• Title/Summary/Keyword: Virtualization Technology

Search Result 292, Processing Time 0.025 seconds

Survey on Network Virtualization Using OpenFlow: Taxonomy, Opportunities, and Open Issues

  • Abdelaziz, Ahmed;Ang, Tan Fong;Sookhak, Mehdi;Khan, Suleman;Vasilakos, Athanasios;Liew, Chee Sun;Akhunzada, Adnan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4902-4932
    • /
    • 2016
  • The popularity of network virtualization has recently regained considerable momentum because of the emergence of OpenFlow technology. It is essentially decouples a data plane from a control plane and promotes hardware programmability. Subsequently, OpenFlow facilitates the implementation of network virtualization. This study aims to provide an overview of different approaches to create a virtual network using OpenFlow technology. The paper also presents the OpenFlow components to compare conventional network architecture with OpenFlow network architecture, particularly in terms of the virtualization. A thematic OpenFlow network virtualization taxonomy is devised to categorize network virtualization approaches. Several testbeds that support OpenFlow network virtualization are discussed with case studies to show the capabilities of OpenFlow virtualization. Moreover, the advantages of popular OpenFlow controllers that are designed to enhance network virtualization is compared and analyzed. Finally, we present key research challenges that mainly focus on security, scalability, reliability, isolation, and monitoring in the OpenFlow virtual environment. Numerous potential directions to tackle the problems related to OpenFlow network virtualization are likewise discussed.

A Study on the Application of Virtualization for Optimization Services (최적화 서비스를 위한 가상화 기술 적용 방안에 관한 연구)

  • Na, Won-Shik;Lee, Jae-Ha
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.2
    • /
    • pp.313-318
    • /
    • 2011
  • Virtualization has recently come under the spotlight as an important emerging technology. The technology was initially focused on services rather than the effective use of the system when it was developed in the 1960s. Now, following with technological advancement, virtualization is used on servers based on x86. The biggest merit by far of this technology is economic. Virtualization enables server integration, which can cut operating expenses (including personnel expenses) since it costs less to purchase, power and maintain multiple servers if they are integrated by the virtualization technology. This study examines the trend of virtualization technology and suggests a roadmap for future server integration.

A Study on the Virtualization and Security Technology for the Operation of Novel Reliable Networks (새로운 신뢰 망 운영을 위한 가상화 및 보안 기술에 관한 연구)

  • Jang, Jung-Sook;Jeon, Yong-Hee
    • Journal of Digital Contents Society
    • /
    • v.16 no.1
    • /
    • pp.1-12
    • /
    • 2015
  • In this paper, we analyze the research trend and problems of the existing virtualization technology and present the most applicable virtualization technology in order to apply the technology to the operation of novel reliable networks. By using the virtualization technology, there is advantage in that the utilization of resource becomes higher and maintenance cost goes down. While, from the security perspective, there exist advantage in using the virtualization, it also introduces new vulnerabilities due to the adoption. Thus it is necessary to analyze the problem and establish the strategy to solve it. Therefore we derive threat elements to the virtualized system, analyze and describe the virtualization security policy.

Application Program Virtualization based on Desktop Virtualization (가상 데스크탑 기반에 응용프로그램 가상화)

  • Lim, Se-Jung;Kim, Gwang-Jun;Kang, Tae-Geun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.595-601
    • /
    • 2010
  • Desktop virtualization technology running on the local computing system in the process of resource depletion or degradation, such as upgrading the system to solve problems and manage critical information and systems must be protected. In addition, a virtualized environment by constructing a convenient stand-virtualized infrastructure and user space, and security from external attack or internal flaw or a problem, even if the service fails to respond quickly and should help to recover. In this paper, a comprehensive virtualization technology based on the client's desktop virtualization technology elements needed to find a local computing environment more comfortable and stable in the proposed new virtualization technologies.

A study on Cloud Security based on Network Virtualization (네트워크 가상화 기반 클라우드 보안 구성에 관한 연구)

  • Sang-Beom Hong;Sung-Cheol Kim;Mi-Hwa Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • In the cloud computing environment, servers and applications can be set up within minutes, and recovery in case of fail ures has also become easier. Particularly, using virtual servers in the cloud is not only convenient but also cost-effective compared to the traditional approach of setting up physical servers just for temporary services. However, most of the und erlying networks and security systems that serve as the foundation for such servers and applications are primarily hardwa re-based, posing challenges when it comes to implementing cloud virtualization. Even within the cloud, there is a growing need for virtualization-based security and protection measures for elements like networks and security infrastructure. This paper discusses research on enhancing the security of cloud networks using network virtualization technology. I configured a secure network by leveraging virtualization technology, creating virtual servers and networks to provide various security benefits. Link virtualization and router virtualization were implemented to enhance security, utilizing the capabilities of virt ualization technology. The application of virtual firewall functionality to the configured network allowed for the isolation of the network. It is expected that based on these results, there will be a contribution towards overcoming security vulnerabil ities in the virtualized environment and proposing a management strategy for establishing a secure network.

A Study against Attack using Virtualization Weakness (가상화 기술의 취약점을 이용한 공격 대응에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.57-64
    • /
    • 2012
  • Computing environment combined with development of internet and IT technology is changing to cloud computing environment. In addition, cloud computing is revitalized more because of propagation of LTE and suggestion of N-screen Service. Virtualization is the point technology for suggest IT resource to service form to users in this cloud computing. This technology combines other system physically or divides one system logically and uses resource efficiently. Many users can be provided application and hardware as needed using this. But, lately various attack using weak point of virtualization technology are increasing rapidly. In this study, we analyze type and weak point of virtualization technology, the point of cloud computing. And we study about function and the position which intrusion detection system has to prepare in order to detect and block attack using this.

An Efficient Network Virtualization Model in Cloud Computing Environments (클라우드 컴퓨팅 환경에서의 효율적인 네트워크 가상화 모델)

  • Jung, Byeong-Man;Choi, Min;Lee, Bong-Hwan;Lee, Kyu-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.823-826
    • /
    • 2012
  • In this paper, we propose an efficient network virtualization model in cloud computing environments. Virtualization is a key technology for the implementation of service-oriented architecture. It is a standardized framework that can be reused or integrated with changing business priorities through a IT infrastructure. Network virtualization has emerged as an important technical issues of the future virtualization technology in Internet. The concept of network virtualization and related technologies stay in ambiguous status since network virtualization is in its early stage. Thus, we propose a network virtualization model for cloud environment by analyzing the existing network virtualization technologies.

  • PDF

A Study of Android Launcher based on Application Virtualization (어플리케이션 가상화를 적용한 안드로이드 런처 연구)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.115-120
    • /
    • 2013
  • Recently, Virtualization technology is moving the desktop environment from its place a mobile platform environment, personal and businesses, academia, and lacked security and in a team environment brought about many changes are coming. In this environment, a representative of VMware's MVP solution and Enterporid Divide. But, another issue is that these mobile virtualization technologies in an environment of limited resources and performance constraints, have become its application virtualization technology to improve the weaknesses of the mobile platform. In this paper, proposed for client-based desktop application virtualization infrastructure, bring it to the Android environment, weaknesses of the existing paper was user area limitations of the desktop environment with application virtualization, program execution android application virtualization launcher was improved through increased resource allocation.

A Survey on the Advancement of Virtualization Technology (가상화의 발전에 대한 서베이)

  • Park, JooYoung;Synn, DoangJoo;Kim, JongKook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.12-15
    • /
    • 2021
  • This paper is a survey on the advancement of virtualization technology. Virtualization of resources was an inevitable path in modern computer systems. This abstraction of hardware allowed the decoupling of the operating system that manages the hardware and applications' requirements by adding a layer between them. It also led to the application-centric view of computing and light virtual machines, where each represents a computer networking device. As virtualization technology ripens, the performance of virtual machines can only improve. This paper will be introducing how virtualization technology has evolved from Xen to LightVM and Firecracker.

Performance Comparison of Virtualization Domain in User Level Virtualization (사용자 레벨 가상화에서 가상화 영역 성능 비교)

  • Jeong, Chan-Joo;Kang, Tae-Geun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.11
    • /
    • pp.1741-1748
    • /
    • 2013
  • In this paper, we proposed new virtualization technology that is more convenient and stable in local computing environment, then found technique elements need to desktop virtualization which is based on clients in various virtualization technologies. After running excution of process explorer utility in user level virtualization and VMWare, we found memory capacity that is used 30.1MB in VMWare and 16.6MB in user level virtualization respectively to compare private bytes each of process. We found no significant difference of CPU utilization which is executed application program in local computing environment and user domain with user level virtualization. In this result, proposed virtualization technology is able to minimize performance degradation of local computing environment.