2007 IEEE 13th International Symposium on High Performance Computer Architecture 2007
DOI: 10.1109/hpca.2007.346208
|View full text |Cite
|
Sign up to set email alerts
|

Concurrent Direct Network Access for Virtual Machine Monitors

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 89 publications
(7 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…In [11], the authors analyze and compare the CPU schedulers in the Xen virtual machine monitor (VMM) [12] in the context of traditional workload managers. They use the open source Xen virtual machine monitor to perform a comparative evaluation of three different CPU schedulers for virtual machines and analyze the impact of the CPU scheduler and resource allocation on application performance.…”
Section: Related Workmentioning
confidence: 99%
“…In [11], the authors analyze and compare the CPU schedulers in the Xen virtual machine monitor (VMM) [12] in the context of traditional workload managers. They use the open source Xen virtual machine monitor to perform a comparative evaluation of three different CPU schedulers for virtual machines and analyze the impact of the CPU scheduler and resource allocation on application performance.…”
Section: Related Workmentioning
confidence: 99%
“…The hypervisor verifies the address of guest buffers specified in the guest DMA descriptors so that the address does not point to the hypervisor regions. This technique is similar to that used in a software-based IOMMU [26]. To prevent attacks using DMA that do not need to be intercepted, we can use IOMMU hardware.…”
Section: Dmamentioning
confidence: 99%
“…Shafer et al [26] proposed a software-based IOMMU that intercepts and verifies the DMA descriptor to allow direct access to the NIC device from a guest OS. This technique is similar to the shadow DMA descriptor used in BitVisor.…”
Section: Related Workmentioning
confidence: 99%
“…More details of the Xen architecture can be found in [7]. The 'hosted' driver architecture incurs a significant performance overhead for guest domains, which has been studied in [15,21,12]. The biggest overhead is incurred due to the frequent context switches between the driver domain and guest domains for driver invocation and interrupt handling, which results in increased TLB and cache misses [12].…”
Section: Background On Xen I/omentioning
confidence: 99%