2016
DOI: 10.1145/2932709
|View full text |Cite
|
Sign up to set email alerts
|

Handling Boot Storms in Virtualized Data Centers—A Survey

Abstract: Large-scale virtual machine (VM) deployment in virtualized data centers is a very slow process. This is primarily due to the resource bottlenecks that are created at the storage, network, and host physical machines when a large number of VMs are requested simultaneously. For companies that provide virtual desktops to their employees, it is common to encounter such requests each day, when their employees turn up for work. In addition, a large number of VMs are often required to be deployed instantly, in order t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 81 publications
0
3
0
Order By: Relevance
“…As shown in Figure 3, it is a data graph of the influencing factors. According to formula (11), the comprehensive risk value of the system is R � 􏽐 N i�1 δ i R(A i ) � 4.4. And 9-10 is the extra high risk.…”
Section: Analysis Of Hidden Dangers Of Property Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…As shown in Figure 3, it is a data graph of the influencing factors. According to formula (11), the comprehensive risk value of the system is R � 􏽐 N i�1 δ i R(A i ) � 4.4. And 9-10 is the extra high risk.…”
Section: Analysis Of Hidden Dangers Of Property Securitymentioning
confidence: 99%
“…e main concern of commercial transaction security is the various security issues arising [8,9], which are virtually inseparable and complementary. Without the foundation of cybersecurity, the security of commercial transactions is like a castle in the air; there is nothing to talk about [10,11]. Commercial transactions are not secure, and even if the network itself is more secure, it cannot meet the special security requirements of e-commerce [12].…”
Section: Introductionmentioning
confidence: 99%
“…Although an increasing number of state-of-the-art VMs provisioning strategies [3], [4] support preparing a specific virtual machine in minutes, customers still need to wait for the startup of services. For those instant demands, the VMs clone techniques [5], [6] become an appropriate choice that prepares and provides VMs in seconds. However, it is difficult to reduce the time consumption of basic procedures such as VM verification and automatic patching ,only if the schedule of customer demands is available [1].…”
Section: Introductionmentioning
confidence: 99%