Contact The DL Team Contact Us | Switch to tabbed view

top of pageABSTRACT

The virtualization of mobile devices such as smartphones, tablets, netbooks, and MIDs offers significant potential in addressing the mobile manageability, security, cost, compliance, application development and deployment challenges that exist in the enterprise today. Advances in mobile processor performance, memory and storage capacities have led to the availability of many of the virtualization techniques that have previously been applied in the desktop and server domains. Leveraging these opportunities, VMware's Mobile Virtualization Platform (MVP) makes use of system virtualization to deliver an end-to-end solution for facilitating employee-owned mobile phones in the enterprise. In this paper we describe the use case behind MVP, and provide an overview of the hypervisor's design and implementation. We present a novel system architecture for mobile virtualization and describe key aspects of both core and platform virtualization on mobile devices

top of pageAUTHORS



Author image not provided  Ken Barr

No contact information provided yet.

Bibliometrics: publication history
Publication years2010-2012
Publication count3
Citation Count50
Available for download3
Downloads (6 Weeks)11
Downloads (12 Months)117
Downloads (cumulative)3,647
Average downloads per article1,215.67
Average citations per article16.67
View colleagues of Ken Barr


Author image not provided  Prashanth Bungale

No contact information provided yet.

Bibliometrics: publication history
Publication years2003-2010
Publication count7
Citation Count164
Available for download5
Downloads (6 Weeks)11
Downloads (12 Months)151
Downloads (cumulative)5,449
Average downloads per article1,089.80
Average citations per article23.43
View colleagues of Prashanth Bungale


Author image not provided  Stephen Deasy

No contact information provided yet.

Bibliometrics: publication history
Publication years2010-2010
Publication count1
Citation Count32
Available for download1
Downloads (6 Weeks)5
Downloads (12 Months)71
Downloads (cumulative)2,883
Average downloads per article2,883.00
Average citations per article32.00
View colleagues of Stephen Deasy


Author image not provided  Viktor Gyuris

No contact information provided yet.

Bibliometrics: publication history
Publication years1997-2010
Publication count7
Citation Count108
Available for download2
Downloads (6 Weeks)10
Downloads (12 Months)91
Downloads (cumulative)3,553
Average downloads per article1,776.50
Average citations per article15.43
View colleagues of Viktor Gyuris


Author image not provided  Perry Hung

No contact information provided yet.

Bibliometrics: publication history
Publication years2010-2010
Publication count1
Citation Count32
Available for download1
Downloads (6 Weeks)5
Downloads (12 Months)71
Downloads (cumulative)2,883
Average downloads per article2,883.00
Average citations per article32.00
View colleagues of Perry Hung


Author image not provided  Craig Newell

No contact information provided yet.

Bibliometrics: publication history
Publication years2010-2010
Publication count1
Citation Count32
Available for download1
Downloads (6 Weeks)5
Downloads (12 Months)71
Downloads (cumulative)2,883
Average downloads per article2,883.00
Average citations per article32.00
View colleagues of Craig Newell


Author image not provided  Harvey Tuch

No contact information provided yet.

Bibliometrics: publication history
Publication years2010-2012
Publication count2
Citation Count34
Available for download2
Downloads (6 Weeks)9
Downloads (12 Months)89
Downloads (cumulative)3,190
Average downloads per article1,595.00
Average citations per article17.00
View colleagues of Harvey Tuch


Author image not provided  Bruno Zoppis

No contact information provided yet.

Bibliometrics: publication history
Publication years2010-2010
Publication count1
Citation Count32
Available for download1
Downloads (6 Weeks)5
Downloads (12 Months)71
Downloads (cumulative)2,883
Average downloads per article2,883.00
Average citations per article32.00
View colleagues of Bruno Zoppis

top of pageREFERENCES

Note: OCR errors may be found in this Reference List extracted from the full text article. ACM has opted to expose the complete List rather than only correct and linked references.

 
1
3GPP, Orange PCS Ltd, Mercury One-2-One. Common PCN Handset Specification, 2000. Version 4.2.
2
 
3
 
4
Apple Inc. Apple's App Store downloads top three billion. http://www.apple.com/pr/library/2010/01/05appstore.html, Jan. 2010.
 
5
ARM Limited. ARM Architecture Reference Manual: ARMv7-A and ARMv7-R edition, 2007. ARM DDI 0406A.
 
6
Asterisk ¿ the open source telephony projects. http://www.asterisk.org.
7
8
9
 
10
Brash, D. Extensions to the ARMv7-A architecture. In Hot Chips 22 (Stanford University, California, Aug. 2010).
 
11
D'Aguanno, J. Blackjacking ¿ 0wning the enterprise via the Blackberry. In Defcon 14 (Las Vegas, NV, August 2006).
 
12
 
13
Elliot, B., and Blood, S. Magic quadrant for Unified Communications. Gartner RAS Core Research Note, G00201349 (2010).
 
14
15
 
16
Forrester Research, Inc. Collaboration needs will fuel a smartphone surge, Jan. 2010.
 
17
Gartner, Inc. Gartner says Android to become no. 2 worldwide mobile operating system in 2010 and challenge Symbian for no. 1 position by 2014. http://www.gartner.com/it/page.jsp?id=1434613, Sept. 2010.
 
18
Google Inc. Android dev guide: What is android? http://developer.android.com/guide/basics/what-is-android.html.
19
20
 
21
Hwang, J., Suh, S., Heo, S., Park, C., Ryu, J., Park, S., and Kim, C. Xen on ARM: System virtualization using Xen hypervisor for ARM-based secure mobile phones. In Proceedings of the 5th Annual IEEE Consumer Communications and Networking Conference (Las Vegas, NV, Jan. 2008), pp. 257--261.
 
22
Kaneshige, T. 7 steps to stronger enterprise iPhone security. CIO Magazine (Aug. 2010).
 
23
Line 2. http://www.line2.com.
 
24
OProfile. http://oprofile.sourceforge.net.
 
25
PDAdb.net. http://pdadb.net.
26
 
27
 
28
 
29
Steinberg, U. Fiasco μ-kernel user-mode port. TU Dresden, Dec. 2002.
 
30
 
31
Vennon, T., and Stroop, D. Threat analysis of the Android Market. Tech. rep., SMboile Systems, 2010.
 
32
Mobile handset design: Realizing flexible, low cost, higher security, device management using OpenOS and real-time virtualizationTM. Tech. Rep. TR-06-102.1, VirtualLogix Inc., 2006.
 
33
 
34
Wiggins, A., Tuch, H., Uhlig, V., and Heiser, G. Implementation of fast address-space switching and TLB sharing on the StrongARM processor. In Proceedings of the 8th Asia-Pacific Computer Systems Architecture Conference (Aizu-Wakamatsu City, Japan, Sep 2003), Springer Verlag.
 
35
Zoppis, B. Using a hypervisor to reconcile GPL and proprietary embedded code. LinuxDevices. com (Aug. 2007).

top of pageCITED BY

32 Citations

 
 
 
 
 
 
 
 
 
 
 
 
 
 

top of pageINDEX TERMS

Index Terms are not available

top of pagePUBLICATION

Title ACM SIGOPS Operating Systems Review table of contents archive
Volume 44 Issue 4, December 2010
Pages 124-135
Publication Date2010-12-13 (yyyy-mm-dd)
Sponsor SIGOPS ACM Special Interest Group on Operating Systems
PublisherACM New York, NY, USA
ISSN: 0163-5980 doi>10.1145/1899928.1899945

APPEARS IN
Networking
Software

top of pageREVIEWS


Reviews are not available for this item
Computing Reviews logo

top of pageCOMMENTS

Be the first to comment To Post a comment please sign in or create a free Web account

top of pageTable of Contents

ACM SIGOPS Operating Systems Review

Volume 44 Issue 4, December 2010

Table of Contents
Systems research and development at VMware
Stephen Alan Herrod
Pages: 1-2
doi>10.1145/1899928.1899949
Full text: PDFPDF

Over the last twelve years, VMware has grown from a small startup with an interesting idea to an 8000+ person company that is changing the landscape of the datacenter and how IT happens in the enterprise. The VMware story has been one of intense technological ...
expand
COLUMN: Hypervisor technology
The evolution of an x86 virtual machine monitor
Ole Agesen, Alex Garthwaite, Jeffrey Sheldon, Pratap Subrahmanyam
Pages: 3-18
doi>10.1145/1899928.1899930
Full text: PDFPDF

Twelve years have passed since VMware engineers first virtualized the x86 architecture. This technological breakthrough kicked off a transformation of an entire industry, and virtualization is now (once again) a thriving business with a wide range of ...
expand
Online cache modeling for commodity multicore processors
Richard West, Puneet Zaroo, Carl A. Waldspurger, Xiao Zhang
Pages: 19-29
doi>10.1145/1899928.1899931
Full text: PDFPDF

Modern chip-level multiprocessors (CMPs) contain multiple processor cores sharing a common last-level cache, memory interconnects, and other hardware resources. Workloads running on separate cores compete for these resources, often resulting in highlyvariable ...
expand
The design of a practical system for fault-tolerant virtual machines
Daniel J. Scales, Mike Nelson, Ganesh Venkitachalam
Pages: 30-39
doi>10.1145/1899928.1899932
Full text: PDFPDF

We have implemented a commercial enterprise-grade system for providing fault-tolerant virtual machines, based on the approach of replicating the execution of a primary virtual machine (VM) via a backup virtual machine on another server. We have designed ...
expand
Virtualization performance: perspectives and challenges ahead
Richard McDougall, Jennifer Anderson
Pages: 40-56
doi>10.1145/1899928.1899933
Full text: PDFPDF

Performance is a central requirement to the wide-spread adoption of virtualization. To deliver on the promise of simplifying IT via virtualization, the virtualization platform must provide excellent performance with minimal effort. Virtualization performance ...
expand
COLUMN: Storage
Virtual machine file system
Satyam B. Vaghani
Pages: 57-70
doi>10.1145/1899928.1899935
Full text: PDFPDF

The Virtual Machine File System (VMFS) is a scalable and high performance symmetric clustered file system for hosting virtual machines (VMs) on shared block storage. It implements a clustered locking protocol exclusively using storage links, and does ...
expand
Scalable virtual machine storage using local disks
Jacob Gorm Hansen, Eric Jul
Pages: 71-79
doi>10.1145/1899928.1899936
Full text: PDFPDF

In virtualized data centers, storage systems have traditionally been treated as black boxes administered separately from the compute nodes. Direct-attached storage is often left unused, to not have VM availabilty depend on individual hosts. Our work ...
expand
COLUMN: Networking
Virtual networking
Shudong Zhou
Pages: 80-85
doi>10.1145/1899928.1899938
Full text: PDFPDF

Over a decade ago, virtual networking started with a simple bridging of VM's virtual network adapter to host's physical network adapter in VMware's Workstation product. With VMware's vSphere 4 product, virtual networking has evolved to a distributed ...
expand
Virtualizing networking and security in the cloud
Debashis Basak, Rohit Toshniwal, Serge Maskalik, Allwyn Sequeira
Pages: 86-94
doi>10.1145/1899928.1899939
Full text: PDFPDF

Virtualization of computer workloads onto powerful x86 multicore platforms is leading to a massive transformation in the way services are produced by next generation data centers. Simultaneously, cloud computing principles are compelling a rethink in ...
expand
COLUMN: System management
Challenges in building scalable virtualized datacenter management
Vijayaraghavan Soundararajan, Kinshuk Govil
Pages: 95-102
doi>10.1145/1899928.1899941
Full text: PDFPDF

Virtualization drives higher resource utilization and makes provisioning new systems very easy and cheap. This combination has led to an ever-increasing number of virtual machines: the largest data centers will likely have more than 100K in few years, ...
expand
Enabling a marketplace of clouds: VMware's vCloud director
Orran Krieger, Phil McGachey, Arkady Kanevsky
Pages: 103-114
doi>10.1145/1899928.1899942
Full text: PDFPDF

Cloud computing promises to bring about a fundamental shift in the computer industry where consumers of IT enjoy on-demand access to massive compute capacity and producers of IT benefit from economies of scale and automation. We believe that the advantages ...
expand
vApp: a standards-based container for cloud providers
René W. Schmidt, Steffen Grarup
Pages: 115-123
doi>10.1145/1899928.1899943
Full text: PDFPDF

In the past decade, virtualization has swept through the x86 server landscape and caused a dramatic change in how enterprise datacenters are organized both from a physical infrastructure level and an organizational level. This has lead to a datacenter ...
expand
COLUMN: Other Applications of virtualization
The VMware mobile virtualization platform: is that a hypervisor in your pocket?
Ken Barr, Prashanth Bungale, Stephen Deasy, Viktor Gyuris, Perry Hung, Craig Newell, Harvey Tuch, Bruno Zoppis
Pages: 124-135
doi>10.1145/1899928.1899945
Full text: PDFPDF

The virtualization of mobile devices such as smartphones, tablets, netbooks, and MIDs offers significant potential in addressing the mobile manageability, security, cost, compliance, application development and deployment challenges that exist in the ...
expand
Virtualizing high performance computing
Joshua E. Simons, Jeffrey Buell
Pages: 136-145
doi>10.1145/1899928.1899946
Full text: PDFPDF

While virtualization is widely used in commercial enterprise environments, it has not to date played any significant role in High Performance Computing (HPC). However, with the rise of cloud computing and its promise of computing on demand, the HPC community's ...
expand
COLUMN: Individual submissions
Report on the second ACM workshop on hot topics in software upgrades (HotSWUp'09): http://www.hotswup.org/2009/
Tudor Dumitraş, Iulian Neamtiu, Eli Tilevich
Pages: 146-152
doi>10.1145/1899928.1899948
Full text: PDFPDF

The Second ACM SIGPLAN Workshop on Hot Topics in Software Upgrades (HotSWUp'09) was held on 25 October 2009 in Orlando, FL. The workshop was co-located with OOPSLA 2009 and was sponsored by ACM SIGPLAN. Twenty researchers and practitioners, from the ...
expand

Powered by The ACM Guide to Computing Literature


The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us