The Community for Technology Leaders
RSS Icon
Issue No.01 - Jan.-March (2014 vol.7)
pp: 40-53
Yuezhi Zhou , Tsinghua University, Beijing
Yaoxue Zhang , Tsinghua University, Beijing and Central South University, Changsha
Hao Liu , Tsinghua University, Beijing
Naixue Xiong , Jiangxi University of Fiance and Economics, Nanchang and Colorado Technical University, Colorado Spring
Athanasios V. Vasilakos , University of Western Macedonia, Kozani
Advancements in cloud computing enable the easy deployment of numerous services. However, the analysis of cloud service access platforms from a client perspective shows that maintaining and managing clients remain a challenge for end users. In this paper, we present the design, implementation, and evaluation of an asymmetric virtual machine monitor (AVMM), which is an asymmetric partitioning-based bare-metal approach that achieves near-native performance while supporting a new out-of-operating system mechanism for value-added services. To achieve these goals, AVMM divides underlying platforms into two asymmetric partitions: a user partition and a service partition. The user partition runs a commodity user OS, which is assigned to most of the underlying resources, maintaining end-user experience. The service partition runs a specialized OS, which consumes only the needed resources for its tasks and provides enhanced features to the user OS. AVMM considerably reduces virtualization overhead through two approaches: 1) Peripheral devices, such as graphics equipment, are assigned to be monopolized by a single user OS. 2) Efficient resource management mechanisms are leveraged to alleviate complicated resource sharing in existing virtualization technologies. We implement a prototype that supports Windows and Linux systems. Experimental results show that AVMM is a feasible and efficient approach to client virtualization.
Resource management, Performance evaluation, Educational institutions, Security, Virtual machine monitors, Hardware,asymmetric partitioning, Virtual machine monitor, virtual machine, client virtualization, desktop virtualization
Yuezhi Zhou, Yaoxue Zhang, Hao Liu, Naixue Xiong, Athanasios V. Vasilakos, "A Bare-Metal and Asymmetric Partitioning Approach to Client Virtualization", IEEE Transactions on Services Computing, vol.7, no. 1, pp. 40-53, Jan.-March 2014, doi:10.1109/TSC.2012.32
[1] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A View of Cloud Computing," Comm. ACM, vol. 53, pp. 50-58, Apr. 2010.
[2] W. Zhou, G. Pierre, and C. Chi, "CloudTPS: Scalable Transactions for Web applications in the Cloud," IEEE Trans. Services Computing, vol. 5, no. 4, pp. 525-539, Oct.-Dec. 2012.
[3] H. Ma, F. Bastani, I. Yen, and H. Mei, "QoS-Driven Service Composition with Reconfigurable Services," IEEE Trans. Services Computing, vol. 6, no. 1, pp. 20-34, 2013.
[4] M. Rose, B. O'Donnell, and R. Perry, "Understanding the Business Value of Centralized Virtual Desktops," white paper, IDC, Nov. 2009.
[5] Symantec, "Symantec Ghost Solution Suite 2.5: Powerful, Versatile, and Efficient PC and Lifecycle Management," Data Sheet: Endpoint Management, 2010.
[6] "BMC BladeLogic Client Automation and Intel Core vPro Processors," white paper, BMC Software, Inc., 2013.
[7] Symantec, "Norton AntiVirus,", 2011.
[8] Z. Wang, X. Jiang, W. Cui, and P. Ning, "Countering Kernel Rootkits with Lightweight Hook Protection," Proc. 16th ACM Conf. Computer and Comm. Security, pp. 545-554, 2009.
[9] A. Dinaburg, P. Royal, M. Sharif, and W. Lee, "Ether: Malware Analysis via Hardware Virtualization Extensions," Proc. 15th ACM Conf. Computer and Comm. Security, pp. 51-62, 2008.
[10] X. Jiang, X. Wang, and D. Xu, "Stealthy Malware Detection through VMM-Based 'Out-of-the-Box' Semantic View Reconstruction," Proc. 14th ACM Conf. Computer and Comm. Security, pp. 128-138, 2007.
[11] A.M. Azab, P. Ning, E.C. Sezer, and X. Zhang, "HIMA: A Hypervisor-Based Integrity Measurement Agent," Proc. Ann. Computer Security Applications Conf., pp. 461-470, 2009.
[12] VMware, "Workstation User's Manual: Workstation 6.5,", 2009.
[13] Xen Project, "Xen 3.1.4," 3.1.4.html , 2013.
[14] Microsoft, "Windows Virtual PC," default.aspx, 2011.
[15] "Desktop Virtualization Strategy: Choosing the Right Solution for Your Needs," white paper, Microsoft Corp., 2008.
[16] Citrix, "XenDesktop 5," xendesktop.html, 2011.
[17] VMware, "VMware View 4.5," , 2011.
[18] R.P. Goldberg, "Architecture of Virtual Machines," Proc. Workshop Virtual Computer Systems, pp. 74-112, 1973.
[19] R. Uhlig, G. Neiger, D. Rodgers, A. Santoni, F. Martins, A. Anderson, S. Bennett, A. Kagi, F. Leung, and L. Smith, "Intel Virtualization Technology," IEEE Computer, vol. 38, no. 5, pp. 48-56, May 2005.
[20] "Understanding Full Virtualization, Paravirtualization, and Hardware Assist," white paper, VMware Inc., Sept. 2007.
[21] K. Fraser, S. Hand, I. Pratt, A. Warfield, R. Neugebauer, and M. Williamson, "Safe Hardware Access with the Xen Virtual Machine Monitor," Proc. First Workshop Operating System and Architectural Support for the on Demand IT Infrastructure (OASIS '04), Oct. 2004.
[22] "AMD-V Nested Paging," white paper, AMD Inc., July 2008.
[23] A. Warfield, S. Hand, K. Fraser, and T. Deegan, "Facilitating the Development of Soft Devices," Proc. USENIX Ann. Technical Conf., pp. 378-382, Apr. 2005.
[24] D.T. Meyer, G. Aggarwal, B. Cully, G. Lefebvre, M.J. Feeley, N.C. Hutchinson, and A. Warfield, "Parallax: Virtual Disks for Virtual Machines," Proc. Third ACM SIGOPS/EuroSys European Conf. Computer Systems (EuroSys '08), pp. 41-54, 2008.
[25] C.A. Waldspurger, "Memory Resource Management in Vmware ESX Server," ACM SIGOPS Operating Systems Rev., vol. 36, pp. 181-194, 2002.
[26] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the Art of Virtualization," Proc. 19th ACM Symp. Operating Systems Principles (SOSP '03), pp. 164-177, 2003.
[27] Intel, "Intel 64 and IA-32 Architectures Software Developer's Manual: Vol. 3B: System Programming Guide, Part 2," manual253669.pdf, Sept. 2009.
[28] "Advanced Configuration and Power Interface Specification, Revision 4.0a," Hewlett-Packard Corp., Intel Corp., Microsoft Corp., Phoenix Technologies Ltd., Toshiba Corp., Apr. 2010.
[29] "PCI Firmware Specification, Revision 3.0," PCI-SIG, June 2005.
[30] "Network Block Device," http:/, 2013.
[31] "openSUSE 11.1,", 2013.
[32] "PerformanceTest—PC Benchmark Software," http://www., 2011.
[33] LMbench, html , 2013.
[34] D. Overclock, "How to Benchmark a Videocard," http://www. 1278_1.html, 2009.
[35] "Counter-Strike," http:/, 2011.
[36] "Quake III Arena," /, 2011.
[37] "Quake III Arena," Wikipedia, , 2011.
[38] Fraps, "Real-Time Video Capture & Benchmarking," http:/, 2011.
[39] "Microsoft Direct3D," Wikipedia, , 2011.
[40] "I-Bench,", 2011.
[41] J. Nieh, S.J. Yang, and N. Novik, "Measuring Thin-Client Performance Using Slow-Motion Benchmarking," ACM Trans. Computer Systems, vol. 21, no. 1, pp. 87-115, 2001.
[42] Iometer, "Introduction," http:/, 2013.
[43] A. Chobotaro, E. Eduri, S. Garg, L. Janz, C. Klotz, M. Ramachandran, R. Rappoport, N. Smith, J. Stanley, and M. Wood, "New Client Virtualization Usage Models Using Intel Virtualization Technology," Intel Technology J., vol. 10, no. 3, pp. 205-216, Aug. 2006.
[44] J. Liu, W. Huang, B. Abali, and D.K. Panda, "High Performance VMM-Bypass I/O in Virtual Machines," Proc. USENIX Ann. Technical Conf., pp. 29-42, 2006.
[45] H. Raj and K. Schwan, "High Performance and Scalable I/O Virtualization via Self-Virtualized Devices," Proc. 16th Int'l Symp. High Performance Distributed Computing (HPDC '07), pp. 179-188, 2007.
[46] M. Ben-Yehuda, J. Mason, O. Krieger, J. Xenidis, L.V. Doorn, A. Mallick, J. Nakajima, and E. Wahlig, "Utilizing Iommus for Virtualization in Linux and Xen," Proc. Ottawa Linux Symp. (OLS '06), pp. 29-42, 2006.
[47] B.-A. Yassour, M. Ben-Yehuda, and O. Wasserman, "Direct Device Assignment for Untrusted Fully-Virtualized Virtual Machines," Research Report H-0263, IBM, 2008.
[48] D. Abramson, J. Jackson, S. Muthrasanallur, G. Neiger, G. Regnier, R. Sankaran, I. Schoinas, R. Uhlig, B. Vembu, and J. Wiegert, "Intel Virtualization Technology for Directed I/O," Intel Technology J., vol. 10, no. 3, pp. 179-191, Aug. 2006.
[49] "AMD I/O Virtualization Technology (IOMMU) Specification," white paper, AMD Inc., Feb. 2009.
[50] L. Xia, J. Lange, P. Dinda, and C. Bae, "Investigating Virtual Passthrough I/O on Commodity Devices," SIGOPS Operating Systems Rev., vol. 43, no. 3, pp. 83-94, 2009.
[51] A. Kadav and M.M. Swift, "Live Migration of Direct-Access Devices," SIGOPS Operating Systems Rev., vol. 43, no. 3, pp. 95-104, 2009.
[52] G. Banga, P. Druschel, and J.C. Mogul, "Resource Containers: A New Facility for Resource Management in Server Systems," Proc. Third Symp. Operating Systems Design and Implementation, pp. 1-11, Feb. 1999.
[53] A. Chandra and P. Shenoy, "Hierarchical Scheduling for Symmetric Multiprocessors," IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 3, pp. 418-431, Mar. 2008.
[54] I. Pratt, D. Magenheimer, H. Blanchard, J. Xenidis, J. Nakajima, and A. Liguori, "The Ongoing Evolution of Xen," Proc. Linux Symp., vol. 2, pp. 255-266, July 2006.
[55] Y. Zhou, Y. Zhang, H. Liu, and N. Xiong, "AVMM: Virtualize Network Client with a Bare-Metal and Asymmetric Partitioning Approach," Proc. IEEE INFOCOM Workshop Cloud Computing, pp. 653-658, Apr. 2011.
30 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool