Browse > Article
http://dx.doi.org/10.13067/JKIECS.2013.8.11.1741

Performance Comparison of Virtualization Domain in User Level Virtualization  

Jeong, Chan-Joo (동강대학 전기에너지과)
Kang, Tae-Geun (한국전자부품연구원 광주지역본부)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.8, no.11, 2013 , pp. 1741-1748 More about this Journal
Abstract
In this paper, we proposed new virtualization technology that is more convenient and stable in local computing environment, then found technique elements need to desktop virtualization which is based on clients in various virtualization technologies. After running excution of process explorer utility in user level virtualization and VMWare, we found memory capacity that is used 30.1MB in VMWare and 16.6MB in user level virtualization respectively to compare private bytes each of process. We found no significant difference of CPU utilization which is executed application program in local computing environment and user domain with user level virtualization. In this result, proposed virtualization technology is able to minimize performance degradation of local computing environment.
Keywords
Virtualization; Local Computing; Kernel Level Virtualization; VMWare;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Daeyoung Hong, Wonseok Ko and Sungsoo Lim, "Virtualization Techniques for Secure and Reliable Computing", The Journal of Korea Institute of Information Scientists and Engineering, Vol. 26, No. 10, pp. 50-57, 2008.
2 Sejung Lim, Gwangjun Kim and Taegeun Kang, "Application Program Virtualization besed on Desktop Virtualization", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 5, No. 6, pp. 595-601, 2010.
3 Heiser Gernot, Elphinstone, Kevin Kuz, Ihor Klein, Gerwin, Petters, and Stefan M. "Towards Trustworthy Computing Systems: Taking Microkernels to the Next Level", Operating Systems Review Vol. 41, No. 3, pp. 3-11, 2007.
4 Jiyeon Kim, Hyungjong Kim, Choonsik Park and Myungjoo Kim, "A Study on the Analysis of Virtualization Techniques Vulnerability in Cloud Computing Environment", The Journal of Korea Institute of Informaion Security and Crypthology, Vol. 19, No. 4, pp. 72-77, 2009.
5 L. Cherkasova, D. Gupta, and A. Vahdat, "Comparison of the three cpu schedulers in xen," SIGMETRICS Perform. Eval. Rev., Vol. 35, No. 2, pp. 42-51, 2007.   DOI   ScienceOn
6 P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the art of virtualization", in SOSP'03: Proceedings of the nineteenth ACM symposium on Operating systems principles. New York, NY, USA : ACM, pp. 164-177, 2003.
7 D. Ongaro, A. L. Cox, and S. Rixner, "Scheduling I/o in virtual machine monitors," in VEE'08 : Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments. New York, NY, USA : ACM, pp, 1-10, 2008.
8 Chiyeon Kim, "A Study for Transaction Processing Supporting Scalability in the Cloud", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 7, No. 4, pp. 873-879, 2012.   과학기술학회마을
9 Inhyuk Kim, Taehyoung Kim, Junghan Kim, Byounghong Lim and YoungIk Eom, "Virtualization Techniques Application Trend for System Secure", The Journal of Korea Institute of Informaion Security and Crypthology, Vol. 19, No. 2, pp. 26-34, 2009.
10 Sejung Lim, Gwangjun Kim and Taegeun Kang, "Important Information Protection using Client Vitualization", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 6, No. 1, pp. 111-117, 2011.