Advertisement

pVEE: A Personalized Virtualized Experimentation Environment for Education Based on Virtual Machines

  • Xiaolin Wang
  • Xingxing Hong
  • Tao Li
  • Bo Gao
  • Zhenlin Wang
  • Yingwei Luo
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8351)

Abstract

With the development of teaching method in higher education, traditional computer labs cannot meet the needs and expectations of modern curriculum. This paper proposes a personalized virtualized experimentation environment (pVEE) which aims to provide VMs for the students as curriculum-oriented specialized experimentation environments. We layer virtualization technology (KVM/Xen) on hosts in the computer lab and implement management tools to construct the pVEE system. pVEE allows a teacher to customize a course related base image which contains dedicated operating systems and applications. A student’s personalized VM boots from the course specific base image combined with a private virtual disk image including his personalized applications and user data. pVEE supports VM accesses and uses for users inside and outside of the lab. We implement interfaces for users to access the pVEE services. pVEE has been deployed in Peking University to support the course projects of a system virtualization courses. Finally, surveys of pVEE users show that pVEE can meet students’ demands for personalized experimentation environments with high resource utilization ratio and manageability.

Keywords

Personalized VM pVEE virtualization educational management 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Gilbert, B., Goode, A., Satyanarayanan, M.: Pocket ISR: Virtual machines anywhere. Tech. Rep. CMU-CS-10-112, School of Computer Science, Carnegie Mellon University (2010)Google Scholar
  2. 2.
    Gephart, N., Kuperman, B.A.: Design of a virtual computer lab environment for hands-on information security exercises. Journal of Computing Sciences in Colleges 26(1), 32–39 (2010)Google Scholar
  3. 3.
    Anderson, B.R.: Xen Worlds: Creating a virtual laboratory environment for use in education (2010)Google Scholar
  4. 4.
    Anderson, B.R., Joines, A.K., Daniels, T.E.: Xen worlds: leveraging virtualization in distance education. ACM SIGCSE Bulletin. ACM 41(3), 293–297 (2009)CrossRefGoogle Scholar
  5. 5.
    Victoria, B.: Creating and Controlling KVM Guests using libvirt, University of Victoria (2009)Google Scholar
  6. 6.
    Habib, I.: Virtualization with kvm. Linux Journal (166), 8 (2008)Google Scholar
  7. 7.
    McLoughlin, M.: The QCOW2 image format (September 11, 2008) (2010-10) (2008), http://people.gnome.org/-markmc/qcow-image-format.html
  8. 8.
    Tang, S., Chen, Y., Zhang, Z.: Own your virtual personal computer. In: IEEE International Parallel and Distributed Processing Symposium, IPDPS 2007, pp. 1–10. IEEE (2007)Google Scholar
  9. 9.
    Hu, J., Cordel, D., Meinel, C.: A Virtual Laboratory for IT Security Education. In: EMISA, vol. 56, pp. 60–71 (2004)Google Scholar
  10. 10.
    Zheng, Q., Chen, H., Wang, Y., et al.: Cosbench: A benchmark tool for cloud object storage services. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 998–999. IEEE (2012)Google Scholar
  11. 11.
    Liguori, A., Van Hensbergen, E.: Experiences with Content Addressable Storage and Virtual Disks. In: Workshop on I/O Virtualization (2008)Google Scholar
  12. 12.
    Kozuch, M., Satyanarayanan, M.: Internet suspend/resume. In: Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications, pp. 40–46. IEEE (2002)Google Scholar
  13. 13.
    Zhi-Cheng, H.: Research on Application of Open Source Cloud Computing OpenStack in Computer Rooms of Universities. Computer and Modernization 3, 53 (2013)Google Scholar
  14. 14.
    Lard, K.M.: Creating Robust IT Security and Efficiency by Reducing Infrastructure Complexity in Higher EducationGoogle Scholar
  15. 15.
    Kivity, A., Kamay, Y., Laor, D., et al.: kvm: the Linux virtual machine monitor. In: Proceedings of the Linux Symposium, vol. 1, pp. 225–230 (2007)Google Scholar
  16. 16.
    Chawla, P.S., Jin, K., Taylor, F., et al.: VDI Storage overcommit and rebalancing: U.S. Patent Application 12/558,443 (September 11, 2009)Google Scholar
  17. 17.
  18. 18.
    Henyard, R.: Desktop virtualization in higher education (2012)Google Scholar
  19. 19.
    Chiueh, S.N.T., Brook, S.: A survey on virtualization technologies. RPE Report, 1–42 (2005)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Xiaolin Wang
    • 1
  • Xingxing Hong
    • 1
  • Tao Li
    • 1
  • Bo Gao
    • 1
  • Zhenlin Wang
    • 1
  • Yingwei Luo
    • 1
  1. 1.Dept. of Computer SciencePeking University & Michigan Tech. UniversityChina

Personalised recommendations