Virtualization 3 Subtitle: “What can we do to a VM?” Learning Objectives: – To understand the VM-handling mechanisms of a hypervisor – To understand how.

Slides:



Advertisements
Similar presentations
Remus: High Availability via Asynchronous Virtual Machine Replication
Advertisements

Virtual Machine Technology Dr. Gregor von Laszewski Dr. Lizhe Wang.
A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines Kenichi Kourai Shigeru Chiba Tokyo Institute of Technology.
Virtualization in HPC Minesh Joshi CSC 469 Dr. Box Feb 1, 2012.
Virtual Machine Security Design of Secure Operating Systems Summer 2012 Presented By: Musaad Alzahrani.
Remus: High Availability via Asynchronous Virtual Machine Replication.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #29-1 Chapter 33: Virtual Machines Virtual Machine Structure Virtual Machine.
Chapter 21: Mobile Virtualization Infrastracture and Related Security Issues Guide to Computer Network Security.
Virtualization for Cloud Computing
VIRTUALISATION OF HADOOP CLUSTERS Dr G Sudha Sadasivam Assistant Professor Department of CSE PSGCT.
Virtualization 101.
To run the program: To run the program: You need the OS: You need the OS:
VMware vSphere 4 Introduction. Agenda VMware vSphere Virtualization Technology vMotion Storage vMotion Snapshot High Availability DRS Resource Pools Monitoring.
Presented by : Ran Koretzki. Basic Introduction What are VM’s ? What is migration ? What is Live migration ?
Introduction to Virtual Machines. Administration Presentation and class participation: 40% –Each student will present two and a half times this semester.
Microsoft Desktop Virtualization Migrating to Windows 7 With MED-V.
Virtualization Technology Prof D M Dhamdhere CSE Department IIT Bombay Moving towards Virtualization… Department of Computer Science and Engineering, IIT.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
CS 149: Operating Systems April 21 Class Meeting
Virtual Infrastructure in the Grid Kate Keahey Argonne National Laboratory.
May l Washington, DC l Omni Shoreham Nick Dobrovolskiy VP Parallels Open Platform May 19 th, 2008 Introducing Parallels Server.
Department of Computer Science Engineering SRM University
Virtual Machine Course Rofideh Hadighi University of Science and Technology of Mazandaran, 31 Dec 2009.
Remus: VM Replication Jeff Chase Duke University.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Benefits: Increased server utilization Reduced IT TCO Improved IT agility.
Xen I/O Overview. Xen is a popular open-source x86 virtual machine monitor – full-virtualization – para-virtualization para-virtualization as a more efficient.
Virtualization Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation is licensed.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Operating Systems ECE344 Ashvin Goel ECE University of Toronto OS-Related Hardware.
INTRODUCTION TO VIRTUALIZATION KRISTEN WILLIAMS MOSES IKE.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
System Virtualization 1 Learning Objective: –To understand the implementation choices and details of System Virtualization COMP
CERN IT Department CH-1211 Genève 23 Switzerland t Evolution of virtual infrastructure with Hyper-V Juraj Sucik, Slavomir Kubacka Internet.
Server Virtualization & Disaster Recovery Ryerson University, Computer & Communication Services (CCS), Technical Support Group Eran Frank Manager, Technical.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
Case for Server Virtualization. Content Why virtualize? Business value of virtualization Virtualization technologies & Hyper-V overview Management and.
Virtual Machines Created within the Virtualization layer, such as a hypervisor Shares the physical computer's CPU, hard disk, memory, and network interfaces.
Efficient Live Checkpointing Mechanisms for computation and memory-intensive VMs in a data center Kasidit Chanchio Vasabilab Dept of Computer Science,
COMP25212: Virtualization 3 Subtitle: “What can we do to a VM?” Learning Objectives: –To understand the VM-handling mechanisms of a hypervisor –To understand.
Lecture 26 Virtual Machine Monitors. Virtual Machines Goal: run an guest OS over an host OS Who has done this? Why might it be useful? Examples: Vmware,
Virtualization One computer can do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Turning hardware.
Alessandro Cardoso, Microsoft MVP Creating your own “Private Cloud” with Windows 10 Hyper- V WIN443.
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
CS 140 Lecture Notes: Virtual MachinesSlide 1 Process Abstraction Instruction Set Registers MMU I/O Devices Physical Memory Virtual Memory System Calls.
Virtual Machines Module 2. Objectives Define virtual machine Define common terminology Identify advantages and disadvantages Determine what software is.
E Virtual Machines Lecture 6 Topics in Virtual Machine Management Scott Devine VMware, Inc.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
VIRTUAL MACHINE – VMWARE. VIRTUAL MACHINE (VM) What is a VM? – A virtual machine (VM) is a software implementation of a computing environment in which.
Virtualization Fundamentals for DBAs Joey D’Antoni February 3, 2015 DBA Fundamentals VC.
1.1 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts – 9 th Edition Chapter 1: Introduction What Operating Systems Do √ Computer-System Organization.
CS352H: Computer Systems Architecture
Lecture 24 Virtual Machine Monitors
TYPES OF SERVER. TYPES OF SERVER What is a server.
Chapter 21: Virtualization Technology and Security
Morgan Kaufmann Publishers Large and Fast: Exploiting Memory Hierarchy
Group 8 Virtualization of the Cloud
CS 140 Lecture Notes: Virtual Machines
Chapter 22: Virtualization Security
Introduction to Operating Systems
EECS 498 Introduction to Distributed Systems Fall 2017
Virtualization Techniques
CS 140 Lecture Notes: Virtual Machines
Process Migration Troy Cogburn and Gilbert Podell-Blume
Virtual machines benefits
CS 140 Lecture Notes: Virtual Machines
Presentation transcript:

Virtualization 3 Subtitle: “What can we do to a VM?” Learning Objectives: – To understand the VM-handling mechanisms of a hypervisor – To understand how many different value-added services are constructed on top of VM-handling mechanisms

Stopping a VM Hypervisor stops and starts VM all the time: – to share CPUs – to serialize access to resources Stop by: – Saving CPU registers into Hypervisor data area Applications Guest A Operating System Virtual Machine Monitor/Hypervisor Applications Host Hardware Guest B Operating System Virtualized

Starting a VM Hypervisor: – gains control (e.g. clock tick) – saves previous VM’s CPU registers – loads next VM’s CPU registers – jumps to next VM’s next-PC (in correct privilege state) Applications Guest A Operating System Virtual Machine Monitor/Hypervisor Applications Host Hardware Guest B Operating System Virtualized

VM State While Stopped VM State: – Memory (all guest physical memory) includes Application state, OS state – CPU state (registers) – Small amount of I/O state Let’s stop VM when I/O is quiescent! Applications Guest A Operating System Virtual Machine Monitor/Hypervisor Applications Host Hardware Guest B Operating System Virtualized

“Freeze” a VM Once suspended, the VM image is self- contained – VM can be (e.g.) copied to a file (LARGE file!) Now, what else can we do with this? Applications Guest A Operating System CPU registers I/O state

Move a VM Applications Guest A Operating System Virtual Machine Monitor/Hypervisor Applications Host Hardware X Guest B Operating System Virtualized Virtual Machine Monitor/Hypervisor Applications Guest C Operating System Virtualized Host Hardware Y Applications Guest B Operating System

Snapshot and Rollback a VM Applications Guest A Operating System Virtual Machine Monitor/Hypervisor Applications Host Hardware Guest B Operating System Virtualized Applications Guest B Operating System Applications Guest B Operating System … Think: Optimizations?

Archive a VM Applications Guest B Operating System

Rapid Provisioning Virtual Machine Monitor/Hypervisor Applications Host Hardware Guest C Operating System Virtualized Applications Guest B Operating System

Virtual Appliances over 1000 downloadable appliances Applications Guest B Operating System Applications Guest B Operating System Applications Guest B Operating System Applications Guest B Operating System Applications Guest B Operating System Applications Guest B Operating System Applications Guest B Operating System Applications Guest B Operating System e.g.: mail server web server hotel system virus scanner firewall

Deploying Secure Desktops Virtual Machine Monitor/Hypervisor Host Hardware Virtualized Desktop Machine Applications Guest Operating System

Live Migration Optimizing migration from “source” to “destination” VMM: – Repeat: Suspend VM on “source” machine Reset all “dirty” bits in VMM’s page tables Resume VM on “source” machine Copy all non-“dirty” pages to destination machine – Until only minimal subset of pages left – Suspend VM on “source” – Copy remaining pages to “destination” – Resume VM on “destination”

Load Balancing Management software monitors “load” on all physical machines If loads are mismatched, migrate a VM from a loaded to a less-loaded machine Independent of Application! Independent of Operating System!

High Availability For critical applications, keep a standby VM available on a different hardware system Regularly copy active VM image to standby VM (but don’t activate it) Activate standby VM if active VM stops responding (VM crashes? VMM crashes? Hardware system fails?)