On resource sharing and careful overbooking for network virtualisation
نویسنده
چکیده
منابع مشابه
Policy Model for Sharing Network Slices in 5G Core Network
As mobile data traffic increases, and the number of services provided by the mobile network increases, service load flows as well, which requires changing in the principles, models, and strategies for media transmission streams serving to guarantee the given nature of giving a wide scope of services in Flexible and cost-effective. Right now, the fundamental question remains what number of netwo...
متن کاملContributions to Efficient Resource Management in Virtual Networks
Network virtualisation is a promising technique for a better future Internet by allowing for network resource sharing. However, resource sharing requires that virtual nodes and links be embedded onto substrate nodes and links (virtual network embedding), and thereafter the allocated resources dynamically managed throughout the lifetime of the virtual network (dynamic resource allocation). Since...
متن کاملTowards a performance interference-aware virtual machine placement strategy for supporting soft real-time applications in the cloud
It is standard practice for cloud service providers (CSPs) to overbook physical system resources to maximize the resource utilization and make their business model more profitable. Resource overbooking can lead to performance interference, however, among the virtual machines (VMs) hosted on the physical resources causing performance unpredictability for soft real-time applications hosted in the...
متن کاملA Performance Interference-aware Virtual Machine Placement Strategy for Supporting Soft Real-time Applications in the Cloud
It is a standard practice for cloud service providers (CSPs) to overbook physical system resources to maximize the resource utilization and make their business model more profitable. Resource overbooking can, however, lead to performance interference between the virtual machines (VMs) hosted on the physical resources thereby causing performance unpredictability for applications hosted in the VM...
متن کاملGraceful Degradation under Resource Overbooking
It is trivial to write malicious code that hogs up a particular resource, for example, memory, disk, etc. Such malicious code can be written by intent (in order to degrade the system performance considerably) or by mistake (for example, memory leaks). As an effect of running such code the other applications running on the same machine suffer and their performance degrade considerably. The syste...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJCNDS
دوره 6 شماره
صفحات -
تاریخ انتشار 2011