Counting Sort for the Live Migration of Virtual Machines

Size: px
Start display at page:

Download "Counting Sort for the Live Migration of Virtual Machines"

Transcription

1 Counting Sort for the Live Migration of Virtual Machines QingXin Zou 123 ZhiYu Hao 3 Xu Cui 4 XiaoChun Yun 13 YongZheng Zhang 3 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, 119, China 2 Graduate University of Chinese Academy of Sciences, Beijing, 149, China 3 Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 193, China 4 China Academy of Aerospace Aerodynamics, Beijing, 174, China {zouqingxin, haozhiyu, cuixu, yunxiaochun, zhangyongzheng@software.ict.ac.cn Abstract The live migration of virtual machines is an important technique in the area of virtualization, and it has been used for load balancing, fault tolerance, and system maintenance in modern data centers, clusters, and cloud computing. The pre-copy algorithm is the most used method for the live migration of virtual machines. However, the existing problem of repeatedly transferring dirty memory pages leads the increase of the transferring data amount, delays of the total migration time as well as the downtime. By analyzing the iteration process of the pre-copy algorithm, we find that the transferring order of memory pages during every middle round has a huge impact on the generation and transferring of dirty memory pages. Further we put forward the concept of the live migration of virtual machines based on the. During every middle round of the iteration process, we do not transfer the memory pages according to their original order, instead we transfer the memory pages according to their times of being dirty. Experiment results show that with different workloads the method could simultaneously decrease the transferring data amount, the total migration time, and the downtime to improve the performance of the live migration. Keywords- live migration;pre-copy; I. INTRODUCTION Live migration is a key feature of virtual machine technology. When the virtual machine s storage is shared (such as SAN or NFS), only the memory image and virtual CPU context will be transferred during the process of live migration. In this case, almost the whole time is spent on the data transferring of the memory image. The pre-copy algorithm is just designed for the data transferring of the memory image. The downtime and the total migration time are contradictory with each other. However in this article, we improve the pre-copy algorithm and simultaneously decrease the total migration time and downtime under different workloads. The main measures taken can be summarized as: First, we transfer the memory pages according to their times of being dirty from low to high. Doing so, we can decrease the repeatedly transferred dirty memory pages. Second, we adopt the method with the time complexity of O (n). Comparing with other sort methods, we can save the migration and sort time. At last, batch size refers to the number of transferred memory pages at a time. Using the method, the batch size is also an affect factor. We diminish the batch size to decrease the transferred memory pages further. The remainder of this paper is organized as follows. Section II introduces the pre-copy algorithm of the live migration. Section III introduces the algorithm design of the method. In section IV we present the experiment results and analysis. In section V some related work is discussed. In section VI, we will present the conclusions and future work. II. THE PRE-COPY ALGORITHM The iteration process of the pre-copy algorithm is shown in Figure 1. 1-Dirty Iteration -Clear (Threshold Number or Max Round) First Round Middle Rounds Critical Round Final Round Figure 1. Process of the iteration The iteration mechanism is used to periodically check dirty memory pages to resend them during the live migration. During the first round of iteration, all memory pages are marked dirty. During the process of iteration, some memory pages which have been modified are also marked dirty and others which have been unmodified are marked clear. When the dirty memory pages during one round of iteration are less than the predefined threshold value or the max round of iteration is attained, the iteration process would be terminated and the virtual machine will be suspended, and then moved into the final round of iteration. For one memory page, we denote the dirty state with 1 and the clear state with. Then for one memory page during adjacent two rounds of iteration, there are four state combinations, which are 11, 1, and 1. The meaning of the state combination 1 is that one memory page is dirty during the front round and clear during the rear round. We should only send the memory page for the state combination of 1, because this memory page has been modified and in the visible future it could not be modified again. For the /13/$ IEEE /13/$ IEEE

2 other three state combinations, we should not send the memory pages. The pre-copy algorithm will repeat the process until the total dirty memory pages during one round is below one threshold value, or the max round of iteration is attained, this round of iteration becomes the critical round. After transferring the dirty memory pages during the critical round, the virtual machine will be suspended and then step into the final round. Now we see during the iteration process of the pre-copy algorithm that there are many memory pages which are transferred to the destination host repeatedly. If we could reduce the transferred memory pages for the pre-copy algorithm, we would save the migration time and decree the transferring data amount, consequently improving the migration efficiency. III. ALGORITHM DESIGN During one round of the iteration, if we could change the transferring order of the memory pages, we could delay the transferring time of one memory page. And the states combination of one memory page could become 11 from 1. Due to the state change, the memory pages which should be sent during one round of the normal pre-copy algorithm will not be sent, consequently reducing the retransmission of the dirty memory pages. Supposing during the time internal of T1 the dirty probability of one memory page k is A k1 and the dirty probability of one memory page w is A w1. During the time internal of T2, the dirty probability of the memory page k is A k2 and the dirty probability of the memory page w is A w2. Then during the time internal of Tn. the dirty probability of memory page k is A kn and the dirty probability of memory page w is A wn. On average, the dirty probability of memory page k is A kavg =( A k1 + A k2 + +A kn )/n and the dirty probability of memory page w is A wavg =( A w1 + A w2 + +A wn )/n. During the whole time interval of (T1+T2+ +Tn), the memory page k dirty times are C k and the memory page w dirty times are C w. We could not gauge the dirty probability of one memory page during every time interval. But if we could replace the different specific values during every time interval with the same average value; suppose (A kavg >=A wavg ) and (C k <C w ). According to this supposition, if the memory page w became dirty during one round, the memory page k would become dirty too. Because the two memory pages go through same lasting time during one round, and the case of (A kavg >=A wavg ) exists. So during the whole time interval, there will be (C k >=C w ). This is contradictory to the supposing of (C k <C w ). In the case of (A kavg >=A wavg ), only (C k >=C w ) exists. The dirty times reflect the average dirty probability from one flank. Therefore, if possible, we would make transferring decision at the rear stage of each round on one memory page which own more times of being dirty. Then, as possible we could decrease the cases of multiple retransmissions for one same memory page due to being frequently dirty. During every round of the pre-copy algorithm iteration, we break the fixed style of transferring memory pages according to their original order. But at the beginning of each round we sort the memory pages according to their dirty times from low to high. Then we could delay the transferring time of memory pages with high dirty probability and lower the chance of transferring repeatedly, consequently improving the efficiency of the pre-copy algorithm. A. Function of the sort There are two factors of dirty times and delaying time for one memory page on one position. This is similar to the vector amount accumulate. See the equality below., 1 If we regard the delaying time of the respond positions as the Vector A and regard the dirty times of the respond positions as the Vector B. Then the Vector A is relatively fixed. Time must go forward, and in reality, could not go backward or turn. The delaying time of the back position is longer than the front position. The n-dimensional vector A of delaying time arrange from low to high all the time. Only the Vector B is changing. < A,B >= A * B cos B Figure 2. Vector amount accumulates From the geometric perspective in Figure 2, the vector amount accumulated is the product of one vector module and the projector of the other vector. So, the smaller the angle is, the bigger the product is. Also, the smaller the angle is, the more the work is from the mechanic. At the same time the ordered vector A of delaying time is relatively fixed from low to high, so the angle is determined by the ordered vector B of dirty times. To be the smallest angle, the dirty times of the memory pages should be sorted from low to high too. In the live migration of a virtual machine, every memory page has different dirty times. If we transfer them according to their different dirty times, then we will produce different results. To attain the best results, and make the work of becoming dirty for the memory pages during one round biggest, we should transfer the memory pages by their dirty times from low to high. B. Use of the In computer science, is a stable, efficient and simple sort algorithm. Counting sort is an algorithm for sorting a collection of objects according to keys which are small integers. It is an integer sorting algorithm. It operates by counting the numbers, and using arithmetic on those counts, to determine the positions of each key value in the output sequence. Its running time is linear in the number of items and the difference between the maximum and minimum key values. Because uses key values as indexes into an array, it is not a comparison sort. The O(n log n) lower bound for comparison sorting does not apply to it [6]. Because there is a limitation on the maximum round of iteration using the pre-copy algorithm for the live migration, this hints that the dirty times of every memory page are not more than the maximum round of iteration. So we can use θ A

3 the method then transfer the memory pages by their times of dirty from low to high. The algorithm description is shown in Table I. Table I. Algorithm based on the tmax: the max round of iteration p2m_size: the size of the memory pages i, j: temp variants. A[p2m_size]: store dirty times of every memory page. D[p2m_size]:record original position of memory pages C[tmax+1]: auxiliary storage initialize every item of A[] with ; if(not the final round of iteration){ for(i=;i<p2m_size;i++){ if(dirty of page i){ Increase A[i] by 1; if(not the first round of iteration){ for(i=; i <= tmax; i++){ initialize the auxiliary storage C[i] with ; for(j=; j<p2m_size; j++){ Counting process, increase C[A[j]] by 1; Positions start from, so decrease C[] by 1; for(j=1; j <= tmax; j++){ Add C[j] by C[j-1] so that memory pages will occupy different position according to their dirty times; for(j=(p2m_size-1);j>=;j--){ Make D[C[A[j]]] equal to j so that we can record the original position, and decrease C[A[j]] by 1 to move one position; transfer the memory pages from D[] to D[p2m_size-1]; By the handling of the method, we don t transfer the memory pages from position to (p2m_size-1); instead we transfer them from D[] to D[p2m_size-1]. IV. EVALUATION We bring about the algorithm with the virtualization platform of Xen on the operating system of Ubuntu and every experiment is done five times. We take the average value which has been rounded up as the experiment data. The CPU of our destination host is an Intel(R) Core(TM) 3.3GZ and our source host is an Intel(R) Core(TM) 2 Duo The RAM of the two hosts is 2GB. The source host and destination host are connected by a FR 4 router of 1Mbps LAN. And on the source host, we share disk images with the destination host by the NFS service. A. Workloads test In our experiments we take the followed scenes as the workloads. 1)Idle: An idle Ubuntu OS with no special applications running in it. 2)Tpcc[7]: Tpcc is an on-line benchmark of transaction processing, simulates complete environment of a population of terminal operators executing transactions against a database. We use tpcc-mysql, and configure ten connections. 3)Dbench[8]: It is an open source benchmark and tool for generating I/O workloads to a file system. We configure one connection to generate suitable disk workload. 4)Linpack[9][1]: Linpack of HPL performs massive vector and matrix operations, which can produce CPU and memory pressure. Four processes exist in our experiments, and we use three order matrix. 5)Webbench[11]: A very simple tool for benchmarking WWW or proxy servers. We configure five connections for a static web page of 263 bytes. We have allocated 512MB RAM for this virtual machine and configure two virtual CPUs. The max round of iteration is set by 3. A.1. Fix the batch size Xen accumulates the memory pages to the batch size of 124 then transfer them all together. Considering the influence of the batch size for the method, we use different batch sizes to test the idle scene at first in order to find a proper value. Memory pages (num) Batch Size(Num) Figure 3. Transferred memory pages of different batches Migration time (us) Batch Size(Num) Figure 4.Total migration time of different batches When the batch size is between 2 and 128 we could transfer less memory pages and above 16 there will be less total migration time. In subsequent experiments we fix the middle batch size of 64 between 16 and 128. A.2. Influence of the workloads. First it is the comparing results of downtime in Figure 5. Downtime(ms) Figure 5.Downtime of different workloads For the idle scene, using both of the default pre-copy method and the method, the small threshold value has been met during the critical round, and the total

4 rounds of iteration are less too. For the Debench scene, adopting the default pre-copy method, all the five tests attain the max round, but in adopting the method, there are three tests which meet the threshold value and the other two tests attain the max round. For the other three scenes of Linpack, Tpcc, and Webbench, the max round is attained with the two kinds of methods. Time(ms) Pages(num) Figure 6.Total migration time of different workloads Figure 7.Total memory pages of different workloads Figure 6 and Figure 7 show the total migration time and transferred memory pages. On average the total migration time of the five scenes has been decreased by 23% and the total migration memory pages has been decreased by 16%. After the using of the method we can simultaneously decrease the total transferred memory pages and those during the final round. Then we can decrease the total migration time and the downtime. B. RAM Test We adopt the TPCC for the test of different kinds of RAM. The TPCC scene attains the max round of iteration. Downtime(ms) MB 512MB 124MB Figure 8. Downtime of different RAM Figure 8 shows the downtime. The transferred memory pages during the final round all decrease after using the method. Then they all bring about the decreasing of the downtime Time(ms) MB 512MB 124MB Figure 9. Total migration time of different RAM Pages(num) MB 512MB 124MB Figure 1. Total memory pages of different RAM Figure 9 shows the total migration time and Figure 1 shows the total transferred memory pages. From left to right the respective decreasing ratios of the total migration time are 17%, 11% and 6% and the total transferred memory pages are 23%, 15% and 8%. At the same time the curves Figure 11 shows the changing trend of the transferred memory pages. Memory pages(num) (All rounds) (middle rounds) (All rounds) (middle rounds) Size of RAM(MB) Figure 11. Transferred memory pages From Figure 11 we see that bigger RAM has more memory pages. But for both of the two methods, the curves of the total transferred memory pages are nearly parallel. It indicates that for the same workload and different kinds of RAM, the decreased total transferred memory pages are almost equal. We then subtract the transferred memory pages during the first and the final rounds. For the same scene and different kinds of RAM, the curves of the transferred memory pages during the middle rounds are nearly parallel with the X axis. The transferred memory pages during the middle round decreases 55% for the RAM of 256 MB, decreases 42% for the RAM of 512 MB and decreases 44% for the RAM of 124 MB. In order to observe the details of changing, we gauge memory pages for sending and omitting during every round for one experiment. See Figure 12 below. Memory pages(num) (send) (send) (omit) (omit) rounds 2 (num) 25 3 Figure 12. Details of different memory pages We choose the experiment which is done on the RAM of 512 MB and the total transferred memory pages is closest to the average value from the five tests. Using the method, the omitted memory pages are more than the omitted memory pages using the default pre-copy algorithm, and also the sent memory pages using the

5 method are less than the sent memory pages using the default pre-copy algorithm. On average, for the default pre-copy algorithm, the ratio of the omitted memory pages and the sent is But for the method, the ratio of the omitted memory pages and the sent is 2.9. The memory pages omitted during the middle rounds and not accumulated to the final round are increased by the method. V. RELATED WORK Since [1] had first mentioned the live migration of virtual machine, researchers have paid much attention to this issue and many studies were related to the live migration of virtual machines. Live migration is an important mechanism available to virtual machines. The improved time-series based pre-copy approach is proposed in [2] to accelerate the live migration of virtual machines. It identifies high dirty memory pages via historical statistics by n-size TO_SEND_H bitmap. In other words if the modified times of one dirty memory page in the TO_SEND_H bitmap were more than a given number k, it is a high dirty memory page, and then it will be sent during the last round. The paper of [3] presents the matrix bitmap algorithm that collects a great deal of information of dirty memory pages and allocates different weights for them. They then adds up the weights to decide whether to transfer the page or not. All the methods mentioned above have a common feature in that there are memory pages accumulating into the final round and could influence the downtime. But using the method, the transferred memory pages decrease and there are not memory pages accumulating into the final round. Ordered propagation to transfer dirty memory pages according to their rewriting rates is proposed in [4]. But recording rewriting rates of every page is prohibitively impossible. So instead of counting rewriting rate of every memory page, it divides memory pages into stripe groups, and use statistical sampling and memory stripe groups for approximation. It uses a simple method to statistically sample the rewriting rates of memory stripe groups. When a round of iteration is finished, it counts the dirtied pages during the round of iteration for each stripe group. This number is then divided by the lasting time of the round. The divided result is the rewriting rate of the stripe group. This method could decrease the downtime efficiently, but the algorithm consumes more time, and could increase the total migration time. Using the method we did not increase the total migration time. The compression technique for migrated memory was adopted in [5]. The transferred memory pages in each round would be compressed on a source physical host at first; next they will be sent to the destination host. After receiving the whole compressed memory pages on the destination host, they would be decompressed. This method does accelerate the live migration from the data transferring style, and is different from the method that improves the live migration from the algorithm. In reality, we could use both at the same time to improve the performance of live migration. The related works mentioned above do research on the live migration of virtual machines from the data transferring style, algorithms and so on. With some success, the counting sort method still improves the live migration of virtual machines from the algorithm and memory transference. VI. CONCLUSION AND FUTURE WORK Using the method, we decrease the transferred memory pages during every middle round of the iteration, shorten the interval between adjacent two rounds of iteration including the critical round and the final round, and decrease the transferred memory pages during the final round. At the same time the batch size can influence the method. Experiments demonstrate: under different workloads the downtime, the total migration time, and the total transferred memory pages could decrease simultaneously when we fix the batch size of 64. On average, the downtime decreases by 18%, the total migration time decreases 23%, and the total transferred memory pages decrease 16%. For the same workload with different kinds of RAM, the decreased memory pages during middle rounds are basically equal. In terms of Tpcc, it decreases 47% on average. In the future we will probe other new styles or algorithms of transferring memory pages to improve the performance of the live migration. ACKNOWLEDGMENT The authors would like to give thanks to the reviewers and helper for their valuable comments and suggestions on this paper. This work also is supported by The National Natural Science Foundation of China (No , No and No ). REFERENCES [1] C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. July, C. Limpach, I.Pratt, and A. Warfield, Live Migration of Virtual Machines, Proc. The 2nd conference on Symposium on Networked Systems Design &Implementation, 25, pp [2] Bolin Hu, Zhou Lei, Yu Lei, Dong Xu, Jiandun Li. A Time-Series Based Precopy Approach for Live Migration of Virtual Machines. 211 IEEE 17th International Conference on Parallel and Distributed Systems. [3] Wentian Cui, Meina Song. Live Memory Migration with Matrix Bitmap Algorithm 21 IEEE 2nd Symposium on Web Society (SWS). [4] Yuyang Du Hongliang Yu Guangyu Shix Jian Chenx Weimin Zheng. Microwiper: Efficient Memory Propagation in Live Migration of Virtual Machines th International Conference on Parallel Processing. [5] H. lin,l. Deng,S. Wu, et al, Live Virtual Machine Migration with Adaptive Memory Compression," In Proc. IEEE Int'l Conf. CLUSTER,pp.I-IO,29. [6] [7] [8] [9] [1] [11]

Enhanced Live Migration of Virtual Machine Using Comparison of Modified and Unmodified Pages

Enhanced Live Migration of Virtual Machine Using Comparison of Modified and Unmodified Pages Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

CloudAP: Improving the QoS of Mobile Applications with Efficient VM Migration

CloudAP: Improving the QoS of Mobile Applications with Efficient VM Migration CloudAP: Improving the QoS of Mobile Applications with Efficient VM Migration Renyu Yang, Ph.D. Student School of Computing, Beihang University yangry@act.buaa.edu.cn In IEEE HPCC, Zhangjiajie, China,

More information

Live Virtual Machine Migration with Efficient Working Set Prediction

Live Virtual Machine Migration with Efficient Working Set Prediction 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore Live Virtual Machine Migration with Efficient Working Set Prediction Ei Phyu Zaw

More information

An Optimized Time Series based Two phase strategy Pre-Copy Algorithm for Live Virtual Machine Migration

An Optimized Time Series based Two phase strategy Pre-Copy Algorithm for Live Virtual Machine Migration An Optimized Time Series based Two phase strategy Pre-Copy Algorithm for Live Virtual Machine Migration Ruchi Tailwal P.G. Scholar, Graphic Era Hill University Dehradun, India Avita Katal Assistant Professor,

More information

An Efficient Method by Using Prediction to Reduce Times in Live Migration of Virtual Machine

An Efficient Method by Using Prediction to Reduce Times in Live Migration of Virtual Machine An Efficient Method by Using Prediction to Reduce imes in Live Migration of Virtual Machine Boseob Kim, and ungchun Kim Computer cience and Engineering ept, ogang Univ, eoul, outh Korea Abstract - Cloud

More information

A three phase optimization method for precopy based VM live migration

A three phase optimization method for precopy based VM live migration DOI 10.1186/s40064-016-2642-2 RESEARCH Open Access A three phase optimization method for precopy based VM live migration Sangeeta Sharma * and Meenu Chawla *Correspondence: sanjsharma29@gmail.com Department

More information

VM Migration, Containers (Lecture 12, cs262a)

VM Migration, Containers (Lecture 12, cs262a) VM Migration, Containers (Lecture 12, cs262a) Ali Ghodsi and Ion Stoica, UC Berkeley February 28, 2018 (Based in part on http://web.eecs.umich.edu/~mosharaf/slides/eecs582/w16/021516-junchenglivemigration.pptx)

More information

2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing

2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing 2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing Present the Challenges in Eucalyptus Cloud Infrastructure for Implementing Virtual Machine Migration Technique

More information

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed

More information

A Database Redo Log System Based on Virtual Memory Disk*

A Database Redo Log System Based on Virtual Memory Disk* A Database Redo Log System Based on Virtual Memory Disk* Haiping Wu, Hongliang Yu, Bigang Li, Xue Wei, and Weimin Zheng Department of Computer Science and Technology, Tsinghua University, 100084, Beijing,

More information

A Study on Load Balancing Techniques for Task Allocation in Big Data Processing* Jin Xiaohong1,a, Li Hui1, b, Liu Yanjun1, c, Fan Yanfang1, d

A Study on Load Balancing Techniques for Task Allocation in Big Data Processing* Jin Xiaohong1,a, Li Hui1, b, Liu Yanjun1, c, Fan Yanfang1, d International Forum on Mechanical, Control and Automation IFMCA 2016 A Study on Load Balancing Techniques for Task Allocation in Big Data Processing* Jin Xiaohong1,a, Li Hui1, b, Liu Yanjun1, c, Fan Yanfang1,

More information

Research on QR Code Image Pre-processing Algorithm under Complex Background

Research on QR Code Image Pre-processing Algorithm under Complex Background Scientific Journal of Information Engineering May 207, Volume 7, Issue, PP.-7 Research on QR Code Image Pre-processing Algorithm under Complex Background Lei Liu, Lin-li Zhou, Huifang Bao. Institute of

More information

Research on Availability of Virtual Machine Hot Standby based on Double Shadow Page Tables

Research on Availability of Virtual Machine Hot Standby based on Double Shadow Page Tables International Conference on Computer, Networks and Communication Engineering (ICCNCE 2013) Research on Availability of Virtual Machine Hot Standby based on Double Shadow Page Tables Zhiyun Zheng, Huiling

More information

Power Consumption of Virtual Machine Live Migration in Clouds. Anusha Karur Manar Alqarni Muhannad Alghamdi

Power Consumption of Virtual Machine Live Migration in Clouds. Anusha Karur Manar Alqarni Muhannad Alghamdi Power Consumption of Virtual Machine Live Migration in Clouds Anusha Karur Manar Alqarni Muhannad Alghamdi Content Introduction Contribution Related Work Background Experiment & Result Conclusion Future

More information

Live Migration of Virtual Machines

Live Migration of Virtual Machines Live Migration of Virtual Machines Pre-copy :Christopher Clarke, Keir Fraser, et. al. NSDI 2005 Post-copy: Hines, Deshpande, Gopalan, VEE 2009 What is live migration? Move a VM from one physical machine

More information

KVM Live Migration: Weather forecast

KVM Live Migration: Weather forecast KVM Live Migration: Weather forecast Red Hat Juan Quintela May 29, 2013 Abstract In this talk we would describe the Live Migration improvements since last year, from how to move it to its own thread and

More information

COMS: Customer Oriented Migration Service

COMS: Customer Oriented Migration Service Boise State University ScholarWorks Computer Science Faculty Publications and Presentations Department of Computer Science 1-1-217 COMS: Customer Oriented Migration Service Kai Huang Boise State University

More information

Preliminary Research on Distributed Cluster Monitoring of G/S Model

Preliminary Research on Distributed Cluster Monitoring of G/S Model Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 860 867 2012 International Conference on Solid State Devices and Materials Science Preliminary Research on Distributed Cluster Monitoring

More information

Two-Level Cooperation in Autonomic Cloud Resource Management

Two-Level Cooperation in Autonomic Cloud Resource Management Two-Level Cooperation in Autonomic Cloud Resource Management Giang Son Tran a, Alain Tchana b, Laurent Broto a, Daniel Hagimont a a ENSEEIHT University of Toulouse, Toulouse, France Email: {giang.tran,

More information

Implementation of Parallel CASINO Algorithm Based on MapReduce. Li Zhang a, Yijie Shi b

Implementation of Parallel CASINO Algorithm Based on MapReduce. Li Zhang a, Yijie Shi b International Conference on Artificial Intelligence and Engineering Applications (AIEA 2016) Implementation of Parallel CASINO Algorithm Based on MapReduce Li Zhang a, Yijie Shi b State key laboratory

More information

Dynamic Data Placement Strategy in MapReduce-styled Data Processing Platform Hua-Ci WANG 1,a,*, Cai CHEN 2,b,*, Yi LIANG 3,c

Dynamic Data Placement Strategy in MapReduce-styled Data Processing Platform Hua-Ci WANG 1,a,*, Cai CHEN 2,b,*, Yi LIANG 3,c 2016 Joint International Conference on Service Science, Management and Engineering (SSME 2016) and International Conference on Information Science and Technology (IST 2016) ISBN: 978-1-60595-379-3 Dynamic

More information

CS4311 Design and Analysis of Algorithms. Lecture 1: Getting Started

CS4311 Design and Analysis of Algorithms. Lecture 1: Getting Started CS4311 Design and Analysis of Algorithms Lecture 1: Getting Started 1 Study a few simple algorithms for sorting Insertion Sort Selection Sort Merge Sort About this lecture Show why these algorithms are

More information

DEDUPLICATION OF VM MEMORY PAGES USING MAPREDUCE IN LIVE MIGRATION

DEDUPLICATION OF VM MEMORY PAGES USING MAPREDUCE IN LIVE MIGRATION DEDUPLICATION OF VM MEMORY PAGES USING MAPREDUCE IN LIVE MIGRATION TYJ Naga Malleswari 1 and Vadivu G 2 1 Department of CSE, Sri Ramaswami Memorial University, Chennai, India 2 Department of Information

More information

Efficient Path Finding Method Based Evaluation Function in Large Scene Online Games and Its Application

Efficient Path Finding Method Based Evaluation Function in Large Scene Online Games and Its Application Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 3, May 2017 Efficient Path Finding Method Based Evaluation Function in Large

More information

FuxiSort. Jiamang Wang, Yongjun Wu, Hua Cai, Zhipeng Tang, Zhiqiang Lv, Bin Lu, Yangyu Tao, Chao Li, Jingren Zhou, Hong Tang Alibaba Group Inc

FuxiSort. Jiamang Wang, Yongjun Wu, Hua Cai, Zhipeng Tang, Zhiqiang Lv, Bin Lu, Yangyu Tao, Chao Li, Jingren Zhou, Hong Tang Alibaba Group Inc Fuxi Jiamang Wang, Yongjun Wu, Hua Cai, Zhipeng Tang, Zhiqiang Lv, Bin Lu, Yangyu Tao, Chao Li, Jingren Zhou, Hong Tang Alibaba Group Inc {jiamang.wang, yongjun.wyj, hua.caihua, zhipeng.tzp, zhiqiang.lv,

More information

CS2351 Data Structures. Lecture 1: Getting Started

CS2351 Data Structures. Lecture 1: Getting Started CS2351 Data Structures Lecture 1: Getting Started About this lecture Study some sorting algorithms Insertion Sort Selection Sort Merge Sort Show why these algorithms are correct Analyze the efficiency

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. The study on magnanimous data-storage system based on cloud computing

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. The study on magnanimous data-storage system based on cloud computing [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 11 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(11), 2014 [5368-5376] The study on magnanimous data-storage system based

More information

Analyzing and Improving Load Balancing Algorithm of MooseFS

Analyzing and Improving Load Balancing Algorithm of MooseFS , pp. 169-176 http://dx.doi.org/10.14257/ijgdc.2014.7.4.16 Analyzing and Improving Load Balancing Algorithm of MooseFS Zhang Baojun 1, Pan Ruifang 1 and Ye Fujun 2 1. New Media Institute, Zhejiang University

More information

MOTION STEREO DOUBLE MATCHING RESTRICTION IN 3D MOVEMENT ANALYSIS

MOTION STEREO DOUBLE MATCHING RESTRICTION IN 3D MOVEMENT ANALYSIS MOTION STEREO DOUBLE MATCHING RESTRICTION IN 3D MOVEMENT ANALYSIS ZHANG Chun-sen Dept of Survey, Xi an University of Science and Technology, No.58 Yantazhonglu, Xi an 710054,China -zhchunsen@yahoo.com.cn

More information

Service Level Management for Iterative Pre-Copy Live Migration

Service Level Management for Iterative Pre-Copy Live Migration Service Level Management for Iterative Pre-Copy Live Migration Thomas Treutner, Helmut Hlavacs Research Group Entertainment Computing University of Vienna, Austria Email: firstname.lastname@univie.ac.at

More information

Swapping. Operating Systems I. Swapping. Motivation. Paging Implementation. Demand Paging. Active processes use more physical memory than system has

Swapping. Operating Systems I. Swapping. Motivation. Paging Implementation. Demand Paging. Active processes use more physical memory than system has Swapping Active processes use more physical memory than system has Operating Systems I Address Binding can be fixed or relocatable at runtime Swap out P P Virtual Memory OS Backing Store (Swap Space) Main

More information

Correlation based File Prefetching Approach for Hadoop

Correlation based File Prefetching Approach for Hadoop IEEE 2nd International Conference on Cloud Computing Technology and Science Correlation based File Prefetching Approach for Hadoop Bo Dong 1, Xiao Zhong 2, Qinghua Zheng 1, Lirong Jian 2, Jian Liu 1, Jie

More information

Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System

Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Donald S. Miller Department of Computer Science and Engineering Arizona State University Tempe, AZ, USA Alan C.

More information

Supplementary File: Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment

Supplementary File: Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment IEEE TRANSACTION ON PARALLEL AND DISTRIBUTED SYSTEMS(TPDS), VOL. N, NO. N, MONTH YEAR 1 Supplementary File: Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment Zhen Xiao,

More information

Multi-projector-type immersive light field display

Multi-projector-type immersive light field display Multi-projector-type immersive light field display Qing Zhong ( é) 1, Beishi Chen (í ì) 1, Haifeng Li (Ó ô) 1, Xu Liu ( Ê) 1, Jun Xia ( ) 2, Baoping Wang ( ) 2, and Haisong Xu (Å Ø) 1 1 State Key Laboratory

More information

Live Migration of Virtualized Edge Networks: Analytical Modeling and Performance Evaluation

Live Migration of Virtualized Edge Networks: Analytical Modeling and Performance Evaluation Live Migration of Virtualized Edge Networks: Analytical Modeling and Performance Evaluation Walter Cerroni, Franco Callegati DEI University of Bologna, Italy Outline Motivations Virtualized edge networks

More information

S-FTL: An Efficient Address Translation for Flash Memory by Exploiting Spatial Locality

S-FTL: An Efficient Address Translation for Flash Memory by Exploiting Spatial Locality S-FTL: An Efficient Address Translation for Flash Memory by Exploiting Spatial Locality Song Jiang, Lei Zhang, Xinhao Yuan, Hao Hu, and Yu Chen Department of Electrical and Computer Engineering Wayne State

More information

Algorithm research of 3D point cloud registration based on iterative closest point 1

Algorithm research of 3D point cloud registration based on iterative closest point 1 Acta Technica 62, No. 3B/2017, 189 196 c 2017 Institute of Thermomechanics CAS, v.v.i. Algorithm research of 3D point cloud registration based on iterative closest point 1 Qian Gao 2, Yujian Wang 2,3,

More information

Distributed Operating Systems

Distributed Operating Systems 2 Distributed Operating Systems System Models, Processor Allocation, Distributed Scheduling, and Fault Tolerance Steve Goddard goddard@cse.unl.edu http://www.cse.unl.edu/~goddard/courses/csce855 System

More information

Acceleration of Virtual Machine Live Migration on QEMU/KVM by Reusing VM Memory

Acceleration of Virtual Machine Live Migration on QEMU/KVM by Reusing VM Memory Acceleration of Virtual Machine Live Migration on QEMU/KVM by Reusing VM Memory Soramichi Akiyama Department of Creative Informatics Graduate School of Information Science and Technology The University

More information

An Efficient Image Processing Method Based on Web Services for Mobile Devices

An Efficient Image Processing Method Based on Web Services for Mobile Devices An Efficient Image Processing Method Based on Web Services for Mobile Devices Yi Liang a,b a Tianjin Key Lab of Intelligent Computing & Novel Software Technology, Tianjin University of Technology Tianjin,

More information

A priority based dynamic bandwidth scheduling in SDN networks 1

A priority based dynamic bandwidth scheduling in SDN networks 1 Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems

More information

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 1 January 2015, Page No. 9966-9970 Double Threshold Based Load Balancing Approach by Using VM Migration

More information

SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES

SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES Haotian Zhao, Yinlong Xu and Liping Xiang School of Computer Science and Technology, University of Science

More information

Chapter 87 Real-Time Rendering of Forest Scenes Based on LOD

Chapter 87 Real-Time Rendering of Forest Scenes Based on LOD Chapter 87 Real-Time Rendering of Forest Scenes Based on LOD Hao Li, Fuyan Liu and Shibo Yu Abstract Using the stochastic L-system for modeling the trees. Modeling the trees includes two sides, the trunk

More information

Processing Technology of Massive Human Health Data Based on Hadoop

Processing Technology of Massive Human Health Data Based on Hadoop 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 2016) Processing Technology of Massive Human Health Data Based on Hadoop Miao Liu1, a, Junsheng Yu1,

More information

Improvements to A-Priori. Bloom Filters Park-Chen-Yu Algorithm Multistage Algorithm Approximate Algorithms Compacting Results

Improvements to A-Priori. Bloom Filters Park-Chen-Yu Algorithm Multistage Algorithm Approximate Algorithms Compacting Results Improvements to A-Priori Bloom Filters Park-Chen-Yu Algorithm Multistage Algorithm Approximate Algorithms Compacting Results 1 Aside: Hash-Based Filtering Simple problem: I have a set S of one billion

More information

Live Virtual Machine Migration with Bandwidth Dynamic Assignment

Live Virtual Machine Migration with Bandwidth Dynamic Assignment Advances in Engineering Research (AER), volume 130 5th International Conference on Frontiers of Manufacturing Science and Measuring Technology (FMSMT 2017) Live Virtual Machine Migration with Bandwidth

More information

A Data Classification Algorithm of Internet of Things Based on Neural Network

A Data Classification Algorithm of Internet of Things Based on Neural Network A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To

More information

High Performance Computing on MapReduce Programming Framework

High Performance Computing on MapReduce Programming Framework International Journal of Private Cloud Computing Environment and Management Vol. 2, No. 1, (2015), pp. 27-32 http://dx.doi.org/10.21742/ijpccem.2015.2.1.04 High Performance Computing on MapReduce Programming

More information

GearDB: A GC-free Key-Value Store on HM-SMR Drives with Gear Compaction

GearDB: A GC-free Key-Value Store on HM-SMR Drives with Gear Compaction GearDB: A GC-free Key-Value Store on HM-SMR Drives with Gear Compaction Ting Yao 1,2, Jiguang Wan 1, Ping Huang 2, Yiwen Zhang 1, Zhiwen Liu 1 Changsheng Xie 1, and Xubin He 2 1 Huazhong University of

More information

Simple Quality-of-Service Path First Protocol and Modeling Analysis*

Simple Quality-of-Service Path First Protocol and Modeling Analysis* Simple Quality-of-Service Path First Protocol and Modeling Analysis* Lin Shen, Mingwei Xu, Ke Xu, Yong Cui, Youjian Zhao Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

Dynamic Grouping Strategy in Cloud Computing

Dynamic Grouping Strategy in Cloud Computing IEEE CGC 2012, November 1-3, Xiangtan, Hunan, China Dynamic Grouping Strategy in Cloud Computing Presenter : Qin Liu a Joint work with Yuhong Guo b, Jie Wu b, and Guojun Wang a a Central South University,

More information

MODERN OPERATING SYSTEMS. Chapter 3 Memory Management

MODERN OPERATING SYSTEMS. Chapter 3 Memory Management MODERN OPERATING SYSTEMS Chapter 3 Memory Management No Memory Abstraction Figure 3-1. Three simple ways of organizing memory with an operating system and one user process. Base and Limit Registers Figure

More information

What s New in VMware vsphere 4.1 Performance. VMware vsphere 4.1

What s New in VMware vsphere 4.1 Performance. VMware vsphere 4.1 What s New in VMware vsphere 4.1 Performance VMware vsphere 4.1 T E C H N I C A L W H I T E P A P E R Table of Contents Scalability enhancements....................................................................

More information

Research Article TSMC: A Novel Approach for Live Virtual Machine Migration

Research Article TSMC: A Novel Approach for Live Virtual Machine Migration Applied Mathematics, Article ID 297127, 7 pages http://dx.doi.org/1.1155/214/297127 Research Article TSMC: A Novel Approach for Live Virtual Machine Migration Jiaxing Song, Weidong Liu, Feiran Yin, and

More information

Energy efficient optimization method for green data center based on cloud computing

Energy efficient optimization method for green data center based on cloud computing 4th ational Conference on Electrical, Electronics and Computer Engineering (CEECE 2015) Energy efficient optimization method for green data center based on cloud computing Runze WU1, a, Wenwei CHE1, b,

More information

Shape Map Method for 3D Body Scanning Information Storage

Shape Map Method for 3D Body Scanning Information Storage Shape Map Method for 3D Body Scanning Information Storage Peng SIXIANG* a, Chan CHEE-KOOI a, Ameersing LUXIMON a, W.H. IP b a Institute of Textiles & Clothing, Hong Kong Polytechnic University, Hong Kong,

More information

Question 13 1: (Solution, p 4) Describe the inputs and outputs of a (1-way) demultiplexer, and how they relate.

Question 13 1: (Solution, p 4) Describe the inputs and outputs of a (1-way) demultiplexer, and how they relate. Questions 1 Question 13 1: (Solution, p ) Describe the inputs and outputs of a (1-way) demultiplexer, and how they relate. Question 13 : (Solution, p ) In implementing HYMN s control unit, the fetch cycle

More information

University of Alberta. Zhu Pang. Master of Science. Department of Computing Science

University of Alberta. Zhu Pang. Master of Science. Department of Computing Science University of Alberta HIGH PERFORMANCE LIVE MIGRATION OVER LOW-BANDWIDTH, HIGH-DELAY NETWORK WITH LOSS PREVENTION by Zhu Pang A thesis submitted to the Faculty of Graduate Studies and Research in partial

More information

A Rank-based VM Consolidation Method for Power Saving in Datacenters

A Rank-based VM Consolidation Method for Power Saving in Datacenters Regular Paper A Rank-based VM Consolidation Method for Power Saving in Datacenters Shingo Takeda 1 and Toshinori Takemura 2 In this paper, we propose a simple but flexible virtual machine consolidation

More information

GPU-Accelerated Apriori Algorithm

GPU-Accelerated Apriori Algorithm GPU-Accelerated Apriori Algorithm Hao JIANG a, Chen-Wei XU b, Zhi-Yong LIU c, and Li-Yan YU d School of Computer Science and Engineering, Southeast University, Nanjing, China a hjiang@seu.edu.cn, b wei1517@126.com,

More information

Dirty Memory Tracking for Performant Checkpointing Solutions

Dirty Memory Tracking for Performant Checkpointing Solutions Dirty Memory Tracking for Performant Checkpointing Solutions Lei Cao lei.cao@stratus.com August 25, 2016 1 Software Fault Tolerance Checkpointing is a technique to create a fault tolerant virtual machine

More information

Module 9: Virtual Memory

Module 9: Virtual Memory Module 9: Virtual Memory Background Demand Paging Performance of Demand Paging Page Replacement Page-Replacement Algorithms Allocation of Frames Thrashing Other Considerations Demand Segmentation Operating

More information

Computer Memory. Data Structures and Algorithms CSE 373 SP 18 - KASEY CHAMPION 1

Computer Memory. Data Structures and Algorithms CSE 373 SP 18 - KASEY CHAMPION 1 Computer Memory Data Structures and Algorithms CSE 373 SP 18 - KASEY CHAMPION 1 Warm Up public int sum1(int n, int m, int[][] table) { int output = 0; for (int i = 0; i < n; i++) { for (int j = 0; j

More information

A Fast and Iterative Migration for GPU Applications

A Fast and Iterative Migration for GPU Applications Shanghai Jiao Tong University School of software, 800 Dongchuan Road, Shanghai, China, 200240 E-mail: titanxxh@sjtu.edu.cn Peng Yang Gansu State Grid Information & Telecommunication Co.,Ltd. 629 East Xijin

More information

The Design and Optimization of Database

The Design and Optimization of Database Journal of Physics: Conference Series PAPER OPEN ACCESS The Design and Optimization of Database To cite this article: Guo Feng 2018 J. Phys.: Conf. Ser. 1087 032006 View the article online for updates

More information

Enhancing Cloud Resource Utilisation using Statistical Analysis

Enhancing Cloud Resource Utilisation using Statistical Analysis Institute of Advanced Engineering and Science International Journal of Cloud Computing and Services Science (IJ-CLOSER) Vol.3, No.1, February 2014, pp. 1~25 ISSN: 2089-3337 1 Enhancing Cloud Resource Utilisation

More information

Grid Resources Search Engine based on Ontology

Grid Resources Search Engine based on Ontology based on Ontology 12 E-mail: emiao_beyond@163.com Yang Li 3 E-mail: miipl606@163.com Weiguang Xu E-mail: miipl606@163.com Jiabao Wang E-mail: miipl606@163.com Lei Song E-mail: songlei@nudt.edu.cn Jiang

More information

The Design of Distributed File System Based on HDFS Yannan Wang 1, a, Shudong Zhang 2, b, Hui Liu 3, c

The Design of Distributed File System Based on HDFS Yannan Wang 1, a, Shudong Zhang 2, b, Hui Liu 3, c Applied Mechanics and Materials Online: 2013-09-27 ISSN: 1662-7482, Vols. 423-426, pp 2733-2736 doi:10.4028/www.scientific.net/amm.423-426.2733 2013 Trans Tech Publications, Switzerland The Design of Distributed

More information

Virtual Memory. Chapter 8

Virtual Memory. Chapter 8 Virtual Memory 1 Chapter 8 Characteristics of Paging and Segmentation Memory references are dynamically translated into physical addresses at run time E.g., process may be swapped in and out of main memory

More information

Computer Science Engineering Sample Papers

Computer Science Engineering Sample Papers See fro more Material www.computetech-dovari.blogspot.com Computer Science Engineering Sample Papers 1 The order of an internal node in a B+ tree index is the maximum number of children it can have. Suppose

More information

Memory Management Topics. CS 537 Lecture 11 Memory. Virtualizing Resources

Memory Management Topics. CS 537 Lecture 11 Memory. Virtualizing Resources Memory Management Topics CS 537 Lecture Memory Michael Swift Goals of memory management convenient abstraction for programming isolation between processes allocate scarce memory resources between competing

More information

A Dynamic TDMA Protocol Utilizing Channel Sense

A Dynamic TDMA Protocol Utilizing Channel Sense International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2

More information

Chapter 3 - Memory Management

Chapter 3 - Memory Management Chapter 3 - Memory Management Luis Tarrataca luis.tarrataca@gmail.com CEFET-RJ L. Tarrataca Chapter 3 - Memory Management 1 / 222 1 A Memory Abstraction: Address Spaces The Notion of an Address Space Swapping

More information

SANDPIPER: BLACK-BOX AND GRAY-BOX STRATEGIES FOR VIRTUAL MACHINE MIGRATION

SANDPIPER: BLACK-BOX AND GRAY-BOX STRATEGIES FOR VIRTUAL MACHINE MIGRATION SANDPIPER: BLACK-BOX AND GRAY-BOX STRATEGIES FOR VIRTUAL MACHINE MIGRATION Timothy Wood, Prashant Shenoy, Arun Venkataramani, and Mazin Yousif * University of Massachusetts Amherst * Intel, Portland Data

More information

CS 5523 Operating Systems: Memory Management (SGG-8)

CS 5523 Operating Systems: Memory Management (SGG-8) CS 5523 Operating Systems: Memory Management (SGG-8) Instructor: Dr Tongping Liu Thank Dr Dakai Zhu, Dr Palden Lama, and Dr Tim Richards (UMASS) for providing their slides Outline Simple memory management:

More information

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 20 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(20), 2014 [12526-12531] Exploration on the data mining system construction

More information

Data Centers and Cloud Computing. Data Centers

Data Centers and Cloud Computing. Data Centers Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

Implementation of the hardwired AFDX NIC

Implementation of the hardwired AFDX NIC Implementation of the hardwired AFDX NIC Pusik Park, Hangyun Jung KETI #68 Yatap, Bundang, Seongnam, Gyeonggi, Korea +82-31-789-{7318, 7319} {parksik, junghg}@keti.kr Daekyo Shin, Kitaeg Lim KETI #68 Yatap,

More information

Drawing Bipartite Graphs as Anchored Maps

Drawing Bipartite Graphs as Anchored Maps Drawing Bipartite Graphs as Anchored Maps Kazuo Misue Graduate School of Systems and Information Engineering University of Tsukuba 1-1-1 Tennoudai, Tsukuba, 305-8573 Japan misue@cs.tsukuba.ac.jp Abstract

More information

processes based on Message Passing Interface

processes based on Message Passing Interface Checkpointing and Migration of parallel processes based on Message Passing Interface Zhang Youhui, Wang Dongsheng, Zheng Weimin Department of Computer Science, Tsinghua University, China. Abstract This

More information

Research on adaptive network theft Trojan detection model Ting Wu

Research on adaptive network theft Trojan detection model Ting Wu International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 215) Research on adaptive network theft Trojan detection model Ting Wu Guangdong Teachers College of Foreign

More information

Power Measurements using performance counters

Power Measurements using performance counters Power Measurements using performance counters CSL862: Low-Power Computing By Suman A M (2015SIY7524) Android Power Consumption in Android Power Consumption in Smartphones are powered from batteries which

More information

Structure of Computer Systems

Structure of Computer Systems 222 Structure of Computer Systems Figure 4.64 shows how a page directory can be used to map linear addresses to 4-MB pages. The entries in the page directory point to page tables, and the entries in a

More information

Memory Management Virtual Memory

Memory Management Virtual Memory Memory Management Virtual Memory Part of A3 course (by Theo Schouten) Biniam Gebremichael http://www.cs.ru.nl/~biniam/ Office: A6004 April 4 2005 Content Virtual memory Definition Advantage and challenges

More information

Performance Assessment of DMOEA-DD with CEC 2009 MOEA Competition Test Instances

Performance Assessment of DMOEA-DD with CEC 2009 MOEA Competition Test Instances Performance Assessment of DMOEA-DD with CEC 2009 MOEA Competition Test Instances Minzhong Liu, Xiufen Zou, Yu Chen, Zhijian Wu Abstract In this paper, the DMOEA-DD, which is an improvement of DMOEA[1,

More information

Online Optimization of VM Deployment in IaaS Cloud

Online Optimization of VM Deployment in IaaS Cloud Online Optimization of VM Deployment in IaaS Cloud Pei Fan, Zhenbang Chen, Ji Wang School of Computer Science National University of Defense Technology Changsha, 4173, P.R.China {peifan,zbchen}@nudt.edu.cn,

More information

Disk scheduling Disk reliability Tertiary storage Swap space management Linux swap space management

Disk scheduling Disk reliability Tertiary storage Swap space management Linux swap space management Lecture Overview Mass storage devices Disk scheduling Disk reliability Tertiary storage Swap space management Linux swap space management Operating Systems - June 28, 2001 Disk Structure Disk drives are

More information

PAGE REPLACEMENT. Operating Systems 2015 Spring by Euiseong Seo

PAGE REPLACEMENT. Operating Systems 2015 Spring by Euiseong Seo PAGE REPLACEMENT Operating Systems 2015 Spring by Euiseong Seo Today s Topics What if the physical memory becomes full? Page replacement algorithms How to manage memory among competing processes? Advanced

More information

Variable Neighborhood Search Based Algorithm for University Course Timetabling Problem

Variable Neighborhood Search Based Algorithm for University Course Timetabling Problem Variable Neighborhood Search Based Algorithm for University Course Timetabling Problem Velin Kralev, Radoslava Kraleva South-West University "Neofit Rilski", Blagoevgrad, Bulgaria Abstract: In this paper

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining Lecture #13: Frequent Itemsets-2 Seoul National University 1 In This Lecture Efficient Algorithms for Finding Frequent Itemsets A-Priori PCY 2-Pass algorithm: Random Sampling,

More information

PoS(CENet2017)008. RELOCATE: A Container Based Moving Target Defense Approach. Speaker. Rui Huang1. Hongqi Zhang. Yi Liu.

PoS(CENet2017)008. RELOCATE: A Container Based Moving Target Defense Approach. Speaker. Rui Huang1. Hongqi Zhang. Yi Liu. RELOCATE: A Container Based Moving Target Defense Approach E-mail: xjhr1009@163.com Hongqi Zhang E-mail: zhq37922@126.com Yi Liu E-mail:liuyi9582@126.com Shie Zhou E-mail:942624127@qq.com In order to cope

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

New research on Key Technologies of unstructured data cloud storage

New research on Key Technologies of unstructured data cloud storage 2017 International Conference on Computing, Communications and Automation(I3CA 2017) New research on Key Technologies of unstructured data cloud storage Songqi Peng, Rengkui Liua, *, Futian Wang State

More information

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.

More information

MONITORING AND MANAGING NETWORK FLOWS IN VMWARE ENVIRONMENTS

MONITORING AND MANAGING NETWORK FLOWS IN VMWARE ENVIRONMENTS WHITEPAPER MONITORING AND MANAGING NETWORK FLOWS IN VMWARE ENVIRONMENTS By Trevor Pott www.apcon.com onitoring and managing network flows is a critical part of a secure and efficient approach to IT. Unfortunately,

More information

Research On a Real-time Database of General Engineering Flight Simulation

Research On a Real-time Database of General Engineering Flight Simulation 2nd International Conference on Information, Electronics and Computer (ICIEAC 2014) Research On a Real-time Database of General Engineering Flight Simulation Cong Zhang School of Computer Science & Engineering

More information

Preview. Memory Management

Preview. Memory Management Preview Memory Management With Mono-Process With Multi-Processes Multi-process with Fixed Partitions Modeling Multiprogramming Swapping Memory Management with Bitmaps Memory Management with Free-List Virtual

More information