Results 1 - 10
of
274
Usermode Kernel: Running the Kernel in Userspace in VM Environments
, 2008
"... In many instances of virtual machine deployments today, virtual machine instances are created to support a single application. Traditional operating systems provide an extensive framework for protecting one process from another. In such deployments, this protection layer becomes an additional source ..."
Abstract
- Add to MetaCart
security on the other virtual machines running on the same physical machine, as they are protected by the VMM. We illustrate the design and implementation of such a system with the Xen hypervisor and the XenoLinux kernel. ii Table of Contents Abstract................................. ii
NV-Hypervisor: Hypervisor-based Persistence for Virtual Machines
"... Abstract—Power outages and subsequent recovery are major causes of service downtimes. This issue is amplified by the ongoing trend of steadily growing in-memory state of Internetbased services which increases the risk of data loss and extends recovery time. Protective measures against power outages, ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
-the-shelf software is not ready for benefiting from NVRAM. We present NV-Hypervisor a lightweight hypervisor extension that transparently provides persistence for virtual machines. NV-Hypervisor paves the way for utilizing NVRAM in virtualized environments (i.e., infrastructure-as-a-service clouds) and protects
RESOURCE SHARING FOR HYPERVISOR BASED ARCHITECTURE IN VIRTUALIZATION ENVIRONMENT
"... In data administration resource sharing has a crucial liability. At the same time we should be conscious about the enslavement factors. In addition virtual platforms can be demoralized as part of gaining the information about a system. As a result the corruption of files can cause crash status of th ..."
Abstract
- Add to MetaCart
In data administration resource sharing has a crucial liability. At the same time we should be conscious about the enslavement factors. In addition virtual platforms can be demoralized as part of gaining the information about a system. As a result the corruption of files can cause crash status
VMDedup: Memory De-duplication in Hypervisor
"... Abstract-Virtualization techniques are widely used in cloud computing environments today. Such environments are installed with a large number of similar virtual instances sharing the same physical infrastructure. In this paper, we focus on the memory usage optimization across virtual machines by au ..."
Abstract
- Add to MetaCart
-duplication support within the hypervisor to achieve benefits across operating system code, data as well as application binaries. We have implemented a prototype of this system within the Xen hypervisor to support both para-virtualized and fully-virtualized instances of operating systems.
An analysis of performance interference effects in virtual environments
- In Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS
, 2007
"... Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization techniques do not provide effective performance isolation between virtual machines (VMs). Specifically, hidden contention ..."
Abstract
-
Cited by 71 (5 self)
- Add to MetaCart
Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization techniques do not provide effective performance isolation between virtual machines (VMs). Specifically, hidden
Storage workload characterization and consolidation in virtualized environments
- In 2nd International Workshop on Virtualization Performance: Analysis, Characterization, and Tools (VPACT
, 2009
"... Server virtualization is accelerating the already existing need for shared storage area network (SAN) infrastructure for the associated benefits of migration, flexible manage-ment and economies of sharing. Understanding the charac-teristics of a workload in terms of access locality, IO sizes, read w ..."
Abstract
-
Cited by 28 (4 self)
- Add to MetaCart
server hypervisor. We further separate out different compo-nents (for example data, index and redo log in a database) of these workloads to understand their behavior in isola-tion. We find that most workloads show highly random ac-cess patterns. Next, we study the impact of storage con
UniCache: Hypervisor Managed Data Storage in RAM and Flash
"... Abstract—Application and OS-level caches are crucial for hiding I/O latency and improving application performance. However, caches are designed to greedily consume memory, which can cause memory-hogging problems in a virtualized data centers since the hypervisor cannot tell for what a virtual machin ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
Abstract—Application and OS-level caches are crucial for hiding I/O latency and improving application performance. However, caches are designed to greedily consume memory, which can cause memory-hogging problems in a virtualized data centers since the hypervisor cannot tell for what a virtual
Virtual Systems Workload Characterization An Overview
"... Abstract—Virtual systems and virtualization technology are taking the momentum nowadays in data centers and IT infrastructure models. Performance analysis of such systems is very invaluable for enterprises but yet is not a deterministic process. Single-workload benchmark is useful in quantifying the ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract—Virtual systems and virtualization technology are taking the momentum nowadays in data centers and IT infrastructure models. Performance analysis of such systems is very invaluable for enterprises but yet is not a deterministic process. Single-workload benchmark is useful in quantifying
Retrofitting the ibm power hypervisor to support mandatory access control
- In Proceedings of the Twenty-Third Annual Computer Security Applications Conference (ACSAC
, 2007
"... Server virtualization more readily enables the collocation of disparate workloads on a shared physical platform. When employed on systems across a data center, the result can be a dramatic increase in server utilization and a decrease in overall power, cooling and floor space requirements. However, ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
, in an environment where workloads share the underlying platforms, achieving other desirable workload goals, such as availability and security, becomes a challenge. In particular, enforcing isolation between workloads in a large, dynamic, and virtualized data center requires strong yet easily configurable controls
TwinDrivers: Semi-Automatic Derivation of Fast and Safe Hypervisor Network Drivers from Guest OS Drivers
"... In a virtualized environment, device drivers are often run inside a virtual machine (VM) rather than in the hypervisor, for reasons of safety and reduction in software engineering effort. Unfortunately, this approach results in poor performance for I/O-intensive devices such as network cards. The al ..."
Abstract
-
Cited by 23 (0 self)
- Add to MetaCart
In a virtualized environment, device drivers are often run inside a virtual machine (VM) rather than in the hypervisor, for reasons of safety and reduction in software engineering effort. Unfortunately, this approach results in poor performance for I/O-intensive devices such as network cards
Results 1 - 10
of
274