{"title":"PDP-10 virtual machines","authors":"Iachines S. W. Galley","doi":"10.1145/800122.803947","DOIUrl":"https://doi.org/10.1145/800122.803947","url":null,"abstract":"The architecture of the DEC PDP-10 prohibits using standard methods to construct a virtual PDP-10 on it. However, by simulating all executive-mode instructions and in rare cases user-mode instructions, a “hybrid” virtual machine may be constructed. Building on such a simulator and an operating system with hierarchical process relationships, the author has easily constructed a prototype virtual machine.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114794860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Segment Based File Support System","authors":"Richard M. Kogut","doi":"10.1145/800122.803948","DOIUrl":"https://doi.org/10.1145/800122.803948","url":null,"abstract":"This paper describes the Segment Based File Support System (SBFSS) which was designed and implemented by Robert g. Munck and the author, both of Brown University. SBFSS is an extension to IBM's CP-67/CMS virtual machine operating system for the IBM 360/67 computer. Its primary purpose is to allow CP to allocate more efficiently its direct access device (DASD) resources among a large number of users. Other advantages include improved response time, greater flexibility in sharing processors and data bases, and simple billing and back-up procedures.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123993833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation of input-output units","authors":"C. Frasson","doi":"10.1145/800122.803964","DOIUrl":"https://doi.org/10.1145/800122.803964","url":null,"abstract":"The concept of simulation - hardware or software - has been expanded to the creation of logical entities that correspond to real identities, to existing machines, or even to configurations that have no physical counterpart.\u0000 Here we deal with the Input/Output aspect only. In order to simulate an input/output unit, we propose to define a comprehensive language, easy to use, and capable of describing operations of the device on line with any computer.\u0000 Only devices using 360 or 370 architecture may be described, but there are no difficulties to describe any kind of device with a slight extension of the language.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134354062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application and analysis of the virtual machine approach to information system security and isolation","authors":"S. Madnick, J. Donovan","doi":"10.1145/800122.803961","DOIUrl":"https://doi.org/10.1145/800122.803961","url":null,"abstract":"Security is an important factor if the programs of independent and possibly malicious users are to coexist on the same computer system. In this paper we show that a combined virtual machine monitor/operating system (VMM/OS) approach to information system isolation provides substantially better software security than a conventional multiprogramming operating system approach. This added protection is derived from redundant security using independent mechanisms that are inherent in the design of most VMM/OS systems.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123437060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On sharing of pages in CP-67","authors":"P. Wahi","doi":"10.1145/800122.803953","DOIUrl":"https://doi.org/10.1145/800122.803953","url":null,"abstract":"Sharing of procedure code among user-programs is a controversial concept in computer systems operating in a virtual machine and a time-sharing environment. In some systems the sharing can be effected at a segment level while in others it is effected at a page level. A model for sharing of pages in a CP-67/360 environment is developed and the results of experiments are presented.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124827496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coupling virtual machines and system construction","authors":"M. Berthaud, M. Jacolin, P. Potin, H. Savary","doi":"10.1145/800122.803944","DOIUrl":"https://doi.org/10.1145/800122.803944","url":null,"abstract":"The behavior of a system running in one virtual machine (OBJECT) is made accessible to an external observer through another virtual machine (SPY) coupled to the previous one. Given the independence of virtual machines, it is possible to run in SPY a fully operational system to which suitable components are added in order to achieve integration and debugging of new systems in OBJECT.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127074488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analytic model of CP-67 - VM/370","authors":"Y. Bard","doi":"10.1145/800122.803955","DOIUrl":"https://doi.org/10.1145/800122.803955","url":null,"abstract":"The paper describes an analytic model of CP-67 - VM/370 (1, 2). Each user (virtual machine) on the system is in one of four states (see Figure 1): dormant (“Console”), receiving interactive service (“Q1”), waiting for batch service (“Queue”), or receiving batch service (“Q2”) The users receiving batch service form the multi-programmed set, and are described by a cyclic queuing network of the Gordon-Newell type (3,4,5). The effect of interactive users is treated by assuming that a fixed portion of system resources is dedicated to them. In order to solve this queuing problem for a given multi-programming level it is necessary to have information on the ratio of channel to CPU busy times. Some of the channel requirements are due to paging, and hence it is necessary to have a characterization of the paging rate vs. memory requirements of various programs.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132459559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A note on virtual machines and software reliability","authors":"J. Buzen, Peter P. Chen, R. Goldberg","doi":"10.1145/800122.803963","DOIUrl":"https://doi.org/10.1145/800122.803963","url":null,"abstract":"This note summarizes a paper entitled “Virtual Machine Techniques for Improving System Reliability” which will be presented April 30, 1973 at the IEEE Symposium on Computer Software Reliability in New York, New York. The full paper will appear in the Proceedings of the Symposium.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121303927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VHM : a Virtual Hardware Monitor","authors":"V. Casarosa, Carlo Paoil","doi":"10.1145/800122.803954","DOIUrl":"https://doi.org/10.1145/800122.803954","url":null,"abstract":"We describe here the features and the implementation of a system that collects information about the activity of the virtual machines generated by CP-67.\u0000 This system can collect information about CPU usage and I/O activity of the virtual machine without interfering with its operation and without knowing what the system running in the virtual machine is doing. In this sense it behaves like an hardware monitor behaves on a real machine, and hence has been called Virtual Hardware Monitor (VHM).\u0000 VHM provides a general tool that can be used by any virtual machine. The information it provides, eventually used in connection with those provided by other systems that monitor the total activity of CP-67, can lead to a better knowledge of the load of CP-67 and to an improvement in the performance of CP-67 itself and in the performance of the various virtual machines.","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"334 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134022019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Small virtual machines: A survey","authors":"Lloyd Dickman","doi":"10.1145/800122.803958","DOIUrl":"https://doi.org/10.1145/800122.803958","url":null,"abstract":"It has been demonstrated that virtual machines can be successfully implemented on large computer systems. They can also be implemented on small computer systems (“mini-computers”). The paper will show this, and at the same time discuss the various architectural features by which virtual machine implementation is achieved.\u0000 Examining features which make machines “small”, we find architectural limitations. These machines are usually byte or word addressable where the virtual address space bound is the word size. They usually rely on indexing and indirect addressing. Most instructions are one word long. The instruction repetoire is not particularly rich. There is a simple I/O structure with facilities for hardware interrupts and direct memory access (block I/O transfers).\u0000 In summary, small virtual machines are effective for software development of systems having one or more of the following characteristics:\u0000 • shared facilities\u0000 • no common operating system\u0000 • user I/O programming\u0000 •communications control\u0000 •process control\u0000 •fictitious I/O devices","PeriodicalId":386817,"journal":{"name":"Workshop on Virtual Computer Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1973-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133845473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}