hardware virtualization
Recently Published Documents


TOTAL DOCUMENTS

72
(FIVE YEARS 3)

H-INDEX

7
(FIVE YEARS 0)

Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3404
Author(s):  
Eduardo Baena ◽  
Sergio Fortes ◽  
Özgü Alay ◽  
Min Xie ◽  
Håkon Lønsethagen ◽  
...  

Although log processing of network equipment is a common technique in cellular network management, several factors make said task challenging, especially during mass attendance events. The present paper assesses classic methods for cellular network measurement and acquisition, showing how the use of on-the-field user probes can provide relevant capabilities to the analysis of cellular network performance. Therefore, a framework for the deployment of this kind of system is proposed here based on the development of a new hardware virtualization platform with radio frequency capabilities. Accordingly, an analysis of the characteristics and requirements for the use of virtual probes was performed. Moreover, the impact that social events (e.g., sports matches) may have on the service provision was evaluated through a real cellular scenario. For this purpose, a long-term measurement study during crowded events (i.e., football matches) in a stadium has been conducted, and the performances of different services and operators under realistic settings has been evaluated. As a result, several considerations are presented that can be used for better management of future networks.


2020 ◽  
pp. 219-227
Author(s):  
Qian Xu ◽  
Rashmin Patel

Author(s):  
Ram Chandra Bhushan ◽  
Dharmendra K. Yadav

Introduction: Development of integrated mixed-criticality systems is becoming increasingly popular for application-specific systems, which needs separation mechanism for available onboard resources and the processors equipped with hardware virtualization. Hardware virtualization allow the partitions to physical resources, which include processor cores, memory, and I/O devices, among guest virtual machines (VMs). For building mixed criticality computing environment, traditional virtual machine systems are inappropriate because they use hypervisors to schedule separate VMs on physical processor cores. In this article, we discuss the design of an environment for mixed-criticality systems: The Muen an x86/64 separation kernel for high assurance. The Muen Separation Kernel is an Open Source microkernel which has no runtime errors at the source code level. The Muen separation kernel has been designed precisely to encounter the challenging requirements of high-assurance systems built on the Intel x86/64 platform. Muen is under active development, and none of the kernel properties of it has been verified yet. In this paper, we present a novel work of verifying one of the kernel properties formally. Method: The CTL used in NuSMV is a first-order modal along with data-depended processes and regular formulas. CTL is a branching-time logic, meaning that its model of time is a tree-like structure in which the future is not determined; there are different paths in the future, any one of which might be an actual path that is realized . This section shows the verification of all the requirements mentioned in section 3. In NuSMV tool the command used for verification of the formulas written in CTL is checkctlspec -p ”CTL-expression”. The nearest quantifier binds each occurrence of a variable in the scope of the bound variable, which has the same name and the same number of arguments. Result: Formal methods have been applied to various projects for specification and verification purpose. Some of them are the SCOMP , SeaView , LOCK,and Multinet Gateway projects. The TLS was written formally. Several mappings were done between the TLS and the SCOMP code: Informal English language to TLS, TLS to actual code , and TLS to pseudo-code. The authors present an ACL2 model for a generic separation kernel also known as GWV approach. Conclusion: We consider the formal verification of data separation property which is one of the crucial modules to achieve the separation functionality. The verification of the data separation manager is carried out on the design level using the NuSMV tool. Furthermore, we present the complete model of the data separation unit along with its code written in the NuSMV modelling language. Finally, we have converted the non-functional requirements into the formal logic, which then has verified the model formally.


Background/ purpose: organization that execution handling foundation on the Definite heart use paten virtualization technique to extenuate expenditure. majority organization use hypervisor- foundation paten virtualization processing, which postulate hardware virtualization to support many I/O and Estate at the ground scale. prescript / statistic breakdown: hypervisor- foundation processing is delimited by wretched motion, which can be sankalp by using implant - foundation virtualization processing. However, check - foundation mechanism also has purport. It is stiff to build resilient implant - foundation mechanism, and Definite devolution execution relapse if the current implant mechanism interface is used. Epitome: To settle these case, this document uses SDN technique and Kubernetes, which is used as a implant orchestration method. further, mechanism vesiculation is mixed with CNI of Kubernetes and materially samarpan mechanism darkhast foundation on the Open mechanism Direction method command for SDN. In other sound, we have evolved a new CNI by remove the overlay mechanism and a pseudo viaduct used in the spot Kubernetes. The Different evolved CNIs are outright coalescent to the amphitryon mechanism for sublimate - execution mechanism manipulation. advance / experiment: The intercommunity of VDN and Kubernetes portion sublimate execution and waxen mechanism competence. We weigh the mechanism execution of the spot CNIs and the Different elevated CNI in this document, which report the excellence of the new CNI in terms of the premeditated mechanism flow capacity results.


Sign in / Sign up

Export Citation Format

Share Document