obstacles preventing the adoption of the NDN (Name Data Networking) protocol by operators by guaranteeing the security, performance, interoperability, proper management and automated deployment of an NDN network. First, we evaluate the current performance of an NDN network thanks to a tool we made, named ndnperf, and observe the high cost for a provider delivering fresh content using this protocol. Then, we propose some optimizations to improve the efficiency of packet generation up to 6.4 times better than the default parameters. Afterwards, we focus on the security of the NDN protocol with the evaluation of the content poisoning attack, known as the second more critical attack on NDN, but never truly characterized. Our study is based on two scenarios, with the usage of a malicious user and content provider, or by exploiting a flaw we found in the packet processing flow of the NDN router. Thus, we show the danger of this kind of attacks and propose a software fix to prevent the most critical scenario. Thirdly, we are trying to adapt the HTTP protocol in a way so that it can be transported on an NDN network for interoperability purposes. To do this, we designed an adaptation protocol and developed two gateways that perform the necessary conversions so that web content can seamlessly enter or exit an NDN network. After describing our solution, we evaluate and improve it in order to make web content benefit from a major NDN feature, the in-network caching, and show up to 61.3% cache-hit ratio in synthetic tests and 25.1% in average for browsing simulations with multiple users using a Zipf law of parameter 1.5. Finally, we propose a virtualized and orchestrated microservice architecture for the deploy-ment of an NDN network following the Network Fonction Virtualization (NFV) paradigm. We developed seven microservices that represent either an atomic function of the NDN router or a new one for specific purposes. These functions can then be chained to constitute a full-fledged network. Our architecture is orchestrated with the help of a manager that allows it to take the full advantages of the microservices like scaling the bottleneck functions or dynamically change the topology for the current needs (an attack for example). Our architecture, associated with our other contributions on performance, security and in-teroperability, allows a better and more realistic deployment of NDN, especially with an easier development of new features, a network running on standard hardware, and the flexibility allowed by this kind of architecture
Bui, Vo Quoc Bao. "Virtualization of micro-architectural components using software solutions". Thesis, Toulouse, INPT, 2020. http://www.theses.fr/2020INPT0082.
Texto completoCloud computing has become a dominant computing paradigm in the information technology industry due to its flexibility and efficiency in resource sharing and management. The key technology that enables cloud computing is virtualization. Essential requirements in a virtualized system where several virtual machines (VMs) run on a same physical machine include performance isolation and predictability. To enforce these properties, the virtualization software (called the hypervisor) must find a way to divide physical resources (e.g., physical memory, processor time) of the system and allocate them to VMs with respect to the amount of virtual resources defined for each VM. However, modern hardware have complex architectures and some microarchitectural-level resources such as processor caches, memory controllers, interconnects cannot be divided and allocated to VMs. They are globally shared among all VMs which compete for their use, leading to contention. Therefore, performance isolation and predictability are compromised. In this thesis, we propose software solutions for preventing unpredictability in performance due to micro-architectural components. The first contribution is called Kyoto, a solution to the cache contention issue, inspired by the polluters pay principle. A VM is said to pollute the cache if it provokes significant cache replacements which impact the performance of other VMs. Henceforth, using the Kyoto system, the provider can encourage cloud users to book pollution permits for their VMs. The second contribution addresses the problem of efficiently virtualizing NUMA machines. The major challenge comes from the fact that the hypervisor regularly reconfigures the placement of a VM over the NUMA topology. However, neither guest operating systems (OSs) nor system runtime libraries (e.g., HotSpot) are designed to consider NUMA topology changes at runtime, leading end user applications to unpredictable performance. We presents eXtended Para-Virtualization (XPV), a new principle to efficiently virtualize a NUMA architecture. XPV consists in revisiting the interface between the hypervisor and the guest OS, and between the guest OS and system runtime libraries so that they can dynamically take into account NUMA topology changes
Palopoli, Amedeo. "Containerization in Cloud Computing: performance analysis of virtualization architectures". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14818/.
Texto completoGao, Meihui. "Models and Methods for Network Function Virtualization (NFV) Architectures". Thesis, Université de Lorraine, 2019. http://www.theses.fr/2019LORR0025/document.
Texto completoDue to the exponential growth of service demands, telecommunication networks are populated with a large and increasing variety of proprietary hardware appliances, and this leads to an increase in the cost and the complexity of the network management. To overcome this issue, the NFV paradigm is proposed, which allows dynamically allocating the Virtual Network Functions (VNFs) and therefore obtaining flexible network services provision, thus reducing the capital and operating costs. In this thesis, we focus on the VNF Placement and Routing (VNF-PR) problem, which aims to find the location of the VNFs to allocate optimally resources to serve the demands. From an optimization point of view, the problem can be modeled as the combination of a facility location problem (for the VNF location and server dimensioning) and a network design problem (for the demands routing). Both problems are widely studied in the literature, but their combination represents, to the best of our knowledge, a new challenge. We start working on a realistic VNF-PR problem to understand the impact of different policies on the overall network management cost and performance. To this end, we extend the work in [1] by considering more realistic features and constraints of NFV infrastructures and we propose a linear programming model and a math-heuristic to solve it. In order to better understand the problem structure and its properties, in the second part of our work, we focus on the theoretical study of the problem by extracting a simplified, yet significant variant. We provide results on the computational complexity under different graph topology and capacity cases. Then, we propose two mathematical programming formulations and we test them on a common testbed with more than 100 different test instances under different capacity settings. Finally, we address the scalability issue by proposing ILP-based constructive methods and heuristics to efficiently deal with large size instances (with up to 60 nodes and 1800 demands). We show that our proposed heuristics can efficiently solve medium size instances (with up to 30 nodes and 1000 demands) of challenging capacity cases and provide feasible solutions for large size instances of the most difficult capacity cases, for which the models cannot find any solution even with a significant computational time
Delgado, Javier. "Scheduling Medical Application Workloads on Virtualized Computing Systems". FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/633.
Texto completoVítek, Daniel. "Cloud computing s ohledem na technologické aspekty a změny v infrastruktuře". Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-72548.
Texto completoStiti, Oussama. "Étude de l'Urbanisation des Accès Virtuels et Stratégie de Métamorphose de Réseaux". Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066632/document.
Texto completoVirtualization was originally introduced in networks to reduce maintenance and deployment costs. It has experienced tremendous growth and reshaped the landscape of IT and ITC networks. Virtualization permits the sharing of physical resources for instantiating isolated virtual machines despite the fact that it is drawing its resources from the same physical hardware. More recently NFV (Network Functions Virtualization) appeared, it allows to virtualize entire classes of network functions node in blocks that can connect to create communication services. In this thesis we virtualize the access network nodes, namely Wi-Fi access points. The Wi-Fi became one of the hot-topic technology for mobile operators, it allows them to offload some of the customers’ data traffic via hotspots. The problem that arises in such a mechanism is the existing wireless standards, and mobile devices connection management software have not been developed for this purpose. The Hotspot2.0 standard was created to overcome this limitation, by making the Wi-Fi experience similar to the cellular in terms of roaming, transparency and security. We have in our work, applied the concept of NFV by virtualizing these brand new Wi-Fi access points. One of the problems that we faced is the high security required by such standard, including the provisioning of client credentials in public areas. In our thesis we propose an innovative architecture for the repatriation of these credentials through NFC terminals. These same terminals will be used for access points’ urbanization by allowing users to create their own Wi-Fi virtual access point on the fly. The last aspect of this thesis is related to the management of virtualized entities changing communication patterns of legacy networks. In this context, SDN (Software Defined Network) emerged in data centers to redefine the way we think about networks, and is designed for virtualized environments. In this thesis we brought SDN to the edge of the network in our Wi-Fi virtual access points. More than a new paradigm of networks communications, we will see that NFV/SDN in Wi-Fi networks will in the near future make Wi-Fi networks more flexible, open and scalable
Rosa, Raphael Vicente 1988. "Uma arquitetura para aprovisionamento de redes virtuais definidas por software em redes de data center". [s.n.], 2014. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275513.
Texto completoDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-25T12:25:32Z (GMT). No. of bitstreams: 1 Rosa_RaphaelVicente_M.pdf: 3185742 bytes, checksum: 0fe239607d96962513c068e7379c6f19 (MD5) Previous issue date: 2014
Resumo: Atualmente provedores de infraestrutura (Infrastructure Providers - InPs) alocam recursos virtualizados, computacionais e de rede, de seus data centers para provedores de serviços na forma de data centers virtuais (Virtual Data Centers - VDCs). Almejando maximizar seus lucros e usar de forma eficiente os recursos de seus data centers, InPs lidam com o problema de otimizar a alocação de múltiplos VDCs. Mesmo que a alocação de máquinas virtuais em servidores seja feita de maneira otimizada por diversas técnicas e algoritmos já existentes, aplicações de computação em nuvem ainda tem o desempenho prejudicado pelo gargalo do subaproveitamento de recursos de rede, explicitamente definidos por limitações de largura de banda e latência. Baseado no paradigma de Redes Definidas por Software, nós aplicamos o modelo de rede como serviço (Network-as-a-Service - NaaS) para construir uma arquitetura de data center bem definida para dar suporte ao problema de aprovisionamento de redes virtuais em data centers. Construímos serviços sobre o plano de controle da plataforma RouteFlow os quais tratam a alocação de redes virtuais de data center otimizando a utilização de recursos da infraestrutura de rede. O algoritmo proposto neste trabalho realiza a tarefa de alocação de redes virtuais, baseado na agregação de informações de um plano virtual executando o protocolo BGP eficientemente mapeado a uma topologia física de rede folded-Clos definida por \textit{switches} com suporte a OpenFlow 1.3. Em experimentos realizados, mostramos que o algoritmo proposto neste trabalho realiza a alocação de redes virtuais de data center de forma eficiente, otimizando o balanceamento de carga e, consequentemente, a utilização de recursos da infraestrutura de rede de data centers. A estratégia de alocação de largura de banda utilizada demonstra flexibilidade e simplicidade para atender a diferentes padrões de comunicação nas redes virtuais ao mesmo tempo que permite elasticidade ao balanceamento de carga na rede. Por fim, discutimos como a arquitetura e algoritmo propostos podem ser estendidos para atender desempenho, escalabilidade, e outros requisitos de arquiteturas de redes de data center
Abstract: Nowadays infrastructure providers (InPs) allocate virtualized resources, computational and network, of their data center to service providers (SPs) in the form of virtual data centers (VDCs). Aiming maximize revenues and thus efficiently use the resources of their virtualized data centers, InPs handle the problem to optimally allocate multiple VDCs. Even if the allocation of virtual machines in servers can be made using well known techniques and algorithms already existent, cloud computing applications still have performance limitations imposed by the bottleneck of network resources underutilization, which are explicitly defined by bandwidth and latency constraints. Based on Software Defined Network paradigm we apply the Network-as-a-Service model to build a data center network architecture well-suited to the problem of virtual networks embedding. We build services over the control plane of the RouteFlow platform that perform the allocation of virtual data center networks optimizing the utilization of network infrastructure resources. This task is performed by the algorithm proposed in this dissertation, which is based on aggregated information from a virtual routing plane using the BGP protocol and a folded-Clos physical network topology based on OpenFlow 1.3 devices. The experimental evaluation shows that the proposed algorithm performs efficient load balancing on the data center network and altogether yields better utilization of the physical resources. The proposed bandwidth allocation strategy exhibits simplicity and flexibility to attend different traffic communication patterns while yielding an elastic load balanced network. Finally, we argue that the algorithm and the architecture proposed can be extended to achieve performance, scalability and many other features required in data center network architectures
Mestrado
Ciência da Computação
Mestre em Ciência da Computação