Cloud Computing #6 - Virtualization

Similar documents
Virtualization. Pradipta De

Virtualization. Jukka K. Nurminen

CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

COS 318: Operating Systems. Virtual Machine Monitors

Virtualization. Dr. Yingwu Zhu

Introduction to Virtual Machines

COM 444 Cloud Computing

Distributed and Cloud Computing

Virtualization. Types of Interfaces

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

Virtualization Technology. Zhiming Shen

System Virtual Machines

Virtual Machines. Virtual Machines

Cloud Computing. Dipl.-Wirt.-Inform. Robert Neumann

Full and Para Virtualization

Virtual Machines. Virtualization

Virtualization Technologies (ENCS 691K Chapter 3)

Virtual Machines.

Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool

Virtual Computing and VMWare. Module 4

Virtualization. ! Physical Hardware. ! Software. ! Isolation. ! Software Abstraction. ! Encapsulation. ! Virtualization Layer. !

Virtualization. Introduction to Virtualization Virtual Appliances Benefits to Virtualization Example Virtualization Products

Cloud Computing CS

Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh

Virtualization. Jia Rao Assistant Professor in CS

Chapter 2 Addendum (More on Virtualization)

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Virtualization for Cloud Computing

Introduction to Virtual Machines

A Unified View of Virtual Machines

OS Virtualization. CSC 456 Final Presentation Brandon D. Shroyer

Data Centers and Cloud Computing

Enabling Technologies for Distributed Computing

Clouds Under the Covers. Elgazzar - CISC Fall

Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition

Distributed Systems. Virtualization. Paul Krzyzanowski

Cloud Computing. Up until now

Virtualization. Explain how today s virtualization movement is actually a reinvention

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16

Enabling Technologies for Distributed and Cloud Computing

Clouds, Virtualization and Security or Look Out Below

The Art of Virtualization with Free Software

Compromise-as-a-Service

Definitions. Hardware Full virtualization Para virtualization Hosted hypervisor Type I hypervisor. Native (bare metal) hypervisor Type II hypervisor

12. Introduction to Virtual Machines

x86 ISA Modifications to support Virtual Machines

kvm: Kernel-based Virtual Machine for Linux

COS 318: Operating Systems. Virtual Machine Monitors

The MIPS architecture and virtualization

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Networked I/O for Virtual Machines

9/26/2011. What is Virtualization? What are the different types of virtualization.

OPEN SOURCE VIRTUALIZATION TRENDS. SYAMSUL ANUAR ABD NASIR Warix Technologies / Fedora Community Malaysia

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

A cure for Virtual Insanity: A vendor-neutral introduction to virtualization without the hype

Networking for Caribbean Development

Chapter 5 Cloud Resource Virtualization

Virtualization. Clothing the Wolf in Wool. Wednesday, April 17, 13

Jukka Ylitalo Tik TKK, April 24, 2006

Hypervisors and Virtual Machines

ARM Virtualization: CPU & MMU Issues

Introduction to Virtualization & KVM

CSE490H: Virtualization

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D

WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach

Virtual Machines. COMP 3361: Operating Systems I Winter

Virtualization: Concepts, Applications, and Performance Modeling

Virtual Machines. Adapted from J.S. Smith and R. Nair, VIRTUAL MACHINES, Morgan-Kaufmann Teodor Rus.

CS 695 Topics in Virtualization and Cloud Computing. Introduction

Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore

Knut Omang Ifi/Oracle 19 Oct, 2015

x86 Virtualization Hardware Support Pla$orm Virtualiza.on

Virtualization Technology. Zhonghong Ou Data Communications Software Lab, Aalto University

Basics of Virtualisation

Intro to Virtualization

21/09/11. Introduction to Cloud Computing. First: do not be scared! Request for contributors. ToDO list. Revision history

Virtual machines and operating systems

Cloud Architecture and Virtualisation. Lecture 4 Virtualisation

What is virtualization

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR

Virtual Machines Fact Sheet

RUNNING vtvax FOR WINDOWS

Virtualization. Michael Tsai 2015/06/08

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

CS 695 Topics in Virtualization and Cloud Computing and Storage Systems. Introduction

Arwed Tschoeke, Systems Architect IBM Systems and Technology Group

VMware Virtual Infrastucture From the Virtualized to the Automated Data Center

An Introduction to Virtual Machines Implementation and Applications

nanohub.org An Overview of Virtualization Techniques

Development of Type-2 Hypervisor for MIPS64 Based Systems

OS Virtualization Frank Hofmann

Dynamic Load Balancing of Virtual Machines using QEMU-KVM

Virtualization and the U2 Databases

Transcription:

Cloud Computing #6 - Virtualization Main source: Smith & Nair, Virtual Machines, Morgan Kaufmann, 2005

Today What do we mean by virtualization? Why is it important to cloud? What is the penalty? Current trends

Virtualization CPU virtualization Memory virtualization Storage virtualization Device virtualization

Cloud Motives Server Consolidation Improve utilisation (possible to overcommit) Significant cost savings (equipment, space, power) Simplified Management Datacenter provisioning and monitoring Dynamic load balancing Migration (dead or alive) Improved Availability Checkpointing Fault tolerance Disaster recovery Replication Security Isolation Convenient for users

Cloud Resource Management

Cloud Resource Management

Cloud Resource Management

Yesterday s News Classical VMM IBM S/360, IBM VM/370 Co-designed proprietary hardware, OS, VMM Trap and emulate model Applications Timeshare several single-user OS instances on expensive hardware Compatibility From IBM VM/370 product announcement, ca. 1972

Original Motives 65 Multiprogramming Multiple single application VMs Multiple secure environments Managed application environments Mixed OS environments Legacy applications New systems transitions Software development OS training Help desk support Operating system instrumentation Event monitoring Check pointing

System VM vs Process VM

Virtualization Interfaces OS ISA Instruction Set Architecture Compiler ABI Application Binary Interface User ISA + ABI Application API Application Programming Interface User ISA + API

VM Taxonomy

VM Taxonomy App App App App Guest OS Guest OS VMM/Hypervisor Hardware Virtual Machine Monitor Type-1: bare metal VMM = Hypervisor OS/370 (CP), VMWare ESXi Type-2: hosted KVM, VirtualBox App App App App Guest OS Guest OS VMM Host OS Hardware

Where is the PaaS & IaaS?

Popek & Goldberg 74 Popek & Goldberg 74

guest host state mapping instruction sequence existence of map & instruction sequences such that: Popek & Goldberg 74

Essential Properties of a VMM Equivalence: Running on VMM = Running directly on HW Performance: Performance on VMM Performance on HW Resource control: The VMM must have complete control of the virtualized resources Popek & Goldberg 74

When is it possible to fulfil these requirements? Popek & Goldberg 74

A Few Definitions Privileged instructions (PI): must generate trap when executed in any but the most privileged level Execute in privileged mode, trap in user mode Privileged state: determines resource allocation Privilege mode, addressing context, exception vectors,... Sensitive instructions (SI): instructions whose behavior depends on the current privilege level Control sensitive: change privileged state Behavior sensitive: exposes privileged state Popek & Goldberg 74

Virtualizable ISA If: Theorem 1: A VMM may be constructed if the set of SI s is a subset of the set of PI s Popek & Goldberg 74

Virtualization Approaches Trap-and-emulate Binary translation Paravirtualization Hardware-assisted Virtualization

Trap & Emulate privileged instruction GuestOS De-privileging Run guest OS in trap resource emulate change unprivileged mode Privileged instructions trap, and VMM emulates change vmm resource Execute guest instructions on real CPU when possible

Binary Translation Interpret the binary code Replace privileged instructions Dynamic or static Use cache to speed up Hosted VM Popularised by VMWare on x86

Paravirtualization Less of a duplicate for better performance OS or system devices are virtualization aware Recompile the OS Guest applications unaffected Popularised by XEN for x86

Virtualization Timeline

Next Hardware virtualization (Robert Marklund) Containers & Docker (Linus)