{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T23:36:13Z","timestamp":1721345773268},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Hum. Cent. Comput. Inf. Sci."],"published-print":{"date-parts":[[2016,12]]},"abstract":"Abstract<\/jats:title>According to current researches, much of the electric power is being consumed by the server cooling system at the Data Center. Moreover, the power consumption rate increases when the number of the equipments and servers expands. Thus, the proposed server operation system has been designed to decrease power consumption rate and CO2<\/jats:sub> emission volume by minimizing the number of these equipments and simplifying the physical composition of the system. Virtualization technology was adopted in both designing and implementation phases to improve resource efficiency of the system. As a result, significant amount has been saved while constructing the server operation system in this paper. System\u2019s performance has been evaluated using a virtual machine prior to its practical use through test bed experiments and the results confirms our expectation that the virtual hardwares will work as efficiently as actual ones.<\/jats:p>","DOI":"10.1186\/s13673-016-0060-7","type":"journal-article","created":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T13:24:55Z","timestamp":1459517095000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["Design and test bed experiments of server operation system using virtualization technology"],"prefix":"10.1186","volume":"6","author":[{"given":"Jun-Ho","family":"Huh","sequence":"first","affiliation":[]},{"given":"Kyungryong","family":"Seo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,1]]},"reference":[{"key":"60_CR1","unstructured":"Shin J (2009) Technological trends in green IT. Korean Institute of Information Scientists and Engineers, pp 35\u201336 (in Korean)"},{"key":"60_CR2","unstructured":"Baek JS (2009) Operating system virtualization for mobile desktop environment on windows, M.S. thesis, Department of computer and communications engineering POSTECH Graduate School of Information Technology, pp 2\u20138 (in Korean)"},{"key":"60_CR3","unstructured":"Wang S, Xu DS, Yan SL (2010) Analysis and application of Wireshark in TCP\/IP protocol teaching. In: IEEE EDT, pp 269\u2013272"},{"key":"60_CR4","unstructured":"Huh JH, Seo K (2013) Designing and implementation of networks learning systems by using virtual computers. In: The 9th international conference on MITA 2013, Bali, pp 68\u201371"},{"key":"60_CR5","unstructured":"Huh JH (2012) Designing and implementation of networks learning systems by using virtual computers, M.S. thesis, Department of Computer Science Education, Graduate School of Education, Pukyong National University at Daeyeon, Busan, pp 2\u201318. (in Korean)"},{"key":"60_CR6","unstructured":"Yao WM (2013) Increasing scalability in network simulation and testbed experiments, Ph.D. thesis, Purdue University, West Lafayette, pp 18\u201319"},{"key":"60_CR7","unstructured":"DETER Team (2011) Building apparatus for multi-resolution networking experiment using containers. Technical Report ISI-TR-683, DeterLab"},{"key":"60_CR8","unstructured":"Kernel-based virtual machine. http:\/\/www.linux-kvm.org"},{"key":"60_CR9","unstructured":"VMware. http:\/\/www.vmware.com"},{"key":"60_CR10","unstructured":"Oracle VM virtualbox. http:\/\/www.virtualbox.org"},{"key":"60_CR11","unstructured":"LinuX containers. http:\/\/lxc.sourceforge.net"},{"issue":"2","key":"60_CR12","first-page":"133","volume":"1","author":"JH Huh","year":"2014","unstructured":"Huh JH, Seo K (2014) Development of competency-oriented social multimedia computer network curriculum. J Multimedia Inf Syst 1(2):133\u2013142","journal-title":"J Multimedia Inf Syst"},{"key":"60_CR13","unstructured":"Kim BH (2014) Establishment of IT resource integration system using server and network virtualization, Ph.D. thesis, Department of Computer Engineering The Graduate School of Korea National University of Transportation, pp 11\u201316 (in Korean)"},{"issue":"4","key":"60_CR14","doi-asserted-by":"publisher","first-page":"553","DOI":"10.3745\/JIPS.2010.6.4.553","volume":"6","author":"SJ Baek","year":"2010","unstructured":"Baek SJ, Park SM, Yang SH, Song EH, Jeong YS (2010) Efficient server virtualization using grid service infrastructure. J Inf Process Syst 6(4):553\u2013562","journal-title":"J Inf Process Syst"},{"key":"60_CR15","first-page":"15","volume":"5","author":"H Ahn","year":"2015","unstructured":"Ahn H, Jung B, Park J (2015) Effect of reagents on optical properties of asbestos and remote spectral sensing. J Converg 5:15\u201318","journal-title":"J Converg"},{"key":"60_CR16","first-page":"19","volume":"5","author":"M Ju","year":"2014","unstructured":"Ju M, Ahn H, Yoo D, Kim H, Kim Y (2014) Feasibility test of wireless monitoring of changes of fish fauna according to habitat conditions of artificial lakes and wetlands. J Converg 5:19\u201322","journal-title":"J Converg"},{"key":"60_CR17","first-page":"1","volume":"4","author":"G Peng","year":"2013","unstructured":"Peng G, Zeng K, Yang X (2013) A hybrid computational intelligence approach for the VRP problem. J Converg 4:1\u20134","journal-title":"J Converg"},{"key":"60_CR18","doi-asserted-by":"publisher","first-page":"365","DOI":"10.3745\/JIPS.2013.9.3.365","volume":"9","author":"J Liu","year":"2013","unstructured":"Liu J, Chung SH (2013) An efiicient load balancing scheme for multi-gateways in wireless mesh networks. J Inf Process Syst 9:365\u2013378","journal-title":"J Inf Process Syst"},{"key":"60_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3745\/JIPS.04.0003","volume":"10","author":"J Lv","year":"2014","unstructured":"Lv J, Guo J, Ren H (2014) Efficient greedy algorithms for influence maximization in social networks. J Inf Process Syst 10:1\u201312","journal-title":"J Inf Process Syst"},{"key":"60_CR20","doi-asserted-by":"publisher","first-page":"491","DOI":"10.3745\/JIPS.01.0004","volume":"10","author":"V Kolici","year":"2014","unstructured":"Kolici V, Herrero A, Xhafa F (2014) On the performace of oracle grid engine queuing system for computing intensive applications. J Inf Process Syst 10:491\u2013502","journal-title":"J Inf Process Syst"},{"key":"60_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-014-0015-9","volume":"4","author":"S Feese","year":"2014","unstructured":"Feese S, Burscher MJ, Jonas K, Tr\u00f6ster G (2014) Sensing spatial and temporal coordination in teams using the smartphone. Hum Centric Comput Inf Sci 4:1\u201318","journal-title":"Hum Centric Comput Inf Sci"},{"key":"60_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2192-1962-3-19","volume":"3","author":"E Elsayed","year":"2013","unstructured":"Elsayed E, Eldahshan K, Tawfeek S (2013) Automatic evaluation technique for certain types of open questions in semantic learning systems. Hum Centric Comput Inf Sci 3:1\u201315","journal-title":"Hum Centric Comput Inf Sci"},{"key":"60_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2192-1962-3-13","volume":"3","author":"A Sinha","year":"2013","unstructured":"Sinha A, Lobiyal DK (2013) Performance evaluation of data aggregation for cluster-based wireless sensor network. Hum Centric Comput Inf Sci 3:1\u201317","journal-title":"Hum Centric Comput Inf Sci"},{"key":"60_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2192-1962-2-16","volume":"2","author":"MJ Sharma","year":"2012","unstructured":"Sharma MJ, Leung VCM (2012) IP multimedia subsystem authentication protocol in LTE-heterogeneous networks. Hum Centric Comput Inf Sci 2:1\u201319","journal-title":"Hum Centric Comput Inf Sci"},{"key":"60_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-014-0019-5","volume":"4","author":"J Vanus","year":"2014","unstructured":"Vanus J, Kucera P, Martinek R, Koziorek J (2014) Development and testing of a visualization application software, implemented with wireless control system in smart home care. Hum Centric Comput Inf Sci 4:1\u201319","journal-title":"Hum Centric Comput Inf Sci"},{"key":"60_CR26","doi-asserted-by":"crossref","unstructured":"Ueno H, Hasegawa S, Hasegawa T (2010) Virtage: server virtualization with hardware transparency. Lecture notes in computer science (LNCS). Springer, Berlin, pp 404\u2013413","DOI":"10.1007\/978-3-642-14122-5_46"},{"issue":"5","key":"60_CR27","first-page":"13","volume":"38","author":"D Paessler","year":"2008","unstructured":"Paessler D (2008) Server virtualization and network management. Database Netw J 38(5):13\u201316","journal-title":"Database Netw J"},{"issue":"5","key":"60_CR28","first-page":"26","volume":"12","author":"C Taylor","year":"2006","unstructured":"Taylor C, Consolidation Server (2006) How to enhance utilization of servers and storage. Manuf Comput Solut 12(5):26","journal-title":"Manuf Comput Solut"},{"issue":"9","key":"60_CR29","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.1016\/j.comnet.2013.04.004","volume":"57","author":"JF Botero","year":"2013","unstructured":"Botero JF, Hesselbach X (2013) Greener networking in a network virtualization environment. Comput Net 57(9):2021\u20132039","journal-title":"Comput Net"},{"issue":"11","key":"60_CR30","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCOM.2013.6658648","volume":"51","author":"R Jain","year":"2013","unstructured":"Jain R, Paul S (2013) Network virtualization and software defined networking for cloud computing: a survey. IEEE Commun Mag 51(11):24\u201331","journal-title":"IEEE Commun Mag"},{"key":"60_CR31","doi-asserted-by":"publisher","first-page":"488","DOI":"10.4028\/www.scientific.net\/AMM.307.488","volume":"307","author":"GY Zhao","year":"2013","unstructured":"Zhao GY, Tang HF, Xiao LM, Li XQ (2013) Efficient inline deduplication on VM images in desktop virtualization environment. Appl Mech Mater 307:488\u2013493","journal-title":"Appl Mech Mater"},{"key":"60_CR32","doi-asserted-by":"crossref","unstructured":"Wang X, Zhang B, Luo Y (2013) Optimizing interactive performance for desktop-virtualization environment optimizing interactive performance for desktop-virtualization environment. Lecture notes in computer science (LNCS), vol 7719. Springer, Berlin, pp 541\u2013555","DOI":"10.1007\/978-3-642-37015-1_47"},{"issue":"2","key":"60_CR33","doi-asserted-by":"publisher","first-page":"348","DOI":"10.4218\/etrij.13.0212.0213","volume":"35","author":"SM Jang","year":"2013","unstructured":"Jang SM, Choi WH, Kim WY (2013) Client rendering method for desktop virtualization services. ETRI J 35(2):348\u2013351","journal-title":"ETRI J"},{"key":"60_CR34","doi-asserted-by":"crossref","unstructured":"Cohen E, Paul W, Schmaltz S (2013) Theory of multi core hypervisor verification. Lecture notes in computer science (LNCS). Springer, Berlin, pp 1\u201327","DOI":"10.1007\/978-3-642-35843-2_1"},{"key":"60_CR35","doi-asserted-by":"crossref","unstructured":"Thorpe S, Ray I, Grandison T, Barbir A (2013) Hypervisor event logs as a source of consistent virtual machine evidence for forensic cloud investigations. Lecture notes in computer science (LNCS). Springer, Berlin, pp 97\u2013112","DOI":"10.1007\/978-3-642-39256-6_7"},{"issue":"9","key":"60_CR36","first-page":"257","volume":"9","author":"Jun-Ho Huh","year":"2015","unstructured":"Huh Jun-Ho, Seo Kyungryong (2015) Hybrid advanced metering infrastructure design for micro grid using the game theory model. Int J Softw Eng Appl 9(9):257\u2013268","journal-title":"Int J Softw Eng Appl"},{"issue":"2","key":"60_CR37","first-page":"37","volume":"9","author":"Jun-Ho Huh","year":"2015","unstructured":"Huh Jun-Ho, Lee Donghoon, Seo Kyungryong (2015) Implementation of graphic based network intrusion detection system for server operation. Int J Secur Appl 9(2):37\u201348","journal-title":"Int J Secur Appl"},{"key":"60_CR38","unstructured":"Huh JH, Koh T, Kim NJ, Seo K (2015) Design and test bed experiments of smart grid-based PLC client node problem using OPNET. In: Proceedings of the 11th international conference on multimedia information technology and applications (MITA 2015), Tashkent, Uzbekistan, IEEE Region 10, Changwon Section, p 317\u2013322"},{"key":"60_CR39","unstructured":"Huh JH, Seo K (2015) Design and testbed of graphic-based server operation system using virtualization technology. In: The 2015 world congress on information technology applications and services proceedings of the \u201cadvanced mobile, communications, security, multimedia, vehicular, cloud, IoT, and computing\u201d (World-IT 2015), p 96"}],"container-title":["Human-centric Computing and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-016-0060-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13673-016-0060-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-016-0060-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-016-0060-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T07:39:48Z","timestamp":1627630788000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13673-016-0060-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,1]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["60"],"URL":"https:\/\/doi.org\/10.1186\/s13673-016-0060-7","relation":{},"ISSN":["2192-1962"],"issn-type":[{"value":"2192-1962","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,1]]},"assertion":[{"value":"3 July 2015","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2016","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2016","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"1"}}