scispace - formally typeset
Search or ask a question

Showing papers on "Temporal isolation among virtual machines published in 2003"


Patent
29 Apr 2003
TL;DR: In this paper, the authors propose a technique for utilizing resources in a virtual machine operating system, where a share of the resources taken from the shares of other virtual machines is allocated to each of the virtual machines, such that the resultant shares allocated to the one virtual machine and the clone together are greater than the share allocated before the one VM was cloned.
Abstract: A technique for utilizing resources in a virtual machine operating system. The virtual machine operating system comprises a multiplicity of virtual machines. A share of resources is allocated to each of the virtual machines. Utilization by one of the virtual machines of the resources allocated to the one virtual machine is automatically monitored. If the one virtual machine needs additional resources, the one virtual machine is automatically cloned. The clone is allocated a share of the resources taken from the shares of other of the virtual machines, such that the resultant shares allocated to the one virtual machine and the clone together are greater than the share allocated to the one virtual machine before the one virtual machine was cloned. The clone performs work with its resources that would have been performed by the one virtual machine if not for the existence of said clone.

189 citations


Patent
22 May 2003
TL;DR: In this article, the authors describe a method and apparatus for running a plurality of interrelated computational tasks on a majority of host computers. But the authors do not specify how to run a virtual machine running on a host computer where the virtual machine is configured to run as a native application.
Abstract: The invention relates to method and apparatus for running a plurality of interrelated computational tasks on a plurality of host computers. The host computers run a primary operating system. The method includes the steps of: establishing a virtual machine running on a host computer where the virtual machine is configured to run as a native application emulating a secondary operating system including storage and I/O functionality. The virtual machine may be configured to provide the host computers primary operating system with access to the virtual machines secondary operating system and the virtual machine with access to the host computers system resources. The virtual machine may also emulate a file system by providing a guest file system and provide access to the host computers system resources via a host system call converter. Virtual machine system calls are converted to the host systems system calls by a host system call converter and controls the access to the users system resources. The host system call converter also provides access to the guest file system.

69 citations


Patent
Daniel Baumberger1
25 Nov 2003
TL;DR: In this paper, the authors present a disclosure related to the resource management of virtual machines using information regarding the activity of the virtual machine(s) and facilitate communication between two or more virtual machines via the mapping of virtual resources to physical resources.
Abstract: The present disclosure relates to the resource management of virtual machine(s) using information regarding the activity of the virtual machine(s), and, more specifically, to the facilitating communication between two or more virtual machines via the mapping of virtual resources to physical resources.

56 citations


Patent
08 Oct 2003
TL;DR: In this paper, a virtual machine management server 2 reads measurement data that indicate the performance of each virtual machine such as a DB every predetermined time, data about the storage capacity of each server that operates each VM, and data about each VM's storage capacity.
Abstract: PROBLEM TO BE SOLVED: To efficiently operate a plurality of virtual machines by means of a plurality of servers. SOLUTION: A virtual machine management server 2 reads measurement data that indicate the performance of each virtual machine such as a DB every predetermined time, data about the storage capacity of each server that operates each virtual machine, and data about the storage capacity of each virtual machine. Using the read data as calculation requirements, the virtual machine management server calculates a combination of any of the virtual machines and any of the servers such that the total value of values showing the performance of each virtual machine for each period of time when the plurality of virtual machines are each operated by either of the plurality of servers is maximized. Based on the combination calculated, the file of each virtual machine is stored in the storage area of the server corresponding to each virtual machine and the virtual machines are relocated. COPYRIGHT: (C)2005,JPO&NCIPI

53 citations


Patent
Daniel Baumberger1
06 Nov 2003
TL;DR: In this article, a system, method and computer program product for communicating between two virtual machines including utilizing first and second virtual machine queues associated with virtual machines to communicate between the virtual machines.
Abstract: A system, method and computer program product for communicating between two virtual machines including utilizing first and second virtual machine queues associated with respective first and second virtual machines to communicate between the virtual machines.

44 citations


Patent
22 Sep 2003
TL;DR: In this article, the authors describe techniques for developing and exchanging virtual machine implementations and/or support library implementations, where the virtual machine design specifies a set of functions for executing all or substantially all support library operations that are dependent on the implementation of the VM.
Abstract: Techniques for developing and exchanging virtual machine implementations and/or support library implementations are described. In one embodiment, the virtual machine design specifies a set of functions for executing all or substantially all support library operations that are dependent on the implementation of the virtual machine. When a developer desires to substitute one virtual machine implementation for another, the developer is able to basically “plug-in” the second virtual machine implementation with minimal impact on the support libraries since both virtual machine implementations provide implementations for the set of specified functions that are dependent on the implementation of the respective virtual machine. Conversely, different support libraries may be utilized in conjunction with a particular virtual machine implementation.

38 citations


Patent
10 Nov 2003
TL;DR: In this article, the authors present a method for managing application, using two physical machines connected via communication means, said machines comprising a physical structure whereon is loaded a first software layer adapted to said machine and a second layer forming a virtual layer whereon virtual machines operate.
Abstract: The present invention concerns a method for managing application, using two physical machines connected via communication means, said machines comprising a physical structure whereon is loaded a first software layer adapted to said machine and a second layer forming a virtual layer whereon virtual machines operate, the latter including at least one application. Said method comprises the following steps: defining by the system management process a service assembling several applications, communicating between the management process and each virtual layer to determine the state of the virtual machines associated with said virtual layers, assigning one virtual machine on one of the virtual layers with regard to the characteristics of the application.

33 citations


Patent
10 Nov 2003
TL;DR: In this article, the authors propose a method for allowing the use of several virtual machines including a plurality of applications and to federate these applications in order to form services, which includes managing applications, making use of at least two physical machines linked by communication means.
Abstract: The aim of this invention is to propose a method for allowing the use of several virtual machines including a plurality of applications and to federate these applications in order to form services. The method includes managing applications, making use of at least two physical machines linked by communication means. These machines comprise a physical structure on which a first software layer adapted to the physical machines is loaded. The machines also include a second layer forming a virtual layer on which virtual machines will operate. The second layer includes at least one application. The method includes loading a virtual machine control program associated with the virtual layer, connecting at least two physical machines to form a physical machine network, wherein the physical machine network includes the virtual layer, establishing a dialogue between the virtual machine control program and a system management process, defining a service containing several applications wherein the service is defined by the system management process, communicating between the management process and each of the virtual layer in order to determine the status of the virtual machines associated with the corresponding virtual layer and assigning a virtual machine to the corresponding virtual layer taking into account the characteristics of the application.

17 citations


Proceedings ArticleDOI
20 May 2003
TL;DR: This paper introduces an efficient algorithm with complexity O(V), V being the number of routers in the VPN and proves that the general problem is NP-hard and introduces multiple heuristics for efficient and robust cache placement suitable under different constraints.
Abstract: Today, most large companies maintain virtual private networks (VPNs) to connect their remote locations into a single secure network. VPNs can be quite large covering more than 1000 locations and in most cases use standard Internet protocols and services. Such VPNs are implemented using a diverse set of technologies such as Frame Relay, MPLS, or IPSEC to achieve the goal of privacy and performance isolation from the public Internet.Using VPNs to distribute live content has recently received tremendous interest. For example, a VPN could be used to broadcast a CEO-employee town hall meeting. To distribute this type of content economically without overloading the network, the deployment of streaming caches or splitters is most likely required.In this paper, we address the problem of optimally placing such streaming splitters or caches to broadcast to a given set of VPN endpoints under the constraints typically found within a VPN. In particular, we introduce an efficient algorithm with complexity O(V), V being the number of routers in the VPN. This guarantees the optimal cache placement if interception is used for redirection. We prove that the general problem is NP-hard and introduce multiple heuristics for efficient and robust cache placement suitable under different constraints. At the expense of increased implementation complexity, each heuristic solution provides additional saving in the number of caches required. We evaluate proposed solutions using extensive simulations. In particular, we show our flow-based solution is very close to the optimal.

14 citations


Patent
24 Oct 2003
TL;DR: In this paper, an apparatus is used to simulate a multiple-processor system by creating multiple virtual machines within a single central processing unit (CPU) hardware implementing Virtual Machine Extension (VMX) technology.
Abstract: An apparatus is used to simulate a multiple-processor system by creating multiple virtual machines. The multiple virtual machines may be formed within a single central processing unit (CPU) hardware implementing Virtual Machine Extension (VMX) technology. In an example, the apparatus includes a host environment and a virtual environment that includes the multiple virtual machines. Virtual code may be executed on each of the multiple virtual machines under the control of a direct execution monitor within the host environment. The direct execution monitor may create the virtual machines and control exit and entry thereto. The direct execution monitor may monitor the virtual machines for sensitive events that are to be handled by the host environment, not the virtual environment. The direct execution monitor may determine the nature of the sensitive event, such as whether the instructions associated with the sensitive event should be de-virtualized and simulated separately. The apparatus allows the virtual code to operate as though it is operating on its own dedicate physical processor at a native level.

9 citations


01 Jan 2003
TL;DR: The approach to building flexible and interoperable execution environments called the Virtual Virtual Machine, the architecture of the VVM and some of its primary applications are presented.
Abstract: With the wide acceptance of distributed computing a rapidly growing number of application domains are emerging, leading to a growing number of ad hoc solutions that are rigid and poorly interoperable. Our response to this situation is a platform for building flexible and interoperable execution environments called the Virtual Virtual Machine. This article presents our approach, the architecture of the VVM and some of its primary applications.