Using a Virtualization Techniques Based Platform for Advanced Studies on Operating Systems
|
|
|
- Clare Parks
- 10 years ago
- Views:
Transcription
1 Using a Virtualization Techniques Based Platform for Advanced Studies on Operating Systems Gabriel Rădulescu, Nicolae Paraschiv Abstract The virtualization technology allows several (sometimes critical) applications running on a single machine, but all isolated into virtual operating system images that do not interfere with each other. Such a working manner proves to be a revolutionary tool in computer science, especially when advanced studies on operating systems behavior are performed in order to reveal the hidden interactions in heterogeneous computing environments. A I. INTRODUCTION LTHOUGH the virtual machine monitors (VMMs) theoretical principles were established about 40 years ago, focusing that time some stiff computing problems running on mainframes, at present they have a fresh and promising impact on computer technology, their application ranging from high-end servers to standard/entry-level platforms endowment. Virtualization is the technique allowing multiple operating system instances running all at once by making use of only one hardware platform. Novel architectures and applications can be designed in order to benefit from such a modern approach in computing especially when original, safe and reliable solutions have to be developed and the perspectives are in a continuous spotlight. In our previous works [1] and [2] the focus is put on how to practically build-up a platform based on virtualization techniques, designed as the main tool for studies on interactions between independent operating systems instances and a homogeneous hardware environment, when heterogeneous software platforms are involved. Since then, interesting results in this area were obtained, a brief selection being here presented. II. A SHORT OVERVIEW ON THE VIRTUALIZATION-BASED PLATFORM A. Virtualization Principles A VMM offers an abstract representation of one or more virtual machines (VM) by de-multiplexing the resources of a real hardware platform [3]. Such a VM may run a standard operating system (OS) together with its own native Manuscript received May 5, Gabriel Rădulescu is with the Petroleum-Gas University of Ploiesti, Automatic Control, Applied Informatics and Computers Department, Ploiești, Romania ( [email protected]). Nicolae Paraschiv is also with the Petroleum-Gas University of Ploiesti, Automatic Control, Applied Informatics and Computers Department, Ploiești, Romania ( [email protected]). Fig. 1. The typical structure for VMM in the context of a host OS, providing the hardware abstraction layer for multiple VMs [2]. applications. Fig. 1 shows the classical architecture used by modern virtualization platforms (i.e. VMware, VirtualBox and VirtualPC solutions). The software executed inside a VM is identified as guest (guest operating systems, guest applications), whereas the software running outside the virtual machine typically the host platform operating system represents the so-called host software. The guest OS and its corresponding applications run in user mode, with hardly-limited control over the real hardware, but the VMM runs in the most privileged level (kernel mode), as the host OS in Fig. 1 is used to provide the basic access to physical devices for VMM and VMs [4]. The guest software uses the emulated hardware that is offered by VMM in the same transparent manner as it would do with real hardware. All complex interactions between guest software and the abstract hardware platform are trapped by the VMM and consequently emulated in software, allowing the guest OS to run in its standard way, also maintaining the strict control over the system at the VMM layer [1]. As previously shown in [2], by virtualization a perfect illusion of multiple, distinct virtual computers can be created, with separate operating systems and applications. For safely keeping the working environment, the VMM isolates each virtual computer and its emulated hardware through an adjustable redirection mechanism. The most easy-tounderstand examples are, for instance, mapping a number of virtual disks to different zones of a physical disk or virtual memory mapping onto different pages in the real machine memory system. The virtualization environments can be used not only for simply multiplexing the host resources, but also to add supplementary services to an existing system, including here special debuggers for new OSs, live machines migration [5], 444
2 intrusion detection and prevention [6] as well as code integrity test [7]. It is also very important to mention that some of these services are implemented outside the guest machines and, as consequence, they do not affect at all the guest environment. In this context, the virtual machine introspection (VMI) is represented by all technologies used to interpret and modify the inner states and events within the guest [8], [9]. By using VMI methods, the variables and guest memory addresses are translated (after reading the guest OS and applications symbols/pages tables) into real references for the host OS. More, through hardware and software breakpoints, a specific VM service is allowed to gain full control at a specific instruction address. Finally, by this technique, such a service may invoke the guest operating system or application code in order to make use of general functions (for instance reading a file from the guest OS file system). It is also very important to emphasize that all virtual machine services can be protected by disabling external I/O procedures. In the same time, VMs assure the guest data integrity by introducing the snapshots (restore points), which points to a frozen guest image where the system can be rolled back (after a crash, for example). A special VMM application which deals with concurrent OS interactions is the so-called virtual machine based rootkit (VMBR), which monitors the VMs activity. The target (supervised) VM practically sees no difference in its memory space, disk availability or execution (depending on the virtualization quality) [1], [2]. There is a complete isolation between the event-generating host OSs and the targeted systems, so the software in the target system cannot see or modify the interacting software from the other system [8]. Also, apart from monitoring the target states and events, the VMBR can quietly read and modify them (without being observed from inside of the running VMs), as it fully controls the virtual hardware presented to the guests [1]. B. The Platform Architecture As previously presented in [2], the authors have designed and implemented a robust, flexible and multi-client oriented platform at the Petroleum-Gas University of Ploiești (Computers and Networks Laboratory) which is a valuable environment for studying the OS complex behavior. This section outlines its main hardware and software characteristics. 1) The hardware architecture As shown in Fig. 2, the system is distributed over a high speed Local Area Network (LAN) and consists in one main server and the associated workstation-clients. The central node is a HP Proliant ML310 server with RAID storage system and backup facility in order to prevent any loss of the user data. As mention, the server has proved an extraordinary robustness, with almost inexistent downtime up to now (in the case, no time required for service as no failure occurred during operating sessions for over 3 years). Fig. 2. A schematic representation for the system s hardware architecture [2]. The system s clients are located on independent workstations connected to the Proliant server through a highspeed managed Ethernet switch. While at the beginning all workstations had the same configuration, later we have used to run our experiments by targeting other hardware configurations (in order to extend the research results, if possible). The quality of service (QOS) inside the LAN was highly improved by configuring a dedicated virtual LAN (VLAN), which isolates the distributed system from the corporate network (at the University level) [2]. 2) The software configuration At first, in order to improve the compatibility between clients and server, the uniform OS installation was adopted (a very stable Linux SuSE distribution, both on server and client machines). But as the last research is focused on heterogeneous host OSs study, other Linux distributions (i.e. Fedora, Ubuntu) and Windows-class OSs are currently tested on workstations. As suggested by Fig. 3, a uniform user account management was adopted too, by locating the users database and home directories on the Proliant server, all clients being authenticated via NIS (Network Information Service), whereas the storage resources are exported via NFS (Networking File System). Except the root, any other user has a mobile profile, with a homogeneous way of accessing the system and server resources. Apart being completely transparent for the users, this solution offers an increased data safety, as any crash at the workstations level only interrupts the communication with the server, without affecting the data last saved here over the network. The good protection against malicious code (spywares, backdoors, viruses) is easily implemented because, by locating the user files only on server side, the central management of any security/integrity solution is natively allowed [1], [2]. As virtualization platform, VMware proved to be the most flexible/reliable solution, with a high level of the hardware abstracting, as well as an almost perfect compatibility with all guest OSs we have included in the test sessions (Windows-based systems, different Linux distributions, even the native MS DOS 6.22). On this infrastructure we currently run software compatibility and endurance tests with VMware Workstation, with versions ranging from 4.5.x to 7.0.x. 445
3 Fig. 3. The simplified software architecture [2]. 3) Advantages The major advantages when using such a multi-client virtualization platform were extensively presented in [2], so in this general outline only a few of them are emphasized: --The possibility to pack and distribute software pieces in virtual machines with considerable less effort. --The facility of virtual machines replication on all workstations ( instantaneous software update). --The "undo" at shutdown feature, for all changes inside virtual machine instances. --Reduced time for technical interventions, network tuning and maintenance activities. But the most important advantage is the open system architecture, from many different points of view. For instance, all network clients can be considered as identical, so adding a new workstation in the system is trivially easy. On the other side, at logical level, all VMs on every workstation have the same attributes, no matter the installed guest OS, being seen by the local VMM as part of a homogeneous environment. At last, any system upgrade may be performed, as time as the architecture and its functionality are preserved [2]. III. CASE-STUDY: OS REGULAR ACTIVITY MONITORING In order to have a complete image over the platform utility, here are presented some significant results when monitoring different OSs running a usual processor-test (a hard-encoded MPEG video file playback) This short casestudy is taken from a more complex research (which includes, for instance, a performance improving analysis), but this will be subject of a future work.. A. The Test Configuration Such a procedure may not give interesting results when the hardware resources are generous (because the processing power is enough to handle without problems the software decoding process), this being the reason why the authors performed all tests on simulated limited-power architectures. As host machine the authors used a medium-performance platform based on Intel Celeron D352 processor, with 1GB RAM and SATA2 HDD, with dual boot feature (SuSE Linux and Windows XP Pro), integrated as client for the previously described network. The software solution adopted for VMM was VMware Workstation 6.0 (running both under Linux and Windows host machines) coupled with Veeam Monitor analyzing tool. This configuration allows a perfect integration with the VMware virtualization layer, so the platform can read and present a wide range of operating parameters related to VMs kernel errors/traps, CPU, memory, disk, network and pagefile usage statistics. In this hosting context, three identical virtual machines were created (each emulating an Intel Celeron platform with 256MB RAM and IDE HDD storage) and configured with typical installations of SuSE Linux 8.2, Ubuntu 7.2 and Windows XP Professional. In order to have a complete functional environment, all VMs include VMware Tools platform. All OS images were stored on the Proliant server and NFS exported over the network. B. The Testing Scenario and Results In the context of normal computer use, dealing with multimedia applications is also a regular task. But when the file to be played is hard-encoded (i.e. high bitrates/video resolutions), the CPU usage may become problematic if the processor performances are below a specific limit, so it is of high interest to know how an OS acts in order to keep the entire system in acceptable working state. The tests performed by authors consisted in playing a local MPEG4 video file encoded with high bitrate (approx. 10 Mbps) by using the same version (1.0) of the famous MPlayer installed under SuSE Linux, Ubuntu and Windows XP VMs. There were two main scenarios, involving both separate tests (consecutively performed) and simultaneous (on all VMs in the same time), the results being presented and briefly commented here. 1) The 3 minutes testing session results (separate run) Fig. 4 shows a comparison between CPU usage percent for the above mentioned OSs. By analyzing these graphs it is to mention that, although at the beginning in SuSE OS the CPU is used not more than 50%, after a few seconds the percent raises to a maximum of 85%. The Ubuntu machine acts totally different, with an initial peak of 92% processor usage but followed by a moderate behavior on long term (with lots of inverse peaks to 50%). The best response is obtained when using Windows XP, which acts between maximum 82% and minimum 31% CPU usage. In fact, this behavior is in total agreement with expectations, as time as high activity means lots of system calls (and for Linux OSs the rendering modules were compiled and integrated in kernel, unlike in Windows case). The HDD usage during the playback process is depicted in Fig. 5. The SuSE Linux VM shows a uniform-time disc access, with long periods of inactivity (approx. 30 s) and high peaks between 8 and 22 Mbytes/s (read/write access). The same uniform behavior can be observed for Ubuntu, at shorter intervals (about 6 s), through moderate peaks (810 to 9216 Kbytes/s). Windows XP is non-predictable, having an almost continuous HDD access with maximum peaks of 446
4 Fig. 4. CPU usage profiles for SuSE Linux (top), Ubuntu (middle) and Windows XP (bottom) scenario 1. Fig. 5. Disk usage profiles for SuSE Linux (top), Ubuntu (middle) and Windows XP (bottom) scenario Kbytes/s (which may be not an optimal behavior). As remark, the diagrams in Fig. 5 (and also in the following figures) are differently scaled for better details readability. The authors further investigated this case and found that such an effect is induced by a different pagefile management (disc cache) style for the three OSs above mentioned. SuSE Linux has an intense but shorter action on its swap partition (which keeps the pages ready to send into memory, respectively the dumped-to-file memory content) than Windows XP, although both have the same maximum access peak (2560 Kbytes/s), as seen in Fig. 6. During the last minute, for about 40 s, SuSE does not even use its disc cache, whereas Windows still keeps accessing the pagefile until the MPEG file playback finishes. Such a policy of take it as needed may be convenient when the hardware resources are continuously available during the working session, but may put serious problems when the limits are touched. Regarding Ubuntu, it has an almost inexistent swapping effect (maximum 512 Kbytes/s transfer speed) because it frequently access the HDD when reading small parts of the MPEG file and they seem to always fit into the free memory, with no need to swap memory pages. 2) The 3 minutes testing session results (concurrent run) As shown above, the second scenario was based on simultaneously performing the video playback in all VMs, in order to reveal if the VMM has a good policy when trying to honestly allocate resources for the managed virtual computers. In order to distinguish the stabilizing time at start, the MPlayer sessions were launched with short delays between them (approx. 3 s), first under Windows XP, Ubuntu and finally in the SuSE Linux VM, as Fig. 7 depicts. It can be observed that, for all OS instances, after a short transient time the CPU usage practically follows the same average envelope, meaning that VMM (VMware) succeeds to fairly implement the resources allocation. It is also to remark the different profile shapes in comparison with the ones from Fig. 4. A careful look at Fig. 7 shows that, when for instance the Ubuntu machine CPU usage lowers, the remaining computing power is re-allocated to SuSE and Windows VMs, this way the overall efficiency being increased. There is no surprise when analyzing the HDD usage in this new context. Indeed, the main characteristics observed when performing the first scenario are preserved, excepting the maximum peak value which lowers to 9216 Kbytes/s (instead of 22 Mbytes/s) for the SuSE virtual 447
5 Fig. 6. Swap/pagefile usage profiles for SuSE Linux (top), Ubuntu (middle) and Windows XP (bottom) scenario 1. machine. In a similar way, the memory swapping (pagefile access) seems to differ only by the highest peak value (512 Kbytes/s instead of 2560 Kbytes/s as for the first scenario). IV. CONCLUSION The complex hardware/software virtualization technology allows new and revolutionary approaches in computer science, especially in the field of operating systems practical studies. In this context, the present paper presented some selected results over the complex interactions between multiple operating systems (SuSE Linux, Ubuntu, Windows XP) and a homogeneous virtualized hardware platform. The studies were performed by using the non-invasive monitoring technique of VMBR. The behavioral characteristics of the three mentioned OSs are also outlined. From the authors point of view, extending such a research approach has a true practical relevance, as time as it may be used to reach a perfect fit between user s needs and the software environment particularities. Fig. 7. CPU (top), HDD (middle) and swap/pagefile (bottom) usage profiles for SuSE Linux, Ubuntu and Windows XP VMs running simultaneously (scenario 2). [2] G. Rădulescu, N. Paraschiv, Developing a virtualization techniques based platform for advanced studies on operating systems, The Petroleum-Gas Univ. of Ploieşti Bulletin, Vol. LIX, Technical Series, No. 3, pp. 1-6, [3] 5. R. P. Goldberg, Survey of virtual machine research, IEEE Computer, pp , June [4] 9. J. Sugerman, J., G. Venkitachalam, B. H. Lim, Virtualizing I/O devices on VMware Workstation s hosted virtual machine monitor, Proc. of the 2001 USENIX Technical Conference, June [5] 8. C. P. Sapuntzakis et al., Optimizing the migration of virtual computers, Proc. of the 2002 Symposium on Operating Systems Design and Implementation, December [6] 1. K. G. Anagnostakis et al., Detecting targeted attacks using shadow honeypots. Proc. of the 2004 USENIX Security Symposium, August [7] O. Agensen, D. Detlefs, Mixed-mode bytecode execution, Technical Report SMLI TR , Sun Microsystems, Inc., [8] S. T. King, G. W. Dunlap, P. M. Chen, Debugging operating systems with time-traveling virtual machines, Proceedings of the USENIX Annual Technical Conference (USENIX'05), pp. 1-15, April [9] A. Whitaker, R. S. Cox, S. D. Gribble, Configuration debugging as search: finding the needle in the haystack, Proc. of the 2004 OSDI Symposium, December REFERENCES [1] G. Rădulescu, N. Paraschiv, Virtualization techniques in computer science a practical point of view, Proc. of the UNIVERSITARIA SIMPRO 2006 (Petroşani) Symposium, pp ,
Virtual Machine Monitors and Network Marketing
BULETINUL Universităţii Petrol Gaze din Ploieşti Vol. LIX No. 3/2007 1-6 Seria Tehnică Developing a Virtualization Techniques Based Platform for Advanced Studies on Operating Systems Universitatea Petrol-Gaze
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
Virtualization. Pradipta De [email protected]
Virtualization Pradipta De [email protected] Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
Intro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
Virtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:
Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
Virtualization. Explain how today s virtualization movement is actually a reinvention
Virtualization Learning Objectives Explain how today s virtualization movement is actually a reinvention of the past. Explain how virtualization works. Discuss the technical challenges to virtualization.
nanohub.org An Overview of Virtualization Techniques
An Overview of Virtualization Techniques Renato Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida NCN/NMI Team 2/3/2006 1 Outline Resource
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Chapter 5 Cloud Resource Virtualization
Chapter 5 Cloud Resource Virtualization Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. Performance and security isolation. Architectural support for virtualization.
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
PARALLELS SERVER BARE METAL 5.0 README
PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal
Monitoring VirtualBox Performance
1 Monitoring VirtualBox Performance Siyuan Jiang and Haipeng Cai Department of Computer Science and Engineering, University of Notre Dame Email: [email protected], [email protected] Abstract Virtualizers on Type
evm Virtualization Platform for Windows
B A C K G R O U N D E R evm Virtualization Platform for Windows Host your Embedded OS and Windows on a Single Hardware Platform using Intel Virtualization Technology April, 2008 TenAsys Corporation 1400
Dynamic Load Balancing of Virtual Machines using QEMU-KVM
Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
Cloud Computing CS 15-319
Cloud Computing CS 15-319 Virtualization Case Studies : Xen and VMware Lecture 20 Majd F. Sakr, Mohammad Hammoud and Suhail Rehman 1 Today Last session Resource Virtualization Today s session Virtualization
Comparing Free Virtualization Products
A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE Module 3: Virtualized Data Center Compute Upon completion of this module, you should be able to: Describe compute virtualization Discuss the compute virtualization
Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:
Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique
x86 ISA Modifications to support Virtual Machines
x86 ISA Modifications to support Virtual Machines Douglas Beal Ashish Kumar Gupta CSE 548 Project Outline of the talk Review of Virtual Machines What complicates Virtualization Technique for Virtualization
Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition
Chapter 16: Virtual Machines Silberschatz, Galvin and Gagne 2013 Chapter 16: Virtual Machines Overview History Benefits and Features Building Blocks Types of Virtual Machines and Their Implementations
Virtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
International Journal of Computer & Organization Trends Volume20 Number1 May 2015
Performance Analysis of Various Guest Operating Systems on Ubuntu 14.04 Prof. (Dr.) Viabhakar Pathak 1, Pramod Kumar Ram 2 1 Computer Science and Engineering, Arya College of Engineering, Jaipur, India.
Microkernels, virtualization, exokernels. Tutorial 1 CSC469
Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,
Chapter 2 Addendum (More on Virtualization)
Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
A quantitative comparison between xen and kvm
Home Search Collections Journals About Contact us My IOPscience A quantitative comparison between xen and kvm This content has been downloaded from IOPscience. Please scroll down to see the full text.
Basics of Virtualisation
Basics of Virtualisation Volker Büge Institut für Experimentelle Kernphysik Universität Karlsruhe Die Kooperation von The x86 Architecture Why do we need virtualisation? x86 based operating systems are
System Virtual Machines
System Virtual Machines Introduction Key concepts Resource virtualization processors memory I/O devices Performance issues Applications 1 Introduction System virtual machine capable of supporting multiple
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
Virtualization: Concepts, Applications, and Performance Modeling
Virtualization: Concepts, s, and Performance Modeling Daniel A. Menascé, Ph.D. The Volgenau School of Information Technology and Engineering Department of Computer Science George Mason University www.cs.gmu.edu/faculty/menasce.html
Computing in High- Energy-Physics: How Virtualization meets the Grid
Computing in High- Energy-Physics: How Virtualization meets the Grid Yves Kemp Institut für Experimentelle Kernphysik Universität Karlsruhe Yves Kemp Barcelona, 10/23/2006 Outline: Problems encountered
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India [email protected] 2 Department
Copyright 1999-2011 by Parallels Holdings, Ltd. All rights reserved.
Parallels Virtuozzo Containers 4.0 for Linux Readme Copyright 1999-2011 by Parallels Holdings, Ltd. All rights reserved. This document provides the first-priority information on Parallels Virtuozzo Containers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
Outline. Introduction Virtualization Platform - Hypervisor High-level NAS Functions Applications Supported NAS models
1 2 Outline Introduction Virtualization Platform - Hypervisor High-level NAS Functions Applications Supported NAS models 3 Introduction What is Virtualization Station? Allows users to create and operate
Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361
s COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 1 Virtualization! Create illusion of multiple machines on the same physical hardware! Single computer hosts multiple virtual machines
COM 444 Cloud Computing
COM 444 Cloud Computing Lec 3: Virtual Machines and Virtualization of Clusters and Datacenters Prof. Dr. Halûk Gümüşkaya [email protected] [email protected] http://www.gumuskaya.com Virtual
Virtualization with Windows
Virtualization with Windows at CERN Juraj Sucik, Emmanuel Ormancey Internet Services Group Agenda Current status of IT-IS group virtualization service Server Self Service New virtualization features in
Virtual Machines. www.viplavkambli.com
1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software
Parallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...
Red Hat enterprise virtualization 3.0 feature comparison
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
Server Virtualization A Game-Changer For SMB Customers
Whitepaper Server Virtualization A Game-Changer For SMB Customers Introduction Everyone in the IT world has heard of server virtualization, and some stunning achievements by datacenter and Enterprise customers
Using VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems
Using VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems Applied Technology Abstract By migrating VMware virtual machines from one physical environment to another, VMware VMotion can
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer [email protected] Agenda Session Length:
Embedded Operating Systems in a Point of Sale Environment. White Paper
Embedded Operating Systems in a Point of Sale Environment White Paper December 2008 Contents Embedded Operating Systems in a POS Environment... 3 Overview... 3 POS Operating Systems... 3 Operating Systems
Virtualization. Michael Tsai 2015/06/08
Virtualization Michael Tsai 2015/06/08 What is virtualization? Let s first look at a video from VMware http://bcove.me/x9zhalcl Problems? Low utilization Different needs DNS DHCP Web mail 5% 5% 15% 8%
White Paper. Recording Server Virtualization
White Paper Recording Server Virtualization Prepared by: Mike Sherwood, Senior Solutions Engineer Milestone Systems 23 March 2011 Table of Contents Introduction... 3 Target audience and white paper purpose...
vnas Series All-in-one NAS with virtualization platform 2014.01.03
vnas Series All-in-one NAS with virtualization platform 2014.01.03 2 Imaging NAS Virtualization Station VMware ESX 3 Install Virtualization Station on a specialized Turbo NAS VM vnas Use vnas series to
Comparative Study of Virtual Machine Software Packages with Real Operating System
Master Thesis Electrical Engineering June 2012 Comparative Study of Virtual Machine Software Packages with Real Operating System Arunkumar Jayaraman Pavankumar Rayapudi School of Computing Blekinge Institute
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the
How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself
How do Users and Processes interact with the Operating System? Users interact indirectly through a collection of system programs that make up the operating system interface. The interface could be: A GUI,
Distributed Systems. Virtualization. Paul Krzyzanowski [email protected]
Distributed Systems Virtualization Paul Krzyzanowski [email protected] Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License. Virtualization
Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors
Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors Benoit Boissinot E.N.S Lyon directed by Christine Morin IRISA/INRIA Rennes Liviu Iftode Rutgers University Phenix
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
Analysis of Virtualization Tools and Techniques
Analysis of Virtualization Tools and Techniques Mrs. Kavita S. 1, Mrs. Dakshyani G. 2, Mrs. Kiruthika 3 Assistant Professor, Department of Computer Engineering, FCRIT, Vashi, Navi Mumbai, India 1,2 Associate
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines
Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR
GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR ANKIT KUMAR, SAVITA SHIWANI 1 M. Tech Scholar, Software Engineering, Suresh Gyan Vihar University, Rajasthan, India, Email:
Table of Contents. Server Virtualization Peer Review 01-03-2007 cameron 1-24-2007: modified, cameron
Table of Contents Objective...2 Definitions...2 Objective discussion...2 Comparison criteria...3 Criteria weights...4 Product scores...4 Criteria comparison discussion...5 References...7 Cost Estimate,
Bosch Video Management System High Availability with Hyper-V
Bosch Video Management System High Availability with Hyper-V en Technical Service Note Bosch Video Management System Table of contents en 3 Table of contents 1 Introduction 4 1.1 General Requirements
FRONT FLYLEAF PAGE. This page has been intentionally left blank
FRONT FLYLEAF PAGE This page has been intentionally left blank Abstract The research performed under this publication will combine virtualization technology with current kernel debugging techniques to
Parallels Desktop 4 for Windows and Linux Read Me
Parallels Desktop 4 for Windows and Linux Read Me Welcome to Parallels Desktop for Windows and Linux build 4.0.6576. This document contains the information you should know to successfully install Parallels
Virtual Machine Security
Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal
my forecasted needs. The constraint of asymmetrical processing was offset two ways. The first was by configuring the SAN and all hosts to utilize
1) Disk performance When factoring in disk performance, one of the larger impacts on a VM is determined by the type of disk you opt to use for your VMs in Hyper-v manager/scvmm such as fixed vs dynamic.
CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization
CS 695 Topics in Virtualization and Cloud Computing More Introduction + Processor Virtualization (source for all images: Virtual Machines: Versatile Platforms for Systems and Processes Morgan Kaufmann;
Servervirualisierung mit Citrix XenServer
Servervirualisierung mit Citrix XenServer Paul Murray, Senior Systems Engineer, MSG EMEA Citrix Systems International GmbH [email protected] Virtualization Wave is Just Beginning Only 6% of x86
ServerPronto Cloud User Guide
ServerPronto Cloud User Guide Virtual machines Virtual machines are based on templates and are deployed on hypervisors. Hypervisors give them access to CPU, disk and network resources. The ServerPronto
The Review of Virtualization in an Isolated Computer Environment
The Review of Virtualization in an Isolated Computer Environment Sunanda Assistant professor, Department of Computer Science & Engineering, Ludhiana College of Engineering & Technology, Ludhiana, Punjab,
What is virtualization
Virtualization Concepts Virtualization Virtualization is the process of presenting computing resources in ways that users and applications can easily get value out of them, rather than presenting them
Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.
Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2.
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Introduction Have been around
Cloud Architecture and Virtualisation. Lecture 4 Virtualisation
Cloud Architecture and Virtualisation Lecture 4 Virtualisation TOC Introduction to virtualisation Layers and interfaces Virtual machines and virtual machine managers Hardware support Security 2 Virtualisation
The Art of Virtualization with Free Software
Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike
Virtualization and Disaster Recovery
Virtualization and Disaster Recovery Ray Trygstad Director of Information Technology, Associate Director, Information Technology & Management Degrees Illinois Institute of Technology NetSecure 09 March
Handling Multimedia Under Desktop Virtualization for Knowledge Workers
Handling Multimedia Under Desktop Virtualization for Knowledge Workers Wyse TCX Multimedia capabilities deliver the applications and performance required, for less A white paper by Wyse Technology Inc.
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
Best Practices for Virtualised SharePoint
Best Practices for Virtualised SharePoint Brendan Law [email protected] @FlamerNZ Flamer.co.nz/spag/ Nathan Mercer [email protected] @NathanM blogs.technet.com/nmercer/ Agenda Why Virtualise? Hardware
Virtualization Technology (or how my Windows computer gave birth to a bunch of Linux computers)
Virtualization Technology (or how my Windows computer gave birth to a bunch of Linux computers) The purpose of this document is to walk you through creating a Linux Virtual Machine (a guest Operating System)
International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 VIRTUALIZATION Vikas Garg Abstract: The main aim of the research was to get the knowledge of present trends
Table of Contents Introduction and System Requirements 9 Installing VMware Server 35
Table of Contents Introduction and System Requirements 9 VMware Server: Product Overview 10 Features in VMware Server 11 Support for 64-bit Guest Operating Systems 11 Two-Way Virtual SMP (Experimental
Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu
Lecture 2 Cloud Computing & Virtualization Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Outline Introduction to Virtualization The Major Approaches
A Project Summary: VMware ESX Server to Facilitate: Infrastructure Management Services Server Consolidation Storage & Testing with Production Servers
A Project Summary: VMware ESX Server to Facilitate: Infrastructure Management Services Server Consolidation Storage & Testing with Production Servers Srinivas P Reddy - 16 th March 2006 [email protected]
Introduction to Virtual Machines
Introduction to Virtual Machines Introduction Abstraction and interfaces Virtualization Computer system architecture Process virtual machines System virtual machines 1 Abstraction Mechanism to manage complexity
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
SUSE Linux Enterprise 10 SP2: Virtualization Technology Support
Technical White Paper LINUX OPERATING SYSTEMS www.novell.com SUSE Linux Enterprise 10 SP2: Virtualization Technology Support Content and modifications. The contents of this document are not part of the
Virtualised MikroTik
Virtualised MikroTik MikroTik in a Virtualised Hardware Environment Speaker: Tom Smyth CTO Wireless Connect Ltd. Event: MUM Krackow Feb 2008 http://wirelessconnect.eu/ Copyright 2008 1 Objectives Understand
How To Understand The Power Of A Virtual Machine Monitor (Vm) In A Linux Computer System (Or A Virtualized Computer)
KVM - The kernel-based virtual machine Timo Hirt [email protected] 13. Februar 2010 Abstract Virtualization has been introduced in the 1960s, when computing systems were large and expensive to operate. It
A Comparison of VMware and {Virtual Server}
A Comparison of VMware and {Virtual Server} Kurt Lamoreaux Consultant, MCSE, VCP Computer Networking and Consulting Services A Funny Thing Happened on the Way to HP World 2004 Call for speakers at the
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
Efficient Load Balancing using VM Migration by QEMU-KVM
International Journal of Computer Science and Telecommunications [Volume 5, Issue 8, August 2014] 49 ISSN 2047-3338 Efficient Load Balancing using VM Migration by QEMU-KVM Sharang Telkikar 1, Shreyas Talele
