A Survey of Virtual Machine Management in Edge Computing

Total Page:16

File Type:pdf, Size:1020Kb

A Survey of Virtual Machine Management in Edge Computing A Survey of Virtual Machine Management in Edge Computing This article provides an overview of the industrial and research projects on virtual machine (VM) management in edge computing, focusing on the virtualization frameworks and virtualization techniques, the serverless management, and the security advantages and issues that virtualization brings to edge computing. By ZEYI TAO ,QI XIA,ZIJIANG HAO,CHENG LI ,LELE MA ,SHANHE YI, AND QUN LI ABSTRACT | Many edge computing systems rely on virtual impacted the contemporary computational patterns for machines (VMs) to deliver their services. It is challenging, both industrial and individual uses. Companies can benefit however, to deploy the virtualization mechanisms on edge from cloud computing by executing large batch-oriented computing hardware infrastructures. In this paper, we intro- tasks on cloud servers, and individual users can rely duce the engineering and research trends of achieving effi- on remote clouds to perform resource-intensive compu- cient VM management in edge computing. We elaborate on: tations for their client devices. Because cloud computing 1) the virtualization frameworks for edge computing developed has brought so many applications into reality, commer- in both the industry and the academia; 2) the virtualization cial cloud platforms, such as Amazon AWS [2], Microsoft techniques tailored for edge computing; 3) the placement Azure [3], and Google Cloud [4], have been successively and scheduling algorithms optimized for edge computing; and put into operation in recent years. 4) the research problems in security related to virtualization of Nevertheless, cloud computing suffers from a severe edge computing. problem when serving client devices at the edge of the Internet. Since cloud data centers usually reside at the core KEYWORDS | Algorithms; management; virtual machining. of the Internet, it is always the case that client devices have a long network distance to the remote clouds, which I. INTRODUCTION leads to significant network delay perceived by the end Since Amazon released its elastic compute cloud (EC2) [1] users. This is unacceptable for many application scenarios, product in 2006, cloud computing has become increasingly especially for latency-sensitive mobile-cloud and IoT-cloud important in people’s daily life. By providing elastic hard- applications, where the client devices are mobile devices ware resources, including processing resources, storage such as smartphones and Internet-of-Things (IoT) devices, resources, and networking resources, at the data centers respectively. residing at the core of the Internet, cloud computing In light of this situation, edge computing [5]–[7] (also enables a spectrum of applications that have profoundly known as fog computing [8], [9] and cloudlets [10], [11]) was proposed as an extension of cloud computing. By pro- viding hardware sources at the edge of the Internet, edge Manuscript received February 9, 2019; revised April 13, 2019 and June 20, 2019; computing serves client devices with much lower network accepted June 20, 2019. Date of publication July 25, 2019; date of current version August 5, 2019. This work was supported in part by the U.S. National latency than cloud computing, thereby greatly improving Science Foundation under Grant CNS-1816399. (Corresponding author: the user experience for delay-sensitive client-remote appli- Zeyi Tao.) Z. Tao, Q. Xia, Z. Hao, C. Li, L. Ma,andQ. Li are with the College of William cations. More importantly, edge computing has recently and Mary, Williamsburg, VA 23185 USA (e-mail: [email protected]; become a concept beyond merely an extension of cloud [email protected]; [email protected]; [email protected]; [email protected]; [email protected]). computing [8]. Indeed, edge computing is now frequently S. Yi is with VMware, Palo Alto, CA 94304 USA (e-mail: [email protected]). mentioned as an enabling technology of IoT [12], [13] Digital Object Identifier 10.1109/JPROC.2019.2927919 and is widely adopted by a range of rapidly develop- 0018-9219 © 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. 1482 PROCEEDINGS OF THE IEEE | Vol. 107, No. 8, August 2019 Tao et al.: Survey of Virtual Machine Management in Edge Computing tion is the most widely adopted solution to this prob- lem. VMs and containers in the same specifications always produce the identical execution environ- ment regardless of the heterogeneity of the underly- ing hardware infrastructure. Therefore, applications developed for a particular set of VM specifications can be surely executed in an edge computing environment that provisions VM instances in those specifications. 2) Resource Abstraction: VMs and containers are not executed on bare metal; they are executed on hypervisors. Hypervisors manage the underlying hardware resources and provide emulated hardware devices for the VMs and containers running atop. By doing so, hypervisors effectively hide the hetero- geneity of the underlying hardware infrastructure, Fig. 1. Example architecture of edge computing. which greatly simplifies the development of cloud applications as well as the management of the hard- ware resources. ing applications, such as big data analytics [14], video 3) Isolation: VMs achieve hardware-level isolation; the surveillance [15]–[17], virtual reality [18]–[20], and aug- abnormal status of a VM such as a software failure mented reality (AR) [21]–[23]. will not affect the correctness (sometimes even the Fig. 1 shows an example architecture of edge com- performance) of the programs running in other VMs puting. As shown in Fig. 1, client devices are wire- running on the same host [25]. This feature is highly lessly connected to the level 1 edge nodes, which are desirable in edge computing because edge nodes Wi-Fi access points (APs) and cellular towers. Behind the are supposed to serve a number of end users and level 1 edge nodes are the level 2 edge nodes, which have execute many tasks simultaneously. In comparison, a longer network distance to the client devices than the containers only achieve operating system (OS)-level level 1 edge nodes. There is also a backend cloud behind isolation; in normal cases, a program running inside the level 2 edge nodes that resides at the core of the a container can only access the resources assigned to Internet. The client devices perceive lower delay when the that container. However, in abnormal cases, such as computations are done at the level 1 edge than at the when a container crashes or has been compromised, level 2 edge. On the other hand, the level 2 edge nodes the containers in problem may affect the entire host possess more powerful hardware than the level 1 edge machine [26], [27]. The primary advantage of con- nodes and can thus execute more computational tasks tainers is that they are more lightweight than VMs, simultaneously. Note that Fig. 1 merely shows a possible and the OS-level isolation that they achieve is usually architecture of edge computing. In other edge computing sufficient for edge computing. architectures, it is possible that there are only one level or more than two levels of edge nodes and that there is no Despite the advantages of adopting the virtualization backend cloud in the system. technology, edge computing has several characteristics that Generally, cloud computing is built on several funda- distinguish itself from cloud computing, which pose new mental technologies, including virtualization, distributed challenges to the management of VMs. We summarize such mass storage, and parallel programming models [24]. characteristics and the challenges they pose as follows. Among these technologies, virtualization plays an impor- 1) Sparse Distribution: Edge nodes are distributed more tant role in resource provisioning, task scheduling, and sparsely in a region than the cloud servers locating at computation sandboxing in cloud computing environ- the same data center. Therefore, it takes a longer time ments. Although built on less powerful hardware, edge to migrate VMs and containers in an edge computing computing faces similar challenges as cloud computing environment than in a cloud computing environment, in effectively managing the hardware resources. There- which poses severe challenges in providing seamless fore, edge computing also employs virtualization as one services for edge computing users. of its fundamental technologies. At a high level, the vir- 2) Limited Resources: Unlike cloud servers that possess tualization technology, no matter in the form of virtual conceptually infinite hardware resources, edge nodes machines (VMs) or containers, provides the following fea- usually possess limited hardware resources. There- tures that are critical in delivering flexible and reliable fore, each edge node can only support a limited edge computing services. number of VMs and containers, which makes it quite 1) Platform Independence: The hardware infrastructure challenging to schedule the VMs/containers in an of edge computing can be highly heterogeneous, edge computing environment. given that the edge nodes are possibly provided by 3) Limited Service Range: Each edge node only covers a multiple third parties and/or individuals. Virtualiza- limited service range via wireless media. Due to the Vol. 107, No. 8, August 2019 |PROCEEDINGS OF THE IEEE 1483 Tao et al.: Survey of Virtual Machine Management in Edge Computing mobility of end devices, VMs and
Recommended publications
  • Implementation of Machining on the Cloud
    Implementation of Machining on the Cloud: A Case Study in PLM Environment Saurav Bhatt, Frédéric Segonds, Nicolas Maranzana, Ameziane Aoussat, Vincent Frerebeau, Damien Chasset To cite this version: Saurav Bhatt, Frédéric Segonds, Nicolas Maranzana, Ameziane Aoussat, Vincent Frerebeau, et al.. Implementation of Machining on the Cloud: A Case Study in PLM Environment. 13th IFIP Interna- tional Conference on Product Lifecycle Management (PLM), Jul 2016, Columbia, SC, United States. pp.341-355, 10.1007/978-3-319-54660-5_31. hal-01699699 HAL Id: hal-01699699 https://hal.inria.fr/hal-01699699 Submitted on 2 Feb 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Implementation of Machining on the Cloud: A case study in PLM environment Saurav Bhatt1,3, Frédéric Segonds2, Nicolas Maranzana2, Améziane Aoussat2, Vincent Frerebeau3, Damien Chasset3 1 Delhi College of Engineering, Delhi, India 2 Arts et Métiers, Paris Tech, LCPI, 151 Boulevard de l’Hôpital, 75013 Paris, France 3 Dassault Systemes, 10 Rue Marcel Dassault, 78140 Velizy Villacoublay, France [email protected] Abstract. This paper focuses on the implementation of cloud solutions in the field of machining which is encompassed by the much larger field of manufacturing.
    [Show full text]
  • Enhancing Undergraduate Understanding of Subtractive Manufacturability Through Virtualized Simulation of CNC Machining
    Paper ID #18310 Enhancing Undergraduate Understanding of Subtractive Manufacturability through Virtualized Simulation of CNC Machining Mr. Roby Lynn Dr. Kathryn W. Jablokow, Pennsylvania State University, Great Valley Dr. Kathryn Jablokow is an Associate Professor of Engineering Design and Mechanical Engineering at Penn State University. A graduate of Ohio State University (Ph.D., Electrical Engineering), Dr. Jablokow’s teaching and research interests include problem solving, invention, and creativity in science and engineer- ing, as well as robotics and manufacturing education. In addition to her membership in ASEE, she is a Senior Member of IEEE, a Fellow of ASME, and the recipient of the 2016 ASME Ruth and Joel Spira Outstanding Design Educator Award. Dr. Jablokow is the architect of a unique 4-course module fo- cused on creativity and problem solving leadership and is currently developing a new methodology for cognition-based design. She is one of three instructors for Penn State’s Massive Open Online Course (MOOC) on Creativity, Innovation, and Change, and she is the founding director of the Problem Solving Research Group, whose 50+ collaborating members include faculty and students from several universities, as well as industrial representatives, military leaders, and corporate consultants. Prof. Christopher Saldana Dr. Thomas Marshall Tucker, Tucker Innovations Dr. Tommy Tucker is the CEO and owner of Tucker Innovations. He has a Ph.D. in Mechanical Engineer- ing from the Georgia Institute of Technology. He has over 15 years of experience writing computationally intensive software applications for engineering, medical, and defense applications. After spending the early part of his career at high tech start-up companies, Dr.
    [Show full text]
  • Oracle® Linux Virtualization Manager Getting Started Guide
    Oracle® Linux Virtualization Manager Getting Started Guide F25124-11 September 2021 Oracle Legal Notices Copyright © 2019, 2021 Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Container and Kernel-Based Virtual Machine (KVM) Virtualization for Network Function Virtualization (NFV)
    Container and Kernel-Based Virtual Machine (KVM) Virtualization for Network Function Virtualization (NFV) White Paper August 2015 Order Number: 332860-001US YouLegal Lines andmay Disclaimers not use or facilitate the use of this document in connection with any infringement or other legal analysis concerning Intel products described herein. You agree to grant Intel a non-exclusive, royalty-free license to any patent claim thereafter drafted which includes subject matter disclosed herein. No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this document. All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel product specifications and roadmaps. The products described may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Copies of documents which have an order number and are referenced in this document may be obtained by calling 1-800-548-4725 or by visiting: http://www.intel.com/ design/literature.htm. Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Learn more at http:// www.intel.com/ or from the OEM or retailer. Results have been estimated or simulated using internal Intel analysis or architecture simulation or modeling, and provided to you for informational purposes. Any differences in your system hardware, software or configuration may affect your actual performance. For more complete information about performance and benchmark results, visit www.intel.com/benchmarks. Tests document performance of components on a particular test, in specific systems.
    [Show full text]
  • Camworks 2019 Camworks
    Virtual Machining Using CAMWorks 2019 Virtual Machining Using CAMWorks Virtual Machining Using CAMWorks® 2019 CAMWorks as a SOLIDWORKS® Module Chang Lower Prices Better Textbooks Kuang-Hua Chang, Ph.D. SDC SDC Better Textbooks. Lower Prices. PUBLICATIONS www.SDCpublications.com Visit the following websites to learn more about this book: Powered by TCPDF (www.tcpdf.org) Lesson 1: Introduction to CAMWorks 1 Lesson 1: Introduction to CAMWorks 1.1 Overview of the Lesson CAMWorks, developed by Geometric Americas Inc. (www.camworks.com/about), is a parametric, feature-based virtual machining software. By defining areas to be machined as machinable features, CAMWorks is able to apply more automation and intelligence into CNC (Computer Numerical Control) toolpath creation. This approach is more intuitive and follows the feature-based modeling concepts of computer-aided design (CAD) systems. Consequently, CAMWorks is fully integrated with CAD systems, such as SOLIDWORKS (and Solid Edge and CAMWorks Solids). Because of this integration, you can use the same user interface and solid models for design and later to create machining simulation. Such a tight integration completely eliminates file transfers using less-desirable standard file formats such as IGES, STEP, SAT, or Parasolid. Hence, the toolpaths generated are on the SOLIDWORKS part, not on an imported approximation. In addition, the toolpaths generated are associative with SOLIDWORKS parametric solid model. This means that if the solid model is changed, the toolpaths are changed automatically with minimal user intervention. In addition, CAMWorks is available as a standalone CAD/CAM package, with embedded CAMWorks Solids as an integrated solid modeler. One unique feature of CAMWorks is the AFR (automatic feature recognition) technology.
    [Show full text]
  • A Comparative Study of Containers and Virtual Machines in Big Data Environment
    A Comparative Study of Containers and Virtual Machines in Big Data Environment Qi Zhang1, Ling Liu2, Calton Pu2, Qiwei Dou3, Liren Wu3, and Wei Zhou3 1IBM Thomas J. Watson Research, New York, USA 2College of Computing, Georgia Institute of Technology, Georgia, USA 3Department of Computer Science, Yunnan University, Yunnan, China Abstract—Container technique is gaining increasing attention able to handle peak resources demands, even when there in recent years and has become an alternative to traditional exist free resources [37], [36]. Another example is the poor virtual machines. Some of the primary motivations for the reproducibility for scientific research when the workloads are enterprise to adopt the container technology include its convenience to encapsulate and deploy applications, lightweight moved from one cloud environment to the other [15]. Even operations, as well as efficiency and flexibility in resources though the workloads are the same, their dependent softwares sharing. However, there still lacks an in-depth and systematic could be slightly different, which leads to inconsistent results. comparison study on how big data applications, such as Spark Recently, container-based techniques, such as Docker[3], jobs, perform between a container environment and a virtual OpenVZ [8], and LXC(Linux Containers) [5], become machine environment. In this paper, by running various Spark applications with different configurations, we evaluate the two an alternative to traditional virtual machines because of environments from many interesting aspects, such as how their agility. The primary motivations for containers to be convenient the execution environment can be set up, what are increasingly adopted are their conveniency to encapsulate, makespans of different workloads running in each setup, how deploy, and isolate applications, lightweight operations, as well efficient the hardware resources, such as CPU and memory, are as efficiency and flexibility in resource sharing.
    [Show full text]
  • Virtual Manufacturing: a Review
    Special Issue - 2015 International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 NCERAME - 2015 Conference Proceedings Virtual Manufacturing: A Review Bharath V G Dr. Rajashekar Patil Research Scholar, School of Mechanical Engineering Head, School of Mechanical Engineering REVA University REVA University Bengaluru, India Bengaluru, India Abstract:- Virtual engineering is an emerging technology processes and the total manufacturing enterprise. Virtual which integrates geometric models and related engineering tools Manufacturing systems enable early optimization of cost, such as design, analysis, simulation, optimization and decision quality and time drivers, achieve integrated product, process making tools within computer-generated environment that and resource design [3]. Virtual manufacturing eliminates facilitates multidisciplinary collaborative product development. material waste and faulty design. It provides better In manufacturing, the major component of virtual engineering is Virtual Manufacturing (VM). VM use computer aided design understanding of a process without making of prototype models and simulations of manufacturing for production of models. Virtual Manufacturing greatly reduces the product manufactured products. VM provides the capability to and process development cycle. It also provides a platform to “Manufacture in the computer” and has the ability to train new operators on a particular machine without having to interchange models between their use in simulation and control waste precious machine
    [Show full text]
  • Virtual High Performance Machining
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Available online at www.sciencedirect.com ScienceDirect Procedia CIRP 46 ( 2016 ) 372 – 378 7th HPC 2016 – CIRP Conference on High Performance Cutting Virtual High Performance Machining Yusuf Altintas The University of British Columbia, Manufacturing Automation Laboratory, Vancouver, BC, V6T1Z4, Canada * Corresponding author. Tel.: 1- 604 822 5622 ; fax: +1-604-822-2403. E-mail address: [email protected] Abstract The goal of current research is to develop digital models of all steps in the manufacturing of parts. This paper presents an overview of digital machining of parts in virtual environment. It is based on research and development of digital models in machining parts. The tool – part intersection along the tool path is evaluated at discrete steps, which are then used to calculate chip area, cutting load, torque-power-energy drawn from the machine and the detection of chatter occurrence. The dynamics of the CNC system are incorporated to the digital model in order to estimate the true tangential feed and machining cycle time. The tangential feeds are automatically optimized by considering the tool breakage, spindle torque-power, and tool deflection limits set by the process planner. The virtual machining system can be used independently or as an integral part of CAM systems such as Siemens NX. Sample applications of the virtual high performance machining system in aerospace industry are presented. © 20162016 The The Authors. Authors. Published Published by Elsevier by Elsevier B.V ThisB.V. is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
    [Show full text]
  • Ovirt Architecture
    oVirt Architecture Itamar Heim Director, RHEV-M Engineering, Red Hat oVirt Engine Architecture 1 oVirt Engine Large scale, centralized management for server and desktop virtualization Based on leading performance, scalability and security infrastructure technologies oVirt Engine Architecture 2 Kenrel-based Virtual Machine (KVM) ● Included in Linux kernel since 2006 ● Runs Linux, Windows and other operating system guests ● Advanced features ● Live migration ● Memory page sharing ● Thin provisioning ● PCI Pass-through ● KVM architecture provides high “feature-velocity” – leverages the power of Linux oVirt Engine Architecture 3 Linux as a Hypervisor? ● What makes up a hypervisor ? ● Hardware management ● Device drivers ● I/O Stack ● Resource Management ● Scheduling ● Access Control ● Power Management ● Memory Manager ● Device Model (emulation) ● Virtual Machine Monitor oVirt Engine Architecture 4 Linux as a Hypervisor? ● What makes up a hypervisor ? ● Hardware management ● Device drivers ● I/O Stack ● Resource Management Operating System Kernel ● Scheduling ● Access Control ● Power Management ● } Memory Manager ● Device Model (emulation) ● Virtual Machine Monitor oVirt Engine Architecture 5 Linux as a Hypervisor? How well does Linux perform as a hypervisor? Isn't Linux a general purpose operating system? Linux is architected to scale from the smallest embedded systems through to the largest multi-socket servers ● From cell phones through to mainframes KVM benefits from mature, time tested infrastructure ● Powerful, scalable memory manager
    [Show full text]
  • A Classification-Based Algorithm to Detect Forged Embedded
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. provided by University of Liverpool Repository IEEE SYSTEMS JOURNAL 1 A Classification-Based Algorithm to Detect Forged Embedded Machines in IoT Environments Valerio Selis , Member, IEEE, and Alan Marshall, Senior Member, IEEE Abstract—In the Internet of Things (IoT), interconnected de- technologies, and smart grids [4]–[8]. These IoT application vices manage essential information related to people’s lives; scenarios are widespread and so it is not practical to implement hence, securing this information is essential. The number of these conventional “enterprise”-type security measures, as for exam- machines is rapidly growing; these are mostly embedded, and therefore more susceptible to attacks. Recently, thousands of sub- ple, many IoT devices will frequently encounter new devices verted IoT embedded machines, such as surveillance cameras, were that are not part of a corporate system. This factor is enhanced used for launching distributed denial of service (DDoS) attacks. In whenever public networks are used for data offloading and IoT this scenario, attackers, who are not embedded machines, can emu- devices share information independently of the communication late their behaviors to subvert the machine-to-machine network. In infrastructure, location, and software applications used [9], [10]. this paper, we present a novel algorithm to detect such forged ma- chines. This allows detection of virtualized and emulated systems In this context, real objects have the important role of manag- by observing their behaviors and can be used by IoT trust agents in ing the data collected from real environments.
    [Show full text]
  • Simulating a Virtual Machining Model in an Agent- Based Model for Advanced Analytics
    Simulating a Virtual Machining Model in an Agent- Based Model for Advanced Analytics David Lechevalier1, Seung-Jun Shin2, Sudarsan Rachuri3, Sebti Foufou4, Y. Tina Lee5, Abdelaziz Bouras4 1Le2i, Université de Bourgogne, Dijon, France, [email protected] 2Graduate School of Management of Technology, Pukyong National University, Busan, South Korea, [email protected] 3Office of Energy Efficiency and Renewable Energy, Advanced Manufacturing Office, Department of Energy, Washington, DC, USA, [email protected] 4CSE Department, College of Engineering, Qatar University, Qatar, [email protected], [email protected] 5Systems Integration Division, National Institute of Standards and Technology, Gaithersburg, MD, USA, [email protected] Abstract. Monitoring the performance of manufacturing equipment is critical to ensure the efficiency of manufacturing processes. Machine-monitoring data allows measuring manufacturing equipment efficiency. However, acquiring real and useful machine-monitoring data is expensive and time consuming. An alternative method of getting data is to generate machine-monitoring data using simulation. The simulation data mimic operations and operational failure. In addition, the data can also be used to fill in real data sets with missing values from real-time data collection. The mimicking of real manufacturing systems in computer-based systems is called “virtual manufacturing”. The computer-based systems execute the manufacturing system models that represent real manufacturing systems. In this paper, we introduce a virtual machining model of milling operations. We developed a prototype virtual machining model that represents 3-axis milling operations. This model is a digital mock-up of a real milling machine; it can generate machine-monitoring data from a process plan.
    [Show full text]
  • Virtualization for Cost-Effective Teaching of Assembly Language Programming
    > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Virtualization for Cost-effective Teaching of Assembly Language Programming José O. Cadenas, Member, IEEE, R. Simon Sherratt, Fellow, IEEE, Des Howlett, Senior Member, IEEE, Chris G. Guy, Senior Member, IEEE, and Karsten Lundqvist, Member, IEEE targeting an ARM processor. Abstract—A virtual system that emulates an ARM-based The virtual solution presented in this paper was adopted as a processor machine has been created to replace a traditional general replacement for the traditional hardware approach of hardware-based system for teaching assembly language. The using physical embedded boards equipped with a target proposed virtual system integrates, in a single environment, all processor, typically physical 8-bit processors, or 32-bit the development tools necessary to deliver introductory or advanced courses on modern assembly language programming. processors such as the 68K, MIPS and embedded PIC 8/16/32- The virtual system runs a Linux operating system in either a bit processors [4]. This new virtual system also replaces the graphical or console mode on a Windows or Linux host machine. need for having cross-tools running on a Windows host (cross- No software licenses or extra hardware are required to use the compilers) thus the cost of software license fees is saved. In virtual system, thus students are free to carry their own ARM addition, there is no need for extra hardware to be purchased emulator with them on a USB memory stick. Institutions and/or replaced, such as proprietary tools for communication adopting this, or a similar virtual system, can also benefit by reducing capital investment in hardware-based development kits and debugging for the embedded board from the host machine.
    [Show full text]