Advances in Network Simulation
Computer
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Experiences teaching operating systems using virtual platforms and Linux
ACM SIGOPS Operating Systems Review
Performance, Validation and Testing with the Network Simulation Cradle
MASCOTS '06 Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation
Getting more from your virtual machine
Journal of Computing Sciences in Colleges
A case for high performance computing with virtual machines
Proceedings of the 20th annual international conference on Supercomputing
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
The Definitive Guide to the Xen Hypervisor (Prentice Hall Open Source Software Development Series)
The Definitive Guide to the Xen Hypervisor (Prentice Hall Open Source Software Development Series)
A general student's model suitable for intelligent e-learning systems
ECC'08 Proceedings of the 2nd conference on European computing conference
Control application for eLearning system
ECC'08 Proceedings of the 2nd conference on European computing conference
Linkage of learning by developing and virtual learning case: network design specialisation studies
ECC'08 Proceedings of the 2nd conference on European computing conference
Hi-index | 0.00 |
The Transaction Processing Monitor (TPM) is the most-used middleware in different e-commerce systems from large enterprises to medium and small businesses available in the internet. Due to its growing popularity, the necessity for a more efficient TPM performance is now the major concern between the developers and researchers. The need for a high-end benchmark platform for a TPM is at present very vital to meet the high performance needs of online transactions. In addition to the performance characteristics of the TPM, we also have to ensure the security of the transactions. In this paper, we perform a detailed analysis of the current software packages available for this application. And therefore, we propose a secure, isolated, and highly configurable environment using the real-time emulation capabilities of NS2 and the virtualization capabilities of Xen, in order to provide a testbed with the characteristics and behavior of a real network.