Search Results/Filters    

Filters

Year

Banks



Expert Group



Full-Text


Issue Info: 
  • Year: 

    2014
  • Volume: 

    12
  • Issue: 

    2-4 (B)
  • Pages: 

    29-35
Measures: 
  • Citations: 

    0
  • Views: 

    357
  • Downloads: 

    179
Abstract: 

In recent years, rapid improvement of cloud computing convinced everyone accept it as a powerful substitution. Nowadays, more and more organizations are getting used to create private clouds, on the other hand, public clouds must be robust enough to handle scientific computing and computing sensitive requests of users in an efficient and cost effective manner. Apart from all these necessities, it is intellectual to improve the cloud infrastructure performance by appropriate choices. In this paper we are going to evaluate the performance of various HYPERVISORs, including VMware ESXi, KVM, Xen, Oracle VirtualBox, and VMware Workstation using HPC Challenge (HPCC) benchmark suite and Open MPI in order to represent solutions for virtualization layer of cloud computing architecture and clusters.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 357

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 179 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    1394
  • Volume: 

    1
Measures: 
  • Views: 

    268
  • Downloads: 

    0
Abstract: 

لطفا برای مشاهده چکیده به متن کامل (PDF) مراجعه فرمایید.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 268

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Issue Info: 
  • Year: 

    2018
  • Volume: 

    4
Measures: 
  • Views: 

    241
  • Downloads: 

    0
Abstract: 

IN THIS PAPER, FIRST WE GET FAMILIAR WITH KEY TERMS ON SOFTWARE ARCHITECTURE AREA. THEN WE MENTION PRINCIPAL RULES ON MICROSERVICES ARCHITECTURE. AFTER THAT, WE SHOW GENERAL INTEREST IN MICROSERVICES ARCHITECTURE COMPARING TO THE SERVICE ORIENTED ARCHITECTURE BY FETCH THE GOOGLE TREND SERVICE STATISTICS. AFTER THAT, WE DISCUSS ABOUT MONOLITHIC ARCHITECTURE MAIN ISSUES AND COMPARING MICROSERVICES ARCHITECTURE WITH SERVICE ORIENTED ARCHITECTURE. IN THE MOST IMPORTANT SECTION OF THE ARTICLE, WE HIT TECHNICAL AND EXPERIMENTAL RESULT THAT EXTRACTED FROM 21 NOTABLE DEVELOPERS AND EXPERT IN SOFTWARE INDUSTRY IN MIGRATION CAUSES TO THE MICROSERVICE ARCHITECTURE WHICH MOST IMPORTANT ONE NAMED THE ENHANCED MAINTENANCE IN LARGE SCALE. WE WILL INTRODUCE JOLIE PROGRAMMING LANGUAGE WHICH NATIVELY SUPPORT MICROSERVICE ARCHITECTURE. MICROSERVICE FORWARD CHALLENGES WILL BE DESCRIBE AND CONTAINER TECHNOLOGY ON THE SHOULDER OF DOCKER OPEN SOURCE PLATFORM WILL BE INTRODUCE. CONTAINER IS AS A COMPETITOR FOR HYPERVISOR AND WE WILL HEAR OF THEM MORE IN FUTURE. MOST IMPORTANT DESIGN PATTERN FOR MICROSERVICES WILL BE DESCRIBE WITH SOLUTION.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 241

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Issue Info: 
  • Year: 

    2018
  • Volume: 

    31
  • Issue: 

    11 (TRANSACTIONS B: Applications)
  • Pages: 

    1838-1845
Measures: 
  • Citations: 

    0
  • Views: 

    215
  • Downloads: 

    98
Abstract: 

In the context of virtual machines live migration, two strategies called “ pre-copy” and “ post-copy” have already been presented; but each of these strategies works well only in some circumstances. In this paper, we have a brief presentation of QAVNS and then introduce a new approach which is based on the concept of "informational object", assigning QAVNS-scheme-revision number, and observing the changes. In this approach, the total virtual machine memory is considered as a QAVNS informational object that is constantly changing. In this regard, we have defined some criteria and presented an algorithm by which the HYPERVISOR can detect the current behavior of the virtual machine, and automatically select the virtual machine migration strategy from the two pre-copy and post-copy options. We evaluated the implementation & simulation platforms considering the state of the art available technologies, mostly CloudSim, SimGrid and DartCSim+. Formal analysis shows that applying the proposed scheme and the proposed algorithm can significantly improve the live migration process of virtual machines.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 215

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 98 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    6
Measures: 
  • Views: 

    169
  • Downloads: 

    0
Abstract: 

With the rapid growth and development of cloud computing, many startups or even large enterprises have decided to employ cloud services due to its dynamic provisioning and also reducing costs through the reduction of seasoned human resources needed to maintain the infrastructure. On the other hand, the risks of using shared resources and virtual machines are among the biggest threats that have always challenged the advantages of using cloud services. It is now possible for an attacker to attack a virtual machine and through that target the virtual machine manager or HYPERVISOR. This approach will allow the attacker to completely control other virtual machines existing in the domain. Therefore, using a mechanism to decrease the colocation degree of vulnerable virtual machines on the same physical machine can be effective in reducing such security risks. To address these issues, we have proposed a security-aware virtual machine placement scheme to reduce the risk of vulnerable virtual machines co-placement. To manage the precision of security evaluation, it is vital to consider some hesitancy factors regarding security evaluations. Thus, to consider hesitancy in our proposed method, hesitant fuzzy sets are applied and several experimental evaluations have demonstrated the benefits of the proposed approach.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 169

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button