Introducing New Resource Management Policies Using a Virtual Machine Monitor
スポンサーリンク
概要
- 論文の詳細を見る
Integrating new resource management policies into operating systems (OSes) is an ongoing process. Despite innovative policy proposals being developed it is unrealistic to widely deploy a new one because it is a difficult costly and often an impractical endeavor to modify an existing operating system to integrate a new policy. To address this problem we explore the possibility of using virtual machine technology to incorporate a new policy into an existing OS without the need to make any changes to it. This paper describes FoxyTechnique which virtualizes physical devices differently from real ones and tricks a guest OS into producing behavior similar to a desired policy. FoxyTechnique has three advantages. First it allows us to implement a new policy without the need to make any changes to OS kernels. Second Foxy-based policies are expected to be portable across different operating systems because they are isolated from guest OSes by stable virtual hardware interfaces. Finally Foxy-based policies sometimes outperform guest OS policies because they can measure performance indicators more accurately than guest OSes. To demonstrate the usefulness of FoxyTechnique we conducted two case studies FoxyVegas and FoxyIdle on the Xen virtual machine monitor. FoxyVegas and FoxyIdle tricked the original Linux and successfully mimicked TCP Vegas and Idletime scheduling respectively.
- 一般社団法人情報処理学会の論文
- 2008-06-26
著者
-
Kenji Kono
Department of Information and Computer Science, Keio University
-
Kenji Kono
Department Of Information And Computer Science Keio University
-
Hiroshi Yamada
Keio University | CREST(JST)
-
Kenji Kono
Keio University | CREST(JST)
関連論文
- A Strategy for Efficient Update Propagation on Peer-to-Peer Based Content Distribution Networks
- Using a Virtual Machine Monitor to Slow Down CPU Speed for Embedded Time-Sensitive Software Testing
- VMM-based Detection of Rootkits that Modify File Metadata
- VMM-based Detection of Rootkits that Modify File Metadata
- Strategy for Selecting Replica Server Spots on the Basis of Demand Fluctuations
- Introducing New Resource Management Policies Using a Virtual Machine Monitor
- An Analysis of Fake Antivirus Behaviors
- Automatically Checking for Session Management Vulnerabilities in Web Applications
- Using Fault Injection to Analyze the Scope of Error Propagation in Linux
- Screening Legitimate and Fake/Crude Antivirus Software