• Title/Summary/Keyword: Desktop virtualization

Search Result 38, Processing Time 0.045 seconds

Performance Comparison of Virtualization Domain in User Level Virtualization (사용자 레벨 가상화에서 가상화 영역 성능 비교)

  • Jeong, Chan-Joo;Kang, Tae-Geun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.11
    • /
    • pp.1741-1748
    • /
    • 2013
  • In this paper, we proposed new virtualization technology that is more convenient and stable in local computing environment, then found technique elements need to desktop virtualization which is based on clients in various virtualization technologies. After running excution of process explorer utility in user level virtualization and VMWare, we found memory capacity that is used 30.1MB in VMWare and 16.6MB in user level virtualization respectively to compare private bytes each of process. We found no significant difference of CPU utilization which is executed application program in local computing environment and user domain with user level virtualization. In this result, proposed virtualization technology is able to minimize performance degradation of local computing environment.

A Study on Construction Site of Virtual Desktop Infrastructure (VDI) System Model for Cloud Computing BIM Service

  • Lee, K.H.;Kwon, S.W.;Shin, J.H.;Choi, G.S.;Moon, D.Y.
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.665-666
    • /
    • 2015
  • Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. In construction site phase, especially the analysis of current research trend about IT technologies, virtualization and BIM service, data exchange such as drawing, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. The purpose of this study is enable the cloud computing BIM server to provide several main function such as edit a model, 3D model viewer and checker, mark-up, snapshot in high-performance quality by proper design of VDI system. Concurrent client connection performance is a main technical index of VDI. Through test-bed server client, developed VDI system's multi-connect control will be evaluated. The performance-test result of BIM server VDI will effect to development direction of cloud computing BIM service for commercialization.

  • PDF

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

Design of Network-adaptive Transmission Architecture for Guaranteeing the Quality of Virtualization Service (가상화 서비스의 QoS 보장을 위한 네트워크 적응적인 전송 구조 설계)

  • Kim, Sujeong;Ju, Kwangsung;Chung, Kwangsue
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.7
    • /
    • pp.1618-1626
    • /
    • 2013
  • Virtualization service processes all operation including the data creation, storing, and disposal in a server and transmits processed data as the streaming media form. Therefore, client can use the same environment as the traditional desktop environment without considering the type of device. Virtualization service should consider not only the video quality but also the delay bounds and continuity of video playback for improving the user perceived Quality of Service(QoS) of streaming service. In this paper, we propose a network-adaptive transmission architecture that focuses on guaranteeing QoS requirements for virtualization service. In order to provide those, the proposed architecture have the transmission rate adaptation function based on available bandwidth and the content bit-rate control function based on sender buffer state. Through each function, proposed architecture guarantee the delay bounds and continuity of virtualization contents playback. The simulation results show that proposed network-adaptive transmission architecture provides a improve performance of throughput and transmission delay.

Development of Desktop Virtualization Using USB System (USB를 통한 데스크탑 가상화 시스템 개발)

  • Cho, Hui-Kyoung;Kim, Kun-Sub;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1271-1276
    • /
    • 2011
  • Recently, the emergence of various terminal devices increases desire for information exchanges. USB technology is the one of useful devices which is used for connection between them. Especially, it has been introduced some technologies that are able to convergence between UWB wireless technologies and USB transmission technologies. In this paper, we designed and implemented the way to extension virtually desktop computing environment by using USB transfer technology. It leads virtual desktop environment that was able to extend up to 8 units by using USB to VGA/HDMI adapter. And we can control quality of services and signal by USB transfer software.

A Study on Implementation and Operation Management of Virtual Programming Lab based on Cloud Computing (클라우드 컴퓨팅 기반의 가상 프로그래밍 실습 환경 구현 및 운영 관리 방안 연구)

  • Park, Jungho;Choi, Eunyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.578-580
    • /
    • 2013
  • In order to provide the virtual desktop service for computer programing training, User group to use the service should be created for each subject. And the management program to manage development tools, disk images, user account information, log data is required. In this study, we implemented the web-based operation management system to manage the virtual desktop service for computer programming training. We can provide rapid provisioning for the virtual desktop service by using the implemented system.

  • PDF

A study on an investigation procedure of digital forensics for VMware Workstation's virtual machine and a method for a corrupted image recovery (VMware Workstation 가상 머신 이미지에 대한 디지털 포렌식 조사 절차 및 손상된 이미지 복구 방안)

  • Lim, Sung-Su;Yoo, Byeong-Yeong;Park, Jung-Heum;Byun, Keun-Duck;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.61-70
    • /
    • 2011
  • Virtualization is a technology that uses a logical environment to overcome physical limitations in hardware. As a part of cost savings and green IT policies, there is a tendency in which recent businesses increase the adoption of such virtualization. In particular, regarding the virtualization in desktop, it is one of the most widely used technology at the present time. Because it is able to efficiently use various types of operating systems in a physical computer. A virtual machine image that is a key component of virtualization is difficult to investigate. because the structure of virtual machine image is different from hard disk image. Therefore, we need researches about appropriate investigation procedure and method based on technical understanding of a virtual machine. In this research, we suggest a procedure of investigation on a virtual machine image and a method for a corrupted image of the VMware Workstation that has the largest number of users.

Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment

  • Park, Woo-Ram;Park, Chan-Ik
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.331-337
    • /
    • 2011
  • Recently, Virtual Desktop Infrastructure (VDI) has been widely adopted to ensure secure protection of enterprise data and provide users with a centrally managed execution environment. However, user experiences may be restricted due to the limited functionalities of thin clients in VDI. If thick client devices like laptops are used, then data leakage may be possible due to malicious software installed in thick client mobile devices. In this paper, we present Data Firewall, a security framework to manage and protect security-sensitive data in thick client mobile devices. Data Firewall consists of three components: Virtual Machine (VM) image management, client VM integrity attestation, and key management for Protected Storage. There are two types of execution VMs managed by Data Firewall: Normal VM and Secure VM. In Normal VM, a user can execute any applications installed in the laptop in the same manner as before. A user can access security-sensitive data only in the Secure VM, for which the integrity should be checked prior to access being granted. All the security-sensitive data are stored in the space called Protected Storage for which the access keys are managed by Data Firewall. Key management and exchange between client and server are handled via Trusted Platform Module (TPM) in the framework. We have analyzed the security characteristics and built a prototype to show the performance overhead of the proposed framework.

A Design of Online Software Service based on Graphic Offloading Computing using Desktop Window Virtualization (데스크탑 창 가상화를 이용한 그래픽 분할 실행 기반 온라인 SW 서비스의 설계)

  • Choi, Won-Hyuk;Jang, Su-Min;Choi, Ji-Hoon;Kim, Won-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.299-301
    • /
    • 2012
  • 본 논문에서는 3D SW와 같은 고사양의 SW를 서버 기반의 온라인 SW 서비스로 제공하기 위하여 클라이언트의 GPU를 사용하여 그래픽 분할 실행 서비스를 제공하기 위한 데스크탑 창의 가상화에 대하여 소개한다. 그래픽 분할 실행은 서버에서 SW를 구동하고 실행되는 SW의 데이터 집중적인 작업은 서버에서 실행하고, 그래픽 작업들은 서버에서 처리되지 않고, GPU 가상화를 이용하여 클라이언트의 GPU에서 처리하여 SW를 서비스하는 방법이다. 이를 위하여 본 논문에서는 3D 그래픽 정보의 클라이언트 렌더링을 API 리모팅을 이용하여 처리하는 방법에 대하여 소개하고, 실행되는 SW의 2D 그래픽 기반 윈도우를 서버의 윈도우 관리 시스템에 독립적으로 클라이언트 PC에서 가상화하여 처리하는 방법을 제안한다. 또한, 제안된 방법이 서버의 창 관리 시스템에 종속적인 경우와 비교하여 사용자에게 유연한 서비스를 제공함을 알아본다.

Adaptive Server Selection Algorithm for High Availability based on DSV (DSV 기반 서버 고가용성을 위한 적응적 서버 선정 알고리즘)

  • Kim, Hyun-Woo;Byun, HwiRim;song, Eun-Ha;Jeong, Young-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.118-120
    • /
    • 2015
  • 현재, 급격한 IT 기술 발전의 산물인 스마트 디바이스에서 발생되는 데이터의 양이 기하급수적으로 증가함에 따라 효율적으로 저장하기 위한 다양한 연구 및 기술 개발이 진행되고 있다. 이 중에 Desktop Storage Virtualization(DSV)은 비가용 데스크톱 스토리지 자원을 하나의 통합된 스토리지로 만들고 이를 스토리지 사용자 니즈에 따라 스토리지를 제공한다. DSV는 분산된 데스크탑의 비가용 자원을 통합함에 따라 신뢰성이 매우 중요시된다. 그러나 DSV 환경에서 산발적 서버다운 및 기타 장애시 대응체계가 미흡하다. 본 논문에서는 이러한 상황을 고려한 Server Selection Algorithm(SSA)를 제시한다. SSA는 서버 장애 발생시 대체 서버를 분산된 데스크탑이 적응적 인지 및 서버를 변경함으로써 고가용성을 제공한다.