Virtualization. Introduction. Why we interested? 11/28/15. Virtualiza5on provide an abstract environment to run applica5ons.
|
|
- Alexandra Horn
- 5 years ago
- Views:
Transcription
1 Virtualization Yifu Rong Introduction Virtualiza5on provide an abstract environment to run applica5ons. Virtualiza5on technologies have a long trail in the history of computer science. Why we interested? Increased performance and compu5ng capacity Underu5lized hardware and sodware resources Lack of space Greening ini5a5ves Rise of administra5ve costs 1
2 Introduction Increased performance and compu/ng capacity. Powerful Enough resources Introduction Underu/lized hardware and so9ware resources. (1) Increased performance and compu5ng capacity (2) The effect of limited or sporadic use of resources Introduction Lack of space. Need addi5onal capacity Cannot afford to build data center 2
3 Introduction Greening ini/a/ves. Data centers are one of the major power consumers We need to reducing the number of servers Introduction Rise of administra/ve costs. Power consump5on and cooling costs Increased demand Servers cannot run on their own Characteristics of virtualized environments Virtualiza5on is a broad concept that refers to the crea5on of a virtual version of something, whether hardware, a sodware environment, storage, or a network. In a virtualized environment there are three major components: guest, host, and virtualiza5on layer. 3
4 The virtualiza5on reference model Characteristics of virtualized environments Example : hardware virtualiza5on the guest is represented by a system image The host is instead represented by the physical hardware Increased security completely transparent manner Guest -> virtual machine -> host VMM Control and filter the ac5vity of guest Preven5ng harmful opera5ons Exposed resources can be hidden by guest 4
5 Managed execution Virtualiza5on of the execu5on environment not only allows increased security, but a wider range of features also can be implemented. In par5cular, sharing, aggrega/on, emula/on, and isola/on are the most relevant features. Managed execution Virtualiza5on of the execu5on environment not only allows increased security, but a wider range of features also can be implemented. In par5cular, sharing, aggrega/on, emula/on, and isola/on are the most relevant features. Portability Example: Hardware virtualiza5on The guest is packaged into a virtual image Easily to display in different computers Example: Programming-level virtualiza5on jars or assemblies can be run without any recompila5on 5
6 Taxonomy of virtualization techniques Taxonomy of virtualization techniques Execution virtualization--introduce Aim to emulate an execu5on environment All these techniques concentrate on providing support for the execu5on of programs Execu5on virtualiza5on can be implemented directly on top of the hardware 6
7 Machine reference model Machine reference model Hardware-level virtualization Hardware virtualiza5on reference model 7
8 Hypervisors Two types of hypervisors Hosted (led) and na5ve (right) virtual machines Hypervisors Two types of hypervisors Hosted (led) and na5ve (right) virtual machines Hypervisors Three proper5es have to be sa5sfied: Equivalence: A guest running under the control of a virtual machine manager should exhibit the same behavior as when it is executed directly on the physical host. Resource control: The virtual machine manager should be in complete control of virtualized resources. Efficiency: A sta5s5cally dominant frac5on of the machine instruc5ons should be executed without interven5on from the virtual machine manager. 8
9 Hypervisors Determines whether these proper5es are sa5sfied is represented by the layout of the ISA of the host running a virtual machine manager. Three theorems that define the proper5es that hardware instruc/ons need to sa5sfy in order to efficiently support virtualiza5on. THEOREM 3.1 For any conven5onal third-genera5on computer, a VMM may be constructed if the set of sensi5ve instruc5ons for that computer is a subset of the set of privileged instruc5ons. THEOREM 3.2 A conven5onal third-genera5on computer is recursively virtualizable if: It is virtualizable and A VMM without any 5ming dependencies can be constructed for it. THEOREM 3.3 A hybrid VMM may be constructed for any conven5onal thirdgenera5on machine in which the set of user-sensi5ve instruc5ons is a subset of the set of privileged instruc5ons. There is another term of hybrid VMM, hybrid virtual machine (HVM) 9
10 Hardware virtualization techniques Hardware-assisted virtualiza/on This term refers to a scenario in which the hardware provides architectural support for building a virtual machine manager able to run a guest opera5ng system in complete isola5on. Full virtualiza/on Full virtualiza5on refers to the ability to run a program, most likely an opera5ng system, directly on top of a virtual machine and without any modifica5on, as though it were run on the raw hardware. To make this possible, virtual machine managers are required to provide a complete emula5on of the en5re underlying hardware. Hardware virtualization techniques Paravirtualiza/on Not-transparent virtualiza5on solu5on Guests need to be modified. Example: Xen, VMWare, Parallels Par/al virtualiza/on Par5al virtualiza5on provides a par5al emula5on of the underlying hardware, thus not allowing the complete execu5on of the guest opera5ng system in complete isola5on. Par5al virtualiza5on allows many applica5ons to run transparently, but not all the features of the opera5ng system can be supported, as happens with full virtualiza5on. Operating System-level virtualization Create execu5on environments for applica5ons No VMM and virtualiza5on is done within single OS OS kernel allows for mul5ple user space Always be 5me-shared OS Examples of opera5ng system-level virtualiza5ons are FreeBSD Jails, IBM Logical Par55on (LPAR), SolarisZones and Containers, Parallels Virtuozzo Containers, OpenVZ, icore Virtual Accounts, Free Virtual Private Server (FreeVPS), and others. 10
11 Programming language-level virtualization Used to achieve ease of deployment of applica5ons, managed execu5on Consists of a virtual machine execu5ng the byte code of a program Example : Java and it is stack-based virtual machine Provide a uniform execu5on environment across different plakorms Application-level virtualization Provide a run5me environment Compare with hardware-level virtualiza5on Replacement library and VMM is much lighter Example: Wine, Vmware ThinApp Other types of virtualization Storage virtualiza/on Storage virtualiza5on is a system administra5on prac5ce that allows decoupling the physical organiza5on of the hardware from its logical representa5on. Network virtualiza/on Network virtualiza5on combines hardware appliances and specific sodware for the crea5on and management of a virtual network. Desktop virtualiza/on Desktop virtualiza5on abstracts the desktop environment available on a personal computer in order to provide access to it using a client/server approach. 11
12 Pros and cons of virtualization Advantages of virtualiza5on Managed execu/on and isola/on Portability and self-containment More efficient use of resources Disadvantages Performance degrada/on Performance is definitely one of the major concerns in using virtualiza5on technology. For instance, in the case of hardware virtualiza5on, the causes of performance degrada5on can be traced back to the overhead introduced by the following ac5vi5es: 1. Maintaining the status of virtual processors 2. Support of privileged instruc5ons (trap and simulate privileged instruc5ons) 3. Support of paging within VM 4. Console func5ons Virtualiza5on technologies at higher levels also have same problem, such as in the case of programming language virtual machines (Java,.NET, and others). Binary transla5on and interpreta5on can slow down the execu5on of managed applica5ons. Disadvantages Inefficiency and degraded user experience Virtualiza5on can some5me lead to an inefficient use of the host. In par5cular, some of the specific features of the host cannot be exposed by the abstrac5on layer and then become inaccessible. In the case of hardware virtualiza5on, this could happen for device drivers: The virtual machine can some5me simply provide a default graphic card that maps only a subset of the features available in the host. In the case of programming-level virtual machines, some of the features of the underlying opera5ng systems may become inaccessible unless specific libraries are used. 12
13 Disadvantages Security holes and new threats Phishing In the case of hardware virtualiza5on, malicious programs can preload themselves before the opera5ng system and act as a thin virtual machine manager toward it. The opera5ng system is then controlled and can be manipulated to extract sensi5ve informa5on of interest to third par5es. In programming-level virtual machines: Modified versions of the run5me environment can access sensi5ve informa5on or monitor the memory loca5ons u5lized by guest applica5ons while these are executed. VMware vs. Virtual Box Cost Performance They all support win 2000,XP,2003, Vista Linux and Mac, but VB is only sodware supports win 7, 2008, FreeBSD Some difference between VirtualBox and VMware are show: hlp:// Thank you 13
Background. IBM sold expensive mainframes to large organiza<ons. Monitor sits between one or more OSes and HW
Virtual Machines Background IBM sold expensive mainframes to large organiza
More informationNetworks and Opera/ng Systems Chapter 21: Virtual Machine Monitors ( )
Networks and Opera/ng Systems Chapter 21: Virtual Machine Monitors (252 0062 00) Donald Kossmann & Torsten Hoefler Frühjahrssemester 2013 Systems Group Department of Computer Science ETH Zürich Last /me:
More informationBackground. IBM sold expensive mainframes to large organiza<ons. Monitor sits between one or more OSes and HW
Virtual Machines Background IBM sold expensive mainframes to large organiza
More informationToday s Objec4ves. Data Center. Virtualiza4on Cloud Compu4ng Amazon Web Services. What did you think? 10/23/17. Oct 23, 2017 Sprenkle - CSCI325
Today s Objec4ves Virtualiza4on Cloud Compu4ng Amazon Web Services Oct 23, 2017 Sprenkle - CSCI325 1 Data Center What did you think? Oct 23, 2017 Sprenkle - CSCI325 2 1 10/23/17 Oct 23, 2017 Sprenkle -
More informationHardware- assisted Virtualization
Hardware- assisted Virtualization Pra$k Shah (pcshah) Rohan Pa$l (rspa$l) 15-612 Opera,ng System Prac,cum Carnegie Mellon University 1 Agenda Introduc)on to VT- x CPU virtualiza)on with VT- x VMX VMX Transi$ons
More informationXen and the Art of Virtualiza2on
Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian PraF, Andrew Warfield University of Cambridge Computer Laboratory Kyle SchuF CS 5204 Virtualiza2on Abstrac2on
More informationVirtualiza)on. COMS W4118 Prof. Kaustubh R. Joshi hep://
Virtualiza)on COMS W4118 Prof. Kaustubh R. Joshi krj@cs.columbia.edu hep://www.cs.columbia.edu/~krj/os References: Opera)ng Systems Concepts (9e), Linux Kernel Development, previous W4118s Copyright no2ce:
More informationThe Challenges of X86 Hardware Virtualization. GCC- Virtualization: Rajeev Wankar 36
The Challenges of X86 Hardware Virtualization GCC- Virtualization: Rajeev Wankar 36 The Challenges of X86 Hardware Virtualization X86 operating systems are designed to run directly on the bare-metal hardware,
More informationLecture 5: February 3
CMPSCI 677 Operating Systems Spring 2014 Lecture 5: February 3 Lecturer: Prashant Shenoy Scribe: Aditya Sundarrajan 5.1 Virtualization Virtualization is a technique that extends or replaces an existing
More informationW1005 Intro to CS and Programming in MATLAB. Brief History of Compu?ng. Fall 2014 Instructor: Ilia Vovsha. hip://www.cs.columbia.
W1005 Intro to CS and Programming in MATLAB Brief History of Compu?ng Fall 2014 Instructor: Ilia Vovsha hip://www.cs.columbia.edu/~vovsha/w1005 Computer Philosophy Computer is a (electronic digital) device
More informationVirtual Machines. Jinkyu Jeong Computer Systems Laboratory Sungkyunkwan University
Virtual Machines Jinkyu Jeong (jinkyu@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Today's Topics History and benefits of virtual machines Virtual machine technologies
More informationModule 1: Virtualization. Types of Interfaces
Module 1: Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform
More informationChapter 5 C. Virtual machines
Chapter 5 C Virtual machines Virtual Machines Host computer emulates guest operating system and machine resources Improved isolation of multiple guests Avoids security and reliability problems Aids sharing
More informationVirtualization. Starting Point: A Physical Machine. What is a Virtual Machine? Virtualization Properties. Types of Virtualization
Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.
More informationVirtualization. ! Physical Hardware Processors, memory, chipset, I/O devices, etc. Resources often grossly underutilized
Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.
More informationVirtualization. Pradipta De
Virtualization Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
More informationSecure Server Project. Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek
Secure Server Project Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek 1 Outline I. Mo9va9on, Objec9ves II. Threat Landscape III. Design IV. Status V. Roadmap 2 Mo9va9on In a nutshell: Secure
More informationVirtualization. Darren Alton
Virtualization Darren Alton A brief introduction... In general, virtualization means emulating computer hardware* with software**. Virtual machine (VM) can mean a couple of things: A process virtual machine
More informationWelcome to CS 449: Introduc3on to System So6ware. Instructor: Wonsun Ahn
Welcome to CS 449: Introduc3on to System So6ware Instructor: Wonsun Ahn What is a System? Merriam-Webster dic3onary: A group of related parts that work together Your computer hardware is a system Comprised
More informationSpring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand
Introduction to Virtual Machines Nima Honarmand Virtual Machines & Hypervisors Virtual Machine: an abstraction of a complete compute environment through the combined virtualization of the processor, memory,
More informationNested Virtualization and Server Consolidation
Nested Virtualization and Server Consolidation Vara Varavithya Department of Electrical Engineering, KMUTNB varavithya@gmail.com 1 Outline Virtualization & Background Nested Virtualization Hybrid-Nested
More informationLINUX Virtualization. Running other code under LINUX
LINUX Virtualization Running other code under LINUX Environment Virtualization Citrix/MetaFrame Virtual desktop under Windows NT. aka Windows Remote Desktop Protocol VNC, Dameware virtual console. XWindows
More informationConfinement (Running Untrusted Programs)
Confinement (Running Untrusted Programs) Chester Rebeiro Indian Institute of Technology Madras Untrusted Programs How to run untrusted programs and not harm your system? Answer: Confinement (some:mes called
More informationOracle VM Workshop Applica>on Driven Virtualiza>on
Oracle VM Workshop Applica>on Driven Virtualiza>on Simon COTER Principal Product Manager Oracle VM & VirtualBox simon.coter@oracle.com hnps://blogs.oracle.com/scoter November 25th, 2015 Copyright 2014
More informationCSE Opera*ng System Principles
CSE 30341 Opera*ng System Principles Overview/Introduc7on Syllabus Instructor: Chris*an Poellabauer (cpoellab@nd.edu) Course Mee*ngs TR 9:30 10:45 DeBartolo 101 TAs: Jian Yang, Josh Siva, Qiyu Zhi, Louis
More informationLearning Outcomes. Extended OS. Observations Operating systems provide well defined interfaces. Virtual Machines. Interface Levels
Learning Outcomes Extended OS An appreciation that the abstract interface to the system can be at different levels. Virtual machine monitors (VMMs) provide a lowlevel interface An understanding of trap
More informationCSE Opera+ng System Principles
CSE 30341 Opera+ng System Principles Lecture 3 Systems Structure Project 1 Intro CSE 30341 Opera+ng System Principles 2 1 Recap Last Lecture I/O Structure (I/O Interface, DMA) Storage and Memory Hierarchy
More informationVirtualization. Virtualization
Virtualization Virtualization Memory virtualization Process feels like it has its own address space Created by MMU, configured by OS Storage virtualization Logical view of disks connected to a machine
More informationIntroduction to Virtualization
Introduction to Virtualization Reference Virtual Machines: Versatile Platforms for Systems and Processes by Jim Smith, Ravi Nair Publisher: Morgan Kaufmann (2005) ISBN-10: 1558609105-2- Abstraction Computer
More informationCOMPUTER ARCHITECTURE. Virtualization and Memory Hierarchy
COMPUTER ARCHITECTURE Virtualization and Memory Hierarchy 2 Contents Virtual memory. Policies and strategies. Page tables. Virtual machines. Requirements of virtual machines and ISA support. Virtual machines:
More informationOriginally prepared by Lehigh graduate Greg Bosch; last modified April 2016 by B. Davison
Virtualization Originally prepared by Lehigh graduate Greg Bosch; last modified April 2016 by B. Davison I. Introduction to Virtualization II. Virtual liances III. Benefits to Virtualization IV. Example
More informationUNIT V: CENTRAL PROCESSING UNIT
UNIT V: CENTRAL PROCESSING UNIT Agenda Basic Instruc1on Cycle & Sets Addressing Instruc1on Format Processor Organiza1on Register Organiza1on Pipeline Processors Instruc1on Pipelining Co-Processors RISC
More informationDistributed Systems COMP 212. Lecture 18 Othon Michail
Distributed Systems COMP 212 Lecture 18 Othon Michail Virtualisation & Cloud Computing 2/27 Protection rings It s all about protection rings in modern processors Hardware mechanism to protect data and
More informationVirtualization and memory hierarchy
Virtualization and memory hierarchy Computer Architecture J. Daniel García Sánchez (coordinator) David Expósito Singh Francisco Javier García Blas ARCOS Group Computer Science and Engineering Department
More informationConcepts. Virtualization
Concepts Virtualization Concepts References and Sources James Smith, Ravi Nair, The Architectures of Virtual Machines, IEEE Computer, May 2005, pp. 32-38. Mendel Rosenblum, Tal Garfinkel, Virtual Machine
More informationNON SCHOLAE, SED VITAE
TDIU11 Operating systems Operating System Structures and Machines [SGG7/8] Chapter 2.7-2.8 [SGG9] Chapter 2.7, 1.11.6 Copyright Notice: The lecture notes are modifications of the slides accompanying the
More informationVirtual Machine Monitors!
ISA 673 Operating Systems Security Virtual Machine Monitors! Angelos Stavrou, George Mason University! Virtual Machine Monitors 2! Virtual Machine Monitors (VMMs) are everywhere! Industry commitment! Software:
More informationOperating Systems 4/27/2015
Virtualization inside the OS Operating Systems 24. Virtualization Memory virtualization Process feels like it has its own address space Created by MMU, configured by OS Storage virtualization Logical view
More informationThe Architecture of Virtual Machines Lecture for the Embedded Systems Course CSD, University of Crete (April 29, 2014)
The Architecture of Virtual Machines Lecture for the Embedded Systems Course CSD, University of Crete (April 29, 2014) ManolisMarazakis (maraz@ics.forth.gr) Institute of Computer Science (ICS) Foundation
More informationCSE Opera,ng System Principles
CSE 30341 Opera,ng System Principles Lecture 5 Processes / Threads Recap Processes What is a process? What is in a process control bloc? Contrast stac, heap, data, text. What are process states? Which
More informationCOS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Prof. Margaret Martonosi Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall11/cos318/ Announcements Project
More informationIntroduc)on to Compu)ng. Heng Sovannarith
Introduc)on to Compu)ng Heng Sovannarith heng_sovannarith@yahoo.com Introduc)on Computers play an increasingly important and nearly indispensable role in everyday life. Computers are used all over the
More informationOS History and OS Structures
OS History and OS Structures Karthik Dantu CSE 421/521: Opera>ng Systems Slides adopted from CS162 class at Berkeley, CSE 451 at U-Washington and CSE 421 by Prof Kosar at UB Join Piazza Ac>on Items From
More informationObjec0ves. Gain understanding of what IDA Pro is and what it can do. Expose students to the tool GUI
Intro to IDA Pro 31/15 Objec0ves Gain understanding of what IDA Pro is and what it can do Expose students to the tool GUI Discuss some of the important func
More informationOpera&ng Systems ECE344
Opera&ng Systems ECE344 Lecture 8: Paging Ding Yuan Lecture Overview Today we ll cover more paging mechanisms: Op&miza&ons Managing page tables (space) Efficient transla&ons (TLBs) (&me) Demand paged virtual
More informationPreliminary ACTL-SLOW Design in the ACS and OPC-UA context. G. Tos? (19/04/2016)
Preliminary ACTL-SLOW Design in the ACS and OPC-UA context G. Tos? (19/04/2016) Summary General Introduc?on to ACS Preliminary ACTL-SLOW proposed design Hardware device integra?on in ACS and ACTL- SLOW
More informationVirtualization Introduction
Virtualization Introduction Simon COTER Principal Product Manager Oracle VM & VirtualBox simon.coter@oracle.com https://blogs.oracle.com/scoter November 21 st, 2016 Safe Harbor Statement The following
More informationAn overview of virtual machine architecture
An overview of virtual machine architecture Outline History Standardized System Components Virtual Machine Basics Process VMs System VMs Virtualizing Process Summary and Taxonomy History In ancient times:
More informationVirtual Machines. Part 2: starting 19 years ago. Operating Systems In Depth IX 1 Copyright 2018 Thomas W. Doeppner. All rights reserved.
Virtual Machines Part 2: starting 19 years ago Operating Systems In Depth IX 1 Copyright 2018 Thomas W. Doeppner. All rights reserved. Operating Systems In Depth IX 2 Copyright 2018 Thomas W. Doeppner.
More informationCprE Virtualization. Dr. Yong Guan. Department of Electrical and Computer Engineering & Information Assurance Center Iowa State University
Virtualization Dr. Yong Guan Department of Electrical and Computer Engineering & Information Assurance Center Iowa State University Outline for Today s Talk Introduction Virtualization Technology Applications
More informationOverview of System Virtualization: The most powerful platform for program analysis and system security. Zhiqiang Lin
CS 6V81-05: System Security and Malicious Code Analysis Overview of System Virtualization: The most powerful platform for program analysis and system security Zhiqiang Lin Department of Computer Science
More informationVirtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu Virtualization Definition Framework or methodology of dividing the resources of a computer into multiple execution environments. Types Platform Virtualization: Simulate a
More informationIntroduction to Cloud Computing and Virtualization. Mayank Mishra Sujesha Sudevalayam PhD Students CSE, IIT Bombay
Introduction to Cloud Computing and Virtualization By Mayank Mishra Sujesha Sudevalayam PhD Students CSE, IIT Bombay Talk Layout Cloud Computing Need Features Feasibility Virtualization of Machines What
More informationGuarded Modules: Adap/vely Extending the VMM s Privileges Into the Guest
Guarded Modules: Adap/vely Extending the VMM s Privileges Into the Guest Kyle C. Hale Peter Dinda Department of Electrical Engineering and Computer Science Northwestern University hip://halek.co hip://presciencelab.org
More informationLibraries are wri4en in C/C++ and compiled for the par>cular hardware.
marakana.com 1 marakana.com 2 marakana.com 3 marakana.com 4 Libraries are wri4en in C/C++ and compiled for the par>cular hardware. marakana.com 5 The Dalvik virtual machine is a major piece of Google's
More informationVirtualization. Application Application Application. MCSN - N. Tonellotto - Distributed Enabling Platforms OPERATING SYSTEM OPERATING SYSTEM
Virtualization lication lication lication lication lication lication OPERATING SYSTEM OPERATING SYSTEM VIRTUALIZATION 1 Basic Idea Observation Hardware resources are typically under-utilized Hardware resources
More informationCS370 Operating Systems
CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2017 Lecture 27 Virtualization Slides based on Various sources 1 1 Virtualization Why we need virtualization? The concepts and
More informationVirtualization (II) SPD Course 17/03/2010 Massimo Coppola
Virtualization (II) SPD Course 17/03/2010 Massimo Coppola The players The Hypervisor (HV) implements the virtual machine emulation to run a Guest OS Provides resources and functionalities to the Guest
More informatione-pg Pathshala Subject: Computer Science Paper: Cloud Computing Module 23: Virtualization II Module No: CS/CC/23 Quadrant 1 e-text
e-pg Pathshala Subject: Computer Science Paper: Cloud Computing Module 23: Virtualization II Module No: CS/CC/23 Quadrant 1 e-text 1. Introduction Virtualization is a necessary mechanism in a data center
More informationOpera&ng Systems: Principles and Prac&ce. Tom Anderson
Opera&ng Systems: Principles and Prac&ce Tom Anderson How This Course Fits in the UW CSE Curriculum CSE 333: Systems Programming Project experience in C/C++ How to use the opera&ng system interface CSE
More informationCONTAINERIZING JOBS ON THE ACCRE CLUSTER WITH SINGULARITY
CONTAINERIZING JOBS ON THE ACCRE CLUSTER WITH SINGULARITY VIRTUAL MACHINE (VM) Uses so&ware to emulate an en/re computer, including both hardware and so&ware. Host Computer Virtual Machine Host Resources:
More informationΠποχωπημένη Κατανεμημένη Υπολογιστική
Πποχωπημένη Κατανεμημένη Υπολογιστική ΗΥ623 Διδάζκων Δημήηριος Καηζαρός @ Τμ. ΗΜΜΥ Πανεπιστήμιο Θεσσαλίαρ Διάλεξη 3η 1 Virtualization Concepts Definitions Virtualization A layer mapping its visible interface
More informationComputer Systems: A Programmer s Perspec4ve. Have a tour of computer system at first... Chapter 1
Computer Systems: A Programmer s Perspec4ve Have a tour of computer system at first... Chapter 1 1 Computer System Runs the sojware and manages the hardware RISC vs CISC ADDRESS BUS DATA BUS SOFTWARE HARDWARE
More informationPrinciples of Programming Languages
Principles of Programming Languages h"p://www.di.unipi.it/~andrea/dida2ca/plp- 14/ Prof. Andrea Corradini Department of Computer Science, Pisa Lesson 18! Bootstrapping Names in programming languages Binding
More informationSingle and mul,threaded processes
1 Single and mul,threaded processes Why threads? Express concurrency Web server (mul,ple requests), Browser (GUI + network I/O + rendering), most GUI programs for(;;) { struct request *req = get_request();
More informationLecture 8: Memory Management
Lecture 8: Memory Management CSE 120: Principles of Opera>ng Systems UC San Diego: Summer Session I, 2009 Frank Uyeda Announcements PeerWise ques>ons due tomorrow. Project 2 is due on Friday. Milestone
More informationDatabase Machine Administration v/s Database Administration: Similarities and Differences
Database Machine Administration v/s Database Administration: Similarities and Differences IOUG Exadata Virtual Conference Vivek Puri Manager Database Administration & Engineered Systems The Sherwin-Williams
More informationMain Points. Address Transla+on Concept. Flexible Address Transla+on. Efficient Address Transla+on
Address Transla+on Main Points Address Transla+on Concept How do we convert a virtual address to a physical address? Flexible Address Transla+on Segmenta+on Paging Mul+level transla+on Efficient Address
More informationServer Virtualization Approaches
Server Virtualization Approaches Virtual Machine Applications Emulation Replication Composition Emulation: Mix-and-match cross-platform portability Replication: Multiple VMs on single platform Composition:
More informationOPS-9: Fun With Virtualization. John Harlow. John Harlow. About John Harlow
OPS-9: Fun With Virtualization President, BravePoint, Inc. About Unix user since 1982 Progress developer since 1984 Linux Desktop and Server user since 1995 VMware user since earliest beta in 1999 Contact
More informationCS 350 Winter 2011 Current Topics: Virtual Machines + Solid State Drives
CS 350 Winter 2011 Current Topics: Virtual Machines + Solid State Drives Virtual Machines Resource Virtualization Separating the abstract view of computing resources from the implementation of these resources
More informationEE 660: Computer Architecture Cloud Architecture: Virtualization
EE 660: Computer Architecture Cloud Architecture: Virtualization Yao Zheng Department of Electrical Engineering University of Hawaiʻi at Mānoa Based on the slides of Prof. Roy Campbell & Prof Reza Farivar
More information: Advanced Compiler Design. 8.0 Instruc?on scheduling
6-80: Advanced Compiler Design 8.0 Instruc?on scheduling Thomas R. Gross Computer Science Department ETH Zurich, Switzerland Overview 8. Instruc?on scheduling basics 8. Scheduling for ILP processors 8.
More informationSERVE. -Priyal Lokhandwala
SERVE VIRTUALIZ -Priyal Lokhandwala Contents: 1) Virtualization- an overview 2) Server Virtualization 3) VM ware 4) Hyper V 5) Server Deployment virtualization is a broad term that refers to the abstraction
More informationCloud Computing Virtualization
Cloud Computing Virtualization Anil Madhavapeddy anil@recoil.org Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. x86 support for virtualization. Full and
More informationSoK: A Study of Using Hardwareassisted. Environments for Security. Fengwei Zhang and Hongwei Zhang. Wayne State University Detroit, Michigan, USA
SoK: A Study of Using Hardwareassisted Isolated Execu
More informationCSE Opera+ng System Principles
CSE 30341 Opera+ng System Principles Lecture 2 Introduc5on Con5nued Recap Last Lecture What is an opera+ng system & kernel? What is an interrupt? CSE 30341 Opera+ng System Principles 2 1 OS - Kernel CSE
More informationCS 550 Operating Systems Spring Introduction to Virtual Machines
CS 550 Operating Systems Spring 2018 Introduction to Virtual Machines 1 How to share a physical computer Operating systems allows multiple processes/applications to run simultaneously Via process/memory
More informationfor Kerrighed? February 1 st 2008 Kerrighed Summit, Paris Erich Focht NEC
Virtualization for Kerrighed? February 1 st 2008 Kerrighed Summit, Paris Erich Focht NEC Why virtualization? Virtualization means many things! Multi-programming any UNIX is virtualizing resources to allow
More informationCSCE 410/611: Virtualization!
CSCE 410/611: Virtualization! Definitions, Terminology! Why Virtual Machines?! Mechanics of Virtualization! Virtualization of Resources (Memory)! Some slides made available Courtesy of Gernot Heiser, UNSW.!
More informationCentralized Monitoring Drive Imaging File Replica on Internet Backup SQL and Exchange Hyper-V Backup and Restore Zip-To-Tape Backup.
The Complete Backup Toolkit for SMB Centralized Monitoring Drive Imaging File Replicaon Internet Backup SQL and Exchange Hyper-V Backup and Restore Zip-To-Tape Backup Copyright Cortex I.T. 2010 ProductBrochure
More informationINNOV-4: Fun With Virtualization. Or, How I learned to love computers that don t really exist...
1 INNOV-4: Fun With Virtualization Or, How I learned to love computers that don t really exist... President, BravePoint, Inc. About Unix user since 1982 Progress developer since 1984 Linux Desktop and
More informationVerifiable Cloud Outsourcing for Network Func9ons (+ Verifiable Resource Accoun9ng for Cloud Services)
1 Verifiable Cloud Outsourcing for Network Func9ons (+ Verifiable Resource Accoun9ng for Cloud Services) Vyas Sekar vnfo joint with Seyed Fayazbakhsh, Mike Reiter VRA joint with Chen Chen, Petros Mania9s,
More informationSQL Injec*on. By Robin Gonzalez
SQL Injec*on By Robin Gonzalez Some things that can go wrong Excessive and Unused Privileges Privilege Abuse Input Injec>on Malware Week Audit Trail Other things that can go wrong Storage Media Exposure
More informationVirtual Memory B: Objec5ves
Virtual Memory B: Objec5ves Benefits of a virtual memory system" Demand paging, page-replacement algorithms, and allocation of page frames" The working-set model" Relationship between shared memory and
More informationMapReduce, Apache Hadoop
Czech Technical University in Prague, Faculty of Informaon Technology MIE-PDB: Advanced Database Systems hp://www.ksi.mff.cuni.cz/~svoboda/courses/2016-2-mie-pdb/ Lecture 12 MapReduce, Apache Hadoop Marn
More informationMapReduce, Apache Hadoop
NDBI040: Big Data Management and NoSQL Databases hp://www.ksi.mff.cuni.cz/ svoboda/courses/2016-1-ndbi040/ Lecture 2 MapReduce, Apache Hadoop Marn Svoboda svoboda@ksi.mff.cuni.cz 11. 10. 2016 Charles University
More informationVirtualization. Part 1 Concepts & XEN
Part 1 Concepts & XEN Concepts References and Sources James Smith, Ravi Nair, The Architectures of Virtual Machines, IEEE Computer, May 2005, pp. 32-38. Mendel Rosenblum, Tal Garfinkel, Virtual Machine
More informationIntroduction to Virtual Machines. Carl Waldspurger (SB SM 89 PhD 95) VMware R&D
Introduction to Virtual Machines Carl Waldspurger (SB SM 89 PhD 95) VMware R&D Overview Virtualization and VMs Processor Virtualization Memory Virtualization I/O Virtualization Typesof Virtualization Process
More informationCSCI 8530 Advanced Operating Systems. Part 19 Virtualization
CSCI 8530 Advanced Operating Systems Part 19 Virtualization Virtualization This is a very old idea It appears in many different forms A variety of commercial products exist The idea has become hot again
More informationCompiler Optimization Intermediate Representation
Compiler Optimization Intermediate Representation Virendra Singh Associate Professor Computer Architecture and Dependable Systems Lab Department of Electrical Engineering Indian Institute of Technology
More informationToday s Objec2ves. AWS/MR Review Final Projects Distributed File Systems. Nov 3, 2017 Sprenkle - CSCI325
Today s Objec2ves AWS/MR Review Final Projects Distributed File Systems Nov 3, 2017 Sprenkle - CSCI325 1 Inverted Index final input files have been posted Another email out to AWS Google cloud Nov 3, 2017
More informationIntroduction to Virtual Machines. Michael Jantz
Introduction to Virtual Machines Michael Jantz Acknowledgements Slides adapted from Chapter 1 in Virtual Machines: Versatile Platforms for Systems and Processes by James E. Smith and Ravi Nair Credit to
More informationWhat are some common categories of system calls? What are common ways of structuring an OS? What are the principles behind OS design and
What are the services provided by an OS? What are system calls? What are some common categories of system calls? What are the principles behind OS design and implementation? What are common ways of structuring
More informationStacking it Up Experimental Observa6ons on the opera6on of Dual Stack Services
Stacking it Up Experimental Observa6ons on the opera6on of Dual Stack Services Geoff Huston, APNIC Labs 1 If working with one protocol has its problems 2 Then just how much damage can we do by joining
More informationA Survey on Virtualization Technologies
A Survey on Virtualization Technologies Virtualization is HOT Microsoft acquires Connectix Corp. EMC acquires VMware Veritas acquires Ejascent IBM, already a pioneer Sun working hard on it HP picking up
More informationRAD, Rules, and Compatibility: What's Coming in Kuali Rice 2.0
software development simplified RAD, Rules, and Compatibility: What's Coming in Kuali Rice 2.0 Eric Westfall - Indiana University JASIG 2011 For those who don t know Kuali Rice consists of mul8ple sub-
More informationDesign Principles & Prac4ces
Design Principles & Prac4ces Robert France Robert B. France 1 Understanding complexity Accidental versus Essen4al complexity Essen%al complexity: Complexity that is inherent in the problem or the solu4on
More informationChapter 5 System Software: Operating Systems and Utility Programs
Chapter 5 System Software: Operating Systems and Utility Programs permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Learning
More informationCS 465 Final Review. Fall 2017 Prof. Daniel Menasce
CS 465 Final Review Fall 2017 Prof. Daniel Menasce Ques@ons What are the types of hazards in a datapath and how each of them can be mi@gated? State and explain some of the methods used to deal with branch
More information