Tuesday, May 7, 2019

Issues of virtualisation and their impact on computing approaches Dissertation

Issues of virtualisation and their impact on computing approaches - Dissertation modelAn investigation of the key characteristics of the implementation of virtualisation and its usefulness for future computation Amrik Singh Samra BSc. ... anagement platform 19 Figure 4 Virtual machine structures (Type I on left, Type II on right) 19 Figure 5 Functions and responsibilities of the VMM 20 Figure 6 The protection rings in the x86 architecture 23 Figure 7 Diagrammatic representation of paravirtualization 28 Figure 8 Illustration of seamless virtualisation in VirtualBox 30 magnetic dip of tables Table 1 Table of Risks 11 Table 2 Types of VM emulators, their key features and examples 20 Table 3 Levels of inductive reasoning involved in virtualisation technologies 21 Table 4 Key advantages and drawbacks for each level of abstraction 21 Table 5 Comparison of virtualisation types in terms of performance and flexibility 29 application virtualisation The process of running software from a r emote server (EC-Council, 2010) Break out attack A situation in which criminals will escape from a virtual machine designed for guests in rule to launch attacks against the hypervisor, allowing them to gain control over the host (Esforsys, 2009c). High Performance Computing (HPC) The use of gibe processing for running advanced programs quickly, efficiently and reliably Hypervisor This is like the nitty-gritty or core of a virtualisation platform, also called the Virtual Machine Monitor (VMM) with access to the hosts physical hardware (VirtualisationAdmin, 2008). cyberspace virtualisation A method of combining the available resources in a network by splitting up the available bandwidth into channels to particular servers or devices in real time (EC-Council, 2010) Privileged Software core group (PSN) - A miniature resident program in the operating system similar to a kernel (Exforsys, 2009) Run-Time System (RTS) A piece of software designed to support the execution of a progr am sandbox The secure

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.