Browse > Article
http://dx.doi.org/10.9708/jksci.2022.27.05.011

Improving Availability of Embedded Systems Using Memory Virtualization  

Son, Sunghoon (Dept. of Computer Science, Sangmyung University)
Abstract
In this paper, we propose a fault tolerant embedded system using memory redundancy on the full-virtualization based virtual machine monitor. The proposed virtual machine monitor first virtualizes main memory of embedded system utilizing efficient shadow page table scheme so that the embedded system runs as a virtual machine on the virtual machine monitor. The virtual machine monitor makes the backup of the embedded system run as another virtual machine by copying memory contents of the embedded system into memory space of backup system according to predefined schedules. When an error occurs in the target virtual machine, the corresponding standby virtual machine takes the role of target virtual machine and continues its operation. Performance evaluation studies show that such backups and switches of virtual machines are performed with minor performance degradation.
Keywords
Embedded system; Memory virtualization; Shadow page table; Fault tolerance; Availability;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Sunghoon Son, "Error Recovery Technique for Improving Reliability of Embedded Systems," Journal of The Korea Society of Computer and Information, Vol. 22, No. 6, pp. 1-8, June 2017.   DOI
2 M. Rosenblum and T. Garfinkel, "Virtual Machine Monitors: Current Technology and Future Trends," IEEE Computer, May 2005.
3 A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic Concepts and Taxanomy of Dependable and Secure Computing," IEEE Trans. on Dependable and Secure Computing, Vol. 1, No. 1, pp. 11-33, January 2004.   DOI
4 J. Choi, S. Baek, and S. Y. Shin, "Design and Implementation of a Kernel Resource Protector for Robustness of Linux Module Programming," Proceedings of the 21st Annual ACM Symposium on Applied Computing, pp. 1477-1481, Dijon, France, April 2006.
5 F. M. David and R. H. Campbell, "Building a Self-Healing Operating System," Proceedings of the Third International Symposium on Dependable, Autonomic and Secure Computing, pp. 3-10, Columbia, Maryland, USA, September 2007.
6 J. Shuja, A. Gani, K. Bilal, A. Khan, S. A. Madani, S. U. Khan, and A. Y. Zomaya, "A Survey of Mobile Device Virtualization: Taxonomy and State of the Art," ACM Computing Surveys, Vol. 49, No. 1, pp. 1-36, July 2016.
7 X. Zhou and P. Petrov, "Towards Virtual Memory Support in Real-Time and Memory-Constrained Embedded Applications: The Interval Page Table," IET Computers and Digital Techniques, Vol. 5, No. 4, pp. 287-295, July 2011.   DOI
8 B. Egger, J. Lee and H. Shin, "Dynamic Scratchpad Memory Management for Code in Portable Systems with an MMU," ACM Transactions on Embedded Computing Systems, Vol. 7, No. 2, pp. 1-38, February 2008.   DOI
9 M. M. Swift, M. Annamalai, B. N. Bershad, and H. M. Levy, "Recovering Device Drivers," ACM Trans. on Computer Systems, Vol. 24, No. 4, pp. 333-360, November 2006.   DOI
10 J. Sahoo, S. Mohapatra, and R. Lath, "Virtualization: A Survey on Concepts, Taxonomy and Associated Security Issues," Proceedings of the Second International Conference on Computer and Network Technology, pp. 222-226, Bangkok, Thailand, April 2010.
11 BeagleBoard-xM, http://www.beagleboard.org/beagleboard-xm