DOI QR코드

DOI QR Code

Performance Comparison of Virtualization Domain in User Level Virtualization

사용자 레벨 가상화에서 가상화 영역 성능 비교

  • 정찬주 (동강대학 전기에너지과) ;
  • 강태근 (한국전자부품연구원 광주지역본부)
  • Received : 2013.08.26
  • Accepted : 2013.11.15
  • Published : 2013.11.30

Abstract

In this paper, we proposed new virtualization technology that is more convenient and stable in local computing environment, then found technique elements need to desktop virtualization which is based on clients in various virtualization technologies. After running excution of process explorer utility in user level virtualization and VMWare, we found memory capacity that is used 30.1MB in VMWare and 16.6MB in user level virtualization respectively to compare private bytes each of process. We found no significant difference of CPU utilization which is executed application program in local computing environment and user domain with user level virtualization. In this result, proposed virtualization technology is able to minimize performance degradation of local computing environment.

본 논문은 가상화 기술에서 클라이언트 기반의 데스크톱 가상화에 필요한 기술 요소를 찾아내고 로컬 컴퓨팅 환경에서 보다 편리하고 안정된 클라이언트 가상화 기술을 제안하였다. 유저 레벨 가상화와 VMWare를 로딩하여 처리 익스플로우 유틸리티를 실행시킨 후 각 프로세스의 Private 바이트를 비교해보면 VMWare에서는 30.1MB의 메모리 용량이 사용되었고, 유저 레벨 가상화 프로세스에서는 16.6MB의 메모리 용량이 사용되어짐을 알 수 있었다.클라이언트 가상화를 이용한 가상화 사용자 영역과 로컬 컴퓨팅 환경에서 응용 프로그램을 실행시킨 후 CPU 사용율을 비교한 결과 큰 차이가 없음을 알 수 있었다. 이러한 결과는 가상화된 사용자 영역에서 로컬 컴퓨팅 환경의 성능 저하를 최소화 하여 사용자가 필요한 기능을 효율적으로 사용할 수 있음을 알 수 있었다.

Keywords

References

  1. Inhyuk Kim, Taehyoung Kim, Junghan Kim, Byounghong Lim and YoungIk Eom, "Virtualization Techniques Application Trend for System Secure", The Journal of Korea Institute of Informaion Security and Crypthology, Vol. 19, No. 2, pp. 26-34, 2009.
  2. Sejung Lim, Gwangjun Kim and Taegeun Kang, "Important Information Protection using Client Vitualization", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 6, No. 1, pp. 111-117, 2011.
  3. Daeyoung Hong, Wonseok Ko and Sungsoo Lim, "Virtualization Techniques for Secure and Reliable Computing", The Journal of Korea Institute of Information Scientists and Engineering, Vol. 26, No. 10, pp. 50-57, 2008.
  4. Sejung Lim, Gwangjun Kim and Taegeun Kang, "Application Program Virtualization besed on Desktop Virtualization", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 5, No. 6, pp. 595-601, 2010.
  5. Heiser Gernot, Elphinstone, Kevin Kuz, Ihor Klein, Gerwin, Petters, and Stefan M. "Towards Trustworthy Computing Systems: Taking Microkernels to the Next Level", Operating Systems Review Vol. 41, No. 3, pp. 3-11, 2007.
  6. Jiyeon Kim, Hyungjong Kim, Choonsik Park and Myungjoo Kim, "A Study on the Analysis of Virtualization Techniques Vulnerability in Cloud Computing Environment", The Journal of Korea Institute of Informaion Security and Crypthology, Vol. 19, No. 4, pp. 72-77, 2009.
  7. L. Cherkasova, D. Gupta, and A. Vahdat, "Comparison of the three cpu schedulers in xen," SIGMETRICS Perform. Eval. Rev., Vol. 35, No. 2, pp. 42-51, 2007. https://doi.org/10.1145/1330555.1330556
  8. P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the art of virtualization", in SOSP'03: Proceedings of the nineteenth ACM symposium on Operating systems principles. New York, NY, USA : ACM, pp. 164-177, 2003.
  9. D. Ongaro, A. L. Cox, and S. Rixner, "Scheduling I/o in virtual machine monitors," in VEE'08 : Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments. New York, NY, USA : ACM, pp, 1-10, 2008.
  10. Chiyeon Kim, "A Study for Transaction Processing Supporting Scalability in the Cloud", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 7, No. 4, pp. 873-879, 2012.