Presentation is loading. Please wait.

Presentation is loading. Please wait.

Virtualization Techniques

Similar presentations


Presentation on theme: "Virtualization Techniques"— Presentation transcript:

1 Virtualization Techniques

2 Learning Objectives Analyze details of virtualization concept
Understand different types of virtualization techniques Explore interoperability standards Concept of VLAN,VSAN and VM

3 Virtualization technology
A massively growing concept of computing and IT A creation of new virtual version of any product or service Example ?? Disk partition of one hard drive that we use in our system

4 Virtualization is separation of resources and requests
Example is virtual memory The combination of virtual infrastructure offers a layers of abstraction between computing, networking hardware, storage and various applications that is running on it

5 Virtual Machine A closely detached software device that could run its own operating systems and application as if it is running on physical computer. It contains its own virtual RAM, hard disk, CPU and Network interface card.

6 Guest Operating System
Operating System running in a VM environment or on different physical system.

7 Hypervisor A hypervisor or virtual machine monitor (VMM) is a software that creates and runs virtual machines. A computer on which a hypervisor is running one or more virtual machines is defined as a Host machine. E.g. Oracle Virtual Box

8 Hosted Virtualization
A virtualization method where virtualization and partitioning services run on top of an OS E.g. VMware Workstation.

9 Before Virtualization
There is one OS image per machine Software and hardware are tightly bound Multiple applications that run on same machine usually create complexity Resources are not used optimally Infrastructure is neither flexible nor economically effective

10 After Virtualization Provisioning of VMs can be done on any system
OS and application work as a single unit OS and applications are independent of hardware

11 Also called as x86 virtualization
CPU Virtualization Also called as x86 virtualization

12

13 x86 Privilege Level Architecture

14 The Challenges of x86 Hardware Virtualization
x86 operating systems are designed to run directly on the Bare-metal hardware, so they naturally assume that they fully own the computer hardware. Some sensitive instructions can’t effectively be virtualized as they have different semantics when they are not executed in Ring 0. The difficulty in trapping and translating these sensitive and privileged instruction requests at runtime was the challenge that originally made x86 architecture virtualization look impossible.

15 Three alternative techniques now exist for handling sensitive and privileged instructions to virtualizes the CPU in x86 architecture.

16 a) Full virtualization using Binary Translation b) Paravirtualization or OS-Enabled virtualization c) Hardware Assisted Virtualization

17 Full Virtualization using Binary Translation

18 Full Virtualization using Binary Translation Contd.
This approach translates kernel code to replace non virtualizable instructions with new sequences of instructions that have the intended effect on the virtual hardware. Meanwhile, user level code is directly executed on the processor for high performance virtualization. Each virtual machine monitor provides each Virtual Machine with all the services of the physical system, including a virtual BIOS, virtual devices and virtualized memory management.

19 Para virtualization or OS-Assisted Virtualization

20 Paravirtualization refers to communication between the guest OS and the hypervisor to improve performance and efficiency. Paravirtualization involve modifying the OS kernel to replace non virtualizable instructions with hypercalls that communicate directly with the virtualization layer hypervisor. The hypervisor also provides hypercall interfaces for other critical kernel operations such as memory management, interrupt handling and time keeping.

21 Hardware Assisted Virtualization

22 In this privileged and sensitive calls are set to automatically trap to the hypervisor, removing the need for either binary translation or paravirtualization. The guest state is stored in Virtual Machine Control Structures (VT-x) or Virtual Machine Control Blocks (AMD-V). Processors with Intel-VT and AMD-V

23 In this privileged and sensitive calls are set to automatically trap to the hypervisor, removing the need for either binary translation or paravirtualization.

24 Memory virtualization: This associates allotment of physical memory and dynamical allotment among all VMs.

25 Device and I/O virtualization:
These include handling the routing of I/O requests between the shared physical hardware and virtual devices Example: Virtual NICs

26 Network virtualization: When all the separate resources of a network are combined and the condition that allows the network administrator to share them among all network users. Server virtualization:

27 Client or Desktop virtualization:
It is like a separation of PC desktop environment from a physical machine through the client server model of computing There are 2 types: Remote (server-hosted) : OS is hosted on a server in the data center Local (Client-hosted): OS runs locally on the user’s PC hardware Application Virtualization It is the execution of running software from a remote server rather than the user’s computer Example: Dynamic link lib

28 Virtualization Products
Category of Virtualization products Type I virtualization: directly runs on bare metal hardware, there is no need of installing OS, Type I hypervisor itself works like an OS example: Vmware ESX and ESXi, Citrix Xen server Type II virtualization: runs directly on OS or any hosted OS example: Oracle VM virtual box, KVM (kernel based VM)

29 VmWare server: Company of making virtualization products
Benefits: Extra servers Increase the CPU utilization Runs Linux, solaris, win, and applications on a simple physical server Transfers VMs from one physical server to another Captures the full state of a VM Gives the choice to access enterprise class product software

30 (In comes virtualization, The Five step process)

31 Move to Virtualization..
▼ What is virtualization? ■ Why would we need it? ■ How can it improve my business? ■ What types of virtualization technologies exist? ■ Which terms should I be familiar with? ■ What is the cost/benefit ratio of virtualization? ■ What new challenges will it bring to the datacenter? ■ How should I structure my virtualization solution? ■ Which applications or services are good virtualization candidates? ■ Which server platforms or form factors are best suited to support virtualization?

32 Move to Virtualization..

33 Green Technologies Greening the datacenter means more than just reducing the number of physical servers contained within it. It means moving forward with green policies and practices. One of the best of these is the acquisition practices in support of new machine purchases

34 A FIVE-STEP PROCESS The move to virtualization relies on five key steps: 1. Discovery The first step begins with datacenter inventories and the identification of potential virtualization candidates. 2. Virtualization The second step focuses on gaining a complete understanding of the value choices that virtualization can offer. 3. Hardware maximization The third step focuses on hardware recovery and how you can make judicial investments when adding new hardware or replacing older systems. 4. Architecture The fourth step looks to the architecture you must prepare to properly introduce virtualization technologies into your datacenter practices. 5. Management The last step focuses on the update of the management tools you use to maintain complete virtualization scenarios in your new dynamic datacenter.

35 STEP ONE: DISCOVERY The first step, Discovery, lets you identify what is in your organization’s network and gives you a view of how it could be transformed. How can you move to virtualization if you don’t know how many servers you are running and what their purpose in your network is?

36 We know that the reason most IT administrators are looking to server virtualization is because of the datacenter crunch. There is no more room in today’s datacenters. Adding more servers always requires more power input as well as more cooling. Datacenter upgrades are expensive. physical servers are hard to provision : acquisition cost and less utilization

37 Inventory It’s amazing just how many organizations do not know what the content of their infrastructure is. Yet, this is the most important step to any virtualization project. Knowing the content of your network can help you maintain it as well as control its growth. If you don’t know what you have, how can you make sure you can protect it and administer it, or, even worse, transform it into a dynamic datacenter.

38 CONTD.. One of the easiest ways to generate an inventory of your network is to work with free tools. For example, many people use the Microsoft Baseline Security Analyzer (MBSA) to scan their networks for vulnerabilities and required updates. MBSA is easy to set up and run against all of the systems in your infrastructure. Once a scan is complete, MBSA provides you with information on each system it scanned, including Internet Protocol (IP) address, operating system, installed applications, and, of course, vulnerabilities. You can easily turn this valuable data into an inventory by linking the results of any MBSA scan with Microsoft Visio through the Microsoft Visio Connector for MBSA. Visio will automatically generate a graphic image of your network and display detailed information on each device when you click on it.

39 Scan for Potential Virtualization Candidates
Microsoft also provides the Microsoft Assessment and Planning (MAP) Toolkit Solution Accelerator. MAP is a tool that can be used to scan your entire network for assessments.

40 Scan for Potential Virtualization Candidates
VMware, the founder of x86 virtualization, also offers two tools that can be used for an assessment of the servers that could be transformed into virtual machines. The first and most readily available to all users is VMware Guided Consolidation (VGC). VGC is available as an integral part of VMware Virtual Center , the management interface used to control both physical hardware and virtual machines running on VMware technology. suitable for networks with fewer than 100 physical servers. VMware's Capacity Planner: For networks with more than 100 servers, rely on VMware’s Capacity Planner to analyze your server resources

41 STEP 2: VIRTUALIZATION After gathering information about systems, we can move on to step 2 and begin to learn about the different virtualization technologies and how they can help solve specific business issues in our organization. Virtualization : The ability to run multiple virtual machines on top of a single physical machine

42 It is important to fully understand which types of virtualization are available
In a dynamic datacenter—one that takes full advantage of the value propositions of virtualization—there will be at least seven layers of virtualization: Server Virtualization (SerV) Storage Virtualization (StoreV) Network Virtualization (NetV) Management Virtualization (ManageV) Desktop Virtualization (DeskV) Presentation Virtualization (PresentV) Application Virtualization (AppV)

43 (1) Server Virtualization (SerV)
It is focused on partitioning a physical instance of an operating system into a virtual instance or virtual machine. True server virtualization products will let you virtualize any x86 or x64 operating system, such as Windows, Linux, and some forms of UNIX. There are two aspects of server virtualization: Software Virtualization (SoftV) Hardware Virtualization (HardV)

44 Contd.. Software Virtualization (SoftV) runs the virtualize operating system on top of a software virtualization platform running on an existing operating system. Ex. Type 2 Hypervisor like Vmware Workstation or Virtual Box Hardware Virtualization (HardV) runs the virtualized operating system on top of a software platform running directly on top of the hardware without an existing operating system. The engine used to run hardware virtualization is usually referred to as a hypervisor (actually Native /Type 1 hypervisor). The purpose of this engine is to expose hardware resources to the virtualized operating systems. Ex.Oracle VM Server, Citrix XenServer

45

46 Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved.
(2) Store Virtualization (StoreV) It is used to merge physical storage from multiple devices so that they appear as one single storage pool. The storage in this pool can take several forms: direct attached storage (DAS), network attached storage (NAS), or storage area networks (SANs). Though storage virtualization is not a requirement for server virtualization, one of the key strengths you will be able to obtain from storage virtualization is the ability to rely on thin provisioning or the assignation of a logical unit (LU) of storage of a given size, but provisioning it only on an as-needed basis.

47 Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved.
(3) Network Virtualization (NetV) It lets you control available bandwidth by splitting it into independent channels that can be assigned to specific resources. For example, the simplest form of network virtualization is the virtual local area network (VLAN), which creates a logical segregation of a physical network. Network-Attached Storage

48 (4) Management Virtualization (ManageV)
It is focused on the technologies that manage the entire datacenter, both physical and virtual, to present one single unified infrastructure for the provision of services. Two key layers are segregated at all times: Resource Pools (RP), which includes the collection of hardware resources— host servers, racks, enclosures, storage, and network hardware—that makes up the datacenter infrastructure Virtual Services Offerings (VSO), or workloads that are made up of the virtual machines—servers and/or desktops—that are client-facing and offer services to end users

49 Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved.
(5) Desktop Virtualization (DeskV) allows you to rely on virtual machines to provision desktop systems. users access centralized desktops through a variety of thin or unmanaged devices Network-Attached Storage

50 Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved.
(6) Presentation Virtualization (PresentV) Until recently called Terminal services provides only the presentation layer from a central location to users The need for PresentV is diminishing because of the introduction of technologies such as Application Virtualization Network-Attached Storage

51 Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved.
(7) Application Virtualization (AppV) uses the same principles as software based SerV, but instead of providing an engine to run an entire operating system, AppV decouples productivity applications from the operating system. Application virtualization layers replace part of the runtime environment normally provided by the operating system. The layer intercepts all file and Registry operations of virtualized applications and transparently redirects them to a virtualized location, often a single file Network-Attached Storage

52 Contd.. There are other key terms that make up the language of virtualization in the datacenter. These include: Host server The physical server running virtual machine workloads. Guest operation system A virtualized operating system running as a workload on a host server. Resource Pool The collection of hardware resources, including host servers that make up the datacenter infrastructure. Virtual Service Offerings The virtual machines that are client-facing and offer services to end users. They are also often referred to as virtual workloads. Virtual Appliances (VAPs) Pre-packaged VSOs that run a specific application or workload. Policy-based workloads VSOs that are powered up on an as-needed basis through automated policies.

53 What Is a Virtual Machine?
VMs are then made up of several different components: Configuration file A file that contains the settings information—amount of RAM, number of processors, number and type of network interface cards (NICs), number and type of virtual disks—for the virtual machine. Each time you create a new virtual machine, you create a virtual machine configuration file, that is, a file that tells the virtualization software how to allocate physical resources from the host to the virtual machine.

54 Hard disk file(s) Files that contain any information which would normally be contained within a physical hard disk. Each time you create a virtual machine, the virtualization software will create a virtual hard disk, that is, a file that acts like a typical sector-based disk. When you install the operating system on the virtual machine, it will be contained in this file. Like a physical system, each virtual machine can have several disk files.

55 BENEFITS The first one is certainly at the deployment level. A virtual machine can often be built and customized in less than 20 minutes. You can deliver a virtual machine that is ready to work right away in considerably less time than with a physical machine. Another benefit is virtual machine mobility. You can move a VM from one host to another at any time. Virtual machines are just easy to use. Once it is built and configured, you just start the machine and it is immediately ready to deliver services to users. Virtual machines also support the concept of volatile services. If a tester or developer needs a virtual machine to perform a given series of tests, you can fire up a new VM, provide it to them in minutes, and then, when they are done with it, you simply delete it.

56 Contd.. VMs can be scaled out or scaled up. To scale out, simply create more VMs with the same services. To scale up, shut down the VM and assign more resources, such as RAM, processor cores, disks, and NICs to it. VMs are also ideal for disaster recovery, since all you need to do is copy their files to another location, either within your datacenter or to another site entirely.

57 Concept of VLAN (Virtual LAN) and Benefits
Virtual LAN is a logical segmentation of local area network (LAN) into different set of broadcasting domains. Because the segmentation is not physical it is called virtual. Different Users in same location or in different locations can use the same LAN.

58

59

60 Advantages High Performance:
Generally, switches and routers need more processing time for incoming traffic because as the traffic passes through the routers, latency increases and the network performance decreases. If VLAN is used, then there is no need of extra routers since VLAN creates broadcasting domains.

61 Virtual workgroups: In current scenario, most of the communication within the organization takes place in small workgroups (e.g. development team , marketing team , accounting team) to manage broadcast and multi-cast functionality within the workgroups, VLAN can be used to enable communication.

62 cost effective The cost of routers can be reduced when VLANs are used like broadcasting domains

63 Easy administration Traditional LAN has many access management issues, including LAN cabling, new station setup and addressing, and configuration of hubs and routers. While using vLAN this access management effort can be reduced because user movement within vLAN requires no reconfiguration of routers and hubs.

64 Enhanced security VLAN is also used to set firewalls, restrict access permission for outside access, adding an extra layer of security for intrusion detection and controlling broadcasting domain.

65 Concept of SAN (Virtual SAN) and Benefits
When a Logical partition is created within a physical storage area network (SAN), it is called virtual storage area network (VSAN). Virtualization technology enables division and allocation of entire storage area network into more logical SANs

66

67 Benefits of SAN Enhanced application availability
Higher application performance Centralized and consolidated storage Data transfer and vaulting to remote sites Simplified centralized management

68

69

70 VM Migration It refers to the movement or transfer between different physical machines without any discontinuity

71 VM Consolidation & Management

72 Cloud Interoperability Standards
There is a strong need for the development of integrated interoperability authentication among all provider. Several organizations such as the Cloud Computing Interoperability Forum (CCIF) have been working on solutions to address cloud interoperability challenges. The Cloud Standards Customer Council (CSCC) provides the opportunity to convert and synchronize client needs and specified requirement into standards of development cloud firms and also for cloud users. It provides standard research materials and documents.

73 Categories of Interoperability
When consumer wish to migrate from one cloud Provider to another, interoperability falls into these categories: 1. Data and Application Portability: It means by running applications and data, consumers should be able to migrate easily from one cloud provider to another without any lock-in issue. 2. Platform Portability: It means application development environment or IDE should be capable enough to run over any type of cloud infrastructure. 3. Infrastructure Portability: It means virtual server or machine images should have the freedom of portability. They should be able to migrate from one cloud provider to another.

74 Open Standards for Solving Cloud Interoperability Challenges
Application Solution Platform Solution Infrastructure Solution

75 Open Virtualization Format
Characteristics: 1) Open standard 2) Portable VM packaging 3) Optimized for distribution 4) Multiple VM support

76 3.VIRTUALIZATION

77 3.1 Move to Virtualization..
Increased Performance and Computing Capacity. Underutilized Hardware and Software Resources. Lack of Space. Greening Initiatives. Rise of Administration

78 3.2 Characteristics of Virtualized Environment
Virtualization Layer Virtual Hardware Virtual Networking Virtual Storage Software Emulation Host Physical Hardware Physical Storage Physical Networking Guest Applications Virtual Image Virtualization Reference Model

79 Characteristics of Virtualized Environment Cont..
Increased Security The ability to control the execution of a guest in a completely transparent manner opens new possibilities for delivering a secure, controlled execution environment. The virtual machine represents an emulated environment in which the guest is executed. All the operations of the guest are generally performed against the virtual machine, which then translates and applies them to the host. This level of indirection allows the VMM to control and filter the activity of guest, thus preventing the harmful operations from being performed.

80 Characteristics of Virtualized Environment Cont..
Managed Execution Virtualization of the execution environment does not only allow increased security but a wider range of features can be implemented. In particular, sharing, aggregation, emulation, and isolation are the most relevant.

81 Characteristics of Virtualized Environment Cont..
Managed Execution includes following: A)Sharing B)Aggregation C)Emulation D)Isolation Portability

82

83 3.3 Taxonomy of Virtualization Techniques
Execution Environment Storage Network …. Emulation High-Level VM Multiprogramming Hardware-assisted Process Level System Level Paravirtualization Full Virtualization How it is done? Technique Virtualization Model Application Programming Language Operating System Hardware Partial Virtualization

84 3.3.1 Execution Virtualization 1.Machine Reference Model
Libraries API ABI Hardware Operative System ISA Applications API calls System calls User

85 2. Hardware Level Virtualization
Host VMM Virtual Machine binary translation instruction mapping interpretation …… Guest In memory representation Storage Virtual Image Host emulation

86

87 Hypervisors

88 3)Hardware Virtualization Techniques
Hardware assisted virtualization Full virtualization Para virtualization Partial virtualization

89 4) OS Level Virtualization
OS level virtualization offers the opportunity to create different and separated execution environments for applications that are managed concurrently. It is different from hardware virtualization —there is no virtual machine manager or hypervisor, and the virtualization is done within a single operating system, where the OS kernel allows for multiple isolated user space instances.

90 5)Programming Level Virtualization
Programming level virtualization is mostly used for achieving ease of deployment of applications, managed execution, and portability across different platforms and operating systems. It consists of a virtual machine executing the byte code of a program, which is the result of the compilation process.

91 6) Application Level Virtualization
Interpretation Binary Translation

92 Virtualization and Cloud Computing
Server A (running) VM Server B Virtual Machine Manager (inactive) Before Migration After Migration

93 Advantages of Virtualization
Eliminates the need for numerous dedicated servers; Offers the ability for different domain names, file directories, administration, IP addresses, logs and analytics; Cost effective because many times server software installation provisioning is available; If one virtual server has a software failure, the other servers will not be affected; Reduces energy costs because only one device is running instead of several; Offers a flexible IT infrastructure; Can quickly make changes with little downtime.

94 Disadvantages of Virtualization
Resource hogging could occur if there are too many virtual servers within a physical machine. As software updates and patches must be compatible with everything running on the virtual machine, admin may have reduced control over the physical environment. Administration, including backup and recovery, requires specialized knowledge. If user experience is impacted, it can be difficult to identify the root cause. Services offered by a dedicated server are more accessible.

95 Characteristics of Virtualized Environments

96 Virtual Reference model
Virtualization Layer Virtual Hardware Virtual Networking Virtual Storage Software Emulation Host Physical Hardware Physical Storage Physical Networking Guest Applications Virtual Image

97 Characteristics of Virtualized Solutions ?????

98 Characteristics of Virtualized Solutions
Increased Security The ability to control the execution of a guest in a completely transparent manner opens new possibilities for delivering a secure, controlled execution environment. The virtual machine represents an emulated environment in which the guest is executed. All the operations of the guest are generally performed against the virtual machine, which then translates and applies them to the host.

99 Managed Execution Virtualization of the execution environment does not only allow increased security but a wider range of features can be implemented. In particular, sharing, aggregation, emulation, and isolation are the most relevant.

100 Aggregation: Cluster Management Software
Emulation: Arcade game emulators allowing playing arcade games on a normal personal computer.(MAME) Isolation- Performance Tuning QOS infrastructure.

101 Portability In case of hardware virtualization solution, the guest is packaged into a virtual image, that in most of the cases, can be safely moved and executed on the top of different virtual machine.

102 TAXONOMY of virtualization Techniques
First classification service or entity being emulated.

103 Pros and Cons of Virtualization
Virtualization has now become extremely popular and is largely used, especially in Cloud computing. The primary reason of its wide success is the elimination of technology barriers that made virtualization not an effective and viable solution in the past. The most relevant barrier has been performance.

104 Advantages of Virtualization
Managed execution and isolation are perhaps the most important advantages of virtualization. In the case of techniques supporting the Creation of virtualized execution environment, these two characteristics allow building secure and controllable computing environments.

105 Portability is another advantage of virtualization, especially for execution virtualization techniques. Virtual machine instances are normally represented by one or more files that can be easily transported with respect to physical systems.

106 Disadvantages Performance degradation
Inefficiency and Degraded user experience Security holes and new Threats increased latencies and delays in hardware virtualization, malicious prog can preload themselves before the OS and then act as a thin VMM towards it. The OS is then controlled and can be manipulated in order to extract sensitive information from the guest. Examples of these kind of malware are : BLUEPILL and SUBVIRT. BLUEPILL is a malware targeting the AMD processor family and moves the execution of the installed OS within the VM. The original version of SUBVIRT was developed as a prototype by Microsoft through collaboration with Michigan University. SUBVIRT infects the guest OS and when the Vm is rebooted, it gains the control of the host.


Download ppt "Virtualization Techniques"

Similar presentations


Ads by Google