A Method of ForCES Virtualization

نویسندگان

  • Rong Jin
  • Xiongxiong He
  • Ming Gao
چکیده

Programmability and virtualization have both become the trends of next generation networks. ForCES (Forwarding and Control Element Seperation) is a new programmable framework for network element. We introduce virtualization into ForCES, propose a method of ForCES virtualization, design its framework, implement a prototype system named vForTER, and test its performance in different scenarios. Test results show that we can flexibly build isolated virtual routers in one physical ForCES network element. And the influences to UDP forwarding rate, TCP out of order packets rate, and RTT are very limited. ForCES network elements supporting with both programmability and virtualization can be used as core infrastructure in future networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Critical Success Factors for Data Virtualization: A Literature Review

Data Virtualization (DV) has become an important method to store and handle data cost-efficiently. However, it is unclear what kind of data and when data should be virtualized or not. We applied a design science approach in the first stage to get a state of the art of DV regarding data integration and to present a concept matrix. We extend the knowledge base with a systematic literature review ...

متن کامل

A review of methods for resource allocation and operational framework in cloud computing

The issue of management and allocation of resources in cloud computing environments, according to the breadth of scale and modern technology implementation, is a complicated issue. Issues such as: the heterogeneity of resources, resource dependencies to each other, the dynamics of the environment, virtualization, workload diversity as well as a wide range of management objectives of cloud servi...

متن کامل

Detection of Hardware Virtualization Based Rootkits by Performance Benchmarking

This paper describes an enhanced side-channel analysis method to detect hardware virtualization based rootkits, by detecting performance degradation caused by the hardware virtualization itself. The method proposed is, (like a network intrusion detection system), both passive and remote, so it is not easily detected by the rookit. The method does not rely on an internal and therefore untrustabl...

متن کامل

Hydrodynamic investigation of multiple rising bubbles using lattice Boltzmann method

Hydrodynamics of multiple rising bubbles as a fundamental two-phase phenomenon is studied numerically by lattice Boltzmann method and using Lee two-phase model. Lee model based on Cahn-Hilliard diffuse interface approach uses potential form of intermolecular forces and isotropic finite difference discretization. This approach is able to avoid parasitic currents and leads to a stable procedure t...

متن کامل

Semi Symmetric Method Of SAN Storage Virtualization

Virtualization is one of the biggest buzzwords of the technology industry right at this moment. The fast growth in storage capacity and processing power in enterprise installations coupled with the need for high availability, requires Storage Area Network (SAN) architecture to provide seamless addition of storage and performance elements without downtime. The usual goal of virtualization is to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016