A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Comparing Containers versus Virtual Machines for Achieving High Availability
2015
2015 IEEE International Conference on Cloud Engineering
features such as live migration, failure detection, and checkpoint/restore. ...
With the surge in adoption of virtualization technologies, ensuring High Availability (HA) for applications hosted in virtualized environments emerges as an important problem and has garnered substantial ...
We would also like to thank the anonymous reviewers for their constructive feedback. ...
doi:10.1109/ic2e.2015.79
dblp:conf/ic2e/LiK15
fatcat:dnmghyflz5g47hoxkdgiygmsou
Cooperative VM Migration: A Symbiotic Virtualization Mechanism by Leveraging the Guest OS Knowledge
2013
IEICE transactions on information and systems
A virtual machine (VM) migration is useful for improving flexibility and maintainability in cloud computing environments. ...
However, VM monitor (VMM)-bypass I/O technologies, including PCI passthrough and SR-IOV, in which the overhead of I/O virtualization can be significantly reduced, make VM migration impossible. ...
Some para-virtualized Infiniband drivers for Xen and VMWare ESXi have been proposed [25] - [27] . ...
doi:10.1587/transinf.e96.d.2675
fatcat:az4jvwdd7zfjto4hiql3qoioum
GPU Virtualization and Scheduling Methods
2017
ACM Computing Surveys
In this survey paper, we present an extensive and in-depth survey of GPU virtualization techniques and their scheduling methods. ...
However, such a paradigm shift would require effective methods for virtualizing GPUs, as well as other accelerators. ...
ACKNOWLEDGMENTS The authors are grateful to the anonymous reviewers for their valuable comments and suggestions. ...
doi:10.1145/3068281
fatcat:bng347au6veltazpmyyzv5ijmu
ADARES: Adaptive Resource Management for Virtual Machines
[article]
2018
arXiv
pre-print
However, users often statically configure the resources of virtual machines through guesswork, resulting in either insufficient resource allocations that hinder VM performance, or excessive allocations ...
For instance, when compared to threshold and prediction-based baselines, it achieves more predictable VM-level performance and also reduces the amount of virtual CPUs and memory provisioned by up to 35% ...
Acknowledgments Special thanks to Kevin Jamieson and Lalit Jain for their valuable and constructive feedback. We are also grateful to Robert Marver for helping with the experiments. ...
arXiv:1812.01837v2
fatcat:zvqjjaitfzab7fkzgogqxrpg3e
Service Migration in a Distributed Virtualization System
2021
Journal of Computer Science and Technology
This article describes the mechanisms used for the migration of server processes between nodes of a DVS cluster in a transparent way for client and server processes, doing special focus on how to solve ...
To achieve the desired level of performance, availability, scalability, and robustness in this kind of system developers are forced to maintain and configure complex sets of infrastructure, platforms and ...
When virtual machines (VMs) are used on hypervisors such as VMware ESXi [2] or KVM [3] , the migration at the VM level is solved using virtual networks where the source VM is connected to a distributed ...
doi:10.24215/16666038.21.e16
doaj:e91683a5485b4344a93cb49287d9ad15
fatcat:cmlx2xjr2revjif6ctjtyczuui
Towards Massive Consolidation in Data Centers with SEaMLESS
2018
2018 18th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)
In Data Centers (DCs), an abundance of virtual machines (VMs) remain idle due to network services awaiting for incoming connections, or due to established-and-idling sessions. ...
By replacing idle VMs with VNFs, SEaMLESS provides fast VM restoration upon user activity detection, thereby introducing limited impact on the Quality of Experience (QoE). ...
For instance, while in QEMU/KVM the entire VM memory needs to be reloaded into the RAM memory before the VM is able to execute any instruction, VMWare ESXi adopts an approach called lazy restore, where ...
doi:10.1109/ccgrid.2018.00038
dblp:conf/ccgrid/SegaliniPJ18
fatcat:ihud5iumpvasxajp6zyimtic7e
Live Migration in Bare-metal Clouds
2018
IEEE Transactions on Cloud Computing
In addition, the overhead of live migration mechanisms should be as low as possible. This paper introduces BLMVisor, a live migration scheme for bare-metal clouds. ...
Unfortunately, live migration is not supported in bare-metal clouds, which lease physical machines rather than virtual machines to offer maximum hardware performance. ...
Yushi Omote for his technical advice, and the reviewers for useful comments. ...
doi:10.1109/tcc.2018.2848981
fatcat:kv4ovrw5uvh7ni4454k7wfx2na
A Taxonomy and Future Directions for Sustainable Cloud Computing: 360 Degree View
[article]
2018
arXiv
pre-print
In this paper, we propose a comprehensive taxonomy of sustainable cloud computing. ...
A conceptual model for sustainable cloud computing has been proposed along with discussion on future research directions. ...
ACKNOWLEDGEMENTS We thank Patricia Arroba, Minxian Xu and Shashikant Ilager for their useful suggestions. ...
arXiv:1712.02899v2
fatcat:t26xxbgiijesneqgzi2mqz4gta
Protecting Critical Files Using Target-Based Virtual Machine Introspection Approach
2017
IEICE transactions on information and systems
It is known that file operation is high-frequency, so operation-based methods often result in performance degradation seriously. ...
Especially, the overhead is very low in the case of a few target files. ...
Trend Micro Deep Security can leverage vShield Endpoint to scan on-access files in VM. To compare with it, we deploy vShield Endpoint on VMware ESXi 5.5 and VMware vCenter 5.5. ...
doi:10.1587/transinf.2016inp0009
fatcat:cxjqvshpkzhmpbcfjralpqj5nu
DuVisor: a User-level Hypervisor Through Delegated Virtualization
[article]
2022
arXiv
pre-print
However, this virtualization architecture has intrinsic issues in both security (a large attack surface) and performance. ...
virtual devices in user mode. ...
There have also been 423 and 77 CVEs for Xen [34] and VMware ESXi [33] since 2007 and 2008 re- spectively. 76.36% and 37.66% of Xen's CVEs and VMware ESXi's CVEs enable the guests to attack the host kernel ...
arXiv:2201.09652v1
fatcat:qtjgkef5krgf5obhrcrt7dr2ae
Mitigating vulnerability windows with hypervisor transplant
2021
Proceedings of the Sixteenth European Conference on Computer Systems
. (2) the downtime imposed by InPlaceTP on VMs is in the same order of magnitude (1.7 seconds for a VM with 1 vCPU and 1 GB of RAM) as in-place upgrade of homogeneous hypervisors based on server micro-reboot ...
Our evaluation results show that HyperTP delivers satisfactory performance: (1) MigrationTP takes the same time and impacts virtual machines (VMs) with the same performance degradation as normal live migration ...
We would also like to thank our shepherd Yubin Xia and the anonymous reviewers for their helpful feedbacks. ...
doi:10.1145/3447786.3456235
fatcat:w7qmcg6ftraldjvr5bnse2rmhu
Resource Management in a Containerized Cloud: Status and Challenges
2019
Journal of Network and Systems Management
In this survey, we provide an overview of the current state of the art regarding resource management within the broad sense of cloud computing, complementary to existing surveys in literature. ...
Traditional resource management strategies however are typically designed for the allocation and migration of virtual machines, so the question arises how these strategies can be adapted for the management ...
Containers are a hierarchy of processes, and existing methods for process migration are often applied, for example using the Checkpoint-restore in Userspace (CRIU) tool [2] . ...
doi:10.1007/s10922-019-09504-0
fatcat:l5ak2kubqvfjzmrioyucvuy6ba
Elasticity in Cloud Computing: State of the Art and Research Challenges
2018
IEEE Transactions on Services Computing
This approach uses Checkpoint/Restore In Userspace (CRIU) [194] , a Linux functionality that allows container live migration. ...
For deploying custom testbeds or clouds, many technologies are used such as hypervisors (Xen, VMWare ESXi, KVM, etc.), cloud orchestrators such as OpenStack, CloudStack, OpenNebula, Eucalyptus, and the ...
doi:10.1109/tsc.2017.2711009
fatcat:6artjpglercivdn6rh3qey7eeq
A critical survey of live virtual machine migration techniques
2017
Journal of Cloud Computing: Advances, Systems and Applications
Specific gaps are identified and the research challenges in improving the performance of live VM migration are highlighted. ...
The significance of this work is that it presents the background of live VM migration techniques and an in depth review which will be helpful for cloud professionals and researchers to further explore ...
Acknowledgements We are thankful to anonymous reviewers for their valuable feedback and comments for improving the quality of the manuscript.
Funding Not applicable. ...
doi:10.1186/s13677-017-0092-1
fatcat:hkfxsyc3wfejjpvezgjow2hrmq
Distributed Shared Memory Based Live VM Migration
2016
2016 IEEE 9th International Conference on Cloud Computing (CLOUD)
Live virtual machine migration is an essential tool for dynamic resource management in current data centers. ...
The thesis proposed model achieves a good enhancement of the live VM migration metrics. Downtime is reduced by 50 % in the idle workload of Windows VM and 66.6% in case of Ubuntu Linux idle workload. ...
Optimized Classic Methods The optimized classic methods objectives are to improve the performance metrics. ...
doi:10.1109/cloud.2016.0116
dblp:conf/IEEEcloud/DaradkehA16
fatcat:hedwazqzfffbhmar6pcta6rqz4
« Previous
Showing results 1 — 15 out of 29 results