A Bare-Metal and Asymmetric Partitioning Approach to Client Virtualization

Advancements in cloud computing enable the easy deployment of numerous services. However, the analysis of cloud service access platforms from a client perspective shows that maintaining and managing clients remain a challenge for end users. In this paper, we present the design, implementation, and evaluation of an asymmetric virtual machine monitor (AVMM), which is an asymmetric partitioning-based bare-metal approach that achieves near-native performance while supporting a new out-of-operating system mechanism for value-added services. To achieve these goals, AVMM divides underlying platforms into two asymmetric partitions: a user partition and a service partition. The user partition runs a commodity user OS, which is assigned to most of the underlying resources, maintaining end-user experience. The service partition runs a specialized OS, which consumes only the needed resources for its tasks and provides enhanced features to the user OS. AVMM considerably reduces virtualization overhead through two approaches: 1) Peripheral devices, such as graphics equipment, are assigned to be monopolized by a single user OS. 2) Efficient resource management mechanisms are leveraged to alleviate complicated resource sharing in existing virtualization technologies. We implement a prototype that supports Windows and Linux systems. Experimental results show that AVMM is a feasible and efficient approach to client virtualization.

[1]  Jan Mádle,et al.  VMware View 4 , 2010 .

[2]  Xuxian Jiang,et al.  Countering kernel rootkits with lightweight hook protection , 2009, CCS.

[3]  qdcat Quake III Arena地图制作 , 2002 .

[4]  MyST·拉拉 Counter Strike 穿透射击高手图解 , 2004 .

[5]  I-Ling Yen,et al.  QoS-Driven Service Composition with Reconfigurable Services , 2013, IEEE Transactions on Services Computing.

[6]  A. C. Primavesi,et al.  The Norton AntiVirus , 1995 .

[7]  Gil Neiger,et al.  Intel ® Virtualization Technology for Directed I/O , 2006 .

[8]  Andrew Warfield,et al.  Facilitating the Development of Soft Devices , 2005, USENIX Annual Technical Conference, General Track.

[9]  Jason Nieh,et al.  Measuring thin-client performance using slow-motion benchmarking , 2001, TOCS.

[10]  Wenke Lee,et al.  Ether: malware analysis via hardware virtualization extensions , 2008, CCS.

[11]  Asim Kadav,et al.  Live migration of direct-access devices , 2008, OPSR.

[12]  R. Schiffer,et al.  INTRODUCTION , 1988, Neurology.

[13]  Peter Druschel,et al.  Resource containers: a new facility for resource management in server systems , 1999, OSDI '99.

[14]  Peter T. Breuer,et al.  The Network Block Device , 2000 .

[15]  Andrew Warfield,et al.  Safe Hardware Access with the Xen Virtual Machine Monitor , 2007 .

[16]  Mahendra Ramachandran,et al.  New Client Virtualization Usage Models Using IntelŴVirtualization Technology , 2006 .

[17]  Naixue Xiong,et al.  AVMM: Virtualize network client with a bare-metal and asymmetric partitioning approach , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[18]  Dutch T. Meyer,et al.  Parallax: virtual disks for virtual machines , 2008, Eurosys '08.

[19]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[20]  Zhou Wei,et al.  Scalable Transactions for Web Applications in the Cloud , 2009, Euro-Par.

[21]  Prashant J. Shenoy,et al.  Hierarchical Scheduling for Symmetric Multiprocessors , 2008, IEEE Transactions on Parallel and Distributed Systems.

[22]  Dhabaleswar K. Panda,et al.  High Performance VMM-Bypass I/O in Virtual Machines , 2006, USENIX Annual Technical Conference, General Track.

[23]  Zhou Wei,et al.  CloudTPS: Scalable Transactions for Web Applications in the Cloud , 2012, IEEE Trans. Serv. Comput..

[24]  Carl A. Waldspurger,et al.  Memory resource management in VMware ESX server , 2002, OSDI '02.

[25]  Muli Ben-Yehuda,et al.  Direct Device Assignment for Untrusted Fully-Virtualized Virtual Machines , 2008 .

[26]  Xuxian Jiang,et al.  Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.

[27]  Peter A. Dinda,et al.  Investigating virtual passthrough I/O on commodity devices , 2009, OPSR.

[28]  Pedro F. Miret,et al.  Wikipedia , 2008, Monatsschrift für Deutsches Recht.

[29]  Karsten Schwan,et al.  High performance and scalable I/O virtualization via self-virtualized devices , 2007, HPDC '07.

[30]  Gil Neiger,et al.  Intel virtualization technology , 2005, Computer.

[31]  James E. Smith,et al.  The architecture of virtual machines , 2005, Computer.

[32]  Jimi Xenidis,et al.  Utilizing IOMMUs for Virtualization in Linux and Xen Muli , 2006 .

[33]  No License,et al.  Intel ® 64 and IA-32 Architectures Software Developer ’ s Manual Volume 3 A : System Programming Guide , Part 1 , 2006 .

[34]  Peng Ning,et al.  HIMA: A Hypervisor-Based Integrity Measurement Agent , 2009, 2009 Annual Computer Security Applications Conference.