1 Virtualization "Virtualization software makes it possible to run multiple operating systems and multiple applications on the same server at the same.

Slides:



Advertisements
Similar presentations
An Overview Of Virtual Machine Architectures Ross Rosemark.
Advertisements

Virtualization Dr. Michael L. Collard
Virtualisation From the Bottom Up From storage to application.
Popek & Goldberg’s notation
Xen , Linux Vserver , Planet Lab
ELEC6200, Fall 07, Oct 29 Westrom: Virtual Machines 1 Kenneth Westrom ELEC-6620.
Virtual Machines. Virtualization Virtualization deals with “extending or replacing an existing interface so as to mimic the behavior of another system”
Virtualization for Cloud Computing
LINUX Virtualization Running other code under LINUX.
Distributed Systems CS Virtualization- Overview Lecture 22, Dec 4, 2013 Mohammad Hammoud 1.
Introduction to Virtual Machines. Administration Presentation and class participation: 40% –Each student will present two and a half times this semester.
A Survey on Virtualization Technologies
Virtualization Technology Prof D M Dhamdhere CSE Department IIT Bombay Moving towards Virtualization… Department of Computer Science and Engineering, IIT.
Tanenbaum 8.3 See references
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
A Survey on Virtualization Technologies. Virtualization is “HOT” Microsoft acquires Connectix Corp. EMC acquires VMware Veritas acquires Ejascent IBM,
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Virtualization Concepts Presented by: Mariano Diaz.
V IRTUALIZATION Sayed Ahmed B.Sc. Engineering in Computer Science & Engineering M.Sc. In Computer Science.
Xen I/O Overview. Xen is a popular open-source x86 virtual machine monitor – full-virtualization – para-virtualization para-virtualization as a more efficient.
Virtualization Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation is licensed.
Introduction 1-1 Introduction to Virtual Machines From “Virtual Machines” Smith and Nair Chapter 1.
Virtual Machine and its Role in Distributed Systems.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
Outline Basic VM Concepts Formal Definitions Virtualization Theorems
Formal Requirements for Virtualizable Third Generation Architectures
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
Cloud Operating System Unit 09 Cloud OS Core Technology M. C. Chiang Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung,
Full and Para Virtualization
Lecture 12 Virtualization Overview 1 Dec. 1, 2015 Prof. Kyu Ho Park “Understanding Full Virtualization, Paravirtualization, and Hardware Assist”, White.
Introduction Why are virtual machines interesting?
Operating-System Structures
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
Cloud Computing – UNIT - II. VIRTUALIZATION Virtualization Hiding the reality The mantra of smart computing is to intelligently hide the reality Binary->
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
Virtualization Neependra Khare
CS 695 Topics in Virtualization and Cloud Computing, Autumn 2012 CS 695 Topics in Virtualization and Cloud Computing More Introduction + Processor Virtualization.
Virtualization for Cloud Computing
A move towards Greener Planet
VIRTUALIZATION.
Introduction to Virtualization
Virtualization.
Virtualization D. J. Foreman 2009.
L2- Virtualization Technology
Virtualization Dr. Michael L. Collard
Prepared by: Assistant prof. Aslamzai
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
Virtual Machines: Versatile Platforms for Systems and Processes
Historical developments
Formal Virtual Machines
Virtualization, Cloud Computing and Big Data
Virtualization overview
Virtual Servers.
Running other code under LINUX
Group 8 Virtualization of the Cloud
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
OS Virtualization.
Virtualization Layer Virtual Hardware Virtual Networking
Virtualization Techniques
Characteristics of Virtualized Environments
A Survey on Virtualization Technologies
Virtual Machines (Introduction to Virtual Machines)
Anil Madhavapeddy Cloud Computing Virtualization Anil Madhavapeddy
Introduction to Virtual Machines
Introduction to Virtual Machines
Virtualization Dr. S. R. Ahmed.
Distributed Systems CS
Hypervisor A hypervisor or virtual machine monitor (VMM) is computer software, firmware or hardware that creates and runs virtual machines. A computer.
Presentation transcript:

1 Virtualization "Virtualization software makes it possible to run multiple operating systems and multiple applications on the same server at the same time," said Mike Adams, director of product marketing at Vmware Virtualization is a large umbrella of technology and concepts that are meant to provide an abstract environment – whether virtual hardware or an operating system – to run applications.

Why Virtualization? Increased performance and computing capacity Underutilized hardware and software resources Lack of space Greening initiatives Rise in administrative costs 2

Charateristics Cloud Computing 3 Virtualization Layer Virtual Hardware Virtual Networking Virtual Storage Software Emulation Host Physical Hardware Physical Storage Physical Networking Guest Applications Virtual Image

Cloud Computing 4 Aggregation Sharing Emulation Isolation Virtualization Physical Resources Virtual Resources ● Increased Security ● Managed Execution ● Portability Characteristics continued ……

Cloud Computing 5 Taxonomy of Virtualization Techniques Virtualization Execution Environment Storage Network …. Emulation High-Level VM Multiprogramming Hardware-assisted Virtualization Hardware-assisted Virtualization Process Level System Level Paravirtualization Full Virtualization How it is done? Technique Virtualization Model Application Programming Language Operating System Hardware Partial Virtualization

Cloud Computing 6 Libraries API ABI Hardware Operative System ISA Applications Operative System Hardware Libraries Applications API calls System calls ISA User ISA User ISA Machine Reference Model Execution virtualization

Security rings and privilege modes Cloud Computing 7 Ring 3 Ring 2 Ring 1 Ring 0 Least privileged mode (user mode) Privileged modes Most privileged mode (supervisor mode) Execution modes Supervisor mode(Master/kernel) Used by OS/hypervisor (runs above supervisor mode) Sensitive operations on hardware level resources User mode Restrictions on machine resources

Hardware – level virtualization 8

Hypervisor 9 ABI Hardware Operative System ISA Virtual Machine Manager ISA VM Hardware ISA Virtual Machine Manager ISA VM Type 2 Type 1 Properties of VMM Equivalence Resource Control Efficiency

Hypervisor Reference Architecture 10 Virtual Machine Manager ISA Virtual Machine Instance Instructions (ISA) Interpreter Routines Interpreter Routines Interpreter Routines Interpreter Routines Allocator Dispatcher

Theorems proposed by Propek and Goldberg 11 Theorem 1: For any conventional third-generation computer, a VMM may be constructed if the set of sensitive instructions for that computer is a subset of the set of privileged instructions. User Instructions Sensitive Instructions Privileged Instructions

Continued.. 12 Theorem 2: A conventional third-generation computer is recursively virtualizable if ● it is virtualizable, and ● a VMM without any timing dependencies can be constructed from it. Theorem 3: A hybrid VMM may be constructed for any conventional third generation machine, in which the set of user sensitive instructions are a subset of the set of privileged instructions.

Hardware Virtualization Techniques 13 Hardware-assisted Virtualization Originally introduced in IBM System/370 x86 architecture did not meet the Popek and Goldberg virtualization requirements. Specific limitations Inability to trap on some privileged instructions. To compensate for the architectural limitations we have Full Virtualization Paravirtualization Partial Virtualization

Continued OS Level virtualization Programming level virtualization Application level virtualization Interpretation Binary translation 14

Other types of Virtualization Storage pooling of physical storage from multiple network virtually into single storage managed from central console. Storage area networks (SANs). Networks splitting up the available bandwidth into channels Assigned/reassigned to a particular server or device in real time. Execution environment 15

Disadvantage Performance degradation Latencies and delays Communication overhead Inefficiency and degraded user experience Insufficient features – emulator cannot replicate certain features Degraded experience : default Hardware mapping Security holes and new threats Phishing Hardware virtualization : malicious thin VMM Ex. BluePill – AMD family ( moves execution of installed OS within a VM) SubVirt: infects guest OS when rebooted. 16

Technology examples Xen – Paravirtualization VmWare – Full Virtualization Microsoft Hyper - V Cloud Computing 17