Qemunet: an approach to an automated virtualized testbed
نویسندگان
چکیده
This paper presents a software system that allows for multiple virtual machines connected by a network simulator to be utilized as an integrated network testbed. The system is built upon popular network simulator ns-3 and is capable of synchronizing user-supplied commands across different virtual machine instances. Performance evaluations are given to estimate limits of applicability of the system.
منابع مشابه
A Service Oriented Experimentation Framework for Virtualized WiMAX Systems
Testbeds for networking research allow experimenters to validate performance of algorithms and architectures under realistic conditions. Further, virtualizing such testbeds allows the deployer to improve utilization of the testbed while preserving reproducibility of the results and originality of the control environment. This paper describes an essential set of services for deploying a virtuali...
متن کاملVirtualized Reconfigurable Hardware Resources in the SAVI Testbed
Reconfigurable hardware can allow acceleration of compute intensive tasks, provide line-rate packet processing capabilities, and in short, expand the range of experiments and applications that can be run on a testbed. Few large-scale networking testbeds have made any concerted effort towards the inclusion of virtualized reconfigurable devices, such as FPGAs, into their systems as allocatable re...
متن کاملA Monitoring Framework for Federated Virtualized Infrastructures
Monitoring and measurement is a fundamental building block for developing and testing new protocols, routing algorithms and networked applications. In a federated virtualized testbed they allow other service components and testbed-users to follow the current state of the network, and on the other hand they enable intelligent automatic decisionmaking, e.g. during the embedding of a virtual topol...
متن کاملAn automated approach to analysis and classification of Crypto-ransomwares’ family
There is no doubt that malicious programs are one of the permanent threats to computer systems. Malicious programs distract the normal process of computer systems to apply their roguish purposes. Meanwhile, there is also a type of malware known as the ransomware that limits victims to access their computer system either by encrypting the victimchr('39')s files or by locking the system. Despite ...
متن کاملProfiling and Modeling Resource Usage of Virtualized Applications
Next Generation Data Centers (NGDC) are transforming labor-intensive, hard-coded systems into shared, virtualized, automated, and fully managed adaptive infrastructures. Virtualization technologies promise great opportunities for reducing energy and hardware costs through server consolidation. Moreover, virtualization can optimize resource sharing among applications hosted in different virtual ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011