Single System Image with Virtualization Technology for Cluster Computing Environment

Size: px
Start display at page:

Download "Single System Image with Virtualization Technology for Cluster Computing Environment"

Transcription

1 Third 2008 International Conference on Convergence and Hybrid Information Technology Single System Image with Technology for Cluster Computing Environment Liang Yong Network Center of Nanchang University, Nanchang , China Abstract Single system image (SSI) for clusters has ever been one of the hot topics in the research field of parallel computer architecture, since SSI supports easier programming and administration for cluster environment. Currently, most SSI studies focused on the middleware level on the top of operating system, leading to some problems of poor transparency, low performance and so on. This paper presents a novel solution using a distributed virtual machine monitor (DVMM) on the basis of hardware-assisted virtualization technologies. The DVMM contains some symmetrical and cooperative VMMs distributed on multi-nodes. The cooperation among the VMMs virtualizes the distributed hardware resources. Thus, the DVMM can support an unmodified legacy operating system to run transparently on the distributed nodes of a cluster. Our solution significantly outperforms other state of SSI solutions, and has more transparency, high performance and easy implementation. I. INTRODUCTION Parallel computer architecture has been presenting two important development directions, one is the shared memory architecture represented by SMP(Symmetric Multiprocessor) and cc-numa(cache-coherent Non-Uniform Memory Architecture), the other is the distributed memory architecture represented by COW(Cluster of Workstations) and MPP(Massively Parallel Processing)[1].The shared memory architecture usually supports the shared memory programming mode, has good programmability, but has poor scalability because of some constrains, such as the bandwidth of the shared memory. The distributed memory architecture usually uses the complicated message passing programming mode, has poor programmability, however, it has strong scalability because of using the loosely coupled interconnection. Since the advantages from the two architectures are complementary mutually, how to obtain the two-sided advantages is a certain idea. One of possible ways for the combination with the advantages form the two architectures is to implement the image of shared memory architecture based on the hardware of distributed memory architecture. Both DSM and SSI on clusters are the typical practices. This paper presents a novel solution to provide SSI on clusters using a distributed virtual machine monitor (DVMM) with hardware-assisted virtualization technologies. The rest of the paper is organized as follows. Section II describes the background of SSI and virtualization technologies as well as an introduction about relative works. Then, we describe the implementation details of the DVMM in Section III. Section IV compares the DVMM with existing solutions. Finally, this paper ends up with a concluding remark in Section V. II. BACKGROUND A. Single System Image SSI means that all the distributed resources are organized to a uniform unit for users, users can not be aware of the existence of every node that makes up of the computer system. SSI includes some attributes such as single memory space, single process space, single I/O space, single log on point, single file system,single loads management, and so on. The key attributes of SSI are single memory space and single process space [2]. The SSI of a cluster can be implemented on the hardware level, the underware level, the middleware level and the application level. Currently there are few solutions on the hardware level, they are Enterprise X-Architecture [3], cc- NUMA [4] and DSM [5], [2]. Special chips or hardware are adopted in these solutions, so that they have high cost and limited applications. The solutions on the underware level are also seldom. The representative solutions are MOSIX [6]Sun Solaris-MC [2]. SSI Implemented on this level has good transparency for the users, but it is difficult to implement. Current solutions on this level can only implement part attributes of SSI. The middleware level is the most convenient level for implementing SSI on a cluster, so there are many relative studies on this level, the typical work include: distributed shared memory systems such as IVY [7], the parallel and distributed file systems such as Lustre [8], the systems of resource management and loads schedule such as LSF [9], the parallel programming environments such as MPI and PVM [10]. The SSI implemented on the middleware level has poor transparency for the users. Implementing SSI on the application level is relative to the applications too closely, so that there are seldom solutions on this level, the most representative solution is the Linux Virtual Server (LVS) [11]. Therefore, the possible levels for implementing SSI of a cluster usually may be the application level, the middleware level, the underware level and the hardware level. From the top down, the difficulty to implement the SSI increases, but the transparency for the users increase, too. Currently most studies were done on the middleware Level, leading to some problems, such as poor transparence. There are seldom solutions on the application levelthe underware level or the hardware level, furthermore, the solutions on these levels have pitfalls respectively, for example, the solutions on the hardware level have high cost, the solutions on the underware level can /08 $ IEEE DOI /ICCIT

2 not implement the SSI attributes roundly, and the solutions on the application level have poor flexibility. 1) : means that computation and processing are done on the virtual base instead of on the real base. A virtual platform can be constructed between the hardware and the OS by means of virtualization techniques for creating multiple running domains on one hardware platform, the running domains are isolated respectively, and each domain can support the running of his OS and applications [12]. The emphasis of virtualization technology is to construct the Virtual Machine Monitor (VMM) based on virtualizing the Instruction Set Architecture (ISA). techniques can be differentiated to full-virtualization, para-virtualization, pre-virtualization and hardware-assisted virtualization [13], [14]. Hardware-assisted virtualization is the most advanced virtualization technology. VT-x (Virtual Technology) [15] is a hardware-assisted virtualization technology for the IA-32 architecture. The contents of VT-x are listed as follows. A new operation form, called VMX (Virtual Machine Extensions), is added to the processor. Two kinds of VMX transitions are defined, called VM entries and VM exits. A VMCS (Virtual- Machine Control Structure) is added to the architecture. Ten new instructions used for controlling the VM are added to the architecture. With the support of VT-x, the design of VMM can be simplified, and full virtualization can be implemented without using binary translation, so the guest software can run transparently on the virtual machine without any modification. B. Related Work The essential of virtualization is to make the details of the hardware be transparent to the software and to separate the software from the hardware through abstracting the physical resources. The goal of SSI is to hide the distributed hardware environment, and to make the cluster appear a single system view. The aims of SSI and virtualization are consistent, thus, SSI can be implemented by virtualization. The related studies are Virtual Multiprocessor [16] and vnuma [17]. 1) Virtual Multiprocessor: Virtual Multiprocessor implements an 8-way shared memory multiple processors virtual machine on a cluster of 8 PCs. The VMMs implemented on the support of the host OS runs in the application space. The guest OS is modified because of using para-virtualization. The shared memory space is supported by the DSM technologies; the virtual processors are emulated by some special processes; the I/O virtualization is implemented through the cooperation between the VMMs and the dedicated I/O sever. The disadvantages of Virtual Multiprocessor are that VMMs on the application level lead to low performance and weak flexibility; para-virtualization needs to modify the code of the guest OS and only the I/O devices in the I/O server can be utilized, so it has limited application and it is difficult to implement. Furthermore, Virtual Multiprocessor can not provide SSI on a SMP cluster because it doesn t support the SMP node. 2) vnuma: VNMUA implements a 2-way NUMA virtual machine on a cluster of two workstations, each one has only one IA64 processor. The VMMs are implemented directly on the hardware without host OS support. Pre-virtualization technology is used to scan the guest OS code during compiling and replace the privileged instructions statically. The guest OS is compelled to run on the ring 1 so that it can ensure the privileged station of the VMM. The shared memory is supported by DSM. One node is the master node from which the system is set up and the others are slave nodes. The disadvantages of vnmua are that pre-virtualization solution needs to modify the guest OS, and degrading the privilege level of the guest OS can bring the confusion of privileges. Also, vnuma can not provide SSI on a SMP cluster. III. DESIGN AND IMPLEMENTATION OF DVMM A. Overview The major goal of DVMM is to hide the distributed hardware attributes, provide SSI on a SMP cluster, and support a single OS to run transparently on the cluster. In other words, DVMM is to implement the image of shared memory architecture based on the hardware of distributed memory architecture to combine with the advantages from the two architectures, such as easy to program and good scalability. Therefore, three essential problems must be solved. Firstly, the distributed hardware configurations of the cluster can be detected and merged to form the global information including the all distributed hardware resources. Secondly, the global hardware resources can be virtualized and presented to the OS. Thirdly, the OS can manage, schedule and utilize the global resources on distributed nodes of a cluster just as on a single SMP or cc-numa machine. For providing SSI on a cluster, a new layer named DVMM is added between the OS and the cluster hardware. The DVMM contains some symmetrical and cooperative VMMs distributed on each node of the cluster. A single OS supporting cc-numa architecture runs on the DVMM. Using hardware-assisted virtualization technologiesthe DVMM detects and merges the physical resources of the cluster to form the global information including the all physical resources, virtualizes the whole physical resources to virtual resources, and presents the virtual resources to the OS. The OS schedules and runs the processes, manages and allocates the virtual resources. These actions by OS are transparent to the bottom DVMM. The DVMM intercepts the operations of accessing resources from the OS and handles them on behalf of the OS, such as mapping the virtual resources to the physical resources and manipulating the physical resources. In this way, it is assured that the OS can be aware of the whole resources of the cluster as well as can manage and utilize them. And the distributed attributes of the bottom hardware are hidden and the whole cluster is presented to the OS as a cc-numa virtual machine. B. Strategie As mentioned before, providing SSI on a cluster faces problems of detecting, presenting and utilizing the resources of the cluster. To solve these problems, our strategies are that detecting the physical resources on each node during the startup 797

3 of VMMs and integrating the physical resources of the cluster through communication among the VMMs; virtualzing the physical resources to the virtual resources then reporting them to the OS through hardware-assisted virtualization; managing and utilizing the physical resources of the cluster through the cooperation between the OS and the DVMM. The details of the strategies are described as follows. 1) Resource Detecting and Merging: Emulates and extends the BIOS to the ebios (Extended Basic Input/Output System). After the ebios acquires the information about the physical resources of native node through the basic BIOS operations, it communicates with the other nodes to collective the information about the physical resources of whole cluster, and merges the information to form the information of the global physical resources. Based on the global physical resources, DVMM reserves some resources and virtualizes the remained resources to virtual resources. DVMM organizes the various virtual resources. This includes forming various resources mapping tables, implementing the mappings from the virtual resources to the physical resources and from the physical resources to the nodes, creating the global virtual resources information table oriented to the OS. Based on the virtual resources, the OS is set up, the calls for BIOS during the setting up are captured, and the information of the global virtual resources are reported to the OS, so that the OS is aware of the global virtual resources. 2) Resource : Resource virtualization includes ISA virtualization, interrupt mechanism virtualization, memory virtualization and the I/O device virtualization. s are based on the information of the global physical resources formed by the ebios. Unlike existing virtualization techniques, the virtualization technique in this paper can implement the virtualization for resources crossing the nodes, for example, virtualizes the distributed memory resources. The IA-32 ISA is virtualized through the VT-x mechanism; the techniques are similar to that used in the HVM of Xen [18]. The interrupt mechanism is virtualized as follows. DVMM emulates various interrupt controllers with software, interferes the accesses from the OS to the interrupt controllers, if the target interrupt controller is in the native node, then DVMM reads or modifies the contents of the interrupt controller to reflect the effect of the guest s operation; if the target interrupt controller is in a remote node, then DVMM sends the access request to the target node, the VMM on the target node manufactures the virtual interrupt controller accordingly. DVMM catches the hardware interrupt, and the contents of the virtual interrupt controller are modified by the native VMM or by the remote VMM according to the node in which the interrupted object is, so that the interrupt can be shown to the OS. Combine the techniques of shadow page table and software DSM to virtualize the distributed memory resources. That is merging the whole memory resources of the cluster to a distributed shared memory with the technique of software DSM, and then virtualizing the distributed shared memory with the technique of shadow page table. The I/O resources virtualization is implemented through interfering and Initialization ebios Operating System A cc-numa virtual machine Distributed Virtual Machine Monitor(DVMM) Node Node Node Node ISA I/O Communication Hardware Fig. 1. Gigabit Ethernet Cluster with SMP nodes Fig. 2. System architecture MMU DSM Operating System Initialization Gigabit Ethernet ebios DVMM structure ISA I/O Communication Hardware MMU DSM processing the I/O operations by the VMM on behalf of the OS. The I/O operations of the OS are interfered by the VT-x mechanism, if the I/O operation will be processed on the native node, then the native VMM processes the interfered instruction and returns the results to the OS, If the I/O operation will be done on a remote node, then the I/O instruction is sent to the target node, and the I/O instruction will be executed by the VMM of the target node and the results are sent back to the native VMM, then the results are returned to the OS by the native VMM. 3) Resource Management and Utilizing: The OS is responsible for managing and utilizing the virtual resources and the DVMM is responsible for managing and utilizing the physical resources. The OS interacts with the DVMM through the VM entry and the VM exit mechanism [15]. Based on the virtual resources which are detected during its setting up, the OS schedules and runs the processes, manages and allocates the virtual resources independently. This is transparent to the bottom DVMM. When the OS runs a sensitive instruction or a trap or interrupt occurs, the control is switched to the DVMM by the VM exit mechanism. The DVMM handles the problem according to the reason of VM exit, for example, mapping the virtual devices to the physical devices, allocating and manipulating various physical devices, notifying the interrupt information, and so on. After the DVMM handles the event for which the VM exit is triggered, the results and the control are returned to the OS through the VM entry mechanism. Through the interactions between the OS and the DVMM, the management and utilization of the global physical resources are implemented. 798

4 C. Design and Implementation 1) System Architecture: The system architecture is shown in Figure 1. The system contains three levels. From the bottom up, they are hardware level, DVMM level and OS level. The hardware level contains some SMP nodes interconnected by the gigabit Ethernet, and the CPUs of the nodes can support VT-x. The DVMM level contains some symmetrical and cooperative VMMs distributed on the nodes. The VMMs can communicate through the dedicated bottom communication software, based on the gigabit Ethernet. The OS can be any one which supports the cc-numa. The key element for implementing this system is to construct the DVMM. The structure and the mechanism of the DVMM will be introduced in the following passages. 2) DVMM Structure: The DVMM is composed of the VMMs distributed on the nodes of the cluster, and each VMM runs on a node. The DVMM runs on the bare machines. The functions of the VMM are detecting, integrating and virtualizing the physical resources, reporting the virtual resources to the operating system and cooperating across the nodes. The structure of the function modules of the DVMM is shown in the Figure 2. The initialization module is responsible for loading and running the VMM on each node. The ebios module is responsible for detecting and integrating the resource information of the cluster and reporting the information to the OS. The ISA virtualization module is responsible for virtualizing the IA-32 ISA and cooperating with the interrupt virtualization module so as to the OS can manage and schedule the virtual computing resources of the cluster. The I/O virtualization module is responsible for virtualizing the global I/O resources, making the OS can detect and utilize the I/O resources of the whole system. The interrupt virtualization module is responsible for virtualizing the interrupt control mechanism, notifying the interrupt event to the OS through injecting a virtual interrupt to the OS. The MMU virtualization module is responsible for virtualizing the memory resources and assuring that the OS can run correctly in the virtual physical address space. The DSM module is responsible for implementing a distributed shared memory transparently. The communication module is responsible for providing the communication service with low delay, high bandwidth and high reliability for the cooperative VMMs. 3) DVMM Mechanism: The relations among the modules of the DVMM are shown in the Figure 3. The ISA virtualization module is the entry point as well as the exit point of the DVMM. This module may invocate every other module of the VMM except the communication module, and vice versa. When a VM exit occurs, the ISA virtualization module analyzes the reason of the VM exit and invocates appropriate module to handle. When one module completes his duties, it invocates the ISA virtualization module to return to the guest system. The communication module is the base of the cooperation among the modules of the DVMM. The communication module may invocate every other module of the VMM except the ISA virtualization module, and vice ISA ebios Direct Access Fig. 3. VM entry/vmexit I/O Hardware Operating System Communication MMU DSM External Communicating Relations among the modules of DVMM versa. The ebios module is used only during the initialization of the DVMM and the setting up of the OS. Firstlythe ebios module invocates the interrupt virtualization module, the I/O virtualization module and the communication module to detect and build the resource information of the whole system. Secondly, while the ISA virtualization module captures the calls to the BIOS during setting up the OS and sends the information to the ebios module, the ebios module returns the information about the virtual resources of the whole system to the OS. The I/O virtualization module receives instructions from the ISA virtualization module, according to the node on which the I/O request should be done, it may executes the I/O instruction or invocate the communication module to send the I/O request to the target node. When the I/O virtualization module receives an I/O request from a remote node, it manipulates the native I/O device and sends the result to the source node. On the one hand, the interrupt virtualization module is invocated by the ISA virtualization module to emulate the operation to the virtual interrupt controller by the OS; on the other hand, it converts the external interrupt vectors to the virtual interrupt vectors and injects a virtual interrupt to the OS. The MMU module is only be invocated by the ISA virtualization module. While the ISA virtualization module captures a sensitive instruction or a trap which is related to MMU, it invocates the MMU virtualization module to handle it. When the MMU virtualization module finds that the requested page is not in the native node, it invocates the DSM module to get the page from the host node. Invocated by the MMU virtualization module, the DSM module requests the page from the remote node, while invocated by the communication module it serves the request and sends the result to the remote node. Through the close cooperation among the modules of the DVMM, based on resource virtualization, the SSI of the SMP cluster is implemented, and the cluster is appeared as a virtual cc-numa machine, and the current parallel software can run on the virtual machine transparently. 799

5 TABLE I COMPARISON AMONG DVMM, VIRTUAL MULTIPROCESSOR AND VNUMA Level Technique Difficulty Transparence Symmetry Performance SMP Supporting Virtual Multiprocessor Application Level Para-virtualization High Poor No Low No vnuma Underware Level Pre-virtualization High Good No Moderation No DVMM Underware Level Hardware-assisted Moderation Good YES High YES IV. DISCUSSION Providing SSI on clusters has ever been one of the hot topics in the research filed of parallel computer architecture, so there are many existing solutions. Few of them are based on virtualization techniques, and the others are not. To distinguish the features of our solution, we compare it with the existing solutions as follows. Known from the Table I, the DVMM has advantages to the Virtual Multiprocessor and the vnuma. Firstly, the DVMM support the SMP node and can implement SSI on the SMP clusters, while the Virtual Multiprocessor and the vnuma do not support the SMP node, so that they can not implement SSI on the SMP clusters. Secondly, the DVMM utilizes the most advanced virtualization technology, the hardware-assisted virtualization, implements full virtualization based on the support of hardware, need not to modify the guest OS, so that it has moderate difficulty to design and implement. While the Virtual Multiprocessor and the vnuma adopt the paravirtualization and the pre-virtualization respectively, both of them need to modify the guest OS, so that they have high difficulty to implement and have limited applications. Thirdly, the DVMM is implemented based on assistance of the hardware, and runs on the metal, so that it has high performance. While both the Virtual Multiprocessor and the vnuma are implemented by software, so that they have low performance, further more the Virtual Multiprocessor is implemented at the application level, it must pass through several software layers leading to lower performance. Finally, the nodes of the DVMM are full symmetrical, while the nodes of the Virtual Multiprocessor and the vnuma are not symmetrical, one of them is the master node, and the others are the slave nodes. Besides, the DVMM is implemented at the underware level, while the Virtual Multiprocessor is implemented at the application level, so that the DVMM is more transparent than the Virtual Multiprocessor; because the IA-32 is used more widely than the IA64, the DVMM has wider application and higher utilization value than the vnuma. As mentioned in section 2.1, there are many solutions for providing SSI on clusters; they are respectively implemented on the hardware level, the underware level, the middleware level and the application level. Compared with these existing solutions, the DVMM also has advantages. Firstly, the DVMM does not demand special hardware, so it has lower cost and wider application than the solutions on the hardware level. Secondly, the DVMM can implement full attributes of SSI, while the solutions on the firmware level can only implement part attributes of SSI, so the DVMM has higher utilization value. Thirdly, the DVMM has better transparence and higher performance than the solutions on the middleware level. Finally, the DVMM has better flexibility and higher performance than the solutions on the application level. V. CONCLUSIONS AND FUTURE WORK The DVMM implements the SSI of clusters on the underware level based on the hardware-assisted virtualization technologies, so it can support an unmodified legacy OS to run transparently on a cluster. Compared with the existing solutions for implementing the SSI of clusters, the DVMM has some advantages. There are still further improvements to be made: firstly, using the most advanced VT-d [19] and EPT(Extended Page Tables) [20] techniques to reduce the implementing difficulty and adopting the processor consistency model instead of the sequential consistency model for higher performance; secondly, detecting the physical resources dynamically to support the dynamic change of the number of the nodes; thirdly, adding the functions of resource management and load schedule to the DVMM for supporting multiple guest OS running transparently and separately on a cluster. REFERENCES [1] G. A. Culler D E, Singh J P, Parallel computer architectureł a hardware/software approach. China Machine Press, [2] T. C. Rajkumar Buyya, Single system image (ssi), the International Journal of High Performance Computing Applications, vol. 15, pp , [3] I. Corporation, Ibm enterprise x-architecture technology. [4] B. Brock, G. D. Carpenter, E. Chiprout, M. E. Dean, P. L. D. Backer, E. N. Elnozahy, H. Franke, M. Giampapa, D. Glasco, J. L. Peterson, R. Rajamony, R. Ravindran, F. L. R. III, R. L. Rockhold, and J. Rubio, Experience with building a commodity intel-based ccnuma system, IBM Journal of Research and Development, vol. 45, no. 2, pp , [5] A. Itzkovitz and A. Schuster, Distributed shared memory: Bridging the granularity gap, in Proceedings of the First ACM Workshop on Software Distributed Shared Memory (WSDSM, [6] L. Amar, A. Barak, and A. Shiloh, The mosix direct file system access method for supporting scalable cluster file systems, Cluster Computing, vol. 7, no. 2, pp , [7] K. Li and P. Hudak, Memory coherence in shared virtual memory systems, ACM Trans. Comput. Syst., vol. 7, no. 4, pp , [8] I. Sun Microsystems, Lustre file system. [Online]. Available: [9] P. C. Corporation, Platform lsf reference. [Online]. Available: [10] V. S. Sunderam, PVM: a framework for parallel distributed computing, Concurrency, Practice and Experience, vol. 2, no. 4, pp , [Online]. Available: citeseer.ist.psu.edu/sunderam90pvm.html [11] W. Zhang, Linux virtual servers for scalable network services, in Ottawa Linux Symposium, Canada, [Online]. Available: 800

6 [12] J. Smith and R. Nair, Virtual Machines: Versatile Platforms for Systems and Processes. Morgan Kaufmann, [13] I. VMware, Understanding full virtualization, paravirtualization, and hardware assist. [Online]. Available: VMware paravirtualization.pdf [14] J. LeVasseur, V. Uhlig, M. Chapman, P. Chubb, B. Leslie, and G. Heiser, Pre-virtualization: Slashing the cost of virtualization, Tech. Rep., [Online]. Available: previrtualization-techreport.pdf [15] I. 64 and I.-. A. S. D. Manuals, System programming guide, [Online]. Available: [16] K. Kaneda, O. Yoshihiro, and Y. Akinori, A virtual machine monitor for providing a single system image, Transactions of Information Processing Society of Japan, vol. 46, pp , [17] M. Chapman and G. Heiser, Implementing transparent shared memory on clusters using virtual machines, in ATEC 05: Proceedings of the annual conference on USENIX Annual Technical Conference. Berkeley, CA, USA: USENIX Association, 2005, pp [18] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. L. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, Xen and the art of virtualization, in SOSP, 2003, pp [19] I. Corporation, Intel virtualization technology for directed i/o. [Online]. Available: 2-io/5-platform-hardware-support.htm [20] G. Neiger, Hardware support for efficient processor virtualization, Intel Technology Journal, vol. 10(3),

Full and Para Virtualization

Full and Para Virtualization Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels

More information

Jukka Ylitalo Tik-79.5401 TKK, April 24, 2006

Jukka Ylitalo Tik-79.5401 TKK, April 24, 2006 Rich Uhlig, et.al, Intel Virtualization Technology, Computer, published by the IEEE Computer Society, Volume 38, Issue 5, May 2005. Pages 48 56. Jukka Ylitalo Tik-79.5401 TKK, April 24, 2006 Outline of

More information

Mesovirtualization: Lightweight Virtualization Technique for Embedded Systems

Mesovirtualization: Lightweight Virtualization Technique for Embedded Systems Mesovirtualization: Lightweight Virtualization Technique for Embedded Systems Megumi Ito Shuichi Oikawa Department of Computer Science, University of Tsukuba 1-1-1 Tennodai, Tsukuba, Ibaraki 305-8573,

More information

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines: Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between

More information

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,

More information

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey

More information

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Microkernels, virtualization, exokernels. Tutorial 1 CSC469 Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,

More information

Virtualization Technologies (ENCS 691K Chapter 3)

Virtualization Technologies (ENCS 691K Chapter 3) Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing

More information

Virtualization. Types of Interfaces

Virtualization. Types of Interfaces Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity

More information

COS 318: Operating Systems. Virtual Machine Monitors

COS 318: Operating Systems. Virtual Machine Monitors COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have

More information

Distributed Systems. Virtualization. Paul Krzyzanowski pxk@cs.rutgers.edu

Distributed Systems. Virtualization. Paul Krzyzanowski pxk@cs.rutgers.edu Distributed Systems Virtualization Paul Krzyzanowski pxk@cs.rutgers.edu Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License. Virtualization

More information

Virtualization. Jukka K. Nurminen 23.9.2015

Virtualization. Jukka K. Nurminen 23.9.2015 Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,

More information

Chapter 2 Addendum (More on Virtualization)

Chapter 2 Addendum (More on Virtualization) Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)

More information

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced

More information

Cloud Computing CS 15-319

Cloud Computing CS 15-319 Cloud Computing CS 15-319 Virtualization Case Studies : Xen and VMware Lecture 20 Majd F. Sakr, Mohammad Hammoud and Suhail Rehman 1 Today Last session Resource Virtualization Today s session Virtualization

More information

Virtualization for Future Internet

Virtualization for Future Internet Virtualization for Future Internet 2010.02.23 Korea University Chuck Yoo (hxy@os.korea.ac.kr) Why Virtualization Internet today Pro and con Your wonderful research results Mostly with simulation Deployment

More information

Cloud Computing #6 - Virtualization

Cloud Computing #6 - Virtualization Cloud Computing #6 - Virtualization Main source: Smith & Nair, Virtual Machines, Morgan Kaufmann, 2005 Today What do we mean by virtualization? Why is it important to cloud? What is the penalty? Current

More information

Proteus, a hybrid Virtualization Platform for Embedded Systems

Proteus, a hybrid Virtualization Platform for Embedded Systems Proteus, a hybrid Virtualization Platform for Embedded Systems Dipl.-Inf. Daniel Baldin and Dipl.-Inf. Timo Kerstan Heinz-Nixdorf-Institute University of Paderborn 33102 Paderborn, Germany dbaldin@uni-paderborn.de

More information

Models For Modeling and Measuring the Performance of a Xen Virtual Server

Models For Modeling and Measuring the Performance of a Xen Virtual Server Measuring and Modeling the Performance of the Xen VMM Jie Lu, Lev Makhlis, Jianjiun Chen BMC Software Inc. Waltham, MA 2451 Server virtualization technology provides an alternative for server consolidation

More information

Nested Virtualization

Nested Virtualization Nested Virtualization Dongxiao Xu, Xiantao Zhang, Yang Zhang May 9, 2013 Agenda Nested Virtualization Overview Dive into Nested Virtualization Details Nested CPU Virtualization Nested MMU Virtualization

More information

COM 444 Cloud Computing

COM 444 Cloud Computing COM 444 Cloud Computing Lec 3: Virtual Machines and Virtualization of Clusters and Datacenters Prof. Dr. Halûk Gümüşkaya haluk.gumuskaya@gediz.edu.tr haluk@gumuskaya.com http://www.gumuskaya.com Virtual

More information

Virtualization. Explain how today s virtualization movement is actually a reinvention

Virtualization. Explain how today s virtualization movement is actually a reinvention Virtualization Learning Objectives Explain how today s virtualization movement is actually a reinvention of the past. Explain how virtualization works. Discuss the technical challenges to virtualization.

More information

Virtual Machines. www.viplavkambli.com

Virtual Machines. www.viplavkambli.com 1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software

More information

Distributed and Cloud Computing

Distributed and Cloud Computing Distributed and Cloud Computing K. Hwang, G. Fox and J. Dongarra Chapter 3: Virtual Machines and Virtualization of Clusters and datacenters Adapted from Kai Hwang University of Southern California March

More information

Performance Comparison of VMware and Xen Hypervisor on Guest OS

Performance Comparison of VMware and Xen Hypervisor on Guest OS ISSN: 2393-8528 Contents lists available at www.ijicse.in International Journal of Innovative Computer Science & Engineering Volume 2 Issue 3; July-August-2015; Page No. 56-60 Performance Comparison of

More information

Virtualization. Pradipta De pradipta.de@sunykorea.ac.kr

Virtualization. Pradipta De pradipta.de@sunykorea.ac.kr Virtualization Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation

More information

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits: Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique

More information

Chapter 5 Cloud Resource Virtualization

Chapter 5 Cloud Resource Virtualization Chapter 5 Cloud Resource Virtualization Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. Performance and security isolation. Architectural support for virtualization.

More information

OS Virtualization. CSC 456 Final Presentation Brandon D. Shroyer

OS Virtualization. CSC 456 Final Presentation Brandon D. Shroyer OS Virtualization CSC 456 Final Presentation Brandon D. Shroyer Introduction Virtualization: Providing an interface to software that maps to some underlying system. A one-to-one mapping between a guest

More information

Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361

Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 s COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 1 Virtualization! Create illusion of multiple machines on the same physical hardware! Single computer hosts multiple virtual machines

More information

Is Virtualization Killing SSI Research?

Is Virtualization Killing SSI Research? Is Virtualization Killing SSI Research? Jérôme Gallard Paris Project-Team Dinard November 2007 Supervisor : Christine Morin Co-supervisor: Adrien Lèbre My subject! ;) Reliability and performance of execution

More information

How To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox 3.5.2 (Xeen) 2.2.5-Xen-Virtualization (X

How To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox 3.5.2 (Xeen) 2.2.5-Xen-Virtualization (X Performance Evaluation of Virtual Routers in Para-virtual Environment 1. Abhishek Bajaj abhishek.bajaj@iiitb.net 2. Anargha Biswas anargha.biswas@iiitb.net 3. Ambarish Kumar ambarish.kumar@iiitb.net 4.

More information

Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/

Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ Virtualization Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ What is Virtualization? Virtualization is the simulation of the software and/ or hardware upon which other software runs. This

More information

Hybrid Virtualization The Next Generation of XenLinux

Hybrid Virtualization The Next Generation of XenLinux Hybrid Virtualization The Next Generation of XenLinux Jun Nakajima Principal Engineer Intel Open Source Technology Center Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL

More information

CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization

CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization CS 695 Topics in Virtualization and Cloud Computing More Introduction + Processor Virtualization (source for all images: Virtual Machines: Versatile Platforms for Systems and Processes Morgan Kaufmann;

More information

Introduction to Virtual Machines

Introduction to Virtual Machines Introduction to Virtual Machines Introduction Abstraction and interfaces Virtualization Computer system architecture Process virtual machines System virtual machines 1 Abstraction Mechanism to manage complexity

More information

Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...

Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization... Contents Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...3 The Challenges of x86 Hardware Virtualization...3 Technique 1 - Full Virtualization using Binary Translation...4 Technique

More information

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16 Virtualization P. A. Wilsey The text highlighted in green in these slides contain external hyperlinks. 1 / 16 Conventional System Viewed as Layers This illustration is a common presentation of the application/operating

More information

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16 1 / 16 Virtualization P. A. Wilsey The text highlighted in green in these slides contain external hyperlinks. 2 / 16 Conventional System Viewed as Layers This illustration is a common presentation of the

More information

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:

More information

Enabling Technologies for Distributed Computing

Enabling Technologies for Distributed Computing Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies

More information

Virtualization. Dr. Yingwu Zhu

Virtualization. Dr. Yingwu Zhu Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the

More information

Virtualization. ! Physical Hardware. ! Software. ! Isolation. ! Software Abstraction. ! Encapsulation. ! Virtualization Layer. !

Virtualization. ! Physical Hardware. ! Software. ! Isolation. ! Software Abstraction. ! Encapsulation. ! Virtualization Layer. ! Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.

More information

Virtualization Technology. Zhiming Shen

Virtualization Technology. Zhiming Shen Virtualization Technology Zhiming Shen Virtualization: rejuvenation 1960 s: first track of virtualization Time and resource sharing on expensive mainframes IBM VM/370 Late 1970 s and early 1980 s: became

More information

nanohub.org An Overview of Virtualization Techniques

nanohub.org An Overview of Virtualization Techniques An Overview of Virtualization Techniques Renato Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida NCN/NMI Team 2/3/2006 1 Outline Resource

More information

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR ANKIT KUMAR, SAVITA SHIWANI 1 M. Tech Scholar, Software Engineering, Suresh Gyan Vihar University, Rajasthan, India, Email:

More information

System Virtual Machines

System Virtual Machines System Virtual Machines Introduction Key concepts Resource virtualization processors memory I/O devices Performance issues Applications 1 Introduction System virtual machine capable of supporting multiple

More information

Virtual machines and operating systems

Virtual machines and operating systems V i r t u a l m a c h i n e s a n d o p e r a t i n g s y s t e m s Virtual machines and operating systems Krzysztof Lichota lichota@mimuw.edu.pl A g e n d a Virtual machines and operating systems interactions

More information

x86 ISA Modifications to support Virtual Machines

x86 ISA Modifications to support Virtual Machines x86 ISA Modifications to support Virtual Machines Douglas Beal Ashish Kumar Gupta CSE 548 Project Outline of the talk Review of Virtual Machines What complicates Virtualization Technique for Virtualization

More information

Hypervisors and Virtual Machines

Hypervisors and Virtual Machines Hypervisors and Virtual Machines Implementation Insights on the x86 Architecture DON REVELLE Don is a performance engineer and Linux systems/kernel programmer, specializing in high-volume UNIX, Web, virtualization,

More information

COS 318: Operating Systems. Virtual Machine Monitors

COS 318: Operating Systems. Virtual Machine Monitors COS 318: Operating Systems Virtual Machine Monitors Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Introduction Have been around

More information

Virtualization and the U2 Databases

Virtualization and the U2 Databases Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the

More information

WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach

WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach Sponsored by: Intel John Humphreys June 2006 Tim Grieser IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200

More information

4-2 A Load Balancing System for Mitigating DDoS Attacks Using Live Migration of Virtual Machines

4-2 A Load Balancing System for Mitigating DDoS Attacks Using Live Migration of Virtual Machines 4-2 A Load Balancing System for Mitigating DDoS Attacks Using Live Migration of Virtual Machines ANDO Ruo, MIWA Shinsuke, KADOBAYASHI Youki, and SHINODA Yoichi Recently, rapid advances of CPU processor

More information

Enabling Technologies for Distributed and Cloud Computing

Enabling Technologies for Distributed and Cloud Computing Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading

More information

kvm: Kernel-based Virtual Machine for Linux

kvm: Kernel-based Virtual Machine for Linux kvm: Kernel-based Virtual Machine for Linux 1 Company Overview Founded 2005 A Delaware corporation Locations US Office Santa Clara, CA R&D - Netanya/Poleg Funding Expertise in enterprise infrastructure

More information

Performance Isolation of a Misbehaving Virtual Machine with Xen, VMware and Solaris Containers

Performance Isolation of a Misbehaving Virtual Machine with Xen, VMware and Solaris Containers Performance Isolation of a Misbehaving Virtual Machine with Xen, VMware and Solaris Containers Todd Deshane, Demetrios Dimatos, Gary Hamilton, Madhujith Hapuarachchi, Wenjin Hu, Michael McCabe, Jeanna

More information

Computer Virtualization in Practice

Computer Virtualization in Practice Computer Virtualization in Practice [ life between virtual and physical ] A. Németh University of Applied Sciences, Oulu, Finland andras.nemeth@students.oamk.fi ABSTRACT This paper provides an overview

More information

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to

More information

IOS110. Virtualization 5/27/2014 1

IOS110. Virtualization 5/27/2014 1 IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to

More information

12. Introduction to Virtual Machines

12. Introduction to Virtual Machines 12. Introduction to Virtual Machines 12. Introduction to Virtual Machines Modern Applications Challenges of Virtual Machine Monitors Historical Perspective Classification 332 / 352 12. Introduction to

More information

Introduction to Virtualization

Introduction to Virtualization Introduction to Virtualization Dr. Qingni Shen Peking University Intel UPO Supported Main Points Status and trends in data center Definition of virtualization Common types of virtualization Key technologies

More information

Hardware Based Virtualization Technologies. Elsie Wahlig elsie.wahlig@amd.com Platform Software Architect

Hardware Based Virtualization Technologies. Elsie Wahlig elsie.wahlig@amd.com Platform Software Architect Hardware Based Virtualization Technologies Elsie Wahlig elsie.wahlig@amd.com Platform Software Architect Outline What is Virtualization? Evolution of Virtualization AMD Virtualization AMD s IO Virtualization

More information

How To Create A Cloud Based System For Aaas (Networking)

How To Create A Cloud Based System For Aaas (Networking) 1 3.1 IaaS Definition IaaS: Infrastructure as a Service Through the internet, provide IT server, storage, computing power and other infrastructure capacity to the end users and the service fee based on

More information

Virtualization. Clothing the Wolf in Wool. Wednesday, April 17, 13

Virtualization. Clothing the Wolf in Wool. Wednesday, April 17, 13 Virtualization Clothing the Wolf in Wool Virtual Machines Began in 1960s with IBM and MIT Project MAC Also called open shop operating systems Present user with the view of a bare machine Execute most instructions

More information

Performance Profiling in a Virtualized Environment

Performance Profiling in a Virtualized Environment Performance Profiling in a Virtualized Environment Jiaqing Du EPFL, Switzerland Nipun Sehrawat IIT Guwahati, India Willy Zwaenepoel EPFL, Switzerland Abstract Virtualization is a key enabling technology

More information

Enterprise-Class Virtualization with Open Source Technologies

Enterprise-Class Virtualization with Open Source Technologies Enterprise-Class Virtualization with Open Source Technologies Alex Vasilevsky CTO & Founder Virtual Iron Software June 14, 2006 Virtualization Overview Traditional x86 Architecture Each server runs single

More information

How To Understand The Power Of A Virtual Machine Monitor (Vm) In A Linux Computer System (Or A Virtualized Computer)

How To Understand The Power Of A Virtual Machine Monitor (Vm) In A Linux Computer System (Or A Virtualized Computer) KVM - The kernel-based virtual machine Timo Hirt timohirt@gmx.de 13. Februar 2010 Abstract Virtualization has been introduced in the 1960s, when computing systems were large and expensive to operate. It

More information

Clouds Under the Covers. Elgazzar - CISC 886 - Fall 2014 1

Clouds Under the Covers. Elgazzar - CISC 886 - Fall 2014 1 Clouds Under the Covers KHALID ELGAZZAR GOODWIN 531 ELGAZZAR@CS.QUEENSU.CA Elgazzar - CISC 886 - Fall 2014 1 References Understanding Full Virtualization, Paravirtualization, and Hardware Assist White

More information

Cloud^H^H^H^H^H Virtualization Technology. Andrew Jones (drjones@redhat.com) May 2011

Cloud^H^H^H^H^H Virtualization Technology. Andrew Jones (drjones@redhat.com) May 2011 Cloud^H^H^H^H^H Virtualization Technology Andrew Jones (drjones@redhat.com) May 2011 Outline Promise to not use the word Cloud again...but still give a couple use cases for Virtualization Emulation it's

More information

Hardware virtualization technology and its security

Hardware virtualization technology and its security Hardware virtualization technology and its security Dr. Qingni Shen Peking University Intel UPO Supported Main Points VMM technology Intel VT technology Security analysis of Intel VT-d Virtual Machine

More information

x86 Virtualization Hardware Support Pla$orm Virtualiza.on

x86 Virtualization Hardware Support Pla$orm Virtualiza.on x86 Virtualization Hardware Support Pla$orm Virtualiza.on Hide the physical characteris.cs of computer resources from the applica.ons Not a new idea: IBM s CP- 40 1967, CP/CMS, VM Full Virtualiza.on Simulate

More information

Basics of Virtualisation

Basics of Virtualisation Basics of Virtualisation Volker Büge Institut für Experimentelle Kernphysik Universität Karlsruhe Die Kooperation von The x86 Architecture Why do we need virtualisation? x86 based operating systems are

More information

<Insert Picture Here> Oracle Database Support for Server Virtualization Updated December 7, 2009

<Insert Picture Here> Oracle Database Support for Server Virtualization Updated December 7, 2009 Oracle Database Support for Server Virtualization Updated December 7, 2009 Support Policy Server virtualization software allows multiple operating system instances to run on the same

More information

Virtual Computing and VMWare. Module 4

Virtual Computing and VMWare. Module 4 Virtual Computing and VMWare Module 4 Virtual Computing Cyber Defense program depends on virtual computing We will use it for hands-on learning Cyber defense competition will be hosted on a virtual computing

More information

2972 Linux Options and Best Practices for Scaleup Virtualization

2972 Linux Options and Best Practices for Scaleup Virtualization HP Technology Forum & Expo 2009 Produced in cooperation with: 2972 Linux Options and Best Practices for Scaleup Virtualization Thomas Sjolshagen Linux Product Planner June 17 th, 2009 2009 Hewlett-Packard

More information

Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition

Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition Chapter 16: Virtual Machines Silberschatz, Galvin and Gagne 2013 Chapter 16: Virtual Machines Overview History Benefits and Features Building Blocks Types of Virtual Machines and Their Implementations

More information

VMware Server 2.0 Essentials. Virtualization Deployment and Management

VMware Server 2.0 Essentials. Virtualization Deployment and Management VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.

More information

Introduction to Virtual Machines

Introduction to Virtual Machines Introduction to Virtual Machines Carl Waldspurger (SB SM 89, PhD 95), VMware R&D 2010 VMware Inc. All rights reserved Overview Virtualization and VMs Processor Virtualization Memory Virtualization I/O

More information

KVM: A Hypervisor for All Seasons. Avi Kivity avi@qumranet.com

KVM: A Hypervisor for All Seasons. Avi Kivity avi@qumranet.com KVM: A Hypervisor for All Seasons Avi Kivity avi@qumranet.com November 2007 Virtualization Simulation of computer system in software Components Processor: register state, instructions, exceptions Memory

More information

Xen and the Art of. Virtualization. Ian Pratt

Xen and the Art of. Virtualization. Ian Pratt Xen and the Art of Virtualization Ian Pratt Keir Fraser, Steve Hand, Christian Limpach, Dan Magenheimer (HP), Mike Wray (HP), R Neugebauer (Intel), M Williamson (Intel) Computer Laboratory Outline Virtualization

More information

Knut Omang Ifi/Oracle 19 Oct, 2015

Knut Omang Ifi/Oracle 19 Oct, 2015 Software and hardware support for Network Virtualization Knut Omang Ifi/Oracle 19 Oct, 2015 Motivation Goal: Introduction to challenges in providing fast networking to virtual machines Prerequisites: What

More information

A technical review on comparison of Xen and KVM hypervisors: An analysis of virtualization technologies

A technical review on comparison of Xen and KVM hypervisors: An analysis of virtualization technologies ISSN (Online) : 2278-1021 A technical review on comparison of Xen and KVM hypervisors: An analysis of technologies Ms Jayshri Damodar Pagare 1, Dr. Nitin A Koli 2 Research Scholar, Sant Gadge Baba Amravati

More information

The Xen of Virtualization

The Xen of Virtualization The Xen of Virtualization Assignment for CLC-MIRI Amin Khan Universitat Politècnica de Catalunya March 4, 2013 Amin Khan (UPC) Xen Hypervisor March 4, 2013 1 / 19 Outline 1 Introduction 2 Architecture

More information

Infrastructure as a Service (IaaS)

Infrastructure as a Service (IaaS) Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,

More information

Masters Project Proposal

Masters Project Proposal Masters Project Proposal Virtual Machine Storage Performance Using SR-IOV by Michael J. Kopps Committee Members and Signatures Approved By Date Advisor: Dr. Jia Rao Committee Member: Dr. Xiabo Zhou Committee

More information

Leveraging Thin Hypervisors for Security on Embedded Systems

Leveraging Thin Hypervisors for Security on Embedded Systems Leveraging Thin Hypervisors for Security on Embedded Systems Christian Gehrmann A part of Swedish ICT What is virtualization? Separation of a resource or request for a service from the underlying physical

More information

9/26/2011. What is Virtualization? What are the different types of virtualization.

9/26/2011. What is Virtualization? What are the different types of virtualization. CSE 501 Monday, September 26, 2011 Kevin Cleary kpcleary@buffalo.edu What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,

More information

INFO5010 Advanced Topics in IT: Cloud Computing

INFO5010 Advanced Topics in IT: Cloud Computing INFO5010 Advanced Topics in IT: Cloud Computing Week 2: Data Center and Virtualization Technology Dr. Uwe Röhm School of Information Technologies This Week s Agenda! Data Centers: Infrastructure of Scale!

More information

Brian Walters. 1999. VMware Virtual Platform. Linux J. 1999, 63es, Article 6 (July 1999).

Brian Walters. 1999. VMware Virtual Platform. Linux J. 1999, 63es, Article 6 (July 1999). Implements BIOS emulation support for BHyVe: A BSD Hypervisor Abstract Current BHyVe only supports FreeBSD/amd6 as a GuestOS. One of the reason why BHyVe cannot support other OSes is lack of BIOS support.

More information

A quantitative comparison between xen and kvm

A quantitative comparison between xen and kvm Home Search Collections Journals About Contact us My IOPscience A quantitative comparison between xen and kvm This content has been downloaded from IOPscience. Please scroll down to see the full text.

More information

Arwed Tschoeke, Systems Architect tschoeke@de.ibm.com IBM Systems and Technology Group

Arwed Tschoeke, Systems Architect tschoeke@de.ibm.com IBM Systems and Technology Group Virtualization in a Nutshell Arwed Tschoeke, Systems Architect tschoeke@de.ibm.com and Technology Group Virtualization Say What? Virtual Resources Proxies for real resources: same interfaces/functions,

More information

Intel Virtualization Technology Overview Yu Ke

Intel Virtualization Technology Overview Yu Ke Intel Virtualization Technology Overview Yu Ke SSG System Software Division Agenda Virtualization Overview Intel Virtualization Technology 2 What is Virtualization VM 0 VM 1 VM n Virtual Machines (VMs)

More information

Networked I/O for Virtual Machines

Networked I/O for Virtual Machines Networked I/O for Virtual Machines Approaches and Challenges Muli Ben-Yehuda, Ben-Ami Yassour, Orit Wasserman {muli,benami,oritw}@il.ibm.com IBM Haifa Research Lab Networked I/O for Virtual Machines p.

More information

Xen Live Migration. Networks and Distributed Systems Seminar, 24 April 2006. Matúš Harvan Xen Live Migration 1

Xen Live Migration. Networks and Distributed Systems Seminar, 24 April 2006. Matúš Harvan Xen Live Migration 1 Xen Live Migration Matúš Harvan Networks and Distributed Systems Seminar, 24 April 2006 Matúš Harvan Xen Live Migration 1 Outline 1 Xen Overview 2 Live migration General Memory, Network, Storage Migration

More information

Virtualization Technology. Zhonghong Ou Data Communications Software Lab, Aalto University

Virtualization Technology. Zhonghong Ou Data Communications Software Lab, Aalto University Virtualization Technology Zhonghong Ou Data Communications Software Lab, Aalto University 1 Definition Virtualization refers to a concept in which access to a single underlying piece of hardware, like

More information

36 January/February 2008 ACM QUEUE rants: feedback@acmqueue.com

36 January/February 2008 ACM QUEUE rants: feedback@acmqueue.com 36 January/February 2008 ACM QUEUE rants: feedback@acmqueue.com Virtu SCOTT RIXNER, RICE UNIVERSITY Network alization Shared I/O in ization platforms has come a long way, but performance concerns remain.

More information

Multi-core Programming System Overview

Multi-core Programming System Overview Multi-core Programming System Overview Based on slides from Intel Software College and Multi-Core Programming increasing performance through software multi-threading by Shameem Akhter and Jason Roberts,

More information

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned

More information

Introduction to Virtualization & KVM

Introduction to Virtualization & KVM Introduction to Virtualization & KVM By Zahra Moezkarimi ICT Research Institute Software Platform Laboratory Outline Virtualization History Overview Advantages and Limitations Types of virtualization Virtualization

More information