Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 947234, 11 pages
http://dx.doi.org/10.1155/2013/947234
Research Article

Empirical Analysis of Server Consolidation and Desktop Virtualization in Cloud Computing

1Department of Computer Science and Information Engineering, National University of Kaohsiung, 81148 Kaohsiung, Taiwan
2Department of Marketing Management, Shu Te University, 82445 Kaohsiung, Taiwan
3Department of Computer Science and Information Engineering, National University of Kaohsiung, 81148 Kaohsiung, Taiwan

Received 11 September 2013; Accepted 10 October 2013

Academic Editor: Teen-Hang Meen

Copyright © 2013 Bao Rong Chang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. B. R. Chang, H. F. Tsai, and C. M. Chen, “Evaluation of virtual machine performance and virtualized consolidation ratio in cloud computing system,” Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 3, pp. 192–200, 2013. View at Google Scholar
  2. J. Hardy, L. Liu, C. Lei, and J. X. Li, “Internet-based virtual computing infrastructure for cloud computing,” in Principles, Methodologies, and Service-Oriented Approaches For Cloud Computing, chapter 16, pp. 371–389, IGI Global, Hershey, Pa, USA, 2013. View at Google Scholar
  3. Y. Haga, K. Imaeda, and M. Jibu, “Windows server 2008 R2 hyper-V server virtualization,” Fujitsu Scientific and Technical Journal, vol. 47, no. 3, pp. 349–355, 2011. View at Google Scholar · View at Scopus
  4. A. Kovari and P. Dukan, “KVM & OpenVZ virtualization based IaaS open source cloud virtualization platforms: openNode, proxmox VE,” in in Proceedings of IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics, pp. 335–339, 2012.
  5. S. M. S. Kimball and C. Bisciglia, “Cluster computing for web-scale data processing,” ACM SIGCSE Bulletin, vol. 40, no. 1, pp. 116–120, 2008. View at Google Scholar
  6. F. Guthrie, S. Lowe, and M. Saidel-Keesing, VMware vSphere Design, John Wiley & Sons, New York, NY, USA, 2011.
  7. D. Sacks, “Demystifying DAS, SAN, NAS, NAS Gateways, Fibre Channel, and iSCSI,” IBM Storage Networking, pp. 3–7, 2001.
  8. I. Yakti and W. A. Salameh, “iSCSI (internet small computer system interface) for your startup,” International Journal of Information and Communication Technology Research, vol. 20, no. 3, 2012. View at Google Scholar
  9. J. M. Kurz, “Beyond ROI,” Value Management, pp. 1–7, 2012.
  10. M. Kornevs, V. Minkevica, and M. Holm, “Cloud computing evaluation based on financial metrics,” Information Technology and Management Science, vol. 15, no. 1, pp. 87–92, 2013. View at Google Scholar
  11. A. Beloglazov and R. Buyya, “Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in Cloud data centers,” Concurrency and Computation, vol. 24, no. 13, pp. 1397–1420, 2012. View at Publisher · View at Google Scholar
  12. S. Simanta, G. A. Lewis, E. J. Morris, K. Ha, and M. Satyanarayanan, “Cloud computing at the tactical edge,” Software Engineering Institute 680, 2012. View at Google Scholar
  13. B. K. Kim, K. W. Hur, J. H. Jang, and Y. W. Ko, “Feedback scheduling for realtime task on Xen virtual machine,” Communications in Computer and Information Science, vol. 266, no. 2, pp. 283–291, 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. VMware TCO/ROI Calculator, VMware, http://roitco.vmware.com/vmw/.
  15. Frequently Asked Questions, Report of VMware ROI TCO Calculator, Version 2.0, VMware, 2013.
  16. TANEJA Group Technology Analysis, “Evaluating the ESX 4 Hypervisor and VM Density Advantage,” Technology Validation, pp. 1–12, 2009.
  17. M. Tabuchi, K.-I. Itoh, Y. Nomura, and H. Taniguchi, “Design and evaluation of a system for running two coexisting linux systems,” Electronics and Communications in Japan, vol. 90, no. 9, pp. 56–68, 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. M. Aboutabl, A. Agrawala, and J. D. Decotignie, “Temporally determinate disk access (extended abstract): an experimental approach,” ACM SIGMETRICS Performance Evaluation Review, vol. 26, no. 1, pp. 280–281, 1998. View at Publisher · View at Google Scholar
  19. S. Prabhakar, S. Pankanti, and A. K. Jain, “Biometric recognition: security and privacy concerns,” IEEE Security and Privacy, vol. 1, no. 2, pp. 33–42, 2003. View at Publisher · View at Google Scholar · View at Scopus
  20. R. L. Krutz and R. D. Scott Lowe Vines, Cloud Security: A Comprehensive Guide to Secure Cloud Computing, John Wiley & Sons, New York, NY, USA, 2010.