Virtualization. Explain how today s virtualization movement is actually a reinvention
|
|
|
- Esmond Palmer
- 10 years ago
- Views:
Transcription
1 Virtualization Learning Objectives Explain how today s virtualization movement is actually a reinvention of the past. Explain how virtualization works. Discuss the technical challenges to virtualization. Identify the key similarities and differences between a virtual machine monitor (hypervisor) and an operating system. Topics In the beginning: VM/370 What is virtualization? Challenges to virtualization and how to address them. 4/21/15 CS161 Spring
2 Virtual Machines Re-inventing operating systems all over again! In the 1960 s, IBM developed a family of machines (System/360, System/370) and an operating system called VM/360. Enable multiple users to share a single machine by giving each user his/her own machine. Real hardware partitioned into per- machine components: Disk Processors Memory Compared to operating systems, it s just a different way of sharing resources. Conventional OS Share processor via processes Virtual Machine Monitor Share processor across machines Share disk through a global namespace Share disk by giving each machine its own disk and file system namespace Share memory through virtual memory Share memory by partitioning among machines. 4/21/15 CS161 Spring
3 API Conventional operating systems use programmatic APIs: system calls. Virtual machine monitors use the hardware as its API. Think about this for a minute Virtual machines largely died out in the 80 s. They made a (major) a resurgence in the 90 s and continue to do so. WHY? 4/21/15 CS161 Spring
4 Why? Original VM/370: Only way to provide sharing. Motivation when re-introduced: Allow geeks like us to run UNIX/Linux and still read MS docs. Provide effective fault containment on multiprocessors. Distracting motivations: One OS can reboot while others keep running. Can test out new installations (both OS or major servers). Today s motivations: Security: can run dangerous things in a sandbox. Provide a new software delivery vehicle. Optimized application and OS integration. Makes it easy for infrastructure providers to use resources efficiently. Provides isolation between different customers. 4/21/15 CS161 Spring
5 Virtual Machine Architecture Applications Applications Applications Linux FreeBSD Windows Virtual Hardware Virtual Hardware Virtual machine monitor Hardware Virtual Hardware 4/21/15 CS161 Spring
6 So, what is the VMM? A layer of software that multiplexes the actual hardware. While an OS multiplexes among processes, a VMM multiplexes among machines. From the point of view of the OS on a virtual machine or an application, anything running on a different virtual machine looks the same as if it were running on a different piece of hardware. 4/21/15 CS161 Spring
7 Virtualization Goals Must give each virtual machine the complete illusion of a real machine, including: I/O devices interrupts, virtual memory hardware protection levels etc... Must be 100% compatible with existing hardware Run existing, unmodified operating systems and applications directly on the VM!! Must completely isolate VMs from each other Should not allow one VM to stomp on another's memory or CPU state Must have high performance Otherwise nobody will want to use it. 4/21/15 CS161 Spring
8 Why is Virtualization hard? Terminology: VMM:The layer of software that lets you run virtual machines. HostOS: An OS that acts as a VMM; runs natively on the hardware. GuestOS: The OS running in a virtual machine. Guest OS needs to call privileged instructions E.g., to perform I/O, manipulate hardware state, etc. Should we let it do this directly?? Guest OS needs to manipulate page tables To set up virtual->physical mappings for its applications Why is this potentially a bad idea? Guest OS needs to believe it's running on a real machine Must support complete instruction set of processor Must support all the weird virtual memory features (segments, paging, etc.) Must support (at least some) real I/O devices (disk, network, etc.) 4/21/15 CS161 Spring
9 In what mode does a VM run? Typically an operating system runs in supervisor mode, but if we really want to prevent individual machines from executing privileged instructions or directly manipulating the memory manager, then we cannot run a virtual machine in supervisor mode! Running the VM in unprivileged mode is the only way to ensure that a Guest OS doesn t do bad stuff. How do we get the Guest OS to behave like an OS then? Option 1: Interpretation The VMM is simply a software layer that interprets every CPU instruction executed by the VM. Can safely emulate privileged instructions. All machine accesses (CPU execution, memory access, I/O) go through VMM. This works, but It s SLOW! VMM is a full CPU emulator (e.g., superset of Sys161) 4/21/15 CS161 Spring
10 Option 2: Direct Execution Let the Guest OS run directly on the machine, but in user mode. Much faster. What happens when the guest issues a privileged instruction? 4/21/15 CS161 Spring
11 Option 2: Direct Execution Let the Guest OS run directly on the machine, but in user mode. Much faster. What happens when the guest issues a privileged instruction? Trap! Who catches this trap? The software running in supervisor mode, which is the VMM! The VMM examines the faulting instruction and decides what to do: Handle the fault (issue the privileged instruction for the Guest). Disallow the operation and kill the VM 4/21/15 CS161 Spring
12 Example: Application issues System Call Applications Applications Applications write Trap Linux FreeBSD Windows Virtual Trap Hardware Trap handler(sys) Virtual Hardware VMM Hardware Virtual Hardware 4/21/15 CS161 Spring
13 Example: Guest accessing hardware Applications Applications Applications Someone tried to execute a protected instruction! Oh wait, it s a Guest OS. That s OK, I ll do it for Linux FreeBSD them! Windows Send a packet Virtual Hardware Virtual Hardware Virtual Hardware VMM Trap handler (prot) Hardware Trap Write to network 4/21/15 CS161 Spring
14 Protection If the OS and regular applications are both running in unprivileged mode, how do we protect them from each other? For example, how do we prevent the user application from stomping all over kernel memory? Recall that the x86 has multiple protection levels (four to be exact). Let s take advantage of them: Run user code in Ring 3 Run the GuestOS in Ring 1 Run the VMM in Ring 0 4/21/15 CS161 Spring
15 Onward: Memory Management The Guest OS thinks that it has its own page tables (because that s what operating systems do and because when it does actually perform operations on behalf of processes, it needs to be able to translate addresses correctly). But we still do not want the Guest OS to actually manipulate PTEs (or TLB entries). If we let it directly manipulate PTEs, it could map any page. Including pages from other VMs! That would be bad TM. 4/21/15 CS161 Spring
16 Shadow Page Tables Give each virtual machine make-believe page tables (called shadow page tables). The Guest OS will trap to the VMM when it manipulates page tables, allowing the VMM to update the real page tables appropriately. Virtual Machine VAS Shadow page table (READ ONLY) Real page table VM s Physical Memory Trap Write real page table entry VMM Real Physical Memory 4/21/15 CS161 Spring
17 Physical Memory Management How does the VMM allocate memory across virtual machines? Each VM/OS needs some physical memory (enough to run). How do you reclaim space from a VM? Option 1: Swap the entire VM (just like the OS swaps a process) Option 2: VMM-managed paging (just like the OS pages processes). Is the problem any different? Can t we just use the same techniques in the VMM that we use in the OS? 4/21/15 CS161 Spring
18 VMM-based Paging VMM has no idea what pages are used for (or even when they were used recently). VMM can t distinguish between the operating system s pages and application s pages. If the VMM is solely responsible for paging, bad things can happen. Double Paging: VMM picks a page from the Guest OS and evicts it This just means that a page that appears to be in the virtual machine s physical memory is really on disk. Now imagine that the Guest OS is under memory pressure and it decides to evict a page from its physical memory. It could choose a page that the VMM has already evicted. Now, the Guest OS is going to write it a second time! And, in order for the Guest OS to access it to write it to its swap partition, it s going to need to page it back in. This is also bad TM. 4/21/15 CS161 Spring
19 Example: Double Paging Virtual Machine VAS Shadow page table (READ ONLY) Real page table VM s Physical Memory Write this page to disk VMM Fault Real Physical Memory Let s evict this page 4/21/15 CS161 Spring
20 Avoiding Double Paging: Ballooning Whenever we need to evict a real, physical page, we want to trick a Guest OS into picking the page to pick. This suggests that we need the Guest OS to feel memory pressure. How do we induce memory pressure on the guest? Add a balloon driver to each Guest OS The driver allocates (pinned) physical pages. When you inflate the balloon it pins more pages. These pages aren t actually needed; all they do is consume part of the virtual machine s address space; thus they are perfect candidates for the VMM to take away from the Guest! 4/21/15 CS161 Spring
21 Example: Ballooning in action Here is a page I m not using VM1 physical memory this driver needs another page of pinned memory Thanks! I needed that page! VM2 physical memory VM3 physical memory Memory allocated to balloon drivers Thank you! I m giving that page to VM2 Real Physical Memory I d like to evict a page and I d like to take it from VM1 4/21/15 CS161 Spring
22 Optimizing Memory Usage In many cases, you may run many copies of the same Guest OS. These copies use many of the same pages. Just like an OS would like to avoid multiple copies of the same text page, the VMM would like to avoid having multiple copies of the same (OS) text page. How can you identify redundant pages? Borrow a page from the file system folks who do deduplication. Maintain a table of the hash values of all the contents of all the pages in memory. When you are about to allocate a new chunk of real physical memory for a page, lookup its hash value. If the hash is already in the table, compare contents to be sure. If they really are the same, reuse the physical page marking it copy-on-write. This technique is called content-based page sharing. 4/21/15 CS161 Spring
23 I/O Device Interfaces All access to I/O devices must go through VMM This can be very expensive! Many real I/O devices have complex interfaces. Many programmed I/O operations to do simple things E.g., Reading a disk block or sending an Ethernet frame require a lot of interaction with the VMM. Observation: The VMM provides virtual devices Those devices can be dirt simple! Example: Simple network driver with two PIO interfaces. One PIO transmits a packet, another receives a packet. Lesson: If you get to design the hardware, make it simple! 4/21/15 CS161 Spring
24 Hardware Nastiness So far, we ve pretended that it s actually possible to virtualize the CPU, but some architectures are not actually fully virtualizable: Every privileged instruction must trap to the OS when executed in user mode. Except for protection, instructions in privileged and unprivileged mode must operate identically. Guess what: the x86 is not virtualizable! Example: The POPF instruction Restores the CPU state from the stack, into the EFLAGS register. Some bits in the EFLAGS be modified only in supervisor mode. E.g., Interrupt enabled bit When execute in user mode, POPF will not modify the interrupt enabled bit. This leads to different behavior in different modes. This means a Guest OS is not going to observe the behavior it expects if we execute it in user mode. 4/21/15 CS161 Spring
25 VMware Approach Binary translation Code running in each VM is scanned on-the-fly for non-virtualizable instructions Code is rewritten into a safe form This allows you to play some games. When you translate code in the Guest OS, you can incorporate some of the functionality from the virtual machine monitor. Example: Fast versions of I/O processing code Binary translation can be slow, so much of the secret sauce is in making it fast. Once you ve translated a page once, you probably don t want to do it again Maintain a translation cache of recently-rewritten code pages. If you observe the same page again, use its already translated version. Must trap writes to any code page to invalidate the cache This only matters if you allow writable code pages But even if you do, you can get this to work. 4/21/15 CS161 Spring
26 Para-virtualization Binary translation is fairly complex and slow. Paravirtualization is an alternative: Define a virtualizable subset of the x86 instruction set. Port the Guest OS to the new instruction set architecture. Xen uses this approach. Advantages Simple Fast Allows you to simplify OS/VMM interaction. Disadvantages Requires that you port the Guest OS Requires that Guest OS does not depend on any nonvirtualizable features. 4/21/15 CS161 Spring
27 VMware Workstation Virtual machine monitor runs as an application (not a special layer running on the hardware!) Host World Applications VMM World Applications VMX (an application that runs directly on the host OS) One instance per VM Host Operating System VMdriver Hardware Linux Virtual Hardware VMM FreeBSD Virtual Hardware VMM 4/21/15 CS161 Spring
28 References The Origin of the VM/370 Time-Sharing System R. J. Creasy, IBM J. Res. Develop, 25:5, Sep. '81 The double paging anomaly R. P. Goldberg, R. Hassinger, AFIPS 1974 DISCO: Running Commodity Operating Systems on Scalable Multiprocessors E. Bugnion, S. Devince, M. Rosenblum, SOSP 1997 Virtualizing I/O Devices on VMware Workstation s hosted Virtual Machine Monitor J. Sugerman, G. Venkitachalam, B. Lim, USENIX ATC, 2001 Memory Resource Management in the VMWare ESX Server C. Waldspurger, OSDI'02 Xen and the Art of Virtualization P. Barham et al., SOSP'03 4/21/15 CS161 Spring
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
Virtualization. Pradipta De [email protected]
Virtualization Pradipta De [email protected] Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
Microkernels, virtualization, exokernels. Tutorial 1 CSC469
Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
Virtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:
Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between
Virtualization Technology. Zhiming Shen
Virtualization Technology Zhiming Shen Virtualization: rejuvenation 1960 s: first track of virtualization Time and resource sharing on expensive mainframes IBM VM/370 Late 1970 s and early 1980 s: became
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Introduction Have been around
Virtual machines and operating systems
V i r t u a l m a c h i n e s a n d o p e r a t i n g s y s t e m s Virtual machines and operating systems Krzysztof Lichota [email protected] A g e n d a Virtual machines and operating systems interactions
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
Virtualization. ! Physical Hardware. ! Software. ! Isolation. ! Software Abstraction. ! Encapsulation. ! Virtualization Layer. !
Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.
CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization
CS 695 Topics in Virtualization and Cloud Computing More Introduction + Processor Virtualization (source for all images: Virtual Machines: Versatile Platforms for Systems and Processes Morgan Kaufmann;
Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:
Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique
Cloud Computing CS 15-319
Cloud Computing CS 15-319 Virtualization Case Studies : Xen and VMware Lecture 20 Majd F. Sakr, Mohammad Hammoud and Suhail Rehman 1 Today Last session Resource Virtualization Today s session Virtualization
Memory Resource Management in VMware ESX Server
Memory Resource Management in VMware ESX Server Carl Waldspurger OSDI 02 Presentation December 10, 2002 Overview Context Memory virtualization Reclamation Sharing Allocation policies Conclusions 2 2 Motivation
Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361
s COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 1 Virtualization! Create illusion of multiple machines on the same physical hardware! Single computer hosts multiple virtual machines
Cloud Computing #6 - Virtualization
Cloud Computing #6 - Virtualization Main source: Smith & Nair, Virtual Machines, Morgan Kaufmann, 2005 Today What do we mean by virtualization? Why is it important to cloud? What is the penalty? Current
Basics of Virtualisation
Basics of Virtualisation Volker Büge Institut für Experimentelle Kernphysik Universität Karlsruhe Die Kooperation von The x86 Architecture Why do we need virtualisation? x86 based operating systems are
Knut Omang Ifi/Oracle 19 Oct, 2015
Software and hardware support for Network Virtualization Knut Omang Ifi/Oracle 19 Oct, 2015 Motivation Goal: Introduction to challenges in providing fast networking to virtual machines Prerequisites: What
Virtualization Technologies
12 January 2010 Virtualization Technologies Alex Landau ([email protected]) IBM Haifa Research Lab What is virtualization? Virtualization is way to run multiple operating systems and user applications on
System Virtual Machines
System Virtual Machines Introduction Key concepts Resource virtualization processors memory I/O devices Performance issues Applications 1 Introduction System virtual machine capable of supporting multiple
VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D
ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned
Chapter 5 Cloud Resource Virtualization
Chapter 5 Cloud Resource Virtualization Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. Performance and security isolation. Architectural support for virtualization.
x86 ISA Modifications to support Virtual Machines
x86 ISA Modifications to support Virtual Machines Douglas Beal Ashish Kumar Gupta CSE 548 Project Outline of the talk Review of Virtual Machines What complicates Virtualization Technique for Virtualization
Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool
Outline CS 6V81-05: System Security and Malicious Code Analysis Overview of System ization: The most powerful platform for program analysis and system security Zhiqiang Lin Department of Computer Science
Introduction to Virtual Machines
Introduction to Virtual Machines Carl Waldspurger (SB SM 89, PhD 95), VMware R&D 2010 VMware Inc. All rights reserved Overview Virtualization and VMs Processor Virtualization Memory Virtualization I/O
CS5460: Operating Systems. Lecture: Virtualization 2. Anton Burtsev March, 2013
CS5460: Operating Systems Lecture: Virtualization 2 Anton Burtsev March, 2013 Paravirtualization: Xen Full virtualization Complete illusion of physical hardware Trap _all_ sensitive instructions Virtualized
Xen and the Art of. Virtualization. Ian Pratt
Xen and the Art of Virtualization Ian Pratt Keir Fraser, Steve Hand, Christian Limpach, Dan Magenheimer (HP), Mike Wray (HP), R Neugebauer (Intel), M Williamson (Intel) Computer Laboratory Outline Virtualization
Virtual Machines. Virtualization
Virtual Machines Marie Roch Tanenbaum 8.3 contains slides from: Tanenbaum 3 rd ed. 2008 1 Virtualization Started with the IBM System/360 in the 1960s Basic concept simulate multiple copies of the underlying
Virtualization. 2010 VMware Inc. All rights reserved
Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D. Rodgers Intel Virtualization Technology
Virtual Machine Security
Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal
Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/
Virtualization Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ What is Virtualization? Virtualization is the simulation of the software and/ or hardware upon which other software runs. This
OS Virtualization. CSC 456 Final Presentation Brandon D. Shroyer
OS Virtualization CSC 456 Final Presentation Brandon D. Shroyer Introduction Virtualization: Providing an interface to software that maps to some underlying system. A one-to-one mapping between a guest
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to
KVM: A Hypervisor for All Seasons. Avi Kivity [email protected]
KVM: A Hypervisor for All Seasons Avi Kivity [email protected] November 2007 Virtualization Simulation of computer system in software Components Processor: register state, instructions, exceptions Memory
Distributed Systems. Virtualization. Paul Krzyzanowski [email protected]
Distributed Systems Virtualization Paul Krzyzanowski [email protected] Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License. Virtualization
Virtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition
Chapter 16: Virtual Machines Silberschatz, Galvin and Gagne 2013 Chapter 16: Virtual Machines Overview History Benefits and Features Building Blocks Types of Virtual Machines and Their Implementations
nanohub.org An Overview of Virtualization Techniques
An Overview of Virtualization Techniques Renato Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida NCN/NMI Team 2/3/2006 1 Outline Resource
kvm: Kernel-based Virtual Machine for Linux
kvm: Kernel-based Virtual Machine for Linux 1 Company Overview Founded 2005 A Delaware corporation Locations US Office Santa Clara, CA R&D - Netanya/Poleg Funding Expertise in enterprise infrastructure
Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16
Virtualization P. A. Wilsey The text highlighted in green in these slides contain external hyperlinks. 1 / 16 Conventional System Viewed as Layers This illustration is a common presentation of the application/operating
Virtualization. Introduction to Virtualization Virtual Appliances Benefits to Virtualization Example Virtualization Products
Virtualization Originally prepared by Greg Bosch; last modified April 2012 by B. Davison I. Introduction to Virtualization II. Virtual Appliances III. Benefits to Virtualization IV. Example Virtualization
COM 444 Cloud Computing
COM 444 Cloud Computing Lec 3: Virtual Machines and Virtualization of Clusters and Datacenters Prof. Dr. Halûk Gümüşkaya [email protected] [email protected] http://www.gumuskaya.com Virtual
Virtualization and the U2 Databases
Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the
Virtualization in Linux KVM + QEMU
CS695 Topics in Virtualization and Cloud Computing KVM + QEMU Senthil, Puru, Prateek and Shashank 1 Topics covered KVM and QEMU Architecture VTx support CPU virtualization in KMV Memory virtualization
A Unified View of Virtual Machines
A Unified View of Virtual Machines First ACM/USENIX Conference on Virtual Execution Environments J. E. Smith June 2005 Introduction Why are virtual machines interesting? They allow transcending of interfaces
Virtualization. Clothing the Wolf in Wool. Wednesday, April 17, 13
Virtualization Clothing the Wolf in Wool Virtual Machines Began in 1960s with IBM and MIT Project MAC Also called open shop operating systems Present user with the view of a bare machine Execute most instructions
Clouds Under the Covers. Elgazzar - CISC 886 - Fall 2014 1
Clouds Under the Covers KHALID ELGAZZAR GOODWIN 531 [email protected] Elgazzar - CISC 886 - Fall 2014 1 References Understanding Full Virtualization, Paravirtualization, and Hardware Assist White
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
x86 Virtualization Hardware Support Pla$orm Virtualiza.on
x86 Virtualization Hardware Support Pla$orm Virtualiza.on Hide the physical characteris.cs of computer resources from the applica.ons Not a new idea: IBM s CP- 40 1967, CP/CMS, VM Full Virtualiza.on Simulate
evm Virtualization Platform for Windows
B A C K G R O U N D E R evm Virtualization Platform for Windows Host your Embedded OS and Windows on a Single Hardware Platform using Intel Virtualization Technology April, 2008 TenAsys Corporation 1400
Hypervisors and Virtual Machines
Hypervisors and Virtual Machines Implementation Insights on the x86 Architecture DON REVELLE Don is a performance engineer and Linux systems/kernel programmer, specializing in high-volume UNIX, Web, virtualization,
An Introduction to Virtual Machines Implementation and Applications
An Introduction to Virtual Machines Implementation and Applications by Qian Huang M.Sc., Tsinghua University 2002 B.Sc., Tsinghua University, 2000 AN ESSAY SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS
Networked I/O for Virtual Machines
Networked I/O for Virtual Machines Approaches and Challenges Muli Ben-Yehuda, Ben-Ami Yassour, Orit Wasserman {muli,benami,oritw}@il.ibm.com IBM Haifa Research Lab Networked I/O for Virtual Machines p.
Jukka Ylitalo Tik-79.5401 TKK, April 24, 2006
Rich Uhlig, et.al, Intel Virtualization Technology, Computer, published by the IEEE Computer Society, Volume 38, Issue 5, May 2005. Pages 48 56. Jukka Ylitalo Tik-79.5401 TKK, April 24, 2006 Outline of
Xen and the Art of Virtualization
Xen and the Art of Virtualization Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauery, Ian Pratt, Andrew Warfield University of Cambridge Computer Laboratory, SOSP
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
Effects of Memory Randomization, Sanitization and Page Cache on Memory Deduplication
Effects of Memory Randomization, Sanitization and Page Cache on Memory Deduplication Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Cyrille Artho Research Institute for Secure Systems EuroSec 2012 at Bern,
Virtual Computing and VMWare. Module 4
Virtual Computing and VMWare Module 4 Virtual Computing Cyber Defense program depends on virtual computing We will use it for hands-on learning Cyber defense competition will be hosted on a virtual computing
Virtual Machines. www.viplavkambli.com
1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software
Intel Virtualization Technology Overview Yu Ke
Intel Virtualization Technology Overview Yu Ke SSG System Software Division Agenda Virtualization Overview Intel Virtualization Technology 2 What is Virtualization VM 0 VM 1 VM n Virtual Machines (VMs)
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
Performance tuning Xen
Performance tuning Xen Roger Pau Monné [email protected] Madrid 8th of November, 2013 Xen Architecture Control Domain NetBSD or Linux device model (qemu) Hardware Drivers toolstack netback blkback Paravirtualized
Virtualization Technology. Zhonghong Ou Data Communications Software Lab, Aalto University
Virtualization Technology Zhonghong Ou Data Communications Software Lab, Aalto University 1 Definition Virtualization refers to a concept in which access to a single underlying piece of hardware, like
Virtualization Concepts And Applications. Yash Jain DA-IICT (DCOM Research Group)
Virtualization Concepts And Applications Yash Jain DA-IICT (DCOM Research Group) Virtualization Virtualization is a framework or methodology of dividing the resources of a computer into multiple execution
Hardware Based Virtualization Technologies. Elsie Wahlig [email protected] Platform Software Architect
Hardware Based Virtualization Technologies Elsie Wahlig [email protected] Platform Software Architect Outline What is Virtualization? Evolution of Virtualization AMD Virtualization AMD s IO Virtualization
Intro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
Introduction to Virtual Machines
Introduction to Virtual Machines Introduction Abstraction and interfaces Virtualization Computer system architecture Process virtual machines System virtual machines 1 Abstraction Mechanism to manage complexity
Hybrid Virtualization The Next Generation of XenLinux
Hybrid Virtualization The Next Generation of XenLinux Jun Nakajima Principal Engineer Intel Open Source Technology Center Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Chapter 2 Addendum (More on Virtualization)
Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)
The Xen of Virtualization
The Xen of Virtualization Assignment for CLC-MIRI Amin Khan Universitat Politècnica de Catalunya March 4, 2013 Amin Khan (UPC) Xen Hypervisor March 4, 2013 1 / 19 Outline 1 Introduction 2 Architecture
Virtualization: Concepts, Applications, and Performance Modeling
Virtualization: Concepts, s, and Performance Modeling Daniel A. Menascé, Ph.D. The Volgenau School of Information Technology and Engineering Department of Computer Science George Mason University www.cs.gmu.edu/faculty/menasce.html
COS 318: Operating Systems
COS 318: Operating Systems OS Structures and System Calls Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Outline Protection mechanisms
Virtual Servers. Virtual machines. Virtualization. Design of IBM s VM. Virtual machine systems can give everyone the OS (and hardware) that they want.
Virtual machines Virtual machine systems can give everyone the OS (and hardware) that they want. IBM s VM provided an exact copy of the hardware to the user. Virtual Servers Virtual machines are very widespread.
RPM Brotherhood: KVM VIRTUALIZATION TECHNOLOGY
RPM Brotherhood: KVM VIRTUALIZATION TECHNOLOGY Syamsul Anuar Abd Nasir Fedora Ambassador Malaysia 1 ABOUT ME Technical Consultant for Warix Technologies - www.warix.my Warix is a Red Hat partner Offers
Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh
Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh Introduction History, Advantages, Common Uses OS-Level Virtualization Hypervisors Type 1 vs. type 2 hypervisors
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE Module 3: Virtualized Data Center Compute Upon completion of this module, you should be able to: Describe compute virtualization Discuss the compute virtualization
CSE490H: Virtualization
CSE490H: Virtualization It s turtles all the way down Steve Gribble Associate Professor, CSE [on sabbatical at Google as a visiting scientist] 1 Some simple terms a virtual machine: a software-based implementation
Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...
Contents Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...3 The Challenges of x86 Hardware Virtualization...3 Technique 1 - Full Virtualization using Binary Translation...4 Technique
GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR
GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR ANKIT KUMAR, SAVITA SHIWANI 1 M. Tech Scholar, Software Engineering, Suresh Gyan Vihar University, Rajasthan, India, Email:
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
Distributed and Cloud Computing
Distributed and Cloud Computing K. Hwang, G. Fox and J. Dongarra Chapter 3: Virtual Machines and Virtualization of Clusters and datacenters Adapted from Kai Hwang University of Southern California March
Is Virtualization Killing SSI Research?
Is Virtualization Killing SSI Research? Jérôme Gallard Paris Project-Team Dinard November 2007 Supervisor : Christine Morin Co-supervisor: Adrien Lèbre My subject! ;) Reliability and performance of execution
FRONT FLYLEAF PAGE. This page has been intentionally left blank
FRONT FLYLEAF PAGE This page has been intentionally left blank Abstract The research performed under this publication will combine virtualization technology with current kernel debugging techniques to
Nested Virtualization
Nested Virtualization Dongxiao Xu, Xiantao Zhang, Yang Zhang May 9, 2013 Agenda Nested Virtualization Overview Dive into Nested Virtualization Details Nested CPU Virtualization Nested MMU Virtualization
matasano Hardware Virtualization Rootkits Dino A. Dai Zovi
Hardware Virtualization Rootkits Dino A. Dai Zovi Agenda Introductions Virtualization (Software and Hardware) Intel VT-x (aka Vanderpool ) VM Rootkits Implementing a VT-x based Rootkit Detecting Hardware-VM
Using Linux as Hypervisor with KVM
Using Linux as Hypervisor with KVM Qumranet Inc. Andrea Arcangeli [email protected] (some slides from Avi Kivity) CERN - Geneve 15 Sep 2008 Agenda Overview/feature list KVM design vs other virtualization
How To Virtualize A Computer System
CHAPTER Virtual Machines and Virtualization of Clusters and Data Centers 3 CHAPTER OUTLINE Summary...130 3.1 Implementation Levels of Virtualization...130 3.1.1 Levels of Virtualization Implementation..............................................
OPEN SOURCE VIRTUALIZATION TRENDS. SYAMSUL ANUAR ABD NASIR Warix Technologies / Fedora Community Malaysia
OPEN SOURCE VIRTUALIZATION TRENDS SYAMSUL ANUAR ABD NASIR Warix Technologies / Fedora Community Malaysia WHAT I WILL BE TALKING ON? Introduction to Virtualization Full Virtualization, Para Virtualization
A Survey on Virtualization Technologies
A Survey on Virtualization Technologies Susanta Nanda Tzi-cker Chiueh {susanta,chiueh}@cs.sunysb.edu Department of Computer Science SUNY at Stony Brook Stony Brook, NY 11794-4400 Abstract Virtualization
Platform Virtualization: Model, Challenges and Approaches
Platform Virtualization: Model, Challenges and Approaches Fangzhou Jiao, Yuan Luo School of Informatics and Computing Indiana University {fjiao, yuanluo}@indiana.edu Outlines Virtualization Overview Virtualization
