Qemunet: an approach to an automated virtualized testbed

نویسندگان

  • Pavel Boyko
  • Andrey Mazo
چکیده

This paper presents a software system that allows for multiple virtual machines connected by a network simulator to be utilized as an integrated network testbed. The system is built upon popular network simulator ns-3 and is capable of synchronizing user-supplied commands across different virtual machine instances. Performance evaluations are given to estimate limits of applicability of the system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Service Oriented Experimentation Framework for Virtualized WiMAX Systems

Testbeds for networking research allow experimenters to validate performance of algorithms and architectures under realistic conditions. Further, virtualizing such testbeds allows the deployer to improve utilization of the testbed while preserving reproducibility of the results and originality of the control environment. This paper describes an essential set of services for deploying a virtuali...

متن کامل

Virtualized Reconfigurable Hardware Resources in the SAVI Testbed

Reconfigurable hardware can allow acceleration of compute intensive tasks, provide line-rate packet processing capabilities, and in short, expand the range of experiments and applications that can be run on a testbed. Few large-scale networking testbeds have made any concerted effort towards the inclusion of virtualized reconfigurable devices, such as FPGAs, into their systems as allocatable re...

متن کامل

A Monitoring Framework for Federated Virtualized Infrastructures

Monitoring and measurement is a fundamental building block for developing and testing new protocols, routing algorithms and networked applications. In a federated virtualized testbed they allow other service components and testbed-users to follow the current state of the network, and on the other hand they enable intelligent automatic decisionmaking, e.g. during the embedding of a virtual topol...

متن کامل

An automated approach to analysis and classification of Crypto-ransomwares’ family

There is no doubt that malicious programs are one of the permanent threats to computer systems. Malicious programs distract the normal process of computer systems to apply their roguish purposes. Meanwhile, there is also a type of malware known as the ransomware that limits victims to access their computer system either by encrypting the victimchr('39')s files or by locking the system. Despite ...

متن کامل

Profiling and Modeling Resource Usage of Virtualized Applications

Next Generation Data Centers (NGDC) are transforming labor-intensive, hard-coded systems into shared, virtualized, automated, and fully managed adaptive infrastructures. Virtualization technologies promise great opportunities for reducing energy and hardware costs through server consolidation. Moreover, virtualization can optimize resource sharing among applications hosted in different virtual ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011