Unit 2. VMMs and hypervisors 2966-Network and Services Virtualisation First semester Assistant professor: Katja Gilly Departament: Physics
|
|
- June Manning
- 5 years ago
- Views:
Transcription
1 Unit 2. VMMs and hypervisors 2966-Network and Services Virtualisation First semester Assistant professor: Katja Gilly Departament: Physics and Computer Architectures
2 Outline Introduction Xen project KVM Vmware Usages in server platforms Usages in client platforms
3 Outline Introduction Xen project KVM Vmware Usages in server platforms Usages in client platforms
4 Introduction System virtual machines are capable of virtualising a full set of hardware resources, including a processor (or processors), memory and storage resources and peripheral devices. Constructed at ISA level Allow multiple environments, or support time sharing. Examples IBM VM/360 VMware Xen KVM OKL4
5 Introduction Main Theorem A virtual machine monitor can be constructed if the set of sensitive instructions is a subset of the set of privileged instructions Proof shows 1. Equivalence by interpreting privileged instructions and executing remaining instructions natively 2. Resource control by having all instructions that change resources trap to the VMM 3. Efficiency by executing all non-privileged instructions directly on hardware A key aspect of the theorem is that it is easy to check
6 Emulation & virtualisation Emulation seems a good way to implement VMM. We can run a guest above emulator. Emulators can manage all hardware resource and arrange sharing resource to the guest However, there are rarely people using emulator as VMM. WHY? Because emulation is quite SLOW! It s not Efficient! How to let it faster? Don t emulate everything. Just emulate some sensitive instructions which will directly access hardware resource. Execute all non-privileged instructions directly on hardware
7 Full-virtualisation Definition: We run the guest without modified. The guest doesn t realise that it is running above VM rather than physical machine. Pro: User can use any what he/she wants to install as guest For those which is hard to patch (ex: Windows, because it s hard to get its source code), user can only install them in full-virtualisation environment Con: For non-virtualisable CPU, running guest without patched critical instruction need use Dynamic Binary Translation in the hypervisor. It costs a lot. Even for the virtualisable or hardware assistant CPU, running an which doesn t find out it's in VM rather in physical machine, it is still lots of computing resource. Using patched guest can avoid these resource wasting. And using full-virtualisation environment cannot gain the performance optimisation.
8 Para-virtualisation Definition: Run the guest which is patched for virtualisation. The guest realises that it is running above VM rather than physical machine. Pro: For non-virtualisable CPU, running guest with patched critical instruction can reduce lots of work for hypervisor. Let guest run faster. Even for the virtualisable or hardware assistant CPU, running an which doesn t find out it's in VM rather in physical machine, it is still lots of computing resource. Using patched guest can avoid these resource wasting. Con: User cannot use any what he/she wants to install as guest For those which is hard to patch (ex: Windows, because it s hard to get its source code), user cannot install them as guest.
9 Several types of VMM According to the category from Popek and Goldberg in 1974, virtual machine monitor can be separate into two major type which are majorly category from where the hypervisor is. Type 1 a.k.a. Bare-metal VMM Type 2 a.k.a. Hosted VMM
10 Bare-Metal VMM
11 Bare-Metal VMM VMM is responsible for scheduling and managing the allocation of HW resources Example: Xen Hyper-V VMware workstation
12 Hosted VMM
13 Hosted VMM VMM is built on top of an existing Installation process is similar to the installation of an APP Let the host to provide device drivers and other low-level services Can patch privileged instructions to VMM calls (traps), or using DBT techniques Example: VMware player KVM Parallels
14 Comparison with native and hosted VMs Virtual Machine Applications Virtual Machine VMM Virtual Machine VMM VMM Host Host Hardware Hardware Hardware Hardware Traditional uniprocessor system Native VM system User-mode Hosted VM system Dual-mode Hosted VM system Non-privileged modes Privileged Mode
15 Outline Introduction Xen project KVM Vmware Usages in server platforms Usages in client platforms
16 Xen Project bio Xen project was created in 2003 at the University of Cambridge Computer Laboratory in what's known as the Xen Hypervisor project Led by Ian Pratt with team members Keir Fraser, Steven Hand, and Christian Limpach. This team along with Silicon Valley technology entrepreneurs Nick Gault and Simon Crosby founded XenSource which was acquired by Citrix Systems in October 2007 The Xen hypervisor is an open source technology, developed collaboratively by the Xen community and engineers (AMD, Cisco, Dell, HP, IBM, Intel, Mellanox, Network Appliance, Novell, Red Hat, SGI, Sun, Unisys, Veritas, Voltaire, and of course, Citrix) Xen is licensed under the GNU General Public License Xen supports Linux 2.4, 2.6, Windows and NetBSD 2.0 Name from next generation virtualization 17
17 Xen Components A Xen virtual environment consists of several modules that provide the virtualisation environment: Xen Hypervisor - VMM Domain 0 Domain Management and Control Domain User, can be one of: Paravirtualised Guest: the kernel is aware of virtualisation Hardware Virtual Machine Guest: the kernel runs natively 18
18 Xen Components Domain 0 Domain Managemen t and Control Domain U Domain U Paravirtual Guest Domain U Paravirtual Guest Paravirtual Guest Domain U Domain U HVM Guest U Domain HVM Guest HVM Guest Hypervisor - VMM 19
19 Xen Components When Xen boots, one of the first things it does is load a Domain 0 (dom0) guest kernel. Domain 0 is the first guest to run, and has elevated privileges. Domain 0 is very important to a Xen system. Xen does not include any device drivers by itself, nor a user interface. These are all provided by the operating system and userspace tools running in the dom0 guest The most obvious task performed by the dom0 guest is to handle devices. This guest runs at a higher level of privilege than others, and so can access the hardware In contrast, other domains are referred to as domain U (domu ) the U stands for unprivileged. However, it is now possible to delegate some of dom0 s responsibilities to domu guests, which blurs this line slightly. 20
20 Xen Components 21
21 Xen Components There are three components to any driver: The split driver The multiplexer The real driver The split driver is typically as simple as it can be. It is designed to move data from the domu guests to the dom0 guest, usually using ring buffers in shared memory. The real driver should already exist in the dom0 operating system, and so it cannot really be considered part of Xen. The multiplexer may or may not. In the example of networking, the firewalling component of the network stack already provides this functionality. In others, there may be no existing operating system component that can be pressed into use. 22
22 Xen Hypervisor - VMM The hypervisor is Xen itself. It goes between the hardware and the operating systems of the various domains. The hypervisor is responsible for: Checking page tables Allocating resources for new domains Scheduling domains. Booting the machine enough that it can start dom0. It presents the domains with a VirtualMachine that looks similar but not identical to the native architecture. Just as applications can interact with an by giving it syscalls, domains interact with the hypervisor by giving it hypercalls. The hypervisor responds by sending the domain an event, which fulfills the same function as an IRQ on real hardware. A hypercall is to a hypervisor what a syscall is to a kernel. 23
23 Xen Hypervisor - VMM Thin, privileged abstraction layer between the hardware and operating systems Defines the virtual machine that guest domains see instead of physical hardware: Grants portions of physical resources to each guest Exports simplified devices to guests Enforces isolation among guests 24
24 Restricting operations with Privilege Rings The hypervisor executes privileged instructions, so it must be in the right place: x86 architecture provides 4 privilege levels / rings Most s were created before this implementation, so only 2 levels are used Xen provides 2 modes: In x86 the applications are run at ring 3, the kernel at ring 1 and Xen at ring 0 In x86 with VT-x, the applications run at ring 3, the guest at ring non-root-0 and Xen at ring root-0 (-1) 25
25 Restricting operations with Privilege Rings Native Paravirtual x HVM x86 The Guest is moved to ring The Hypervisor is moved to ring -1 Applications Guest kernel (dom0 and dom U) Hypervisor 26
26 Domain 0 Domain 0 is a Xen required Virtual Machine running a modified Linux kernel with special rights to: Access physical I/O devices Two drivers are included in Domain 0 to attend requests from Domain U PV or HVM guests Interact with the other Virtual Machines (Domain U) Provides the command line interface for Xen daemons Due to its importance, the minimum functionality should be provided and properly secured Some Domain 0 responsibilities can be delegated to Domain U (isolated driver domain) 27
27 Domain 0 Domain 0 PV Network backend driver Block backend driver HVM Qemu-DM Communicates directly with the local networking hardware to process all virtual machines requests Communicates with the local storage disk to read and write data from the drive based upon Domain U requests Supports HVM guests for networking and disk access requests 28
28 Domain Management and Control - Daemons The Domain Management and Control is composed of Linux daemons and tools: Xm Command line tool and passes user input to Xend through XML RPC (creates and manages guest VMs) Xend Python application that is considered the system manager for the Xen environment (Daemon to communicate with the hypervisor) Libxenctrl A C library that allows Xend to talk with the Xen hypervisor via Domain 0 (privcmd driver delivers the request to the hypervisor) Xenstored Maintains a registry of information including memory and event channel links between Domain 0 and all other Domains Qemu-dm Supports HVM Guests for networking and disk access requests 29
29 Domain U Paravirtualised guests The Domain U PV Guest is a modified Linux, Solaris, FreeBSD or other UNIX system that is aware of virtualisation (no direct access to hardware) No rights to directly access hardware resources, unless especially granted Access to hardware through front-end drivers using the split device driver model Usually contains XenStore, console, network and block device drivers There can be multiple Domain U in a Xen configuration 30
30 Domain U Paravirtualised guests Domain U - PV Console driver XenStore driver Network front-end driver Block front-end driver Similar to a registry Communicates with the Network backend driver in Domain 0 Communicates with the Block backend driver in Domain 0 31
31 Domain U HVM guests The Domain U HVM Guest is a native with no notion of virtualisation (sharing CPU time and other VMs running) An unmodified doesn t support the Xen split device driver, Xen emulates devices by borrowing code from QEMU HVMs begin in real mode and gets configuration information from an emulated BI For an HVM guest to use Xen features it must use CPUID and then access the hypercall page Domain U - HVM Xen virtual firmware Simulates the BI for the unmodified operating system to read it during startup 32
32 Pseudo-Physical to Memory Model In an operating system with protected memory, each application has it own address space. A hypervisor has to do something similar for guest operating systems. Application Virtual Kernel Pseudo-physical Hypervisor Machine The triple indirection model is not necessarily required but it is more convenient from the performance point of view and modifications needed in the guest kernel. If the guest kernel needs to know anything about the machine pages, it has to use the translation table provided by the shared info page (rare) 33
33 Pseudo-Physical to Memory Model There are variables at various places in the code identified as MFN, PFN, GMFN and GPFN PFN (Page Frame Number) It means some kind of page frame number. The exact meaning depends on the context MFN (Machine frame number) Number of a page in the (real) machine s address space GPFN (Guest page frame number) These are page frames in the guest s address space. These page addresses are relative to the local page tables GMFN (Guest machine frame number) This refers to either a MFN or a GPFN, depending on the architecture 34
34 Virtual Ethernet interfaces Xen creates, by default, seven pair of "connected virtual ethernet interfaces" for use by dom0 For each new domu, it creates a new pair of "connected virtual ethernet interfaces", with one end in domu and the other in dom0 Virtualized network interfaces in domains are given Ethernet MAC addresses (by default xend will select a random address) The default Xen configuration uses bridging (xenbr0) within domain 0 to allow all domains to appear on the network as individual hosts 35
35 The Virtual Machine lifecycle Xen provides 3 mechanisms to boot a VM: Booting from scratch (Turn on) Restoring the VM from a previously saved state (Wake) Clone a running VM (only in XenServer) Stop PAUSED Resume Start Pause (paused) Turn on OFF Turn off Turn off Wake RUNNING Migrate Sleep SUSPENDED 36
36 Outline Introduction Xen project KVM Vmware Usages in server platforms Usages in client platforms
37 KVM Overview It is a VMM built within the Linux kernel The name stands for Kernel Virtual Machines It is included in mainline Linux, as of It offers full-virtualisation Para-virtualisation support is in alpha state It works *only* in platforms with hardware-assisted virtualisation Currently only Intel-VT and AMD-V Recently also s390, PowerPC and IA64 Decision taken to achieve a simple design No need to deal with ring aliasing problem, Nor excessive faulting avoidance Nor guest memory management complexity Etc 38
38 Why KVM? Today s hardware is becoming increasingly complex Multiple HW threads on a core Multiple cores on a socket Multiple sockets on a system NUMA memory models (on-chip memory controllers) Scheduling and memory management is becoming harder accordingly Great effort is required to program all this complexity in hypervisors But an operating system kernel already handles this complexity So why no reuse it? KVM makes use of all the fine-tuning work that has gone (and is going) into the Linux kernel, applying it to a virtualised environment Minimal footprint Less than 10K lines of kernel code Implemented as a Linux s module 39
39 How does it work? A normal Linux process has two modes of execution: kernel and user KVM adds a third mode: guest mode A virtual machine in KVM will be seen as a normal Linux process A portion of code will run in user mode: performs I/O on behalf of the guest A portion of code will run in guest mode: performs non-i/o guest code 40
40 How does it work? guest mode With its own 4 rings 41
41 Key features Simpler design: Kernel+Userspace (vs. Hypervisor + Kernel + Userspace) Avoids many context switches Code reuse (today and tomorrow) Easy management of VMs (standard process tools) Supports Qcow2 and Vmdk disk image formats Growable formats (copy-on-write) Advanced guest memory management Increased VM density with KSM (under development) KSM is a kernel module to save memory by searching and merging identical pages inside one or more memory areas Guest s page swapping allowed 42
42 Future trends Para-virtualisation support (Windows & Linux) virtio devices already included in Linux s mainline as of Storage Many similar guests cause a lot of duplicate storage Current solution: baseline + delta images Delta degrades overtime (needs planning) Disk-in-file is overheady 43
43 Outline Introduction Xen project KVM Vmware Usages in server platforms Usages in client platforms
44 VMware In 1998, VMware created a solution to virtualise the x86 platform, creating the market for x86 virtualisation The solution was a combination of binary translation and direct execution on the processor Nonvirtualisable instructions are replaced with new sequences of instructions User level code is directly executed on the processor Each VMM provides each VM with all the services of the physical system, including a virtual BI, virtual devices and virtualised memory management 46
45 VMware 47
46 VMware Basic properties: Separate and hardware break hardware dependencies and Application as single unit by encapsulation Strong fault and security isolation Standard, HW independent environments can be provisioned anywhere Flexibility to choose the right for the right application 48
47 Vmware major products VMware Server A free-of-charge virtualisation-software server suite Run multiple servers on your server Hosted architecture Available for Linux hosts and Windows hosts VMware ESX Server An enterprise-level computer virtualisation product Quality of service High-performance I/O Host-less architecture ( bare-metal ) 49
48 VMware ESX architecture
49 VMware ESX architecture Datacenter-class virtualisation platform used by many enterprise customers for server consolidation Runs directly on a physical server having direct access to the physical hardware of the server Parts: Virtualisation layer (VMM/VMKernel): implements the idealised hardware environment and virtualises the physical hardware devices Resource Manager: partitions and controls the physical resources of the underlying machine Hardware interface components: enable hardware-specific service delivery Service Console: boots the system, initiates execution of the virtualisation layer and resource manager, and relinquishes control to those layers Add Virtual Centre / Lab manager 51
50 VMware ESX architecture 52
51 VMware default deployment Primary method of interaction with virtual infrastructure (console and GUI) Authorises VirtualCenter Servers and ESX Server hosts appropriately for the licensing agreement Virtualisation layer that abstracts the processor, memory, storage, and networking resources of the physical host into multiple virtual machines VI Client from the VirtualCenter Server or ESX Server hosts Organises all the configuration data for the virtual infrastructure environment Centrally manages the VMware ESX Server hosts 53
52 VMware for free VMware provides freeware Server and Workstation virtualisation solutions VMware Server: Is a free desktop application that lets you run virtual machines on your Windows or Linux PC Lets you use host machine devices, such as CD and DVD drives, from the virtual machine Datasheet or FAQ page is available Different Virtual Appliances are provided for free VMware Player: Similar to VMware Server but limited to run pre-built virtual appliances 54
53 Outline Introduction Xen project KVM Vmware Usages in server platforms Usages in client platforms
54 Virtualisation in servers 56
55 Workload Consolidation description Too many servers: Hot and underutilised Server virtualisation consolidates many systems onto one physical platform Higher physical resource utilization Improved utilization: Several users with different requirements can more easily share a virtualised server It allows to run legacy and new operating systems concurrently VM1 App VM1 VMn App App HW0 HWn VMn App Focus in Equivalence prop VMM HW Hardware is more stressed: - More intense IO 57 - More intense mem usage
56 Workload Consolidation pros/cons Pros: Each application can run in a separate environment delivering true isolation Cost Savings: Power, space, cooling, hardware, software and management Ability to run legacy applications in legacy s Ability to run through emulation legacy applications in legacy HW Cons: Disk and memory footprint increase due to multiples s Performance penalty caused by resource sharing management Workload consolidation provides the basis most usages/benefits of virtualisation 58
57 Workload Isolation Virtualisation can improve overall system security and reliability by isolating multiple software stacks in their own VMs Security: intrusions can be confined to the VM in which they occur Reliability: software failures in one VM do not affect the other VMs As a side effect, if the hypervisor or drivers are compromised, the whole VMs can be compromised (equivalent to BI VM1 VMn attack) App App HWn App App VMM HW 59 Focus in Efficiency prop (P&G)
58 Workload migration for dynamic load balancing If a given application needs more resources, it could be easily moved to other physical host with more power Several application replicas can be started in different physical machines and split the workload among them While the applications should be engineered for this behaviour, the deployment is simplified VM1 App VM1 VMn App App VMn App VMM VMM HW0 HWn What happens with the established connections, mem pages, disk? 60
59 Workload migration for disaster recovery High Availability: if an application goes down, it is not necessary to wait for the reboot of the operating system/application Virtualisation allows to immediately put another replica up State-less applications can be immediately restored from snapshots Disk images should exist in external network storage (SAN, NAS) VM1 VMn VM1 VMn App App App App VMM VMM VMM HW0 HW0 HW How often should the VMM store the VM s status? 61
60 Deployment of standard environments Service providers usually offer some standard services Standard images can be provided instantaneously Simplifies deployment procedures: everything is stored in a file that represents the VM Easier backward compatibility (Gold Image 1, 2, 3, etc) Gold Image VM1 VM2 VM3 VMn App App App App App VMM VMM VMM HW0 HW0 HW1 62
61 Test and deployment Development and testing environments A VM with standard tools is distributed amongst developers Releasing new revisions of tools, patches, etc. is very simple Business Agility and Productivity It allows to easily transform environments (Development to test, back to development, etc) Deployment of Patches in controlled environments Allows for testing in production hardware before formal activation App App VMM HW 63
62 Virtual appliances The convergence of virtual machine technology and a new initiative by several tool vendors is giving birth to this new form of software packaging called Virtual Appliance Software appliance that includes necessary components to run in a virtual computing environment (VMware, Xen, Virtual Iron, ) Both, software and virtual appliances, are aimed to eliminate the installation, configuration and maintenance costs associated with running complex stacks of software App. Middleware Virtual Platform Virtual Appliance A software appliance is a software application combined with a tailored operating system Software Appliance Fully pre-installed and pre-configured application and operating system environment Virtual Machine 64
63 Outline Introduction Xen project KVM Vmware Usages in server platforms Usages in client platforms
64 Windows games emulation in Mac Games are very dependant of the platform for which they were programmed Creating games for each platform is too costly Minimal emulation is needed for minimal performance degradation Game App HW VMM HW 66
65 Test and Development also for clients Development and testing environments A VM with standard tools is distributed amongst developers Releasing new revisions of tools, patches, etc. is very simple Business Agility and Productivity It allows to easily transform environments (Development to test, back to development, etc) Deployment of Patches in controlled environments Simplifies testing of P2P applications App App VMM HW 67
66 Desktop infrastructure management Migration to new hardware due to compatibility is too costly Windows Vista slow adoption is an example Gradual upgrade can be implemented Desktops are underutilised (as opposed to previous) Consolidate in the server, run remotely in the client VM1 VM2 VM2 App App App HW VMM VM1 HW (new) Connectivity becomes the critical path App HW 68
67 My corporate PC within my PC Users sharing their own PC with the corporate A VM for own work A VM for corporate usages Can be extended to more profiles (secure, entertainment, etc) Temporary remote employees are given a VM with expiration date VM1 App VM2 App Personal Corp VMM HW (personal) Personal Corp VMM HW (corporation) Connectivity becomes the critical path VMM HW (personal) 69
68 Bibliography Books : The definite guide to Xen Hypervisor. David Chisnall. Prentice Hall Other resources : Lecture slides of Virtual Machine course (5200) in NCTU KVM web page: VMware web page:
Virtualization. Application Application Application. MCSN - N. Tonellotto - Distributed Enabling Platforms OPERATING SYSTEM OPERATING SYSTEM
Virtualization lication lication lication lication lication lication OPERATING SYSTEM OPERATING SYSTEM VIRTUALIZATION 1 Basic Idea Observation Hardware resources are typically under-utilized Hardware resources
More informationThe only open-source type-1 hypervisor
Monika Danikáková What is Xen? The only open-source type-1 hypervisor For Unix and Unix-like OS Linux, NetBSD and OpenSolaris From ancient greek term Xenos (ξένος), guest-friends Developed by the University
More informationCHAPTER 16 - VIRTUAL MACHINES
CHAPTER 16 - VIRTUAL MACHINES 1 OBJECTIVES Explore history and benefits of virtual machines. Discuss the various virtual machine technologies. Describe the methods used to implement virtualization. Show
More informationVirtualization. ...or how adding another layer of abstraction is changing the world. CIS 399: Unix Skills University of Pennsylvania.
Virtualization...or how adding another layer of abstraction is changing the world. CIS 399: Unix Skills University of Pennsylvania April 6, 2009 (CIS 399 Unix) Virtualization April 6, 2009 1 / 22 What
More informationSpring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand
Introduction to Virtual Machines Nima Honarmand Virtual Machines & Hypervisors Virtual Machine: an abstraction of a complete compute environment through the combined virtualization of the processor, memory,
More informationChapter 5 C. Virtual machines
Chapter 5 C Virtual machines Virtual Machines Host computer emulates guest operating system and machine resources Improved isolation of multiple guests Avoids security and reliability problems Aids sharing
More informationCOMPUTER ARCHITECTURE. Virtualization and Memory Hierarchy
COMPUTER ARCHITECTURE Virtualization and Memory Hierarchy 2 Contents Virtual memory. Policies and strategies. Page tables. Virtual machines. Requirements of virtual machines and ISA support. Virtual machines:
More informationIntroduction to Cloud Computing and Virtualization. Mayank Mishra Sujesha Sudevalayam PhD Students CSE, IIT Bombay
Introduction to Cloud Computing and Virtualization By Mayank Mishra Sujesha Sudevalayam PhD Students CSE, IIT Bombay Talk Layout Cloud Computing Need Features Feasibility Virtualization of Machines What
More informationVirtualization and memory hierarchy
Virtualization and memory hierarchy Computer Architecture J. Daniel García Sánchez (coordinator) David Expósito Singh Francisco Javier García Blas ARCOS Group Computer Science and Engineering Department
More informationVirtualization. Michael Tsai 2018/4/16
Virtualization Michael Tsai 2018/4/16 What is virtualization? Let s first look at a video from VMware http://www.vmware.com/tw/products/vsphere.html Problems? Low utilization Different needs DNS DHCP Web
More informationVirtualization. Starting Point: A Physical Machine. What is a Virtual Machine? Virtualization Properties. Types of Virtualization
Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.
More informationVirtualization. ! Physical Hardware Processors, memory, chipset, I/O devices, etc. Resources often grossly underutilized
Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.
More informationCS370 Operating Systems
CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2017 Lecture 27 Virtualization Slides based on Various sources 1 1 Virtualization Why we need virtualization? The concepts and
More informationLecture 5: February 3
CMPSCI 677 Operating Systems Spring 2014 Lecture 5: February 3 Lecturer: Prashant Shenoy Scribe: Aditya Sundarrajan 5.1 Virtualization Virtualization is a technique that extends or replaces an existing
More informationModule 1: Virtualization. Types of Interfaces
Module 1: Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform
More informationVirtualization. Pradipta De
Virtualization Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
More informationDistributed Systems COMP 212. Lecture 18 Othon Michail
Distributed Systems COMP 212 Lecture 18 Othon Michail Virtualisation & Cloud Computing 2/27 Protection rings It s all about protection rings in modern processors Hardware mechanism to protect data and
More informationThe Challenges of X86 Hardware Virtualization. GCC- Virtualization: Rajeev Wankar 36
The Challenges of X86 Hardware Virtualization GCC- Virtualization: Rajeev Wankar 36 The Challenges of X86 Hardware Virtualization X86 operating systems are designed to run directly on the bare-metal hardware,
More informationCloud Computing Virtualization
Cloud Computing Virtualization Anil Madhavapeddy anil@recoil.org Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. x86 support for virtualization. Full and
More informationNested Virtualization and Server Consolidation
Nested Virtualization and Server Consolidation Vara Varavithya Department of Electrical Engineering, KMUTNB varavithya@gmail.com 1 Outline Virtualization & Background Nested Virtualization Hybrid-Nested
More informationVirtual Machines Disco and Xen (Lecture 10, cs262a) Ion Stoica & Ali Ghodsi UC Berkeley February 26, 2018
Virtual Machines Disco and Xen (Lecture 10, cs262a) Ion Stoica & Ali Ghodsi UC Berkeley February 26, 2018 Today s Papers Disco: Running Commodity Operating Systems on Scalable Multiprocessors, Edouard
More informationOriginally prepared by Lehigh graduate Greg Bosch; last modified April 2016 by B. Davison
Virtualization Originally prepared by Lehigh graduate Greg Bosch; last modified April 2016 by B. Davison I. Introduction to Virtualization II. Virtual liances III. Benefits to Virtualization IV. Example
More informationVirtual Machines. Jinkyu Jeong Computer Systems Laboratory Sungkyunkwan University
Virtual Machines Jinkyu Jeong (jinkyu@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Today's Topics History and benefits of virtual machines Virtual machine technologies
More informationCSE 120 Principles of Operating Systems
CSE 120 Principles of Operating Systems Spring 2018 Lecture 16: Virtual Machine Monitors Geoffrey M. Voelker Virtual Machine Monitors 2 Virtual Machine Monitors Virtual Machine Monitors (VMMs) are a hot
More informationVirtual Leverage: Server Consolidation in Open Source Environments. Margaret Lewis Commercial Software Strategist AMD
Virtual Leverage: Server Consolidation in Open Source Environments Margaret Lewis Commercial Software Strategist AMD What Is Virtualization? Abstraction of Hardware Components Virtual Memory Virtual Volume
More informationXen is not just paravirtualization
Xen is not just paravirtualization Dongli Zhang Oracle Asia Research and Development Centers (Beijing) dongli.zhang@oracle.com December 16, 2016 Dongli Zhang (Oracle) Xen is not just paravirtualization
More informationVirtual Machines. To do. q VM over time q Implementation methods q Hardware features supporting VM q Next time: Midterm?
Virtual Machines To do q VM over time q Implementation methods q Hardware features supporting VM q Next time: Midterm? *Partially based on notes from C. Waldspurger, VMware, 2010 and Arpaci-Dusseau s Three
More informationOperating Systems 4/27/2015
Virtualization inside the OS Operating Systems 24. Virtualization Memory virtualization Process feels like it has its own address space Created by MMU, configured by OS Storage virtualization Logical view
More informationVirtual machine architecture and KVM analysis D 陳彥霖 B 郭宗倫
Virtual machine architecture and KVM analysis D97942011 陳彥霖 B96902030 郭宗倫 Virtual machine monitor serves as an interface between hardware and software; no matter what kind of hardware under, software can
More informationVirtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu Virtualization Definition Framework or methodology of dividing the resources of a computer into multiple execution environments. Types Platform Virtualization: Simulate a
More informationLinux and Xen. Andrea Sarro. andrea.sarro(at)quadrics.it. Linux Kernel Hacking Free Course IV Edition
Linux and Xen Andrea Sarro andrea.sarro(at)quadrics.it Linux Kernel Hacking Free Course IV Edition Andrea Sarro (andrea.sarro(at)quadrics.it) Linux and Xen 07/05/2008 1 / 37 Introduction Xen and Virtualization
More informationVMware Overview VMware Infrastructure 3: Install and Configure Rev C Copyright 2007 VMware, Inc. All rights reserved.
VMware Overview Kontakt: jens.soeldner@netlogix.de 1-1 You Are Here Virtual Infrastructure VMware Overview ESX Server Installation ESX Server Installation Networking Networking Storage Storage ESX Server
More informationVirtual Machine Monitors!
ISA 673 Operating Systems Security Virtual Machine Monitors! Angelos Stavrou, George Mason University! Virtual Machine Monitors 2! Virtual Machine Monitors (VMMs) are everywhere! Industry commitment! Software:
More informationVirtualization Introduction
Virtualization Introduction Simon COTER Principal Product Manager Oracle VM & VirtualBox simon.coter@oracle.com https://blogs.oracle.com/scoter November 21 st, 2016 Safe Harbor Statement The following
More informationXen and the Art of Virtualiza2on
Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian PraF, Andrew Warfield University of Cambridge Computer Laboratory Kyle SchuF CS 5204 Virtualiza2on Abstrac2on
More informationThe Architecture of Virtual Machines Lecture for the Embedded Systems Course CSD, University of Crete (April 29, 2014)
The Architecture of Virtual Machines Lecture for the Embedded Systems Course CSD, University of Crete (April 29, 2014) ManolisMarazakis (maraz@ics.forth.gr) Institute of Computer Science (ICS) Foundation
More informationCHAPTER 16 - VIRTUAL MACHINES
CHAPTER 16 - VIRTUAL MACHINES 1 OBJECTIVES Explore history and bene ts of virtual machines. Discuss the various virtual machine technologies. Describe the methods used to implement virtualization. Show
More informationCS 350 Winter 2011 Current Topics: Virtual Machines + Solid State Drives
CS 350 Winter 2011 Current Topics: Virtual Machines + Solid State Drives Virtual Machines Resource Virtualization Separating the abstract view of computing resources from the implementation of these resources
More informationXen Summit Spring 2007
Xen Summit Spring 2007 Platform Virtualization with XenEnterprise Rich Persaud 4/20/07 Copyright 2005-2006, XenSource, Inc. All rights reserved. 1 Xen, XenSource and XenEnterprise
More informationHow it can help your organisation
How it can help your organisation History Types of Virtualisation & Hypervisors Virtualisation Features Why Virtualisation? Virtualising Oracle Performance Licensing Support Cloud 1998 VMware founded by
More informationA Survey on Virtualization Technologies
A Survey on Virtualization Technologies Virtualization is HOT Microsoft acquires Connectix Corp. EMC acquires VMware Veritas acquires Ejascent IBM, already a pioneer Sun working hard on it HP picking up
More informationLINUX Virtualization. Running other code under LINUX
LINUX Virtualization Running other code under LINUX Environment Virtualization Citrix/MetaFrame Virtual desktop under Windows NT. aka Windows Remote Desktop Protocol VNC, Dameware virtual console. XWindows
More informationCprE Virtualization. Dr. Yong Guan. Department of Electrical and Computer Engineering & Information Assurance Center Iowa State University
Virtualization Dr. Yong Guan Department of Electrical and Computer Engineering & Information Assurance Center Iowa State University Outline for Today s Talk Introduction Virtualization Technology Applications
More informationVirtualization technology
Virtualization technology Zhonghong Ou Post-doc researcher Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University Zhonghong Ou 16/10/2012 Aalto University
More informationSUSE Linux Enterprise Server: Supported Virtualization Technologies
Technical White Paper Enterprise Linux SUSE Linux Enterprise Server: Supported Virtualization Technologies Table of Contents page Comprehensive Virtualization Support Overview... 2 Upgrade Guidelines...4
More informationCSC 5930/9010 Cloud S & P: Virtualization
CSC 5930/9010 Cloud S & P: Virtualization Professor Henry Carter Fall 2016 Recap Network traffic can be encrypted at different layers depending on application needs TLS: transport layer IPsec: network
More informationVirtualization. Operating Systems, 2016, Meni Adler, Danny Hendler & Amnon Meisels
Virtualization Operating Systems, 2016, Meni Adler, Danny Hendler & Amnon Meisels 1 What is virtualization? Creating a virtual version of something o Hardware, operating system, application, network, memory,
More informationServer Virtualization Approaches
Server Virtualization Approaches Virtual Machine Applications Emulation Replication Composition Emulation: Mix-and-match cross-platform portability Replication: Multiple VMs on single platform Composition:
More informationOverview of System Virtualization: The most powerful platform for program analysis and system security. Zhiqiang Lin
CS 6V81-05: System Security and Malicious Code Analysis Overview of System Virtualization: The most powerful platform for program analysis and system security Zhiqiang Lin Department of Computer Science
More informationHypervisor security. Evgeny Yakovlev, DEFCON NN, 2017
Hypervisor security Evgeny Yakovlev, DEFCON NN, 2017 whoami Low-level development in C and C++ on x86 UEFI, virtualization, security Jetico, Kaspersky Lab QEMU/KVM developer at Virtuozzo 2 Agenda Why hypervisor
More informationreferences Virtualization services Topics Virtualization
references Virtualization services Virtual machines Intel Virtualization technology IEEE xplorer, May 2005 Comparison of software and hardware techniques for x86 virtualization ASPLOS 2006 Memory resource
More informationWhat is KVM? KVM patch. Modern hypervisors must do many things that are already done by OSs Scheduler, Memory management, I/O stacks
LINUX-KVM The need for KVM x86 originally virtualization unfriendly No hardware provisions Instructions behave differently depending on privilege context(popf) Performance suffered on trap-and-emulate
More informationCS370 Operating Systems
CS370 Operating Systems Colorado State University Yashwant K Malaiya Spring 2018 Lecture 26 Virtualization Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 Virtualization Why we
More informationVirtual Machine Security
Virtual Machine Security CSE443 - Spring 2012 Introduction to Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ 1 Operating System Quandary Q: What is the primary goal
More informationVirtual Machines. Part 2: starting 19 years ago. Operating Systems In Depth IX 1 Copyright 2018 Thomas W. Doeppner. All rights reserved.
Virtual Machines Part 2: starting 19 years ago Operating Systems In Depth IX 1 Copyright 2018 Thomas W. Doeppner. All rights reserved. Operating Systems In Depth IX 2 Copyright 2018 Thomas W. Doeppner.
More informationVirtualization Overview
VMware W Hwhite I T E Ppaper A P E R Virtualization Overview Table of Contents Introduction... 3 Virtualization in a Nutshell... 3 Virtualization Approaches... 4 Virtualization for Server Consolidation
More informationIntel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey May 13, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey torreyj@ainfosec.com
More informationI/O and virtualization
I/O and virtualization CSE-C3200 Operating systems Autumn 2015 (I), Lecture 8 Vesa Hirvisalo Today I/O management Control of I/O Data transfers, DMA (Direct Memory Access) Buffering Single buffering Double
More informationCloud and Datacenter Networking
Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica
More informationMultiprocessor Scheduling. Multiprocessor Scheduling
Multiprocessor Scheduling Will consider only shared memory multiprocessor or multi-core CPU Salient features: One or more caches: cache affinity is important Semaphores/locks typically implemented as spin-locks:
More informationVirtual Machine Monitors (VMMs) are a hot topic in
CSE 120 Principles of Operating Systems Winter 2007 Lecture 16: Virtual Machine Monitors Keith Marzullo and Geoffrey M. Voelker Virtual Machine Monitors Virtual Machine Monitors (VMMs) are a hot topic
More informationCOS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Prof. Margaret Martonosi Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall11/cos318/ Announcements Project
More informationVirtualization (II) SPD Course 17/03/2010 Massimo Coppola
Virtualization (II) SPD Course 17/03/2010 Massimo Coppola The players The Hypervisor (HV) implements the virtual machine emulation to run a Guest OS Provides resources and functionalities to the Guest
More informationCSE543 - Computer and Network Security Module: Virtualization
CSE543 - Computer and Network Security Module: Virtualization Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 Operating System Quandary Q: What is the primary goal of system
More informationTraditional Desktop Deployment. Desktop Delivery Vision. End to End desktop virtualization. virtualization. virtualization
End to End desktop virtualization End to End desktop virtualization Martijn Martijn Bosschaart Bosschaart End to End desktop virtualization Channel Channel Systems Systems Engineer Engineer Netherlands
More informationVirtualisation: The KVM Way. Amit Shah
Virtualisation: The KVM Way Amit Shah amit.shah@qumranet.com foss.in/2007 Virtualisation Simulation of computer system in software Components Processor Management: register state, instructions, exceptions
More informationVirtual Machine Systems
Virtual Machine Systems Question Can a small operating system simulate the hardware of some machine so that Another operating system can run in that simulated hardware? More than one instance of that operating
More informationDeploying Application and OS Virtualization Together: Citrix and Virtuozzo
White Paper Deploying Application and OS Virtualization Together: Citrix and Virtuozzo www.swsoft.com Version 1.0 Table of Contents The Virtualization Continuum: Deploying Virtualization Together... 3
More informationLearning Outcomes. Extended OS. Observations Operating systems provide well defined interfaces. Virtual Machines. Interface Levels
Learning Outcomes Extended OS An appreciation that the abstract interface to the system can be at different levels. Virtual machine monitors (VMMs) provide a lowlevel interface An understanding of trap
More informationVirtualization with XEN. Trusted Computing CS599 Spring 2007 Arun Viswanathan University of Southern California
Virtualization with XEN Trusted Computing CS599 Spring 2007 Arun Viswanathan University of Southern California A g e n d a Introduction Virtualization approaches Basic XEN Architecture Setting up XEN Bootstrapping
More informationThe Future of Virtualization
The "anyos" paradigm and its implications through virtualization 30 December 2005 22c3 Berlin Introduction Tools The Future Introduction Application Area Theorie What is Virtualization? Virtualization
More informationLecture 7. Xen and the Art of Virtualization. Paul Braham, Boris Dragovic, Keir Fraser et al. 16 November, Advanced Operating Systems
Lecture 7 Xen and the Art of Virtualization Paul Braham, Boris Dragovic, Keir Fraser et al. Advanced Operating Systems 16 November, 2011 SOA/OS Lecture 7, Xen 1/38 Contents Virtualization Xen Memory CPU
More informationVirtualization. Guillaume Urvoy-Keller UNS/I3S
Virtualization Guillaume Urvoy-Keller UNS/I3S Outline Part I What is virtualization : a first definition Why virtualizing? The new features offered by virtualization The various virtualization solutions
More informationOS Virtualization. Why Virtualize? Introduction. Virtualization Basics 12/10/2012. Motivation. Types of Virtualization.
Virtualization Basics Motivation OS Virtualization CSC 456 Final Presentation Brandon D. Shroyer Types of Virtualization Process virtualization (Java) System virtualization (classic, hosted) Emulation
More informationEE 660: Computer Architecture Cloud Architecture: Virtualization
EE 660: Computer Architecture Cloud Architecture: Virtualization Yao Zheng Department of Electrical Engineering University of Hawaiʻi at Mānoa Based on the slides of Prof. Roy Campbell & Prof Reza Farivar
More informationXen and the Art of Virtualization. Nikola Gvozdiev Georgian Mihaila
Xen and the Art of Virtualization Nikola Gvozdiev Georgian Mihaila Outline Xen and the Art of Virtualization Ian Pratt et al. I. The Art of Virtualization II. Xen, goals and design III. Xen evaluation
More informationSystem Virtual Machines
System Virtual Machines Outline Need and genesis of system Virtual Machines Basic concepts User Interface and Appearance State Management Resource Control Bare Metal and Hosted Virtual Machines Co-designed
More informationXen and the Art of Virtualization
Xen and the Art of Virtualization Paul Barham,, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer,, Ian Pratt, Andrew Warfield University of Cambridge Computer Laboratory Presented
More informationVIRTUALIZATION: IBM VM/370 AND XEN
1 VIRTUALIZATION: IBM VM/370 AND XEN CS6410 Hakim Weatherspoon IBM VM/370 Robert Jay Creasy (1939-2005) Project leader of the first full virtualization hypervisor: IBM CP-40, a core component in the VM
More informationVirtualization with VMware ESX and VirtualCenter SMB to Enterprise
Virtualization with VMware ESX and VirtualCenter SMB to Enterprise This class is an intense, five-day introduction to virtualization using VMware s immensely popular Virtual Infrastructure suite including
More informationWhat is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet.
1 INTRODUCTION What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet. Cloud computing encompasses any Subscriptionbased or pay-per-use
More informationA Review On optimization technique in Server Virtualization
A Review On optimization technique in Server Virtualization Lavneet Kaur, Himanshu Kakkar Department of Computer Science Chandigarh Engineering College Landran, India Abstract In this paper, the earlier
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Deploying Application and OS Virtualization Together: Citrix and Parallels Virtuozzo Containers www.parallels.com Version 1.0 Table of Contents The Virtualization
More informationCLOUD COMPUTING IT0530. G.JEYA BHARATHI Asst.Prof.(O.G) Department of IT SRM University
CLOUD COMPUTING IT0530 G.JEYA BHARATHI Asst.Prof.(O.G) Department of IT SRM University What is virtualization? Virtualization is way to run multiple operating systems and user applications on the same
More informationSecuring the Data Center against
Securing the Data Center against vulnerabilities & Data Protection Agenda Virtual Virtualization Technology How Virtualization affects the Datacenter Security Keys to a Secure Virtualized Deployment and
More informationPerformance & Scalability Testing in Virtual Environment Hemant Gaidhani, Senior Technical Marketing Manager, VMware
Performance & Scalability Testing in Virtual Environment Hemant Gaidhani, Senior Technical Marketing Manager, VMware 2010 VMware Inc. All rights reserved About the Speaker Hemant Gaidhani Senior Technical
More informationSystem Virtual Machines
System Virtual Machines Outline Need and genesis of system Virtual Machines Basic concepts User Interface and Appearance State Management Resource Control Bare Metal and Hosted Virtual Machines Co-designed
More informationXen Project Overview and Update. Ian Pratt, Chairman of Xen.org, and Chief Scientist, Citrix Systems Inc.
Xen Project Overview and Update Ian Pratt, Chairman of Xen.org, and Chief Scientist, Citrix Systems Inc. Xen Community Story 2002 Oct Xen hypervisor development starts 2004 Xen 1.0 and 2.0 released, First
More information24-vm.txt Mon Nov 21 22:13: Notes on Virtual Machines , Fall 2011 Carnegie Mellon University Randal E. Bryant.
24-vm.txt Mon Nov 21 22:13:36 2011 1 Notes on Virtual Machines 15-440, Fall 2011 Carnegie Mellon University Randal E. Bryant References: Tannenbaum, 3.2 Barham, et al., "Xen and the art of virtualization,"
More informationNON SCHOLAE, SED VITAE
TDIU11 Operating systems Operating System Structures and Machines [SGG7/8] Chapter 2.7-2.8 [SGG9] Chapter 2.7, 1.11.6 Copyright Notice: The lecture notes are modifications of the slides accompanying the
More informationLINUX KVM FRANCISCO JAVIER VARGAS GARCIA-DONAS CLOUD COMPUTING 2017
LINUX KVM FRANCISCO JAVIER VARGAS GARCIA-DONAS CLOUD COMPUTING 2017 LINUX KERNEL-BASED VIRTUAL MACHINE KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware
More informationVirtualization. Darren Alton
Virtualization Darren Alton A brief introduction... In general, virtualization means emulating computer hardware* with software**. Virtual machine (VM) can mean a couple of things: A process virtual machine
More informationCSE543 - Computer and Network Security Module: Virtualization
CSE543 - Computer and Network Security Module: Virtualization Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 Operating System Quandary Q: What is the primary goal of system
More informationW11 Hyper-V security. Jesper Krogh.
W11 Hyper-V security Jesper Krogh jesper_krogh@dell.com Jesper Krogh Speaker intro Senior Solution architect at Dell Responsible for Microsoft offerings and solutions within Denmark Specialities witin:
More informationIntroduction to Virtualization
Introduction to Virtualization Reference Virtual Machines: Versatile Platforms for Systems and Processes by Jim Smith, Ravi Nair Publisher: Morgan Kaufmann (2005) ISBN-10: 1558609105-2- Abstraction Computer
More informationINNOV-4: Fun With Virtualization. Or, How I learned to love computers that don t really exist...
1 INNOV-4: Fun With Virtualization Or, How I learned to love computers that don t really exist... President, BravePoint, Inc. About Unix user since 1982 Progress developer since 1984 Linux Desktop and
More informationVirtualization. Virtualization
Virtualization Virtualization Memory virtualization Process feels like it has its own address space Created by MMU, configured by OS Storage virtualization Logical view of disks connected to a machine
More informationXen Project Status Ian Pratt 12/3/07 1
Xen Project Status Ian Pratt 12/3/07 1 Project Status xen.org and the Xen Advisory Board Xen project mission Ubiquitous virtualization Realizing Xen s architectural advantages From servers to clients Interoperability
More informationOperating system hardening
Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications
More informationConcepts. Virtualization
Concepts Virtualization Concepts References and Sources James Smith, Ravi Nair, The Architectures of Virtual Machines, IEEE Computer, May 2005, pp. 32-38. Mendel Rosenblum, Tal Garfinkel, Virtual Machine
More information