COMP25212: Virtualization 3 Subtitle: “What can we do to a VM?” Learning Objectives: –To understand the VM-handling mechanisms of a hypervisor –To understand.

Slides:



Advertisements
Similar presentations
Remus: High Availability via Asynchronous Virtual Machine Replication
Advertisements

Virtual Machine Technology Dr. Gregor von Laszewski Dr. Lizhe Wang.
A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines Kenichi Kourai Shigeru Chiba Tokyo Institute of Technology.
Virtualization in HPC Minesh Joshi CSC 469 Dr. Box Feb 1, 2012.
Adam Duffy Edina Public Schools.  The heart of virtualization is the “virtual machine” (VM), a tightly isolated software container with an operating.
Virtual Machine Security Design of Secure Operating Systems Summer 2012 Presented By: Musaad Alzahrani.
Remus: High Availability via Asynchronous Virtual Machine Replication.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #29-1 Chapter 33: Virtual Machines Virtual Machine Structure Virtual Machine.
Chapter 21: Mobile Virtualization Infrastracture and Related Security Issues Guide to Computer Network Security.
Virtualization for Cloud Computing
Virtualization Infrastructure Administration Cluster Jakub Yaghob.
Jennifer Rexford Princeton University MW 11:00am-12:20pm SDN Software Stack COS 597E: Software Defined Networking.
Virtualization 101.
To run the program: To run the program: You need the OS: You need the OS:
VMware vSphere 4 Introduction. Agenda VMware vSphere Virtualization Technology vMotion Storage vMotion Snapshot High Availability DRS Resource Pools Monitoring.
Presented by : Ran Koretzki. Basic Introduction What are VM’s ? What is migration ? What is Live migration ?
Introduction to Virtual Machines. Administration Presentation and class participation: 40% –Each student will present two and a half times this semester.
Microsoft Desktop Virtualization Migrating to Windows 7 With MED-V.
Virtualization Technology Prof D M Dhamdhere CSE Department IIT Bombay Moving towards Virtualization… Department of Computer Science and Engineering, IIT.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
CS 149: Operating Systems April 21 Class Meeting
Virtual Infrastructure in the Grid Kate Keahey Argonne National Laboratory.
May l Washington, DC l Omni Shoreham Nick Dobrovolskiy VP Parallels Open Platform May 19 th, 2008 Introducing Parallels Server.
Department of Computer Science Engineering SRM University
Virtual Machine Course Rofideh Hadighi University of Science and Technology of Mazandaran, 31 Dec 2009.
Remus: VM Replication Jeff Chase Duke University.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Benefits: Increased server utilization Reduced IT TCO Improved IT agility.
Virtualization Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation is licensed.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Operating Systems ECE344 Ashvin Goel ECE University of Toronto OS-Related Hardware.
INTRODUCTION TO VIRTUALIZATION KRISTEN WILLIAMS MOSES IKE.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
System Virtualization 1 Learning Objective: –To understand the implementation choices and details of System Virtualization COMP
CERN IT Department CH-1211 Genève 23 Switzerland t Evolution of virtual infrastructure with Hyper-V Juraj Sucik, Slavomir Kubacka Internet.
Server Virtualization & Disaster Recovery Ryerson University, Computer & Communication Services (CCS), Technical Support Group Eran Frank Manager, Technical.
Virtualization 3 Subtitle: “What can we do to a VM?” Learning Objectives: – To understand the VM-handling mechanisms of a hypervisor – To understand how.
Case for Server Virtualization. Content Why virtualize? Business value of virtualization Virtualization technologies & Hyper-V overview Management and.
Virtual Machines Created within the Virtualization layer, such as a hypervisor Shares the physical computer's CPU, hard disk, memory, and network interfaces.
Efficient Live Checkpointing Mechanisms for computation and memory-intensive VMs in a data center Kasidit Chanchio Vasabilab Dept of Computer Science,
Lecture 26 Virtual Machine Monitors. Virtual Machines Goal: run an guest OS over an host OS Who has done this? Why might it be useful? Examples: Vmware,
Virtualization One computer can do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Turning hardware.
Alessandro Cardoso, Microsoft MVP Creating your own “Private Cloud” with Windows 10 Hyper- V WIN443.
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
CS 140 Lecture Notes: Virtual MachinesSlide 1 Process Abstraction Instruction Set Registers MMU I/O Devices Physical Memory Virtual Memory System Calls.
Virtual Machines Module 2. Objectives Define virtual machine Define common terminology Identify advantages and disadvantages Determine what software is.
E Virtual Machines Lecture 6 Topics in Virtual Machine Management Scott Devine VMware, Inc.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
VIRTUAL MACHINE – VMWARE. VIRTUAL MACHINE (VM) What is a VM? – A virtual machine (VM) is a software implementation of a computing environment in which.
Virtualization Fundamentals for DBAs Joey D’Antoni February 3, 2015 DBA Fundamentals VC.
1.1 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts – 9 th Edition Chapter 1: Introduction What Operating Systems Do √ Computer-System Organization.
CS352H: Computer Systems Architecture
Lecture 24 Virtual Machine Monitors
TYPES OF SERVER. TYPES OF SERVER What is a server.
Chapter 21: Virtualization Technology and Security
Morgan Kaufmann Publishers Large and Fast: Exploiting Memory Hierarchy
Group 8 Virtualization of the Cloud
CS 140 Lecture Notes: Virtual Machines
Chapter 22: Virtualization Security
Introduction to Operating Systems
EECS 498 Introduction to Distributed Systems Fall 2017
Virtualization Techniques
CS 140 Lecture Notes: Virtual Machines
Process Migration Troy Cogburn and Gilbert Podell-Blume
Virtual machines benefits
CS 140 Lecture Notes: Virtual Machines
Presentation transcript:

COMP25212: Virtualization 3 Subtitle: “What can we do to a VM?” Learning Objectives: –To understand the VM-handling mechanisms of a hypervisor –To understand how many different value- added services are constructed on top of VM-handling mechanisms COMP Feb 2013

Stopping a VM Hypervisor stops and starts VM all the time: –to share CPUs –to serialize access to resources Stop by: –Saving CPU registers into Hypervisor data area COMP Applications Guest A Operating System Virtual Machine Monitor/Hypervisor Applications Host Hardware Guest B Operating System Virtualized Feb 2013

Starting a VM Hypervisor: –gains control (e.g. clock tick) –saves previous VM’s CPU registers –loads next VM’s CPU registers –jumps to next VM’s next-PC (in correct privilege state) COMP Applications Guest A Operating System Virtual Machine Monitor/Hypervisor Applications Host Hardware Guest B Operating System Virtualized Feb 2013

VM State While Stopped VM State: –Memory (all guest physical memory) includes Application state, OS state –CPU state (registers) –Small amount of I/O state Let’s stop VM when I/O is quiescent! COMP Applications Guest A Operating System Virtual Machine Monitor/Hypervisor Applications Host Hardware Guest B Operating System Virtualized Feb 2013

“Freeze” a VM Once suspended, the VM image is self- contained –VM can be (e.g.) copied to a file (LARGE file!) Now, what else can we do with this? COMP Applications Guest A Operating System CPU registers I/O state Feb 2013

Move a VM COMP Applications Guest A Operating System Virtual Machine Monitor/Hypervisor Applications Host Hardware X Guest B Operating System Virtualized Virtual Machine Monitor/Hypervisor Applications Guest C Operating System Virtualized Host Hardware Y Applications Guest B Operating System Feb 2013

Snapshot and Rollback a VM COMP Applications Guest A Operating System Virtual Machine Monitor/Hypervisor Applications Host Hardware Guest B Operating System Virtualized Think: Optimizations? Feb 2013 Applications Guest B Operating System Snapshot 1 Applications Guest B Operating System … Snapshot n

Archive a VM COMP Applications Guest B Operating System Applications Guest B Operating System Feb 2013

Rapid Provisioning COMP Virtual Machine Monitor/Hypervisor Applications Host Hardware Guest C Operating System Virtualized Applications Guest B Operating System Feb 2013

Virtual Appliances over 1000 downloadable appliances COMP Applications Guest B Operating System Applications Guest B Operating System Applications Guest B Operating System Applications Guest B Operating System Applications Guest B Operating System Applications Guest B Operating System Applications Guest B Operating System Applications Guest B Operating System e.g.: mail server web server hotel system virus scanner firewall Feb 2013

Deploying Secure Desktops COMP Virtual Machine Monitor/Hypervisor Host Hardware Virtualized Desktop Machine Applications Guest Operating System Feb 2013

Live Migration Optimizing live migration from “source” to “destination” VMM: –Copy every page from “source” to “destination” machine reset “dirty” bit in VMM’s page table for every page copied –Repeat: Find next non-“dirty” page in “source” machine Copy to “destination” machine and reset “dirty” bit –Until only minimal subset of pages left –Suspend VM on “source” –Copy remaining pages to “destination” –Resume VM on “destination” COMP Feb 2013

Load Balancing Management software monitors “load” on all physical machines If loads are mismatched, migrate a VM from a loaded to a less-loaded machine Independent of Application! Independent of Operating System! COMP Feb 2013

High Availability For critical applications, keep a standby VM available on a different hardware system Regularly copy active VM image to standby VM (but don’t activate it) Activate standby VM if active VM stops responding (VM crashes? VMM crashes? Hardware system fails?) Independent of Application! Independent of Operating System! COMP Feb 2013