Vir tualization technolog y
|
|
- Joan Marshall
- 8 years ago
- Views:
Transcription
1 V I R T U A L M A C H I N E S A Virtualization Infrastructure that Supports Pervasive Computing Smartphones might well be the most powerful pervasive embedded device and the ideal platform for pervasive computing. Virtualization technology offers a practical means for the widespread deployment of the necessary middleware. Larry Rudolph VMware Vir tualization technolog y as applied in embedded devices such as mobile smartphones is a practical means for the widespread deployment of pervasive computing applications. As anyone who reads this magazine knows, pervasive computing is all about moving beyond the desktop PC to the computational and digital devices that surround us in our daily lives. The application is dynamically spread over multiple, physically separate I/O devices, with data streaming between them. These devices are part of or controlled by one or more computers containing the middleware that provides the ability to use I/O devices on remote machines. Deploying pervasive computing applications in the wild requires installation of middleware on a range of machines in a safe, secure, and trusted way with minimum effort. This is a challenge as the machines are often embedded computers with any one of a wide range of I/O devices, runtime libraries, operating systems, and outdated software components without support for remote middleware installation. Owners are reluctant to permit remote use of their devices for fear of potential adverse effects on the machine s primary function. As if that weren t difficult enough, the embedded computer or machine that represents the user isn t a pseudo mobile laptop computer as in many pervasive computing demonstrations; rather, it s most likely a mobile smartphone that often has a highly restrictive programming environment. There is reason to believe that the situation will improve. The embedded computers that control the devices in the environment are becoming more powerful and might soon be smartphones in disguise. Smartphones are true computers capable of interacting with, controlling, and coordinating other devices in the environment. They re rich in sensors and actuators and are thus emerging as an ideal pervasive computing building block. For most smartphones, only handset manufacturers and cell network operators can modify the operating system, and it seems unlikely that they ll install pervasive computing middleware in the foreseeable future. The hope lies in using virtualization technology with features that enable the transparent use of remote I/O resources a fundamental need in pervasive computing. This article discusses some of these features. 2 PERVASIVE computing Published by the IEEE CS /09/$ IEEE
2 Figure 1. Two virtual phones within a single handset. The handset on the left contains two virtual phones: a corporate one under the IT department s control and a personal one under the user s control. Although they execute within the same handset, these phones are isolated from each other. The personal virtual machine is encapsulated as a single file that can migrate from the corporate handset to a separate, personal one. Daily handset Corporate phone Personal phone Weekend handset Background A virtualized smartphone or virtualized embedded computer is a physical computer with a low-level software layer on top of which a virtual phone executes. There is a decoupling of software from hardware in which the CPU, memory, and devices appear as if they were real to the software executing in the virtual phone. A virtual phone runs the exact same software as would run on a physical handset; in this way, multiple virtual phones, perhaps running different operating systems, can run on the same handset, each isolated from the other. If you trust this isolation, you are likely to believe that middleware running in its own virtual phone won t compromise other smartphone operations. Virtualization technology has ignored lower-end machines for various reasons. The CPU in most current virtualized computers, for example, is based on the Intel x86 instruction set, whereas in many smartphones and embedded computers it s based on ARM instruction sets ( products/cpus/index.html). These two architectures are sufficiently different that they require a complete redevelopment of any virtualization software. Moreover, virtualization incurs some overhead in both performance and storage, and smartphones execute very close to their resource limits and can t withstand any performance degradation. Fortunately, this situation is changing: smartphones are increasingly provisioned to handle many available thirdparty applications, and academic studies as well as several industrial efforts have identified several potential revenue sources for virtualized phones (www. ok-labs.com, and mobile/index.html). 1,2 In addition to isolation, virtualization s other main benefits of encapsulation and interposition are useful in the mobile space, although for slightly different reasons than in the desktop and server markets. 3 Encapsulation makes it easy to deploy middleware on a wide variety of platforms. Interposition lets a pervasive computing application use and harvest remote devices in the local environment; it refers to the fact that all the virtual machine I/O actions are mediated by virtualization software, which can inspect, modify, and redirect these actions. Isolation Several virtual phones can execute on the same machine, yet remain protected from each other as if they were executing on separate machines a feature that has several potential benefits. It s especially important in mobile phones to protect the baseband stack the part that interacts with the cellular network. An application executing in a virtual phone might somehow compromise the operating system in that virtual phone; however, because of isolation, it can t compromise the baseband stack. Indeed, many (nonvirtualized) smartphones currently have two distinct processor chips to provide such isolation, with trusted software burned into the ROM controlling one of the processors. Multicore chips and higher-capacity single cores have led to all these functions combined onto a single chip, with virtualization technology as a way to keep them isolated. Many executives routinely carry two phones because of isolation, one for business and the other for personal use. The corporate phone might contain sensitive s and documents because it has direct virtual private network (VPN) access to the corporate network. Because the company owns this phone, its management is under the IT department s control; IT personnel dictate security settings, control which applications employees install on it, track communications (such as , text messages, and phone calls), and encrypt data on the device. A personal phone often has a few of these restrictions, but it s under the user s control; he or she might opt for the convenience of riskier operation. As Figure 1 shows, a single handset with virtualization technology can simultaneously support both types of phones. Rather than supplying a corporate phone to all employees, the IT OCTOBER DECEMBER 2009 PERVASIVE computing 3
3 VIRTUAL MACHINES department can install a virtual phone completely under its control within an employee s virtualization-enabled personal phone. Encapsulation A virtual phone s entire state can be encapsulated in a single file, a feature that provides checkpointing but also enables deployment and migration. It s possible to present a standard virtual hardware platform independent from the actual physical hardware platform so that a virtual phone can execute on any such virtualized physical handset. Many other embedded devices, such as handheld GPS devices, set-top boxes, and digital cameras, have hardware configurations similar to mobile phones a virtual phone could therefore migrate to such devices as well. One extreme form of encapsulation is a virtual appliance, an application that executes in a dedicated virtual phone that contains just enough operating system for that application to run. The promise of virtual appliances is that they make applications easier to deploy: very little is assumed about the platform except that is can support the minimal set of virtual devices a particular virtual appliance requires. Interpositioning A virtual phone has a set of virtual devices; the phone s operating system interacts with these devices through its device drivers. These virtual devices are software that emulates device behavior and communicates with the host s device drivers, which in turn interact with the real devices. A handset can have several virtual phones concurrently executing, so the virtualization system must multiplex access to each actual device. Exactly how the multiplexing works depends on the device, of course some devices can be shared (such as a vibrating battery), whereas others demand exclusive accesses (such as a keyboard). The multiplexor acts something like a network address translator (NAT) as it must route input data to the appropriate destination. Note that the user might have Pervasive computing applications can benefit from capabilities such as remote device usage and remote execution, which provide privacy, security, and ease of deployment. to take action to allocate a device exclusively to a particular virtual phone, for example, a Bluetooth device. Similarly, explicit action might be required when a user attempts to use a remote device or permit a remote handset to use a local device. These multiplexors are instances of a device stream transformer. Another example is a transformer that routes communications from an emulated device to a physically remote machine. The collection of filters, multiplexors, and device selectors and their interconnection structure are referred to as a transformer network. The Challenge With so many pervasive computing applications available, it s helpful to consider just a few representative ones that can assume a role for mobile phones even though other platforms are possible as well. The following two examples involve communication and collaboration between distinct devices: Alice is creating a complex symphony on her phone in a coffee shop, but her battery is dying. As she taps the cash register with her phone, the register s powerful process takes over the phone s resource-consuming computations. Her good friend Bob walks in, and after a few seconds, he hears Alice s live composition through the headphones attached to his smartphone. The gang has just sat down at its favorite restaurant, and Debbie decides she wants a group picture. She gives the waiter her cell-phone camera and tells everyone to gather around. After he takes the picture, everyone pushes a few buttons on their own phones and engages their own cameras to magically capture the picture taken with Debbie s phone. In each situation, computers communicate and use nearby peripheral devices. The pervasiveness comes about by dynamically enabling physically proximate computers to interact in an ad hoc manner. Alice might be happy to let Bob hear her music but not to see her messages, and Bob certainly doesn t want Alice to hear his phone conversations with his new girlfriend. Debbie s happy to share the group photo but not the pictures she took yesterday. In other words, permission to use some peripherals is more likely to be granted if it s under the owner s control and causes no ill effects. These types of pervasive computing applications can benefit from additional capabilities such as remote device usage and remote execution that provide sufficient protection, privacy, security, and ease of deployment. Remote access to devices isn t new (the X Window 4 system is probably the most successful early example), nor is remote execution of code on another computer (for example, via remote procedure call, RPC 5 ). Indeed, we ve all seen these scenarios demonstrated multiple times and places, and over many years, albeit with desktop computers, laptops, or even handheld computers. However, despite all the advances in device technology, such pervasive computing scenarios still await a practical solution. 4 PERVASIVE computing
4 How Virtualization Can Help Alice and the Gang Let s see how virtualization might support the sample scenarios just described. The virtual machine on Alice s phone can migrate to the cash register, thereby reducing the drain on her battery. Alice still interacts with the phone, but the audio output that s now transmitted from the register to her phone can be multicast to Bob s phone using the interpositioning feature. Interposition in Debbie s phone makes the image that her camera captured available to her friends phones; likewise, interposition in her friends phones also fools each device into believing that it took the picture, not Debbie s camera. In other words, each friend snaps the virtual camera in his or her virtual phone and receives a possibly different but actual image captured by Debbie s physical camera. Where s the Middleware? Pervasive computing middleware provides services such as finding nearby devices and making resources available to others. However, the basic question is where should the middleware reside? The choices are at the application or user level, within the operating system, or at the virtualization layer. Although the first two have their advantages, the latter option might be the most practical, assuming virtualization is present in most handsets and embedded devices. At the user level. User-level applications have access to devices and networking, making them a natural candidate for middleware. However, it isn t likely that developers will rewrite all their applications to explicitly check and, when available, use these remote devices perhaps a particular application or two, but not all of them. However, it s possible to modify a fully software-based virtual machine s runtime system for example, the Java Virtual Machine (JVM) could be modified to remote particular devices. In this case, all applications that execute within the JVM need not be modified, but non-java applications can still access the local devices. A JVM doesn t present a complete software abstraction of a phone s hardware, but rather a higher level of abstraction. Consider, for example, the group camera use case. An application on one phone takes the picture and advertises its availability over Bluetooth 6 or a local ad hoc Wi-Fi network. All the other phones have an application that searches for this service, registers the device, and receives the picture when available. Of course, to actually communicate requires an authentication mechanism to ensure that the pictures are only sent to those in the group. Unfortunately, other camera application features aren t similarly available for example, some GPS-enabled phones tag images, whereas others might have the ability to add notes directly to the picture. An application that merely fetches an image from a remote location might not be able to exploit such sophisticated applications. At the operating system level. An alternative approach is to directly modify an operating system and its device drivers so that the applications need not know about remote devices. However, it s a challenge to modify operating systems: many mobile and embedded devices simply don t allow it, or the system must be signed, and signing keys aren t readily available. Unlike personal computers, you can t install a new operating system on a phone. At the virtualization level. The virtualization system already controls the data streams between emulated and actual devices, and remote devices can use this functionality. Naturally, it isn t a good idea to allow arbitrary third-party software to be inserted into the virtualization system because it must be the most secure and reliable software in the system. Fortunately, we only require some combination of enabling or disabling some standard transformers and multiplexors within the virtualization layer. The more specialized user-level software handles the specific application needs. An appropriately designed transformer network, for example, allows incoming control to continue in either the forward or reverse direction. Each transformer has a set of function pointers specifying the next step in the flow, and the logic inside the management software can tell the transformer to remote a device, multicast it with data, or use an actual device. Putting the Pieces Together Pervasive computing middleware in a virtualized device is partly implemented at the user level and partly in the trusted virtualization layer (see Figure 2). The user-level software might be best implemented as a virtual appliance so that it only affects the data streams for particular devices. For this It isn t likely that developers will rewrite all their applications to explicitly check and, when available, use these remote devices. article s purposes, let s call this Per- Com-VA. A machine can contain multiple instances and versions depending on the particular pervasive computing application; this discussion assumes a single one. The virtualization layer support consists of a transformation network and a method to route data streams to and from the PerCom-VA. The transformer network can be configured at boot time or dynamically configured, provided OCTOBER DECEMBER 2009 PERVASIVE computing 5
5 VIRTUAL MACHINES Figure 2. Virtualized embedded Management server VM Guest Apps Guest OS Guest device driver Device emulator VM Percom virtual appliance Guest device driver Device emulator Guest device driver Device emulator machine. The structure contains trusted software that can reroute I/O device streams. Management software, either trusted remote code or explicit user actions, controls the rerouting. A rerouted data stream flows through a virtual appliance that contains thirdparty code for the specific pervasive computing application. Management client Transformational network Virtualization software Transformer any affected streams are quiescent during the reconfiguration. The transformers themselves are all trusted software. In and of itself, PerCom-VA does very little and is only useful when the virtualization layer explicitly directs I/O device streams to flow through it. Its installation is thus more likely to be acceptable to the owner. Moreover, the same virtual appliance can execute on any device that has the virtualization infrastructure, regardless of the host machine s operating system or runtime libraries. A machine that contains PerCom- VA will be able to make its I/O devices available to any other machine with a compatible PerCom-VA. The I/O stream passes between machines over a Bluetooth, Wi-Fi, or some other wireless communication device, which is akin to a virtual network computer, 7 remote desktop, GoToMyPC, or even X11 remote windows. PerCom-VA, however, will do this in a way that s transparent to the operating system and the applications in a virtual phone or virtual machine. It s natural that a device s owner will have ultimate control over how it and Device driver Device Device driver Device its components are used; equally obvious is that an altruistic owner shouldn t suffer. Let s look at how to install Per- Com-VA and control the transformer network. Management Details A machine can either install PerCom- VA itself from a central, universally accessible repository or receive a copy from a nearby machine that initiated the pervasive computing application. Virtualization, in theory, provides stronger isolation than processes, but it s still likely that each PerCom-VA will be signed. Within a single machine, the biggest challenges are who controls the I/O stream and how much trust is required. The path between an I/O device and PerCom-VA isn t easy to protect. Even with complete faith in the virtualization software and device drivers contained therein, it s still possible that an I/O device stream is directed to one PerCom-VA instance before reaching the intended PerCom-VA. Presumably, the transformation network can tag each packet with its last entry, but a stream could pass through many virtual appliances. A further complication involves several remote machines simultaneously using shared devices. The level of isolation and protection required isn t clear for example, should a PerCom-VA be allowed to know of this sharing? Moreover, some monitoring is needed to avoid a circular chain that might result when the same data stream flows through more than one remote machine. Inserting, deleting, modifying, enabling, or disabling a transformer is a serious operation because it compromises the entire machine s security, isolation, integrity, and reliability. The challenges are similar to those in the Denali project, 8 which let programmers interpose on and modify events at the virtual architecture level in an extensible and programmable fashion. However, the limited resources in a mobile and embedded space require a much lighter-weight solution, which should be possible because the interposition is limited to device flows and not arbitrary virtual machine monitor events. Issues Creating an efficient mechanism that addresses isolation and security concerns while making remote use of I/O devices easy for users and developers is still an open problem. Passwords and group access rights are the obvious awkward initial solutions to security. Users must be able to easily and clearly enable and disable remote sharing of resources, giving permission to remote devices as well as getting access to them. One step in this direction is 6 PERVASIVE computing
6 presenting information about nearby devices to users with a graphical interface and a join-the-dots metaphor. 9 Limited screen area, imprecise user input devices, limited attention spans, and the fact that many smartphone users are technically naive are just a few of the remaining challenges. the AUTHOR Larry Rudolph is senior staff engineer at VMware. His research interests include high-performance computing; optical interconnection networks; and pervasive, human-centric mobile computing. Rudolph has a PhD in computer science from the Courant Institute, NYU. Contact him at rudolph@vmware. com. So far, research in device stream control and low-overhead, dynamic interpositioning of fi l- ters, transformers, and redirectors is mostly specific to particular operating systems and nonembedded computing platforms. 10 Because pervasive computing applications also use devices embedded in the environment and in our pockets, it s time for a more general mechanism. The biggest differences between mobile phones and their larger counterparts are their extreme resource limitations and location awareness. Mobile phone users must constantly worry about power and battery life; memory is limited as well. In a pervasive computing environment, it might be advantageous to offload computation 11 to a non-battery device to use memory and CPU freely, but wireless transmission itself consumes a lot of power sometimes, the transmission of one byte can require a thousand times more energy than a single 32-bit computation. 12 Adapting to local conditions requires constant evaluation of such trade-offs. Today s mobile phones have cameras, but it won t be long before cameras contain mobile phones. Device manufacturers are already adding GPS and networking functions to cameras, as well as touchscreens with full computational capabilities. Mobile phones and PDAs can act as ebook readers, whereas dedicated ebook readers have cellular network connectivity some even run Linux. The list goes on, and the diversity of convergent devices implies that many people will have many more devices than they already do. A virtual machine that can migrate or even be cloned can reduce user effort in keeping such devices coherent. Virtualization technology is now present in servers and personal computers; it s only a matter of time before mobile handsets and other nontrivial embedded computers embrace it. REFERENCES 1. L.P. Cox and P.M. Chen, Pocket Hypervisors: Opportunities and Challenges, Proc. Mobile Computing Systems and Applications, IEEE CS Press, 2007, pp D.R. Ferstay, Fast Secure Virtualization for the ARM Platform, master s thesis, Computer Science Dept., Univ. British Columbia, M. Rosenblum and T. Garfinkel, Virtual Machine Monitors: Current Technology and Future Trends, Computer, vol. 38, no. 5, 2005, pp R.W. Scheier and J. Gettys, The X Window System, ACM Trans. Graphics, vol. 5, no. 2, 1986, pp J.E. White, A High-Level Framework for Network-Based Resource Sharing, Proc. Nat l Computer Conf. and Exposition, ACM Press, 1976, pp A.S. Huang and L. Rudolph, Bluetooth Essentials for Programmers, Cambridge Univ. Press, T. Richardson et al., Virtual Network Computing, IEEE Internet Computing, vol. 2, no. 1, 1998, pp A. Whitaker et al., Constructing Services with Interposable Virtual Hardware, Proc. 1st Symp. Networked Systems Design and Implementation, Advanced Computing Systems Association, 2004, pp R. Want et al., Dynamic Composable Computing, Proc. HotMobile 2008, ACM Press, 2008, pp E. Kohler et al., The Click Modular Router, ACM Trans. Computer Systems, vol. 18, no. 3, 2000, pp B.-G. Chun and P. Maniatis, Augmented Smartphone Applications through Clone Cloud Execution, Proc. 12th Workshop Hot Topics in Operating Systems, Advanced Computing Systems Association, 2009; hotos09/tech/full_papers/chun/chun.pdf. 12. K.C. Barr and K. Asanovic, Energy- Aware Lossless Data Compression, ACM Trans. Computer Systems, vol. 24, no. 3, 2006, pp For more information on this or any other computing topic, please visit our Digital Library at Questions? Comments? pervasive@computer.org OCTOBER DECEMBER 2009 PERVASIVE computing 7
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
More informationAnalysis on Virtualization Technologies in Cloud
Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization
More informationObjectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.
Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Virtual Desktop Infrastructure www.parallels.com Version 1.0 Table of Contents Table of Contents... 2 Enterprise Desktop Computing Challenges... 3 What is Virtual
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...
More informationThe Importance of User Workspace Virtualization in Desktop Virtualization
res Software // Whitepaper The Importance of User Workspace Virtualization in Desktop Virtualization Whitepaper Transforming Desktops into Workspaces 2 Table of content: Abstract... 3 What is desktop virtualization?...4
More informationevm Virtualization Platform for Windows
B A C K G R O U N D E R evm Virtualization Platform for Windows Host your Embedded OS and Windows on a Single Hardware Platform using Intel Virtualization Technology April, 2008 TenAsys Corporation 1400
More informationVirtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
More informationMobile Image Offloading Using Cloud Computing
Mobile Image Offloading Using Cloud Computing Chintan Shah, Aruna Gawade Student, Dept. of Computer., D.J.Sanghvi College of Engineering, Mumbai University, Mumbai, India Assistant Professor, Dept. of
More informationMobile Operating Systems. Week I
Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone
More informationPerformance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
More informationThingsquare Technology
Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.
More informationWhite Paper on NETWORK VIRTUALIZATION
White Paper on NETWORK VIRTUALIZATION INDEX 1. Introduction 2. Key features of Network Virtualization 3. Benefits of Network Virtualization 4. Architecture of Network Virtualization 5. Implementation Examples
More informationWays to Use USB in Embedded Systems
Ways to Use USB in Embedded Systems by Yingbo Hu, R&D Embedded Engineer and Ralph Moore, President of Micro Digital Universal Serial Bus (USB) is a connectivity specification that provides ease of use,
More informationSimplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction
Simplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction There are tectonic changes to storage technology that the IT industry hasn t seen for many years. Storage has been
More informationIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
More informationComparing Virtualization Technologies
CHAPTER 2 Comparing Virtualization Technologies With this chapter, we begin our exploration of several popular virtualization strategies and explain how each works. The aim is to bring you the operational
More informationNovel Systems. Extensible Networks
Novel Systems Active Networks Denali Extensible Networks Observations Creating/disseminating standards hard Prototyping/research Incremental deployment Computation may be cheap compared to communication
More informationLast Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
More informationCrashPlan PRO Enterprise Backup
CrashPlan PRO Enterprise Backup People Friendly, Enterprise Tough CrashPlan PRO is a high performance, cross-platform backup solution that provides continuous protection onsite, offsite, and online for
More informationFull and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
More informationWindows Server Virtualization An Overview
Microsoft Corporation Published: May 2006 Abstract Today s business climate is more challenging than ever and businesses are under constant pressure to lower costs while improving overall operational efficiency.
More informationGetting More Performance and Efficiency in the Application Delivery Network
SOLUTION BRIEF Intel Xeon Processor E5-2600 v2 Product Family Intel Solid-State Drives (Intel SSD) F5* Networks Delivery Controllers (ADCs) Networking and Communications Getting More Performance and Efficiency
More informationVirtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
More informationLast Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
More informationMulti-core Programming System Overview
Multi-core Programming System Overview Based on slides from Intel Software College and Multi-Core Programming increasing performance through software multi-threading by Shameem Akhter and Jason Roberts,
More informationWatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA 98104 www.watchguard.com
SMALL BUSINESS NETWORK SECURITY GUIDE WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION AUGUST 2004 SMALL BUSINESS NETWORK SECURITY GUIDE: WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION
More informationVirtual. The term virtual machine initially described a 1960s. The Reincarnation of FOCUS. Virtual. Machines
The term virtual machine initially described a 1960s operating system concept: a software abstraction with the looks of a computer system s hardware (real machine). Forty years later, the term encompasses
More informationData Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
More informationThe Reincarnation of Virtual Machines
The Reincarnation of Virtual Machines By Mendel Rosenblum Co-Founder of VMware Associate Professor, Computer Science Stanford University Abstract:VMware, Inc. has grown to be the industry leader in x86-based
More informationNetworking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the
More informationVirtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
More informationBasics in Energy Information (& Communication) Systems Virtualization / Virtual Machines
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to
More informationWindows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...
More information9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary kpcleary@buffalo.edu What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
More informationBefore we can talk about virtualization security, we need to delineate the differences between the
1 Before we can talk about virtualization security, we need to delineate the differences between the terms virtualization and cloud. Virtualization, at its core, is the ability to emulate hardware via
More informationVirtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
More informationSolution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
More informationExample of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
More informationStudy and installation of a VOIP service on ipaq in Linux environment
Study and installation of a VOIP service on ipaq in Linux environment Volkan Altuntas Chaba Ballo Olivier Dole Jean-Romain Gotteland ENSEIRB 2002 Summary 1. Introduction 2. Presentation a. ipaq s characteristics
More informationThe Promise of Desktop Virtualization
White Paper Desktop virtualization can help rein in the costs of managing and maintaining PC infrastructures. By Megan Santosus Contents 1 Executive Summary 2 Introduction 2 Types of Desktop Virtualization
More informationExpertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition
Remote Access Technologies: A Comparison of Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition Contents: Executive Summary...1 Remote Access Overview...2 Intended Application... 2 Revolutionary
More informationWineWeb: Point-of-Sale Planning Guide
WineWeb: Point-of-Sale Planning Guide This document provides information on options to consider when establishing a point-of-sale environment for your winery, or when thinking about expanding your winery
More information7 Things You Need to Know about Virtual Mobile Infrastructure
7 Things You Need to Know about Virtual Mobile Infrastructure Executive Summary Employees are bringing their phones and tablets to work in droves. This tidal wave of unmanaged devices has forced IT departments
More informationIntel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
More informationGEM Network Advantages and Disadvantages for Stand-Alone PC
Possible Configurations Turns your Contacts into a Business Network focussed on you GEM can be configured to run in many different ways. From simple stand-alone PC s or Mac s, through Client Server on
More informationVirtualization for Future Internet
Virtualization for Future Internet 2010.02.23 Korea University Chuck Yoo (hxy@os.korea.ac.kr) Why Virtualization Internet today Pro and con Your wonderful research results Mostly with simulation Deployment
More informationVirtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
More informationA Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
More informationCS 695 Topics in Virtualization and Cloud Computing. Introduction
CS 695 Topics in Virtualization and Cloud Computing Introduction This class What does virtualization and cloud computing mean? 2 Cloud Computing The in-vogue term Everyone including his/her dog want something
More informationCS 695 Topics in Virtualization and Cloud Computing and Storage Systems. Introduction
CS 695 Topics in Virtualization and Cloud Computing and Storage Systems Introduction Hot or not? source: Gartner Hype Cycle for Emerging Technologies, 2014 2 Source: http://geekandpoke.typepad.com/ 3 Cloud
More informationReminders. Lab opens from today. Many students want to use the extra I/O pins on
Reminders Lab opens from today Wednesday 4:00-5:30pm, Friday 1:00-2:30pm Location: MK228 Each student checks out one sensor mote for your Lab 1 The TA will be there to help your lab work Many students
More informationDeveloping a dynamic, real-time IT infrastructure with Red Hat integrated virtualization
Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization www.redhat.com Table of contents Introduction Page 3 Benefits of virtualization Page 3 Virtualization challenges
More informationCELLS A Virtual Mobile Smartphone Architecture
CELLS A Virtual Mobile Smartphone Architecture Jeremy Andrus, Christoffer Dall, Alexander Van t Hof, Oren Laadan, Jason Nieh Columbia University 23rd ACM Symposium on Operating Systems Principles, Cascais,
More informationOne platform for all your print, scan and device management
One platform for all your print, scan and device management Manage all Printing & Scanning with one single Platform. Incorporating uniflow into your document processes will lead to real improvements in
More informationRemote Desktop on Mobile
Remote Desktop on Mobile SonamGavhane RasikaPhanse Monica Sadafule B.W.Balkhande Abstract In This paper we will see how the remote Desktop with static IP can be accessed using Android based mobile phones,to
More informationOperating System Structures
COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating
More informationExtend Your IT Infrastructure with Amazon Virtual Private Cloud
Extend Your IT Infrastructure with Amazon Virtual Private Cloud January 2010 http://aws.amazon.com/vpc Understanding Amazon Virtual Private Cloud Amazon Virtual Private Cloud (Amazon VPC) is a secure and
More informationVirtualization: An Overview
Virtualization: An Overview Executive Summary Improving resource utilization through virtualizing IT infrastructures is becoming a priority for many enterprises. A successful deployment requires up front
More informationHypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:
Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique
More informationChapter 6 Essentials of Design and the Design Activities
Systems Analysis and Design in a Changing World, sixth edition 6-1 Chapter 6 Essentials of Design and the Design Activities Chapter Overview There are two major themes in this chapter. The first major
More informationVIRTUALIZATION THE FOUNDATION OF CLOUD COMPUTING
VIRTUALIZATION THE FOUNDATION OF CLOUD COMPUTING TM 989 Old Eagle School Road Suite 815 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Did You Know Approximately 70 percent of a typical IT budget in
More informationOptimize Server Virtualization with QLogic s 10GbE Secure SR-IOV
Technology Brief Optimize Server ization with QLogic s 10GbE Secure SR-IOV Flexible, Secure, and High-erformance Network ization with QLogic 10GbE SR-IOV Solutions Technology Summary Consolidation driven
More informationDecomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces
Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The
More informationIMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications
Open System Laboratory of University of Illinois at Urbana Champaign presents: Outline: IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications A Fine-Grained Adaptive
More informationRunning Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
More informationRemote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser
Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser 1 Karan Sandeep Bhandari, 2 Vishnu Baliram Mandole, 3 Akash Dattatray Munde, 4 Sachin B. Takmare Bharati Vidyapeeth
More informationClonecloud: Elastic execution between mobile device and cloud [1]
Clonecloud: Elastic execution between mobile device and cloud [1] ACM, Intel, Berkeley, Princeton 2011 Cloud Systems Utility Computing Resources As A Service Distributed Internet VPN Reliable and Secure
More informationServer and Storage Sizing Guide for Windows 7 TECHNICAL NOTES
Server and Storage Sizing Guide for Windows 7 TECHNICAL NOTES Table of Contents About this Document.... 3 Introduction... 4 Baseline Existing Desktop Environment... 4 Estimate VDI Hardware Needed.... 5
More informationVirtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
More informationVMware Virtualization and Software Development
VMware Virtualization and Software Development 1 VMware Virtualization and Software Development Mark Cloutier Undergraduate Student, Applied Math and Computer Science Keywords: Virtualization, VMware,
More informationCS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 2: Operating System Structures Prof. Alan Mislove (amislove@ccs.neu.edu) Operating System Services Operating systems provide an environment for
More informationWeb Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
More informationMODULE 3 VIRTUALIZED DATA CENTER COMPUTE
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE Module 3: Virtualized Data Center Compute Upon completion of this module, you should be able to: Describe compute virtualization Discuss the compute virtualization
More informationMaximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software
FAST, RELIABLE, & JUST WORKS! White Paper Maximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software Proxy Networks, Inc. 877-PROXY-US or 617-453-2700 www.proxynetworks.com
More informationTechnical Paper. Moving SAS Applications from a Physical to a Virtual VMware Environment
Technical Paper Moving SAS Applications from a Physical to a Virtual VMware Environment Release Information Content Version: April 2015. Trademarks and Patents SAS Institute Inc., SAS Campus Drive, Cary,
More informationOPERATING SYSTEM SERVICES
OPERATING SYSTEM SERVICES USER INTERFACE Command line interface(cli):uses text commands and a method for entering them Batch interface(bi):commands and directives to control those commands are entered
More informationChapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
More informationThe Benefits of Virtualizing Citrix XenApp with Citrix XenServer
White Paper The Benefits of Virtualizing Citrix XenApp with Citrix XenServer This white paper will discuss how customers can achieve faster deployment, higher reliability, easier management, and reduced
More informationApplications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More informationVirtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
More informationIn the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.
QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in
More informationCSE597a - Cell Phone OS Security. Cellphone Hardware. William Enck Prof. Patrick McDaniel
CSE597a - Cell Phone OS Security Cellphone Hardware William Enck Prof. Patrick McDaniel CSE597a - Cellular Phone Operating Systems Security - Spring 2009 - Instructors McDaniel and Enck 1 2 Embedded Systems
More informationCloud Data Protection for the Masses
Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing
More informationM-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
More informationProtecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationThe XenServer Product Family:
The XenServer Product Family: A XenSource TM White Paper Virtualization Choice for Every Server: The Next Generation of Server Virtualization The business case for virtualization is based on an industry-wide
More informationWindows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described
More informationWhy Virtualize? Executive Summary
Why Virtualize? Executive Summary Improving resource utilization through virtualizing IT infrastructures is becoming a priority for many enterprises. A successful deployment requires up front preparation
More informationDesigning and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System
, pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department
More informationThe Fastest Way to Parallel Programming for Multicore, Clusters, Supercomputers and the Cloud.
White Paper 021313-3 Page 1 : A Software Framework for Parallel Programming* The Fastest Way to Parallel Programming for Multicore, Clusters, Supercomputers and the Cloud. ABSTRACT Programming for Multicore,
More informationCPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
More informationServer Based Desktop Virtualization with Mobile Thin Clients
Server Based Desktop Virtualization with Mobile Thin Clients Prof. Sangita Chaudhari Email: sangita123sp@rediffmail.com Amod N. Narvekar Abhishek V. Potnis Pratik J. Patil Email: amod.narvekar@rediffmail.com
More informationVirtualised MikroTik
Virtualised MikroTik MikroTik in a Virtualised Hardware Environment Speaker: Tom Smyth CTO Wireless Connect Ltd. Event: MUM Krackow Feb 2008 http://wirelessconnect.eu/ Copyright 2008 1 Objectives Understand
More informationRelational Databases in the Cloud
Contact Information: February 2011 zimory scale White Paper Relational Databases in the Cloud Target audience CIO/CTOs/Architects with medium to large IT installations looking to reduce IT costs by creating
More informationSystem Structures. Services Interface Structure
System Structures Services Interface Structure Operating system services (1) Operating system services (2) Functions that are helpful to the user User interface Command line interpreter Batch interface
More informationThe Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
More informationNetwork Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
More informationGlobal Network. Whitepaper. September 2014. Page 1 of 9
Global Network Whitepaper September 2014 Page 1 of 9 Contents 1. Overview...2 2. Global Connectivity, Quality of Service and Reliability...2 2.1 Exceptional Quality...3 2.2 Resilience and Reliability...3
More information