Evaluation of Xen: Performance and Use in Parallel Applications EECE 496 Project Report
|
|
- Cornelius Anthony
- 6 years ago
- Views:
Transcription
1 Evaluation of Xen: Performance and Use in Parallel Applications EECE 496 Project Report Prepared by Caleb Ho ( ) Supervisor: Matei Ripeanu Date: April 12, 2007
2 ABSTRACT Xen is an open-source virtual machine monitor under heavy development. In this project, the performance of Xen and its use in parallel applications are investigated. It is found that Xen performs close to the native performance in the area of computation, but lacking in other areas. Furthermore, to increase fault tolerance of parallel applications, the naïve checkpoint technique is analyzed and determined feasible using Xen s save/restore functionalities. ii
3 TABLE OF CONTENTS ABSTRACT... ii TABLE OF CONTENTS...iii LIST OF ILLUSTRATIONS... iv GLOSSARY... v LIST OF ABBREVIATIONS... vi 1.0 INTRODUCTION METHODOLOGY Performance Evaluation of Xen Checkpoint techniques for parallel applications EXPERIMENTS Performance Evaluation of Xen UnixBench v Intel MPI Benchmark Suite (IMB) v Checkpoint techniques for parallel applications RESULTS Performance Evaluation of Xen UnixBench Results Intel MPI Benchmark (IMB) results Checkpoint techniques for parallel applications save/restore space/disk results Naïve checkpoint results Difficulties and Challenges Future work CONCLUSIONS REFERENCES APPENDICES Appendix A: UnixBenchResultsParse.py Appendix B: genshellscript.py Appendix C: MPIResultsParse.py Appendix D: save.py Appendix E: restore.py iii
4 LIST OF ILLUSTRATIONS Figure 1. Raw Output of the Benchmark Suite... 7 Figure 2. PingPong Operation [9]... 8 Figure 3. UnixBench Results Figure 4. UnixBench Results Test Legend Figure 5. MPI PingPong results Table 1. Naïve checkpoint results iv
5 GLOSSARY Checkpoint save the state of an operation to be restored later in the case of a failure Cluster a collection of nodes that work on a computation problem together by dividing the problem into smaller tasks Guest a virtual machine created in Xen Initrd a temporary file system used by the Linux kernel during boot Kernel a piece of software responsible for providing secure access to the machine's hardware to various computer programs Native machine the machine running the operating system without virtualization Node - a computational processor or machine in parallel computing Open-source a program whose source code is made available for use or modification Para-virtualization a software interface that runs on top of the virtual machine monitor to mimic the underlying hardware Full-virtualization a complete simulation of the underlying hardware by the virtual machine monitor that requires special hardware support Parallel application a program that uses cooperative nodes to perform parallel computing Parallel computing - the simultaneous execution of the same task on multiple processors or machines in order to obtain results faster [1]. PingPong message passing between two nodes, where the nodes take turns to a message to each other Virtual Machine also called hardware virtual machine, is a self-contained operating environment that behaves as if it is a separate computer. In Xen, virtual machines that are created are called guests. Xen an open-source virtual machine monitor v
6 LIST OF ABBREVIATIONS CPU Central processing unit I/O input output IMB Intel MPI Benchmark Suite MPI - Message Passing Interface MPICH2 an MPI implementation version 2 vi
7 1.0 INTRODUCTION Virtual machines are often used in software development, testing, and analysis as they provide benefits such as isolation, standardization, consolidation, ease of testing, and mobility [2]. There are currently several virtual machine monitors available in the market, of which one of the most popular is Xen. Xen is an open-source virtual machine monitor under heavy development that has shown exceptional level of performance [3]. Furthermore, Xen has a built-in save/restore functionality that allows a user to save and restore the state of a virtual machine. In this project, the performance of Xen and its use in parallel applications are investigated. Specifically, one of the main of objectives of this project is to execute a quantitative performance comparison between the native machine and Xen. Because there are currently only a handful of characterizations of Xen as it is still a developing product, its performance results would be an interesting study to the virtual machine community. Another objective of this project is to analyze the feasibility of using the save/restore functionalities in Xen for parallel applications. During parallel computing, the failure of a node is normal due to factors such as hardware failures, power outages, or software problems, which would lead to failure of the entire computation. In order to retain the computational efforts before a particular node fails, common techniques such as duplication, logging, and check-pointing can be used [3]. Using Xen, users might be able to implement check-pointing algorithms on their parallel computing applications to increase their fault tolerance. In this project, several Xen virtual machines on one physical machine are installed and configured. Afterwards, the performance of Xen is evaluated using two benchmark suites: UnixBench [5], and Intel MPI Benchmark Suite [9]. Lastly, different test cases are designed and executed to analyze the feasibility of using the save/restore functionalities of Xen to checkpoint parallel applications. This project was performed alone, and was 1
8 supervised by Matei Ripeanu. This project specifically deals with Xen, and checkpoint techniques using Xen save/restore functionalities. This report divides into the following primary sections: methodology, experiments, results, and conclusions. 2
9 2.0 METHODOLOGY This project naturally can be categorized into two parts. Firstly, a performance evaluation of Xen is to be executed. Secondly, a feasibility analysis of using Xen's save/restore functionalities for check-pointing parallel applications is to be designed and done. In order to design the appropriate tests, the different modes under which Xen can create a virtual machine should be considered. There are two modes para-virtualization, and full virtualization. Para-virtualization requires the operating system to be explicitly ported to run on top of the Xen to provide a software interface that is similar to that of the underlying hardware; while full-virtualization provides a complete simulation of the underlying hardware, but require special hardware support. In order to evaluate both modes, the test hardware chosen have the support required for full virtualization. For this project, we have chosen a Dell E520 that has an Intel processor that supports full virtualization, which is the only real constraint for the selection of machine. Before conducting the experiments, a correct testbed must be configured and set up. The testbed is on a Dell E520 with virtualization technology, running on Fedora Core 6 distribution of Linux. First, a new partition of the harddrive is created using GParted [4] so that Linux can be installed. Xen is then installed: using the fc6-kernel ( fc6) for native tests, xen-kernel ( fc6xen) for para-virtualized tests, and xen-hvm-loader (/xen/boot/hvmloader) for full-virtualized tests. 2.1 Performance Evaluation of Xen The performance evaluation of Xen can be further categorized into the following areas: computation, process creation and execution, file system operations, concurrency, process I/O, and network I/O. In order to cover all these areas of performance, two benchmarks were chosen: UnixBench 4.0.1, and Intel MPI Benchmark Suite (IMB) v3.0. UnixBench, consists of ten different tests that cover all the areas mentioned except I/O; 3
10 whereas IMB consists of over ten that measures I/O performance covers, and it is based on the MPICH2 implementation of the Message Passing Interface (MPI) standard. IMB is chosen because MPI is needed for the network I/O tests, as it will be detailed later. While other benchmarks could have been chosen, these two benchmark suites were chosen because they are free, complete, and simple to run. In order to evaluate network I/O, a virtual cluster, which is a network of virtual machines, is configured and set up using Xen on a single physical machine. Using a single physical machine instead of multiple physical machines allows less equipment to be bought for testing. In addition, Xen provides built-in functions for saving and restoring a virtual machine's state. For coordination between the virtual machine nodes during parallel computing, MPICH2, which is an implementation of the Message Passing Interface (MPI) Standard, is used. This implementation is widely used in the parallel computing community. 2.2 Checkpoint techniques for parallel applications Parallel computing is often used to speed up computation problems that could take days, months, or even years to complete. Some practical applications of parallel computing in the scientific and engineering computing field include computational electromagnetics, industrial environmental flows, and groundwater flow models [2]. During parallel computing, the failure of a node is normal due to factors such as hardware failures, power outages, or software problems, which would lead to failure of the entire computation. In order to retain the computational efforts before a particular node fails, common techniques such as duplication, logging, and check-pointing can be used [3]. Check-pointing is a common technique that allows a user to save the current state of an operation, and then later restore to a pre-failure state if an error ever occurs. Xen has built-in functions, namely save, and restore, allow a user to save the state of a virtual machine to a file; and to restore that virtual machine at the saved state from a file at a 4
11 later time. A difficulty with check-pointing for parallel applications arises because every node needs to have the same state. In other words, for a parallel application with node A and node B, and that the user invokes a checkpoint at time t, there could be an inconsistent state between node A and B. For example, at the point of the checkpoint, a message might be in transit from node A to B, where node A knows about the transfer, but B does not know about the message since it has not received it the two nodes would have different view of the system and hence save different states. There are checkpoint techniques that can be done without Xen s save/restore. For example, synchronization can be done at the application level, where the application would have functionality to signal its internal functions for a checkpoint. Although this method is more reliable, it also makes the job of the developer more difficult. In the rest of this report, all references to check-pointing would be referred to using Xen s save/restore functionalities unless otherwise specified. The original intent was to design and implement various checkpoint techniques using Xen s save/restore functionalities. Because of time constraints, only one checkpoint technique is analyzed, which is to checkpoint naively by scripts without any kind of explicit synchronization between the nodes. Specifically, save would be called for the nodes involved at the same instance, and then restore would be called immediately after save is complete which is equivalent of a simple checkpoint with no guarantees. In order to evaluate the success/failure condition of a checkpoint technique, a modified version of IMB s PingPong test is used. The test would run continuously, check-pointed, and resume running after various idle intervals. If the test continues to run, it is considered to be successful. 5
12 3.0 EXPERIMENTS 3.1 Performance Evaluation of Xen To evaluate Xen, the two benchmark suites, UnixBench 4.0.1, and Intel MPI Benchmark Suite (IMB) v3.0 are used. In the following sections, the tests within these suites are described briefly UnixBench v4.0.1 The UnixBench test is an open-source benchmarking tool [5], and it consists of 27 tests that test the areas of computation, process creation and execution, file-system operations, and concurrency. The metrics given are either bytes per second, or loops per second, where higher number denotes better performance. Some of the computation benchmarks include Dhrystone [6], Arithmetic tests of integer, double, float, and various other types, compiler throughput test, and a Tower of Hanoi recursion test [7]. For processes, tests that measure system call overhead, process creation, execl throughput [8], pipe throughput, and context switching are used. For filesystem operations, various block sizes are tested for both reads and writes. For concurrency, shell scripts that running concurrently are used. Overall, this benchmark suite is a good tool to evaluate the areas mentioned for a system. The benchmark suite is run 10 times each on the native machine (i.e. with no virtualization), on one para-virtualized guest, and on one full-virtualized guest separately. The average and standard deviation for each test is computed, and the performance measurements for the virtualized guests are normalized to the native performance such that a comparison can be done easily. In order to run the test and capture the results, simple shell scripts were used. The 6
13 following figure is the raw output screenshot of the results of running the suite once. Figure 1. Raw Output of the Benchmark Suite In order to format the data and perform computations of averages and standard deviation, A Python script was written to parse the results and generate a summary file. The script has to open all the related test results, take the corresponding results of each test, and compute the average and standard deviation of each test. The script file is included in Appendix A Intel MPI Benchmark Suite (IMB) v3.0 The Intel MPI Benchmark Suite (IMB) is an open-source benchmarking tool that is targeted towards benchmarking the I/O of a system. Specifically, it is based on the MPICH2 implementation of the Message Passing Interface (MPI) standard, which is often used in parallel applications. It consists of thirteen benchmarks, and for this project, on the most basic one, PingPong, was used to compare the I/O performance of Xen. The following diagram is an illustration of PingPong, where X bytes is the variable size of the message to be sent in a ping pong. The time for the message to send and received again is used to measure the performance of the operation. Hence, a shorter time difference 7
14 denotes better the performance. Figure 2. PingPong Operation [9] Similarly to UnixBench, the tests are to be done on the native machine, para-virtualized guest, and full-virtualized guest. Differently from UnixBench benchmarks, the PingPong benchmark requires two processes to operate. Hence, the benchmark is run ten times in each of the following setup: 2 processes on 1 machine (no virtualization) 2 processes on 1 para-vm 2 processes on 2 para-vm 2 processes on 1 full-vm 2 processes on 2 full-vm By performing the above tests, we can evaluate the I/O of Xen. Ideally, a test case for 2 processes on 2 machines would be done, but such case requires two physical machines. Again, scripts were written to deploy the tests and format the results, which can be found in Appendix B and Appendix C. 3.2 Checkpoint techniques for parallel applications First, the space/time tradeoff for Xen s save/restore functionalities is analyzed. By using time <command>, the user time and the CPU usage can be determined. 8
15 In order to evaluate different checkpoint techniques, a modified version of the Intel MPI Benchmark Suite s PingPong test is again used. Specifically, the messages used in the PingPong and configured to be large (150 MB) so that the test would run for more than 5 minutes such that failure conditions can be observed. For simplicity, only two nodes are used in the evaluation. In order to determine the success criterion of a checkpoint technique, failure condition of the PingPong test is first identified. Xen has a pause/unpause functionalities for virtual machines. The transient failure of a node can be simulated by pausing the execution a node for a desirable period of time. In order to test the time required for the PingPong test to detect a failure, one node is paused for indefinite amount of time until an error occurs on the other node. After running five trials, the test detects a failure in the range of 20 to 22 minutes, which can be explained the default time-out period of 20 minutes for a Transfer Control Protocol (TCP). Because of time constraints, only one checkpoint technique is analyzed, which is to checkpoint naively by scripts without any kind of explicit synchronization between the nodes. Specifically, save would be called for the nodes involved at the same instance. This can be done by the following code, xm save nodea & xm save nodeb & which would allow the saving of both virtual machine nodes at the same time in the background. The saving of the nodes is handled the operating system and Xen, which would provide no guarantees on the states. The full script can be found in Appendix D. The nodes can then be restored after a desirable amount of time with the following code, xm restore nodea & xm restore nodeb & which would restore both virtual machine nodes at the same time in the background. Again, the two nodes would not be restored simultaneously. The full script can be found 9
16 in Appendix E. Because of the nature of TCP, packets can be lost and retransmitted. Hence, the application can tolerate some loss naturally, and the failure condition can still be evaluated. The following test cases are performed to evaluate the naive check-pointing, where the two nodes can be identified as node A and node B: save and stop node B, then restore it after 5 minutes save and stop node B, then restore it after 10 minutes save and stop node B, then restore it after 20 minutes save and stop nodes A and B, then restore it after 5 minutes save and stop nodes A and B, then restore it after 10 minutes save and stop nodes A and B, then restore it after 1 hour save and stop nodes A and B, then restore it after 1 day By performing the above tests, the feasibility of a checkpoint technique for a PingPong application can be determined. 10
17 4.0 RESULTS 4.1 Performance Evaluation of Xen UnixBench Results The following graph is the results for the UnixBench benchmark, where the different colors represent the different testbeds native, para-virtualized, and full-virtulized. The x-axis is the benchmark test denoted in Figure 4 on the next page; while the y-axis is the normalized performance values. A higher number denotes better performance. 2 Unix Bench results Normalized values Native ParaVirtualized Fully Virtualized Tests Figure 3. UnixBench Results As seen in the above graph, the performance of para-virtualization is close to native for computation, while the filesystem performance of para-virtualization even exceeds the native performs. A possible explanation is that since para-virtualization is performed in software, Xen would have likely cached the operation request and sent a complete to 11
18 the application before actually completing the task. However, performance relating to processes/pipes (test 5-7) and concurrency (tests 17-19), para-virtualization has only half the performance of native, while full-virtualization performs even worse. Figure 4. UnixBench Results Test Legend Intel MPI Benchmark (IMB) results The following graph is the results for the MPI PingPong benchmark, where the different colors represent the different testbeds 2 processes on 1 machine (native1machine) 2 processes on 1 para-vm (para1vm) 2 processes on 2 para-vm (para2vm) 2 processes on 1 full-vm (Full1VM) 2 processes on 2 full-vm (Full2VM) The x-axis is the different message block sizes; while the y-axis is the throughput values. 12
19 A higher number denotes better performance. Figure 5. MPI PingPong results As seen in the above graph, the performance of para-virtualization is a bit slower than native, while full-virtualization is significantly slower than native performance for all block sizes. 4.2 Checkpoint techniques for parallel applications save/restore space/disk results The save function of Xen on the test machine takes on average less than one second user time and 3% CPU, but requires ~133MB of disk space; while the restore function of Xen takes less than one second of user time. 13
20 4.2.2 Naïve checkpoint results Test case save and stop node B, then restore it after 5 minutes save and stop node B, then restore it after 10 minutes save and stop node B, then restore it after 25 minutes save and stop nodes A and B, then restore it after 5 minutes save and stop nodes A and B, then restore it after 10 minutes save and stop nodes A and B, then restore it after 1 hour save and stop nodes A and B, then restore it after 1 day Table 1. Naïve checkpoint results Results No Failure No Failure Failure No Failure No Failure No Failure No Failure According to the results above, Naïve check-pointing using Xen s save/restore functionalities is feasible for applications similar to the PingPong benchmark. Because total failure occurs after 20 minutes, checkpoints should be made at least once every 20 minutes. 4.3 Difficulties and Challenges There have been numerous challenges and roadblocks in the process of setting up the testbed. Several reasons contributed to the problem: hardware incompatibility, my unfamiliarity with the platform and software, and the immaturity of Xen. The details of the challenges are described in this section. At first, the testbed was to be installed and deployed on a IBM Thinkpad laptop, which was chosen for its portability. However, during the course of setup, it was found that Xen 3.0 required Physical Address Extension (PAE), which is a feature the laptop did not support. This requirement was not obvious in documentation of Xen at the time of purchasing the laptop for this project. Consequently, identifying the problem and looking for workarounds caused delay in the original schedule of the project. After considerable effort to have Xen operational on the laptop, a new desktop computer was purchased 14
21 instead which is the Dell E520 with full virtualization support. The installation of Linux on the test hardware (Dell E520) did not go as smooth as expected. There was trouble partitioning the disk using a method I was previously using (QtParted [11]) because the Linux rescue CD was not mounting for hardware configuration reasons. An alternative method (GParted [4]) was found, but the problem has already caused delay to the schedule. There were also problems during the installation and configuration of Xen. Because paravirtualization requires a software interface to mimic the underlying hardware, a modification to the Xen kernel was required for my hardware. Originally, third-party prebuilt disk images [10] were to be used to reduce development time. However, due to hardware differences, these images did not function. Finally, after many failed attempts and trials of different workarounds suggested by the Xen community, it was found that the recent Xen kernel was missing essential modules for my setup, and a workaround was used by building a new initrd based on the original initrd with the missing modules. Problems were encountered with the virtual Ethernet hardware. Up to date, there is still no active Internet connection from the nodes to the outside world. However, to workaround this problem, a virtual local area network between the nodes has been set up using static IP addresses, which is sufficient for this project's purposes. 4.4 Future work In this project, the Fedora Core 6 distribution of Linux was used. Instead, future experiments can involve using different versions of Windows, as well as other operating systems that support Xen. Furthermore, in this project, only one physical machine was used. Therefore, in the future, effects of using two physical machines for testing network I/O could be investigated. Since only one checkpoint technique was investigated, more techniques should be 15
22 designed and tested in the future. In addition, instead of using a third-party test for checkpoint feasibility, one could develop custom software. Such software can have the benefits of giving the tester more control over the tests, as well as providing more debugging information such as the number of messages lost and retransmitted. 16
23 5.0 CONCLUSIONS In this project, the performance of Xen and its use in parallel applications were investigated. Firstly, Xen was installed in a Fedora Core 6 Distribution of Linux, and the performance differences of native, para-virtualized, and full-virtualized machines were compared using benchmark suites. Secondly, different test cases were designed and executed to analyze the feasibility of using the save/restore functionalities of Xen to checkpoint parallel applications. Specifically, a naïve checkpoint approach was used. As Xen is still a maturing product, difficulties were faced were setting up the testbed due to bugs in Xen and its lack of documentation. For the performance evaluation, it was found that para-virtualization and fullvirtualization performed close to the native performance in the area of computation. However, para-virtualization performed only half as well in the areas of processes/pipes and concurrency compared to native; whereas full-virtualization performed only half as well in the same areas as para-virtualization. In the area of I/O, para-virtualization performed close to native performance, while full-virtualization performed ten times worse. While Xen performs well in the area of computation, the overheads introduced in the Xen virtualization, especially full virtualization, might be significant to user applications. For the checkpoint evaluation, it was found that the naïve checkpoint technique can be used for parallel applications similar to the PingPong test performed. A modification to the feasibility test could be developed, and more checkpoint techniques could be investigated in the future. 17
24 6.0 REFERENCES [1] Parallel Computing, April [2] Chao, Wellie. "The Pros and Cons of Virtual Machines in the Datacenter", January [3] The difference between Xen & VMware. November [4] GParted. April [5] UnixBench. April [6] Dhrystone. April [7] Tower of Hanoi. April [8] execl(). April 2007 [9] Intel Corporation. Intel Cluster Toolkit 3.0 for Linux, April [10] Jailtime.org: Downloadable Images for Xen. April [11] QTParted. April
25 APPENDICES Appendix A: UnixBenchResultsParse.py import sys testlist = [] for filename in sys.argv[1:]: newlist = [] curfile = open(filename) filelist = curfile.readlines() curfile.close start = False for line in filelist: if line.find('dhrystone')!= -1 and line.find('lps')!= -1: start = True if start is True: line = line.replace(" lps", "lps").replace(" KBps", "KBps").replace(" lpm", "lpm") splitline = line.split(" ") i = 0 for eachitem in splitline: if eachitem.find("lps")!= -1 or eachitem.find("kbps")!= -1 or \ eachitem.find("lpm")!= -1: number = splitline[i] newlist.append([ " ".join(splitline[0:i]).rstrip(), number ]) break i = i+1 if line.find('recursion Test')!= -1 and line.find('lps')!= -1: break testlist.append(newlist) #print testlist numtests = len(testlist) for i in range(0, len(testlist[0])): total = 0.0 for j in range(0, len(testlist)): number = float(testlist[j][i][1].replace("lps", "").replace("kbps", "").replace("lpm", "")) total = total + number average = total/numtests for j in range(0, len(testlist)): number = float(testlist[j][i][1].replace("lps", "").replace("kbps", "").replace("lpm", "")) total = total + pow((number - average), 2) stddev = pow(total/numtests, 0.5) errorrange = 0.0 if (average!= 0.0): errorrange = stddev/average print testlist[0][i][0], "\t", "%.2f" % average, "\t", "%.2f" % stddev, "\t", "%.2f" % (errorrange) 19
26 Appendix B: genshellscript.py test = ""; for i in range(10): test = test + "mpirun -n 2./IMB-MPI1 tee test" + str(i) + ".txt;"; print test Appendix C: MPIResultsParse.py import sys fulllist = [] current = 0 benchmark = ["PingPong", "PingPing", "Sendrecv"] for i in range(0, len(benchmark)): testlist = [] for filename in sys.argv[1:]: newlist = [] curfile = open(filename) filelist = curfile.readlines() curfile.close start1 = False start2 = False for line in filelist: if line.find(benchmark[current])!= -1 and line.find('benchmarking')!= -1: start1 = True if start2 is True: splitline = line.replace("\n", "").split(" ") if len(splitline) <= 3: break splitlinemod = [] for item in splitline: if item!= '': splitlinemod.append (item) value = splitlinemod[0] if (len(newlist) <= i): newlist.append(value) else: newlist[i] = value i = i + 1 if start2 is False and start1 is True: if line.find("sec")!= -1: start2 = True i = 0 testlist.append(newlist) fulllist.append([benchmark[current], testlist]) current = current + 1 for i in fulllist: print i[0] for j in i[1]: 20
27 for k in j: print k Appendix D: save.py import sys, os for i in sys.argv[1:]: os.system("xm save " + i + " &") Appendix E: restore.py import sys, os for i in sys.argv[1:]: os.system("xm restore " + i + " &") 21
Lecture 5: February 3
CMPSCI 677 Operating Systems Spring 2014 Lecture 5: February 3 Lecturer: Prashant Shenoy Scribe: Aditya Sundarrajan 5.1 Virtualization Virtualization is a technique that extends or replaces an existing
More informationCOMPUTER ARCHITECTURE. Virtualization and Memory Hierarchy
COMPUTER ARCHITECTURE Virtualization and Memory Hierarchy 2 Contents Virtual memory. Policies and strategies. Page tables. Virtual machines. Requirements of virtual machines and ISA support. Virtual machines:
More informationCSCI 8530 Advanced Operating Systems. Part 19 Virtualization
CSCI 8530 Advanced Operating Systems Part 19 Virtualization Virtualization This is a very old idea It appears in many different forms A variety of commercial products exist The idea has become hot again
More informationHDF Virtualization Review
Scott Wegner Beginning in July 2008, The HDF Group embarked on a new project to transition Windows support to a virtualized environment using VMWare Workstation. We utilized virtual machines in order to
More informationINNOV-4: Fun With Virtualization. Or, How I learned to love computers that don t really exist...
1 INNOV-4: Fun With Virtualization Or, How I learned to love computers that don t really exist... President, BravePoint, Inc. About Unix user since 1982 Progress developer since 1984 Linux Desktop and
More informationIntel Cache Acceleration Software (Intel CAS) for Linux* v2.9 (GA)
Intel Cache Acceleration Software (Intel CAS) for Linux* v2.9 (GA) Release Notes June 2015 Revision 010 Document Number: 328497-010 Notice: This document contains information on products in the design
More informationLinux and Xen. Andrea Sarro. andrea.sarro(at)quadrics.it. Linux Kernel Hacking Free Course IV Edition
Linux and Xen Andrea Sarro andrea.sarro(at)quadrics.it Linux Kernel Hacking Free Course IV Edition Andrea Sarro (andrea.sarro(at)quadrics.it) Linux and Xen 07/05/2008 1 / 37 Introduction Xen and Virtualization
More informationOracle VM Template for MySQL Enterprise Edition =========================================================================== ===
Oracle VM Template for MySQL Enterprise Edition =========================================================================== === Note: * This is first release of MySQL in a Template delivery for installation
More informationPerformance Evaluation of Virtualization Technologies
Performance Evaluation of Virtualization Technologies Saad Arif Dept. of Electrical Engineering and Computer Science University of Central Florida - Orlando, FL September 19, 2013 1 Introduction 1 Introduction
More informationChapter 2: Operating-System Structures
Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs Operating System
More informationFull file at
Import Settings: Base Settings: Brownstone Default Highest Answer Letter: D Multiple Keywords in Same Paragraph: No Chapter: Chapter 2 Multiple Choice 1. A is an example of a systems program. A) command
More informationModule 1: Virtualization. Types of Interfaces
Module 1: Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform
More informationVirtualization. ...or how adding another layer of abstraction is changing the world. CIS 399: Unix Skills University of Pennsylvania.
Virtualization...or how adding another layer of abstraction is changing the world. CIS 399: Unix Skills University of Pennsylvania April 6, 2009 (CIS 399 Unix) Virtualization April 6, 2009 1 / 22 What
More informationVirtualization. Michael Tsai 2018/4/16
Virtualization Michael Tsai 2018/4/16 What is virtualization? Let s first look at a video from VMware http://www.vmware.com/tw/products/vsphere.html Problems? Low utilization Different needs DNS DHCP Web
More informationDeploying Application and OS Virtualization Together: Citrix and Virtuozzo
White Paper Deploying Application and OS Virtualization Together: Citrix and Virtuozzo www.swsoft.com Version 1.0 Table of Contents The Virtualization Continuum: Deploying Virtualization Together... 3
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Deploying Application and OS Virtualization Together: Citrix and Parallels Virtuozzo Containers www.parallels.com Version 1.0 Table of Contents The Virtualization
More informationVirtualization and memory hierarchy
Virtualization and memory hierarchy Computer Architecture J. Daniel García Sánchez (coordinator) David Expósito Singh Francisco Javier García Blas ARCOS Group Computer Science and Engineering Department
More informationXen and the Art of Virtualization
Xen and the Art of Virtualization Paul Barham,, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer,, Ian Pratt, Andrew Warfield University of Cambridge Computer Laboratory Presented
More informationChapter 5 C. Virtual machines
Chapter 5 C Virtual machines Virtual Machines Host computer emulates guest operating system and machine resources Improved isolation of multiple guests Avoids security and reliability problems Aids sharing
More informationReporting Performance Results
Reporting Performance Results The guiding principle of reporting performance measurements should be reproducibility - another experimenter would need to duplicate the results. However: A system s software
More informationProactive Process-Level Live Migration in HPC Environments
Proactive Process-Level Live Migration in HPC Environments Chao Wang, Frank Mueller North Carolina State University Christian Engelmann, Stephen L. Scott Oak Ridge National Laboratory SC 08 Nov. 20 Austin,
More informationAbstract. Testing Parameters. Introduction. Hardware Platform. Native System
Abstract In this paper, we address the latency issue in RT- XEN virtual machines that are available in Xen 4.5. Despite the advantages of applying virtualization to systems, the default credit scheduler
More informationUnit 5: Distributed, Real-Time, and Multimedia Systems
Unit 5: Distributed, Real-Time, and Multimedia Systems Unit Overview Unit 5 provides an extension to the core topics of operating systems. It introduces distributed systems and special-purpose operating
More informationAn introduction to checkpointing. for scientific applications
damien.francois@uclouvain.be UCL/CISM - FNRS/CÉCI An introduction to checkpointing for scientific applications November 2013 CISM/CÉCI training session What is checkpointing? Without checkpointing: $./count
More informationOperating- System Structures
Operating- System Structures 2 CHAPTER Practice Exercises 2.1 What is the purpose of system calls? Answer: System calls allow user-level processes to request services of the operating system. 2.2 What
More informationCOS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Prof. Margaret Martonosi Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall11/cos318/ Announcements Project
More information24-vm.txt Mon Nov 21 22:13: Notes on Virtual Machines , Fall 2011 Carnegie Mellon University Randal E. Bryant.
24-vm.txt Mon Nov 21 22:13:36 2011 1 Notes on Virtual Machines 15-440, Fall 2011 Carnegie Mellon University Randal E. Bryant References: Tannenbaum, 3.2 Barham, et al., "Xen and the art of virtualization,"
More informationLETTER OF TRANSMITTAL
LETTER OF TRANSMITTAL Tony Angerilli April 13, 2006 Dr. Lemieux, Enclosed is a copy of the report on a Reliable Network-Based Storage system. This report presents the overall system design and choices
More informationThe Slide does not contain all the information and cannot be treated as a study material for Operating System. Please refer the text book for exams.
The Slide does not contain all the information and cannot be treated as a study material for Operating System. Please refer the text book for exams. Operating System Services User Operating System Interface
More informationVirtualization, Xen and Denali
Virtualization, Xen and Denali Susmit Shannigrahi November 9, 2011 Susmit Shannigrahi () Virtualization, Xen and Denali November 9, 2011 1 / 70 Introduction Virtualization is the technology to allow two
More information3.1 Introduction. Computers perform operations concurrently
PROCESS CONCEPTS 1 3.1 Introduction Computers perform operations concurrently For example, compiling a program, sending a file to a printer, rendering a Web page, playing music and receiving e-mail Processes
More informationIBM InfoSphere Streams v4.0 Performance Best Practices
Henry May IBM InfoSphere Streams v4.0 Performance Best Practices Abstract Streams v4.0 introduces powerful high availability features. Leveraging these requires careful consideration of performance related
More informationMission-Critical Enterprise Linux. April 17, 2006
Mission-Critical Enterprise Linux April 17, 2006 Agenda Welcome Who we are & what we do Steve Meyers, Director Unisys Linux Systems Group (steven.meyers@unisys.com) Technical Presentations Xen Virtualization
More informationImplementation and. Oracle VM. Administration Guide. Oracle Press ORACLG. Mc Grauv Hill. Edward Whalen
ORACLG Oracle Press Oracle VM Implementation and Administration Guide Edward Whalen Mc Grauv Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore
More informationChapter 2: Operating-System Structures. Operating System Concepts Essentials 8 th Edition
Chapter 2: Operating-System Structures Operating System Concepts Essentials 8 th Edition Silberschatz, Galvin and Gagne 2011 Chapter 2: Operating-System Structures Operating System Services User Operating
More informationBackground. IBM sold expensive mainframes to large organizations. Monitor sits between one or more OSes and HW
Virtual Machines Background IBM sold expensive mainframes to large organizations Some wanted to run different OSes at the same time (because applications were developed on old OSes) Solution: IBM developed
More informationVirtualization. Pradipta De
Virtualization Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
More informationChapter 2: Operating-System
Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Operating System Services! User Operating System Interface! System Calls! Types of System Calls! System Programs! Operating
More informationCLOUD COMPUTING IT0530. G.JEYA BHARATHI Asst.Prof.(O.G) Department of IT SRM University
CLOUD COMPUTING IT0530 G.JEYA BHARATHI Asst.Prof.(O.G) Department of IT SRM University What is virtualization? Virtualization is way to run multiple operating systems and user applications on the same
More informationDynamic Translator-Based Virtualization
Dynamic Translator-Based Virtualization Yuki Kinebuchi 1,HidenariKoshimae 1,ShuichiOikawa 2, and Tatsuo Nakajima 1 1 Department of Computer Science, Waseda University {yukikine, hide, tatsuo}@dcl.info.waseda.ac.jp
More informationCS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 11: File System Implementation Prof. Alan Mislove (amislove@ccs.neu.edu) File-System Structure File structure Logical storage unit Collection
More informationThe Challenges of X86 Hardware Virtualization. GCC- Virtualization: Rajeev Wankar 36
The Challenges of X86 Hardware Virtualization GCC- Virtualization: Rajeev Wankar 36 The Challenges of X86 Hardware Virtualization X86 operating systems are designed to run directly on the bare-metal hardware,
More informationNested Virtualization and Server Consolidation
Nested Virtualization and Server Consolidation Vara Varavithya Department of Electrical Engineering, KMUTNB varavithya@gmail.com 1 Outline Virtualization & Background Nested Virtualization Hybrid-Nested
More informationChapter 2: Operating-System Structures
Chapter 2: Operating-System Structures 2.1 Silberschatz, Galvin and Gagne 2009 Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System
More informationCS 350 Winter 2011 Current Topics: Virtual Machines + Solid State Drives
CS 350 Winter 2011 Current Topics: Virtual Machines + Solid State Drives Virtual Machines Resource Virtualization Separating the abstract view of computing resources from the implementation of these resources
More informationA Case for High Performance Computing with Virtual Machines
A Case for High Performance Computing with Virtual Machines Wei Huang*, Jiuxing Liu +, Bulent Abali +, and Dhabaleswar K. Panda* *The Ohio State University +IBM T. J. Waston Research Center Presentation
More informationAMD: WebBench Virtualization Performance Study
March 2005 www.veritest.com info@veritest.com AMD: WebBench Virtualization Performance Study Test report prepared under contract from Advanced Micro Devices, Inc. Executive summary Advanced Micro Devices,
More informationIntroduction to Ethernet Latency
Introduction to Ethernet Latency An Explanation of Latency and Latency Measurement The primary difference in the various methods of latency measurement is the point in the software stack at which the latency
More informationChapter 14 Performance and Processor Design
Chapter 14 Performance and Processor Design Outline 14.1 Introduction 14.2 Important Trends Affecting Performance Issues 14.3 Why Performance Monitoring and Evaluation are Needed 14.4 Performance Measures
More informationImplementation and Analysis of Large Receive Offload in a Virtualized System
Implementation and Analysis of Large Receive Offload in a Virtualized System Takayuki Hatori and Hitoshi Oi The University of Aizu, Aizu Wakamatsu, JAPAN {s1110173,hitoshi}@u-aizu.ac.jp Abstract System
More informationChapter 2: Operating-System Structures
Chapter 2: Operating-System Structures Silberschatz, Galvin and Gagne 2009 Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System
More informationA Fine-grained Performance-based Decision Model for Virtualization Application Solution
A Fine-grained Performance-based Decision Model for Virtualization Application Solution Jianhai Chen College of Computer Science Zhejiang University Hangzhou City, Zhejiang Province, China 2011/08/29 Outline
More informationAbout the XenClient Enterprise Solution
About the XenClient Enterprise Solution About the XenClient Enterprise Solution About the XenClient Enterprise Solution XenClient Enterprise is a distributed desktop virtualization solution that makes
More informationSpring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand
Introduction to Virtual Machines Nima Honarmand Virtual Machines & Hypervisors Virtual Machine: an abstraction of a complete compute environment through the combined virtualization of the processor, memory,
More informationIntroduction CHAPTER. Review Questions
1 CHAPTER Introduction Review Questions Section 1.1 1.1 What are the four components of a computer system? 1.2 Provide at least three resources the operating system allocates. 1.3 What is the common name
More informationVMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015
VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation
More informationVirtualization of the MS Exchange Server Environment
MS Exchange Server Acceleration Maximizing Users in a Virtualized Environment with Flash-Powered Consolidation Allon Cohen, PhD OCZ Technology Group Introduction Microsoft (MS) Exchange Server is one of
More informationANR call for proposals number ANR-08-VERS-010 FINEP settlement number 1655/08. Horizon - A New Horizon for Internet
Horizon Project ANR call for proposals number ANR-08-VERS-010 FINEP settlement number 1655/08 Horizon - A New Horizon for Internet WP2 - TASK 2.1: Identification and Comparison of Appropriate Virtualisation
More informationCHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed.
CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed. File-System Structure File structure Logical storage unit Collection of related information File
More informationPexip Infinity Server Design Guide
Pexip Infinity Server Design Guide Introduction This document describes the recommended specifications and deployment for servers hosting the Pexip Infinity platform. It starts with a Summary of recommendations
More informationCHAPTER 16 - VIRTUAL MACHINES
CHAPTER 16 - VIRTUAL MACHINES 1 OBJECTIVES Explore history and benefits of virtual machines. Discuss the various virtual machine technologies. Describe the methods used to implement virtualization. Show
More informationOriginally prepared by Lehigh graduate Greg Bosch; last modified April 2016 by B. Davison
Virtualization Originally prepared by Lehigh graduate Greg Bosch; last modified April 2016 by B. Davison I. Introduction to Virtualization II. Virtual liances III. Benefits to Virtualization IV. Example
More informationMaximizing VMware ESX Performance Through Defragmentation of Guest Systems
Maximizing VMware ESX Performance Through Defragmentation of Guest Systems This paper details the results of testing performed to determine if there was any measurable performance benefit to be derived
More informationPerformance Report: Multiprotocol Performance Test of VMware ESX 3.5 on NetApp Storage Systems
NETAPP TECHNICAL REPORT Performance Report: Multiprotocol Performance Test of VMware ESX 3.5 on NetApp Storage Systems A Performance Comparison Study of FC, iscsi, and NFS Protocols Jack McLeod, NetApp
More informationTable of Contents. Virtual Server Software Trade Study Architecture Working Group, Systems Administrators Group , Revised
Table of Contents Objective...3 Scope...3 Definitions...3 Initial Criteria...4 Generic...4 Support Services...4 Features...4 Systems Administration...5 Additional Criteria...5 Product Discovery...5 Initial
More informationPerformance & Scalability Testing in Virtual Environment Hemant Gaidhani, Senior Technical Marketing Manager, VMware
Performance & Scalability Testing in Virtual Environment Hemant Gaidhani, Senior Technical Marketing Manager, VMware 2010 VMware Inc. All rights reserved About the Speaker Hemant Gaidhani Senior Technical
More informationKemari: Virtual Machine Synchronization for Fault Tolerance using DomT
Kemari: Virtual Machine Synchronization for Fault Tolerance using DomT Yoshi Tamura NTT Cyber Space Labs. tamura.yoshiaki@lab.ntt.co.jp 2008/6/24 Outline Our goal Design Architecture overview Implementation
More informatione-pg Pathshala Subject: Computer Science Paper: Cloud Computing Module 23: Virtualization II Module No: CS/CC/23 Quadrant 1 e-text
e-pg Pathshala Subject: Computer Science Paper: Cloud Computing Module 23: Virtualization II Module No: CS/CC/23 Quadrant 1 e-text 1. Introduction Virtualization is a necessary mechanism in a data center
More informationCSC 2405: Computer Systems II
CSC 2405: Computer Systems II Dr. Mirela Damian http://www.csc.villanova.edu/~mdamian/csc2405/ Spring 2016 Course Goals: Look under the hood Help you learn what happens under the hood of computer systems
More informationFuxiSort. Jiamang Wang, Yongjun Wu, Hua Cai, Zhipeng Tang, Zhiqiang Lv, Bin Lu, Yangyu Tao, Chao Li, Jingren Zhou, Hong Tang Alibaba Group Inc
Fuxi Jiamang Wang, Yongjun Wu, Hua Cai, Zhipeng Tang, Zhiqiang Lv, Bin Lu, Yangyu Tao, Chao Li, Jingren Zhou, Hong Tang Alibaba Group Inc {jiamang.wang, yongjun.wyj, hua.caihua, zhipeng.tzp, zhiqiang.lv,
More informationDesigning high-availability solutions using HP Integrity Virtual Machines as HP Serviceguard packages
Designing high-availability solutions using HP Integrity Virtual Machines as HP Serviceguard packages August 2006 Executive summary... 2 HP Integrity VM overview... 2 HP Integrity VM feature summary...
More informationPage 1. Program Performance Metrics. Program Performance Metrics. Amdahl s Law. 1 seq seq 1
Program Performance Metrics The parallel run time (Tpar) is the time from the moment when computation starts to the moment when the last processor finished his execution The speedup (S) is defined as the
More informationVirtual Machine Monitors (VMMs) are a hot topic in
CSE 120 Principles of Operating Systems Winter 2007 Lecture 16: Virtual Machine Monitors Keith Marzullo and Geoffrey M. Voelker Virtual Machine Monitors Virtual Machine Monitors (VMMs) are a hot topic
More informationFractal: A Software Toolchain for Mapping Applications to Diverse, Heterogeneous Architecures
Fractal: A Software Toolchain for Mapping Applications to Diverse, Heterogeneous Architecures University of Virginia Dept. of Computer Science Technical Report #CS-2011-09 Jeremy W. Sheaffer and Kevin
More informationWindows 7 Overview. Windows 7. Objectives. The History of Windows. CS140M Fall Lake 1
Windows 7 Overview Windows 7 Overview By Al Lake History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface Lake 2 Objectives To explore the principles
More informationMechanisms and constructs for System Virtualization
Mechanisms and constructs for System Virtualization Content Outline Design goals for virtualization General Constructs for virtualization Virtualization for: System VMs Process VMs Prevalent trends: Pros
More informationfor Kerrighed? February 1 st 2008 Kerrighed Summit, Paris Erich Focht NEC
Virtualization for Kerrighed? February 1 st 2008 Kerrighed Summit, Paris Erich Focht NEC Why virtualization? Virtualization means many things! Multi-programming any UNIX is virtualizing resources to allow
More informationELEC 377 Operating Systems. Week 1 Class 2
Operating Systems Week 1 Class 2 Labs vs. Assignments The only work to turn in are the labs. In some of the handouts I refer to the labs as assignments. There are no assignments separate from the labs.
More informationChapter 2 Operating-System Structures
This chapter will discuss the following concepts: 2.1 Operating System Services 2.2 User Operating System Interface 2.3 System Calls 2.4 System Programs 2.5 Operating System Design and Implementation 2.6
More informationMaintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS
Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Applied Technology Abstract This white paper describes tests in which Navisphere QoS Manager and VMware s Distributed
More informationA Survey on Virtualization Technologies
A Survey on Virtualization Technologies Virtualization is HOT Microsoft acquires Connectix Corp. EMC acquires VMware Veritas acquires Ejascent IBM, already a pioneer Sun working hard on it HP picking up
More informationTable of contents. OpenVMS scalability with Oracle Rdb. Scalability achieved through performance tuning.
OpenVMS scalability with Oracle Rdb Scalability achieved through performance tuning. Table of contents Abstract..........................................................2 From technical achievement to
More informationMultiprocessor Scheduling. Multiprocessor Scheduling
Multiprocessor Scheduling Will consider only shared memory multiprocessor or multi-core CPU Salient features: One or more caches: cache affinity is important Semaphores/locks typically implemented as spin-locks:
More informationKeywords: disk throughput, virtual machine, I/O scheduling, performance evaluation
Simple and practical disk performance evaluation method in virtual machine environments Teruyuki Baba Atsuhiro Tanaka System Platforms Research Laboratories, NEC Corporation 1753, Shimonumabe, Nakahara-Ku,
More informationNIC TEAMING IEEE 802.3ad
WHITE PAPER NIC TEAMING IEEE 802.3ad NIC Teaming IEEE 802.3ad Summary This tech note describes the NIC (Network Interface Card) teaming capabilities of VMware ESX Server 2 including its benefits, performance
More informationAn XML-Based Automation Framework For Benchmarking Multiple Virtual Machines Travis Finch, St. Edward s University
An XML-Based Automation Framework For Benchmarking Multiple Virtual Machines Travis Finch, St. Edward s University Abstract Server virtualization provides a mechanism to use system resources more efficiently
More informationThe Architecture of Virtual Machines Lecture for the Embedded Systems Course CSD, University of Crete (April 29, 2014)
The Architecture of Virtual Machines Lecture for the Embedded Systems Course CSD, University of Crete (April 29, 2014) ManolisMarazakis (maraz@ics.forth.gr) Institute of Computer Science (ICS) Foundation
More informationApplication-Transparent Checkpoint/Restart for MPI Programs over InfiniBand
Application-Transparent Checkpoint/Restart for MPI Programs over InfiniBand Qi Gao, Weikuan Yu, Wei Huang, Dhabaleswar K. Panda Network-Based Computing Laboratory Department of Computer Science & Engineering
More informationOpenStack hypervisor, container and Baremetal servers performance comparison
OpenStack hypervisor, container and Baremetal servers performance comparison Yoji Yamato a) Software Innovation Center, NTT Corporation, 3 9 11 Midori-cho, Musashino-shi, Tokyo 180 8585, Japan a) yamato.yoji@lab.ntt.co.jp
More informationUsing MySQL in a Virtualized Environment. Scott Seighman Systems Engineer Sun Microsystems
Using MySQL in a Virtualized Environment Scott Seighman Systems Engineer Sun Microsystems 1 Agenda Virtualization Overview > Why Use Virtualization > Options > Considerations MySQL & Virtualization Best
More informationMeasuring VMware Environments
Measuring VMware Environments Massimo Orlando EPV Technologies In the last years many companies adopted VMware as a way to consolidate more Windows images on a single server. As in any other environment,
More informationPower Efficiency of Hypervisor and Container-based Virtualization
Power Efficiency of Hypervisor and Container-based Virtualization University of Amsterdam MSc. System & Network Engineering Research Project II Jeroen van Kessel 02-02-2016 Supervised by: dr. ir. Arie
More informationVirtual Machines Disco and Xen (Lecture 10, cs262a) Ion Stoica & Ali Ghodsi UC Berkeley February 26, 2018
Virtual Machines Disco and Xen (Lecture 10, cs262a) Ion Stoica & Ali Ghodsi UC Berkeley February 26, 2018 Today s Papers Disco: Running Commodity Operating Systems on Scalable Multiprocessors, Edouard
More informationVirtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu Virtualization Definition Framework or methodology of dividing the resources of a computer into multiple execution environments. Types Platform Virtualization: Simulate a
More informationCOL862 Programming Assignment-1
Submitted By: Rajesh Kedia (214CSZ8383) COL862 Programming Assignment-1 Objective: Understand the power and energy behavior of various benchmarks on different types of x86 based systems. We explore a laptop,
More informationMaintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS
Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS Applied Technology Abstract This white paper describes tests in which Navisphere QoS Manager and
More informationVirtual Machines. To do. q VM over time q Implementation methods q Hardware features supporting VM q Next time: Midterm?
Virtual Machines To do q VM over time q Implementation methods q Hardware features supporting VM q Next time: Midterm? *Partially based on notes from C. Waldspurger, VMware, 2010 and Arpaci-Dusseau s Three
More information1 Virtualization Recap
1 Virtualization Recap 2 Recap 1 What is the user part of an ISA? What is the system part of an ISA? What functionality do they provide? 3 Recap 2 Application Programs Libraries Operating System Arrows?
More informationBackground: I/O Concurrency
Background: I/O Concurrency Brad Karp UCL Computer Science CS GZ03 / M030 5 th October 2011 Outline Worse Is Better and Distributed Systems Problem: Naïve single-process server leaves system resources
More informationCS 471 Operating Systems. Yue Cheng. George Mason University Fall 2017
CS 471 Operating Systems Yue Cheng George Mason University Fall 2017 Outline o Process concept o Process creation o Process states and scheduling o Preemption and context switch o Inter-process communication
More information