• Title/Summary/Keyword: server virtualization

Search Result 106, Processing Time 0.021 seconds

A feasibility study of virtualization for Submarine Combat System

  • Lee, Dong-Won;Bae, Byung-Ku;Cho, Kyu-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.121-129
    • /
    • 2022
  • In this paper, the virtual environment using rack server type HPC and 3U VPX server type HPC was applied and tested to the basic functions of the Jangbogo-III class submarine combat system developed for the first time in Korea. Based on this test results, the possibility of applying virtualization to the domestic submarine combat system to be developed in the future is confirmed. Existing studies have been limited to deriving applicable virtualization solutions through simple performance analysis of virtualization solutions or applying virtualization to some functions of the surface ship combat system, but in this paper, the application of virtualization is expanded to the submarine combat system through testing.

Delayed-constrained scheduling for a game server virtual machine (게임서버 가상머신을 위한 지연 제약 스케줄링)

  • kang, Kiwook;Ko, Cherl-hong;Hong, Jiman;Paik, Doowon
    • Journal of Korea Game Society
    • /
    • v.16 no.4
    • /
    • pp.57-68
    • /
    • 2016
  • As the size of the data used in the game application increase gradually, the physical resources of game server grow. Accordingly, it is necessary to/it is required to introduce I/O virtualization in game server to improve I/O performance of the server. But it is difficult to ensure high responsiveness in game server where I/O delay change from time to time. To maximize the benefit of I/O virtualization, guaranteeing I/O response time is very important and it is necessary to have I/O scheduling techniques to manage the I/O latency in the order of priority of virtual machines. In this paper, we propose an efficient delay-constrained scheduling algorithm in a virtualization environment to ensure maximum I/O latency. In addition, a reduced amount of loss of the packet was found to increase the fairness of scheduling in the experiments with the proposed scheme.

Design and Implementation of Borderless Casual Game Server using Virtualization (가상화 기법을 사용한 경계 없는 캐쥬얼 게임 서버 설계 및 구현)

  • Kim, Sung-Baek;Lee, Jae-Dong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.4
    • /
    • pp.25-40
    • /
    • 2012
  • This paper suggests the way to build the integration of internal server by using link server with virtualization method. With the development of on-line games, game communities began to be formed by users, players get fun from playing games, sharing online space with friends, clans, and parties. However, the limit of physical server restrict the allows under average a hundred users to play at same time and place, and three thousand to ten thousand people to access to game community with chat, message, friends functions. By following the explanation of the method from this paper, this limit can be overcome. It will give the function to share information of all connected users in one displayed server. This paper demonstrates the key quality requirements of the server built by this way such as scalable architecture, consistency, and latency is fulfilled.

A Study on Security of Virtualization in Cloud Computing Environment for Convergence Services (융합서비스를 위한 클라우드 컴퓨팅 환경에서 가상화 보안에 관한 연구)

  • Lee, Bo-Kyung
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.93-99
    • /
    • 2014
  • Cloud computing refers to borrow IT resources as needed by leveraging Internet technology and pay as much as you used by supporting real-time scalability depending on the service load. Virtualization which is the main technology of cloud computing is a technology that server, storage and hardware are regarded as not separate system but one system area and are allocated as needed. However, the security mechanisms provided by virtualized environments are difficult to cope with the traditional security mechanisms, having basic levels of visibility, control and audit function, on which the server is designed to monitor the traffic between the servers. In this paper, the security vulnerabilities of virtualization are analysed in the cloud computing environment and cloud virtualization security recommendations are proposed.

Data Security Technology for the Desktop Virtualization Environment using the Graphic Offloading (SW 분할 실행을 이용한 데스크탑 가상화 환경에서 데이터 보안 기술)

  • Chung, Moonyoung;Choi, Won-Hyuk;Jang, Su-Min;Yang, Kyung-Ah;Kim, Won-Young;Choi, Jihoon
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.10
    • /
    • pp.555-560
    • /
    • 2014
  • This paper proposes the data security technology for the desktop virtualization environment using the separated software execution method. In the virtual environment where allocates separate VMs to the users, there is a benefit that the programs in one guest machine are isolated from the programs running in another guest machine, whereas in the separated execution environment that supports application virtualization, the isolation is not offered and it causes the data security problem because the applications are executed by the one root privilege in the server. To solve this problem, we provides the data security method using the server storage filter, the viewer filter, and the file mapping table in this paper.

A Migration Method of Virtual Machines based Dynamic Threshold in Virtualization Environments (가상화 환경에서 동적 임계치 기반 가상 머신 이주 기법)

  • Choi, Hogun;Park, JiSu;Shon, Jin Gon
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.2
    • /
    • pp.83-90
    • /
    • 2015
  • In an virtualization environment, several virtual machines use physical resources together. If a specific virtual machine uses to much of the computing resources, other machines may not be working properly. There are various method to solve this problem. Most representative study is to migrate a specified virtual machines to a different server, a target server. In this study, server load can be transferred to a target server by the remigrate of the load imposed on virtual machine. It is still problematic that virtual machine has to remigrate to a different server. This thesis has proposed the algorithm determining the remigration targets by applying dynamic thresholds to solve those problems. The migration algorithm applies dynamic thresholds according to the following criteria. Firstly, the usage of CPU, network and memory; secondly, decide the set of artificial machine and the target server based on the resources surpassed thresholds; thirdly, determine artificial machines based on the resource usage in the target server.

Client Rendering Method for Desktop Virtualization Services

  • Jang, Su Min;Choi, Won Hyuk;Kim, Won Young
    • ETRI Journal
    • /
    • v.35 no.2
    • /
    • pp.348-351
    • /
    • 2013
  • Cloud computing has recently become a significant technology trend in the IT field. Among the related technologies, desktop virtualization has been applied to various commercial applications since it provides many advantages, such as lower maintenance and operation costs and higher utilization. However, the existing solutions offer a very limited performance for 3D graphics applications. Therefore, we propose a novel method in which rendering commands are not executed at the host server but rather are delivered to the client through the network and are executed by the client's graphics device. This method prominently reduces server overhead and makes it possible to provide a stable service at low cost. The results of various experiments prove that the proposed method outperforms all existing solutions.

A Study on the Admissibility of the Virtual Machine Image File as a Digital Evidence in Server Virtualization Environment (서버 가상화 환경의 가상머신 이미지에 대한 법적 증거로서의 허용성에 관한 연구)

  • Kim, Dong-Hee;Baek, Seung-Jo;Shim, Mi-Na;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.163-177
    • /
    • 2008
  • As many companies are considering to use server virtualization technology to reduce cost, the crime rates in virtual server environment are expected to be increasing rapidly. The server virtualization solution has a basic function to produce virtual machine images without using any other disk imaging tools, so that investigating virtual servers are more efficient because the investigator only has to collect the virtual machine image and submit it to the court. However, the virtual machine image has no admissibility to be the legal evidence because of security, authenticity, procedural problems in collecting virtual machine images on virtual servers. In this research, we are going to provide requirements to satisfy security, authenticity and chain of custody conditions for the admissibility of the virtual machine image in server virtualization environment. Additionally, we suggest definite roles and driving plans for related organizations to produce virtual machine image as a admissible evidence.

Design and Implementation of Cloud Service with Unix System & Java Based Application (유닉스 시스템과 자바 기반의 애플리케이션을 이용한 Cloud 서비스 설계 및 구현)

  • Nam, Jeon-Woo;Park, Yeong-Beom;Lee, Yong-Jae;Song, Jin-Ha;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.273-276
    • /
    • 2011
  • In this paper, Cloud services to support the implementation of UNIX virtualization systems, and applications using Java-based service are proposed. Unix Virtualization with Web Server zone NFS zone and FTP zone is divided into three systems and is implemented. Applications are implemented with Java programming. Applicable to Unix systems, applications and data anytime, anywhere by uploading, downloading music, documents tasks, and It provides efficiency. From Unix virtualization for server resources, we can expect energy savings. Smart phone without PC conduct its mission and business with benefits.

  • PDF

Dynamic Relocation of Virtual Machines for Load Balancing in Virtualization Environment (가상화 환경에서 부하균형을 위한 가상머신 동적 재배치)

  • Sa, Seong-Il;Ha, Chang-Su;Park, Chan-Ik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.12
    • /
    • pp.568-575
    • /
    • 2008
  • Server consolidation by sever virtualization can make one physical machine(PM) to run several virtual machines simultaneously. Although It is attractive in cost, it has complex workload behaviors. For that reason, efficient resource management method is required. Dynamic relocation of virtual machine(VM)[3,4] by live migration[1,2] is one of resource management methods. We proposed SCOA(Server Consolidation Optimizing Algorithm) : a fine-grained load balancing mechanism worked on this dynamic relocation mechanism. We could obtain accurate resource distribution information through pointed physical machines on multi dimensional resource usage coordination, so we could maintain more balanced resource state. In this paper, we show the effectiveness of our algorithm by comparison of experimental results between SCOA and sandpiper[3] by software simulation.