Distributed Systems. Virtualization. Paul Krzyzanowski pxk@cs.rutgers.edu



Similar documents
Virtualization. Pradipta De

Virtualization. Dr. Yingwu Zhu

Full and Para Virtualization

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

Virtualization. Types of Interfaces

IOS110. Virtualization 5/27/2014 1

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D

Virtualization. Jukka K. Nurminen

Basics of Virtualisation

COS 318: Operating Systems. Virtual Machine Monitors

Intro to Virtualization

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Virtualization. Jia Rao Assistant Professor in CS

Virtual Machines. Virtualization

Virtualization Technology. Zhiming Shen

kvm: Kernel-based Virtual Machine for Linux

Virtualization and the U2 Databases

Virtualization Technology. Zhonghong Ou Data Communications Software Lab, Aalto University

Cloud Computing #6 - Virtualization

Virtualization. Michael Tsai 2015/06/08

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu

The Art of Virtualization with Free Software

CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization

Virtual machines and operating systems

Virtual Machines. COMP 3361: Operating Systems I Winter

System Virtual Machines

Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

COS 318: Operating Systems. Virtual Machine Monitors

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

9/26/2011. What is Virtualization? What are the different types of virtualization.

Virtual Machine Security

Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool

Data Centers and Cloud Computing

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Hardware Based Virtualization Technologies. Elsie Wahlig Platform Software Architect

Jukka Ylitalo Tik TKK, April 24, 2006

Enabling Technologies for Distributed Computing

CSE 501 Monday, September 09, 2013 Kevin Cleary

matasano Hardware Virtualization Rootkits Dino A. Dai Zovi

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE

Compromise-as-a-Service

VIRTUALIZATION 101. Brainstorm Conference 2013 PRESENTER INTRODUCTIONS

Enabling Technologies for Distributed and Cloud Computing

Virtual Computing and VMWare. Module 4

Introduction to Virtual Machines

The Xen of Virtualization

Virtualization with Windows

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR

Multi-core Programming System Overview

Virtualizare sub Linux: avantaje si pericole. Dragos Manac

Virtualization. Explain how today s virtualization movement is actually a reinvention

Computing in High- Energy-Physics: How Virtualization meets the Grid

Virtualization in Linux KVM + QEMU

Hypervisors and Virtual Machines

Introduction to Virtualization & KVM

Arwed Tschoeke, Systems Architect IBM Systems and Technology Group

Virtual Machines Fact Sheet

Virtualization for Cloud Computing

A quantitative comparison between xen and kvm

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16

Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition

Knut Omang Ifi/Oracle 19 Oct, 2015

Enterprise-Class Virtualization with Open Source Technologies

Chapter 14 Virtual Machines

VMware Server 2.0 Essentials. Virtualization Deployment and Management

Virtual Machines.

Distributed and Cloud Computing

x86 ISA Modifications to support Virtual Machines

Virtualization Technologies

Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...

Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh

nanohub.org An Overview of Virtualization Techniques

Models For Modeling and Measuring the Performance of a Xen Virtual Server

BHyVe. BSD Hypervisor. Neel Natu Peter Grehan

Analysis on Virtualization Technologies in Cloud

COM 444 Cloud Computing

A cure for Virtual Insanity: A vendor-neutral introduction to virtualization without the hype

Hardware Assisted Virtualization

Virtualization VMware Inc. All rights reserved

FRONT FLYLEAF PAGE. This page has been intentionally left blank

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

Virtualization. ! Physical Hardware. ! Software. ! Isolation. ! Software Abstraction. ! Encapsulation. ! Virtualization Layer. !

Xen and the Art of. Virtualization. Ian Pratt

Table of Contents. Server Virtualization Peer Review cameron : modified, cameron

Cloud^H^H^H^H^H Virtualization Technology. Andrew Jones May 2011

Virtualization Technologies (ENCS 691K Chapter 3)

Clouds Under the Covers. Elgazzar - CISC Fall

Cloud Computing CS

Machine Virtualization: Efficient Hypervisors, Stealthy Malware

CS5460: Operating Systems. Lecture: Virtualization 2. Anton Burtsev March, 2013

Chapter 5 Cloud Resource Virtualization

KVM: A Hypervisor for All Seasons. Avi Kivity avi@qumranet.com

Transcription:

Distributed Systems Virtualization Paul Krzyzanowski pxk@cs.rutgers.edu Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License.

Virtualization Memory virtualization Process feels like it has its own address space Created by MMU, configured by OS Storage virtualization Logical view of disks connected to a machine External pool of storage CPU/Machine virtualization Each process feels like it has its own CPU Created by OS preemption and scheduler

Storage Virtualization Dissociate knowledge of physical disks Software between the computer and the disks manages the view of storage Examples: Make four 500 GB disks appear as one 2 TB disk Make one 500 GB disk appear as two 200 GB disks and one 100 GB disk, with each of the 200 GB virtual disks available to different servers while the 100 GB disk can be shared by all. Have all writes get mirrored to a backup disk Virtualization software translates read-block/writeblock requests for logical devices to readblock/write-block requests for physical devices

Virtualization Storage virtualization Logical view of disks connected to a machine Separate logical view from phyisical storage External pool of storage Host 1 Host 2... Host n Virtualization appliance Fibre-channel switch Replication Snapshots Pooling Partitioning

Virtual CPU Each process feels like it has its own CPU But cannot execute privileged instructions (e.g., modify the MMU or the interval timer, halt the processor, access I/O) Created by OS preemption and scheduler

Virtual CPUs Pseudo-machine with interpreted instructions 1966: O-code for BCPL 1973: P-code for Pascal 1995: Java Virtual Machine Run anywhere

Virtual Machines Machine virtualization Partition a physical computer to act like several real machines Migrate an entire OS + applications from one machine to another 1972: IBM System 370

Machine Virtualization Privileged vs. unprivileged instructions Regular applications use unprivileged instructions Easy to virtualize If regular applications execute privileged instructions, they trap VM catches the trap and emulates the instruction

Intel Ugliness Intel x86 arch < Core 2 Duo doesn t support trapping privileged instructions Two approaches Binary translation (BT) Scan instruction stream and replace privileged instructions with something the VM can intercept. (VMware approach) Paravirtualization Don t use non-virtualizable instructions (Xen approach)

Virtual Machine Monitor (VMM) Program in charge of virtualization Aka Hypervisor Arbitrates access to physical resources Presents a set of virtual device interfaces to each host Guest OS runs until: Privileged instruction traps System interrupts Exceptions (page faults) Explicit call: VMCALL (intel) or VMMCALL (AMD)

Architectural Support Intel Virtual Technology (Intel Core 2 Duo) AMD Opteron Certain privileged instructions are intercepted as VM exits to the VMM Exceptions, faults, and external interrupts are intercepted as VM exits Virtualized exceptions/faults are injected as VM entries

Xen Popular VM Platforms Runs under an OS and provides virtual containers for running other operating systems. Runs a subset of x86. Routes all hardware accesses to the host OS. Altris Software Virtualization Services Windows registry & directory tweaking Allows multiple instances of applications to be installed Microsoft Virtual Server Parallels VMWare

Security Threats Hypervisor-based rootkits A system with no virtualization software installed but with hardware-assisted virtualization can have a hypervisor-based rootkit installed. Rootkit runs at a higher privilege level than the OS. It s possible to write it in a way that the kernel will have a limited ability to detect it.

Muiltiprocessor Virutalization 3Leaf Systems Custom ASIC to allow networked processors to act like one SMP system Cache-coherent links between servers A connection between servers keeps memory coherent and makes a remote processor look like it s on the same system bus Planned for 2010

The end