CFP last date
20 January 2025
Reseach Article

Studying and Analyzing Virtualization While Transition from Classical to Virtualized Data Center

by Amit Wadhwa, Ankit Garg
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 14
Year of Publication: 2015
Authors: Amit Wadhwa, Ankit Garg
10.5120/20620-3341

Amit Wadhwa, Ankit Garg . Studying and Analyzing Virtualization While Transition from Classical to Virtualized Data Center. International Journal of Computer Applications. 117, 14 ( May 2015), 10-14. DOI=10.5120/20620-3341

@article{ 10.5120/20620-3341,
author = { Amit Wadhwa, Ankit Garg },
title = { Studying and Analyzing Virtualization While Transition from Classical to Virtualized Data Center },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 14 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 10-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number14/20620-3341/ },
doi = { 10.5120/20620-3341 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:22.318866+05:30
%A Amit Wadhwa
%A Ankit Garg
%T Studying and Analyzing Virtualization While Transition from Classical to Virtualized Data Center
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 14
%P 10-14
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper discusses and brings together a detailed analysis of virtualization implemented at various levels of computing infrastructure, keeping in mind and providing detailed transition process adopted for transition from a classical to virtualized data center. It focuses on emerging trends or areas related with storage virtualization. Further, its various network level virtualization based implementations has been presented and analyzed. And finally it sums up with step by step process of transition from a classical to virtualized data center.

References
  1. Agrawal, D. ,El Abbadi, A. , Wang, S. , Secure and Privacy- Preserving Data Services in the Cloud: A Data Centric View, Presented at the 38th International Conference on Very Large Data Bases, August 27th - 31st 2012, Istanbul, Turkey
  2. Gurav, U. and Shaikh, R. 2010. "Virtualization- A key feature of cloud computing" International Conference and Workshop on Emerging Trends in Technology (ICWET 2010) – TCET, Mumbai, India
  3. Gnanasundaram, S. and Shrivastava, A. Information Storage and Management. USA: Wiley, 2013. Print
  4. Wadhwa, A. and kamra, R. "Analysing Security Threats and Solutions during Transition to Cloud Environment" presented in National conference on Innovations in Computing and Information Technology (Cognition 2015), Feb 25-26, 2015, Gurgaon, India
  5. Chraibi, M. , Harroud, H. and Maach, A. "Classification of Security Issues and Solutions in Cloud Environments", International conference based on Ad-hoc generalized Wireless Sensor and networks, by ACM, at Vienna, Austria, Dec, 2013
  6. VMware, Inc. white paper. Virtualization: Architectural Considerations and Other Evaluation Criteria. http://www. vmware. com/pdf/virtualization_considerations. pdf.
  7. Lombardi, F. and Di Pietro, R. "Secure virtualization for cloud computing" Journal of Network and Computer Applications, June 2010
  8. Raj, G. and Setia, S. "Effective Cost Mechanism for Cloudlet Retransmission and Prioritized VM Scheduling Mechanism over Broker Virtual Machine Communication Framework". International Journal on Cloud Computing: Services and Architecture (IJCCSA),Vol. 2, No. 3, June 2012
  9. Bourguiba, M. et al "Improving Network I/O Virtualization for Cloud Computing". IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Vol 25, No. 3, March 2014
  10. Wang, J. , Wright, K. and Gopalan, K. "XenLoop: A Transparent High Performance Inter-VM Network LoopBack," Proc. ACM Symp. High Performance Parallel and Distributed Computing (HPDC '08), 2008
  11. Gamage, S. et al. "Opportunistic Flooding to Improve TCP Transmit Performance in Virtualized Clouds," Proc. Second ACM Symp. Cloud Computing (SOCC '11), 2011
  12. Zhang, X. et al. "XenSocket: A High-Throughput Interdomain Transport for Virtual Machines," Proc. ACM/IFIP/USENIX Int'l Conf. Middleware (Middleware '07), 2007
  13. Calheiros, R. N. et al. "CloudSim: A Novel Framework for Modeling and Simulation of Cloud Computing Infrastructures and Services". published in IEEE, 2009
  14. Rutkowska, J. "Security Challenges in Virtualized Environments", white paper, Nordic Virtualization Forum, October 2007
  15. Christodorescu, M. et al. "Cloud Security is not (just) Virtualization Security", (CCSW'09), Nov. 13, 2009, Chicago, Illinois, USA
  16. Yu, A. , Qin, Y. and Wang, D. "Obtaining the Integrity of Your Virtual Machine in the Cloud" In CloudCom '11, pages 213–222, 2011
Index Terms

Computer Science
Information Sciences

Keywords

Virtualization Storage Virtualization Network Virtualization Storage Provisioning Virtual machine (VM)