• Title/Summary/Keyword: Virtualization Environments

Search Result 69, Processing Time 0.022 seconds

Job Scheduling Mechanism using Server Virtualization in Grid Environments (그리드 환경에서 서버 가상화를 이용한 작업 스케줄링 기법)

  • Kim, Oh Beom;Park, Ji Su;Shon, Jin Gon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.131-134
    • /
    • 2010
  • 그리드 컴퓨팅은 분산된 자원을 하나로 묶어 거대한 시스템을 구성하며 자원을 공유하여 성능을 높이고 비용을 절감 할 수 있는 시스템이다. 그리드 컴퓨팅 환경에서 사용되는 노드는 높은 성능을 가지고 있지만 단일 운영체제가 모든 하드웨어 자원을 제어하기 때문에 작업 진행시 부하가 높을 때 유휴자원을 쉽게 활용 할 수 없는 문제점이 발생한다. 본 논문에서는 서버에 가용된 자원을 효율적으로 사용 할 수 있도록 가상화를 적용하고 구성된 가상환경에 작업 스케줄링을 대행 할 수 있는 마스터노드를 이용하는 작업 스케줄링을 제안한다.

Analyzing delay of Kernel function owing to GPU memory input from multiple VMs in RPC-based GPU virtualization environments (RPC 기반 GPU 가상화 환경에서 다중 가상머신의 GPU 메모리 입력으로 인한 커널 함수의 지연 문제 분석)

  • Kang, Jihun;Kim, Soo Kyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.541-542
    • /
    • 2021
  • 클라우드 컴퓨팅 환경에서는 고성능 컴퓨팅을 지원하기 위해 사용자에게 GPU(Graphic Processing Unit)가 할당된 가상머신을 제공하여 사용자가 고성능 응용을 실행할 수 있도록 지원한다. 일반적인 컴퓨팅 환경에서 한 명의 사용자가 GPU를 독점해서 사용하기 때문에 자원 경쟁으로 인한 문제가 상대적으로 적게 발생하지만 독립적인 여러 사용자가 컴퓨팅 자원을 공유하는 클라우드 환경에서는 자원 경쟁으로 인해 서로 성능 영향을 미치는 문제를 발생시킨다. 본 논문에서는 여러 개의 가상머신이 단일 GPU를 공유하는 RPC(Remote Procedure Call) 기반 GPU 가상화 환경에서 다수의 가상머신이 GPGPU(General Purpose computing on Graphics Processing Units) 작업을 수행할 때 GPU 메모리 입력 경쟁으로 인해 발생하는 커널 함수의 실행 지연 문제를 분석한다.

  • PDF

A Study on Web-based operating system (웹 기반 운영체제에 관한 연구)

  • Bae, Yu-Mi;Jung, Sung-Jae;Jang, Rae-Young;Park, Jeong-Su;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.674-677
    • /
    • 2012
  • An operating system acts as an intermediary between your computer hardware and computer users to perform, that the user can run the program provides an environment in which. Therefore, the main purpose of the operating system having a computer available for your convenience and to effectively manage computer hardware. The popularization of the people who use computers, improve hardware performance, advent of the internet, popularity of wireless networks, Smartphone and Tablet PC appearance, advent of virtualization technologies and cloud computing, etc. began making changes to the operating system. In particular, cloud computing environments based on server virtualization and using a variety of wired and wireless devices with internet connection, a Web-based operating system was born. In this paper, the definition of a Web-based operating system, types and characteristics, an analysis of the pros and cons, and find out about the future prospects.

  • PDF

VDI deployment and performance analysys for multi-core-based applications (멀티코어 기반 어플리케이션 운용을 위한 데스크탑 가상화 구성 및 성능 분석)

  • Park, Junyong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1432-1440
    • /
    • 2022
  • Recently, as Virtual Desktop Infrastructure(VDI) is widely used not only in office work environments but also in workloads that use high-spec multi-core-based applications, the requirements for real-time and stability of VDI are increasing. Accordingly, the display protocol used for remote access in VDI and performance optimization of virtual machines have also become more important. In this paper, we propose two ways to configure desktop virtualization for multi-core-based application operation. First, we propose a codec configuration of a display protocol with optimal performance in a high load situation due to multi-processing. Second, we propose a virtual CPU scheduling optimization method to reduce scheduling delay in case of CPU contention between virtual machines. As a result of the test, it was confirmed that the H.264 codec of Blast Extreme showed the best and stable frame, and the scheduling performance of the virtual CPU was improved through scheduling optimization.

A Hybrid Mapping Technique for Logical Volume Manager in SAN Environments (SAN 논리볼륨 관리자를 위한 혼합 매핑 기법)

  • 남상수;피준일;송석일;유재수;최영희;이병엽
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.1
    • /
    • pp.99-113
    • /
    • 2004
  • A new architecture called SAN(Storage Area Network) was developed in response to the requirements of high availability of data, scalable growth, and system performance. In order to use SAN more efficiently, most of SAN operating softwares support storage virtualization concepts that allow users to view physical storage devices attached to SAN as a large volume virtually h logical volume manager plays a key role in storage virtualization. It realizes the storage virtualization by mapping logical addresses to physical addresses. A logical volume manager also supports a snapshot that preserves a volume image at certain time and on-line reorganization to allow users to add/remove storage devices to/from SAN even while the system is running. To support the snapshot and the on-line reorganization, most logical volume managers have used table based mapping methods. However, it is very difficult to manage mapping table because the mapping table is large in proportion to a storage capacity. In this paper, we design and implement an efficient and flexible hybrid mapping method based on mathematical equations. The mapping method in this paper supports a snapshot and on-line reorganization. The proposed snapshot and on-line reorganization are performed on the reserved area which is separated from data area of a volume. Due to this strategy normal I/O operations are not affected by snapshot and reorganization. Finally, we show the superiority of our proposed mapping method through various experiments.

Ukrainian Students' Analysis of Abuse Treatment by Parents: Retrospective and Perspective in Virtual and Real Environments

  • Stoliarchuk, Olesia;Kokhanova, Olena;Prorok, Nataliia;Khrypko, Svitlana;Shevtsova, Olena;Tkachyshyna, Oksana;Lobanchuk, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.197-207
    • /
    • 2022
  • Given the prevalence of violence in Ukrainian families, measures to prevent parental abusive treatment against children are urgent. It is important to study today's youth awareness about violence within families in order to enhance a culture of engagement with spouses and children in future. The aim of the study is to examine students' reflective experiences and their attitudes towards forms, frequency, causes and effects of parental abusive treatment. During the research the following methods were used step-by-step: theoretical analyses of scientific resources, anonymous questionnaire, quantitative and correlation analyses. According to result of survey 98 students who were interviewed, none of them fell victim of sexual abuse in their families. However, more than a half (51%) of the students surveyed experienced some forms of parental physical punishment. All the interviewed students encountered psychological cases of parental violence. The mostprevalent forms of parental abuse among the interviewees are criticism, negative comparison, emotional detachment, arrogance, intimidation, blackmail and humiliation. The most prevalent consequences of parental abuse among students are anxiety, low self-esteem, insecurity, impatience, suspiciousness, constraint in communication. Students agree that budget limitations, forced labor, criticism, spanking, emotional detachment, ignoring type of communication, reproach, blackmail are acceptable methods of punishment to use when raising their own children. These results clearly demonstrate the problem of the impact of parental abuse on children and its consequences in the future. A virtual dimension of the actualized problem is considered, namely: - virtualization of aggression and cruelty in the postmodern world. - the level of determining the factor of cruelty from the space of virtual culture. - the mirror image of everyday cruelty in the virtual environment; - the phenomenon of video games as a source and context of representation of the factor of cruelty in behavioral realities; - cybercrime as a virtualized result of cruelty in family and everyday realities. - futurological perspectives of virtualization of cruelty in communicative culture in general and in family relations in particular. The postmodern world is fundamentally different from the traditions and culture of the past, primarily due to the development of computer technologies and the virtualization of life in general. So, for example, virtual communities have become, in a certain way, another world, a second reality of life in general. And certain behavioral factors, in particular cruelty in the private environment, became a projection of such a phenomenon as cybercrime. Video games are a unique modern phenomenon, which multipolarly absorb all facets of human potential, communicative tendencies, behavioral and characterological factors, from the warmth of interpersonal relationships to the extreme degree of cruelty.

BPFast: An eBPF/XDP-Based High-Performance Packet Payload Inspection System for Cloud Environments (BPFast: 클라우드 환경을 위한 eBPF/XDP 기반 고속 네트워크 패킷 페이로드 검사 시스템)

  • You, Myoung-sung;Kim, Jin-woo;Shin, Seung-won;Park, Tae-june
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.213-225
    • /
    • 2022
  • Containerization, a lightweight virtualization technology, enables agile deployments of enterprise-scale microservices in modern cloud environments. However, containerization also opens a new window for adversaries who aim to disrupt the cloud environments. Since microservices are composed of multiple containers connected through a virtual network, a single compromised container can carry out network-level attacks to hijack its neighboring containers. While existing solutions protect containers against such attacks by using network access controls, they still have severe limitations in terms of performance. More specifically, they significantly degrade network performance when processing packet payloads for L7 access controls (e.g., HTTP). To address this problem, we present BPFast, an eBPF/XDP-based payload inspection system for containers. BPFast inspects headers and payloads of packets at a kernel-level without any user-level components. We evaluate a prototype of BPFast on a Kubernetes environment. Our results show that BPFast outperforms state-of-the-art solutions by up to 7x in network latency and throughput.

An Efficient Software Defined Data Transmission Scheme based on Mobile Edge Computing for the Massive IoT Environment

  • Kim, EunGyeong;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.974-987
    • /
    • 2018
  • This paper presents a novel and efficient data transmission scheme based on mobile edge computing for the massive IoT environments which should support various type of services and devices. Based on an accurate and precise synchronization process, it maximizes data transmission throughput, and consistently maintains a flow's latency. To this end, the proposed efficient software defined data transmission scheme (ESD-DTS) configures and utilizes synchronization zones in accordance with the 4 usage cases, which are end node-to-end node (EN-EN), end node-to-cloud network (EN-CN), end node-to-Internet node (EN-IN), and edge node-to-core node (EdN-CN); and it transmit the data by the required service attributes, which are divided into 3 groups (low-end group, medium-end group, and high-end group). In addition, the ESD-DTS provides a specific data transmission method, which is operated by a buffer threshold value, for the low-end group, and it effectively accommodates massive IT devices. By doing this, the proposed scheme not only supports a high, medium, and low quality of service, but also is complied with various 5G usage scenarios. The essential difference between the previous and the proposed scheme is that the existing schemes are used to handle each packet only to provide high quality and bandwidth, whereas the proposed scheme introduces synchronization zones for various type of services to manage the efficiency of each service flow. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of throughput, control message overhead, and latency. Therefore, the proposed ESD-DTS is very suitable for upcoming 5G networks in a variety of massive IoT environments with supporting mobile edge computing (MEC).

A Workflow Execution System for Analyzing Large-scale Astronomy Data on Virtualized Computing Environments

  • Yu, Jung-Lok;Jin, Du-Seok;Yeo, Il-Yeon;Yoon, Hee-Jun
    • International Journal of Contents
    • /
    • v.16 no.4
    • /
    • pp.16-25
    • /
    • 2020
  • The size of observation data in astronomy has been increasing exponentially with the advents of wide-field optical telescopes. This means the needs of changes to the way used for large-scale astronomy data analysis. The complexity of analysis tools and the lack of extensibility of computing environments, however, lead to the difficulty and inefficiency of dealing with the huge observation data. To address this problem, this paper proposes a workflow execution system for analyzing large-scale astronomy data efficiently. The proposed system is composed of two parts: 1) a workflow execution manager and its RESTful endpoints that can automate and control data analysis tasks based on workflow templates and 2) an elastic resource manager as an underlying mechanism that can dynamically add/remove virtualized computing resources (i.e., virtual machines) according to the analysis requests. To realize our workflow execution system, we implement it on a testbed using OpenStack IaaS (Infrastructure as a Service) toolkit and HTCondor workload manager. We also exhaustively perform a broad range of experiments with different resource allocation patterns, system loads, etc. to show the effectiveness of the proposed system. The results show that the resource allocation mechanism works properly according to the number of queued and running tasks, resulting in improving resource utilization, and the workflow execution manager can handle more than 1,000 concurrent requests within a second with reasonable average response times. We finally describe a case study of data reduction system as an example application of our workflow execution system.

Hierarchical IoT Edge Resource Allocation and Management Techniques based on Synthetic Neural Networks in Distributed AIoT Environments (분산 AIoT 환경에서 합성곱신경망 기반 계층적 IoT Edge 자원 할당 및 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.2 no.3
    • /
    • pp.8-14
    • /
    • 2023
  • The majority of IoT devices already employ AIoT, however there are still numerous issues that need to be resolved before AI applications can be deployed. In order to more effectively distribute IoT edge resources, this paper propose a machine learning-based approach to managing IoT edge resources. The suggested method constantly improves the allocation of IoT resources by identifying IoT edge resource trends using machine learning. IoT resources that have been optimized make use of machine learning convolution to reliably sustain IoT edge resources that are always changing. By storing each machine learning-based IoT edge resource as a hash value alongside the resource of the previous pattern, the suggested approach effectively verifies the resource as an attack pattern in a distributed AIoT context. Experimental results evaluate energy efficiency in three different test scenarios to verify the integrity of IoT Edge resources to see if they work well in complex environments with heterogeneous computational hardware.