Virtual machine migration time memory optimization algorithm based on Xen Chen Tingwei Zhang Pu Zhang Zhongqing for virtual machine migration in a cloud computing environment, Xen Migration uses a comparison between passing a page bitmap and skipping a page bitmap to determine whether the memory page is retransmission. The problem of multiple retransmission to increase network transport overhead for page bitmap comparisons A memory optimization algorithm based on AR model is proposed, which predicts the next time of memory page modification according to the memory page modification time interval of all records, and retransmission when the next modification time is greater than a certain threshold. The experimental results show that the base ...
When you joined the Xen Summit last week, you heard the XCI (Xen Client Initiative) project (see Xen Cloud Platform (XCP)), Xen clients hypervisor:the Ultimate The "project is" to Define a standard framework for supporting service domain virtual Applian ...
What kind of virtualization technology to choose for the cloud computing platform will be a problem that cloud computing construction will face. This article compares and analyzes the architecture levels of the four mainstream virtualization technologies.
Research and implementation of security mechanism among cloud computing client virtual machines The flexible services provided by the Choran Hu Junrong cloud computing rely on the support of virtualization technology, but the security problems of virtualization technology also pose a serious threat to the security of cloud computing. In view of the security risks faced by the client operating system in the cloud computing virtualization technology, based on the analysis of the requirements and characteristics of cloud computing virtualization technology, this paper designs the centralized management of cloud computing environment, the forced access control of distributed implementation and the isolation mechanism based on cloud resource control to make it cooperate with each other. Ensure the security of the client operating system in cloud computing and make the ...
Archipel is a solution for managing and supervising virtual machines. If you have a local computer that can manage thousands of data centers through it, Archipel is a core solution to manage them. You can use all the virtualization engines supported by libvirt like Kvm,xen,openvz, or VMware. You can perform all the basic virtualization commands and many other things, like live migrations, vmcasts,packages, and so on. Archipel uses XMPP protocol for all ...
September 23, virtualization technology for the Linux kernel Xen was given a hat-trick with 3 security vulnerabilities. Xen vulnerabilities can be jumped out of the virtual host environment (ultra vires), or read other user data, control the hypervisor itself (host). A remote attacker could exploit a vulnerability that could cause the host system to crash and deny service to legitimate users. Xen Vulnerabilities and impact range is not small, such as Amazon AWS Large-scale restart server-the entire repair cycle lasted 5 days (from September 25 7 o'clock in the afternoon to September 30 5 o'clock in the afternoon), impact ...
A, virtualization virtualization refers to the ability to simulate multiple virtual machines on the same physical machine. Each virtual machine has a separate processor, memory, hard disk, and network interface logically. The use of virtualization technology can improve the utilization of hardware resources, so that multiple applications can run on the same physical machine with each other isolated operating environment. There are also different levels of virtualization, such as virtualization at the hardware level and virtualization at the software level. Hardware virtualization refers to the simulation of hardware to obtain a similar to the real computer environment, you can run a complete operating system. In the hardware virtual ...
Eucalyptus Elastic Utility Computing architecture for linking Your Programs to useful Bae (Eucalyptus) is an open source software infrastructure, Used to compute the flexible, practical cloud computing of a cluster or workstation cluster. It was originally a research project at the University of California at Santa Barbara School of Computer Science, ...
Overview of Virtual machine system security Shen Zhi, Zhang Qun, Dichen with the wide application of cloud computing, virtual machine technology has been revived and developed, but it also brings new security threats, so the research on the security threat and defense of virtual machines has become a hotspot in the field of computer security. Taking the current widely used virtual machine Xen as an example, this paper analyzes the existing vulnerabilities and threats according to the technical characteristics of virtual machines, and puts forward the corresponding defense and protection methods from the angle of computer security science. A more comprehensive summary of the current domestic and foreign research on the safety of virtual machines related to the ...
Cloudstack is an open-source, highly available and scalable cloud computing platform that supports the management of most mainstream virtual machine managers, such as KVM and XEN. There are two types of storage in Cloudstack: Primary storage provides disk volumes for virtual machine instances, and level two storage provides templates for virtual machine instances to install mirrored files for systems and disk snapshots of virtual machine instances. Both types of storage support network-attached storage (NAS). Figure 0. Cloudstack architecture This article we will be a Linux host ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.