Chapter 2 Addendum (More on Virtualization)



Similar documents
Virtualization Technologies (ENCS 691K Chapter 3)

SOA and Virtualization Technologies (ENCS 691K Chapter 2)

Virtualization for Cloud Computing

Virtualization. Jukka K. Nurminen

Infrastructure as a Service (IaaS)

COS 318: Operating Systems. Virtual Machine Monitors

Cloud Computing #6 - Virtualization

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Enabling Technologies for Distributed Computing

Enabling Technologies for Distributed and Cloud Computing

Full and Para Virtualization

Analysis on Virtualization Technologies in Cloud

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

Virtualization. Types of Interfaces

How To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox (Xeen) Xen-Virtualization (X

Distributed and Cloud Computing

Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009

White Paper on NETWORK VIRTUALIZATION

COM 444 Cloud Computing

How To Create A Cloud Based System For Aaas (Networking)

Basics of Virtualisation

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Cloud Computing CS

Virtualization. Pradipta De

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

COS 318: Operating Systems. Virtual Machine Monitors

IOS110. Virtualization 5/27/2014 1

What is virtualization

Control Tower for Virtualized Data Center Network

9/26/2011. What is Virtualization? What are the different types of virtualization.

Virtual Machine Security

Performance Comparison of VMware and Xen Hypervisor on Guest OS

How To Understand Cloud Computing

Virtual Machines.

Network Virtualization

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

Knut Omang Ifi/Oracle 19 Oct, 2015

Compromise-as-a-Service

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Virtualization. Dr. Yingwu Zhu

Dynamic Load Balancing of Virtual Machines using QEMU-KVM

Networking for Caribbean Development

Virtualization. Explain how today s virtualization movement is actually a reinvention

Virtualized Networks based on System Virtualization

Data Centers and Cloud Computing

Virtualization and the U2 Databases

Introduction to Virtualization

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

Distributed Systems. Virtualization. Paul Krzyzanowski

Virtual Machines. COMP 3361: Operating Systems I Winter

Software as a Service (SaaS) and Platform as a Service (PaaS) (ENCS 691K Chapter 1)

Virtual Machine in Data Center Switches Huawei Virtual System

VMware Server 2.0 Essentials. Virtualization Deployment and Management

Virtualization System Security

The Art of Virtualization with Free Software

How To Manage A Virtualization Server

Quantum Hyper- V plugin

ProMoX: A Protocol Stack Monitoring Framework

nanohub.org An Overview of Virtualization Techniques

Installing & Using KVM with Virtual Machine Manager COSC 495

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

Virtualization: Concepts, Applications, and Performance Modeling

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR

Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool

Migration of Virtual Machines for Better Performance in Cloud Computing Environment

x86 ISA Modifications to support Virtual Machines

Hypervisors and Virtual Machines

Virtualization Technology. Zhiming Shen

Virtualization and Other Tricks.

Virtual machines and operating systems

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu

Virtual Computing and VMWare. Module 4

OS Virtualization. CSC 456 Final Presentation Brandon D. Shroyer

Models For Modeling and Measuring the Performance of a Xen Virtual Server

CS 695 Topics in Virtualization and Cloud Computing. Introduction

CS 695 Topics in Virtualization and Cloud Computing and Storage Systems. Introduction

Virtualization. Jia Rao Assistant Professor in CS

How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself

Best Practices for Virtualised SharePoint

SCO Virtualization Presentation to Customers

Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh

Cloud Computing. Dipl.-Wirt.-Inform. Robert Neumann

Jukka Ylitalo Tik TKK, April 24, 2006

Arwed Tschoeke, Systems Architect IBM Systems and Technology Group

Virtualization in Enterprise Environment. Krisztian Egi

Virtual Technologies for Learning System. Chao-Wen Chan, Chih-Min Chen. National Taichung University of Science and Technology, Taiwan

Network performance in virtual infrastructures

EMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers Support Matrix

Comparing performance of HyperV and VMware considering Network Isolation in virtual machines

Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...

Transcription:

Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/

More on Systems Virtualization Type I (bare metal) vs. Type 2 (hosted) Full virtualization vs. para-virtualization Network virtualization

References ( Systems Virtualization) 1. M. Pearce et al., Virtualization: Issues, Security, Threats, and Solutions, ACM Computing Survey, February 2013 2. P. Barham et al., XEN and the Art of Virtualization, SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles, Pages 164-177

Type I vs Type II Hypervisor Types of hypervisor Type I bare metal Installed on bare hardware Examples Citrix XEN server VMWARE ESX/ESXI

Type I vs Type II Hypervisor Types of hypervisor Type 2 hosted Runs on top of host operating system Examples: VMWare workstation VirtualBox

Type I vs Type II Hypervisor Type I - Bare metal Hypervisor installed on bare hardware Advantages (compared to type II) Performance (No additional software layer to go through) Security (No possible attack through host operating system) Drawbacks (compared to type II) Host operating system needs to be ported on top of hypervisor Complexity depends on the type of virtualization (Full virtualization vs. para-virtualization)

Type I vs Type II Hypervisor Type II - Hosted Hypervisor installed on top of host operating system Drawbacks (compared to type I) Performance (need to go through host operating system) Security (i.e. Possibility to attack through host operating system) Advantages (compared to type I) Host operating system is re-used as it is (No need to port it) No change required to applications running on top of host operating system

Type I vs Type II Hypervisor (Summary) Types of hypervisor/virtual machine monitor (From ref. 2)

Full virtualization vs. Para-virtualization More on operating systems fundamentals Privileged vs. non privileged instruction Privileged If called in user mode, the CPU needs to trap it and switch control to supervisory software (e.g. hypervisor) for its execution

Full virtualization vs. Para-virtualization More on operating systems fundamentals Sensitive vs. non sensitive instruction Sensitive Has the capacity to interfere with supervisor software functioning (e.g. Hypervisor) Write hypervisor memory vs. read hypervisor memory

Full virtualization vs. Para-virtualization Could all CPU architectures be fully virtualized? Could be fully virtualized only if the set of sensitive instructions is a subset of the privileged instructions From reference [1]

Full virtualization vs. Para-virtualization Could all CPU architectures be fully virtualized? The case of Intel x86 CPU architectures Cannot be fully virtualized Certain instructions must be handled by the VMM for correct virtualization, but these with insufficient privilege fail silently rather than causing a convenient trap Reference [2]

Full virtualization vs. Para-virtualization Definitions Full virtualization Hypervisor enables virtual machines identical to real machine Problematic for architectures such as Intel x86

Full virtualization vs. Para-virtualization Definitions Para-virtualization Hypervisor enables virtual machine that are similar but not identical to real machine A solution to the problem of CPU architectures that cannot be virtualized Prevents user programs from executing sensitive instructions Note: Para-virtualization is not the only solution to the problem

Full virtualization vs. Para-virtualization Full virtualization Advantages Possibility to host guest operating systems with no change since virtual machines are identical to real machines Disadvantages Not always feasible (e.g. Intel x86) There are work around (e.g. binary translation) Some guest operating systems might need to see both virtual resources and real resources for real time applications

Full virtualization vs. Para-virtualization Para - virtualization Advantages Feasible for all CPU architectures Performance Compared to: Full virtualization Other approaches to architectures that could not be virtualized (e.g. binary translation) Disadvantages Need to modify guest operating systems

Full virtualization vs. Para-virtualization Para - virtualization Alternatives to para-virtualization Binary translation (e.g. VMWare ESX server) Leads to full virtualization No need to re-write statically guest operating systems i.e. guest OS can be installed without change Interpretation of guest code (OS + application) Rewrites dynamically guest code and insert traps when necessary

Full virtualization vs. Para-virtualization Para - virtualization Alternatives to para-virtualization Binary translation Disadvantages / penalties Performance However, optimization is possible, e.g.» Adaptive translation (i.e. optimize the code being translated)

Full virtualization vs. Para-virtualization Para virtualization A detailed case study on para-virtualization XEN (Reference 2)

More on Network Virtualization 1. Motivations (Reminder) 2. Prior to network virtualization Virtual Local Area Network Virtual Private Network Overlays 3. A case study on network virtualization business model Scenarios Prototype

References (Network Virtualization) 1. N.M Chowdhury and r. Boutaba, Network Virtualization: State of the Art and Research Challenges, IEEE Communications Magazine, July 2009 2. J. Carapinha et al., Network Virtualization A View from the Bottom, VISA '09 Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures, Pages 73-80 3. G. Schaffrat et al., Network Virtualization Architecture: Proposal and Initial Prototype, Proceeding VISA '09 Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures, Pages 63-72 4. J. Kurose and K. Ross, Computer Networking: A Top Down Approach, Pearson, 6 th Edition, 2013 5. Venkateswanan, Virtual Private Networks, IEEE Potentials, Issue 20, no1

Motivations Bring the benefits of systems virtualization to the networking world, e.g. Co-existence of virtual networks on top of a same physical real network with proper isolation Networking research (e.g. possibility to deploy brand networks for experimentation purpose on top of existing real networks) Network software testing and run-time debugging Optimization of network resource utilization Nodes Links Migration of virtual machine from node to node

Prior to Network Virtualization Virtual Local Area Networks (VLANs) Possibility to define several VLANs over a same physical LAN infrastructure Each VLAN has its broadcast domain and has an id. However Each physical node is part of one and only VLAN No efficient resource usage

Prior to Network Virtualization Virtual Local Area Networks (VLANs) A LAN (Reference 4)

Prior to Network Virtualization Virtual Local Area Networks (VLANs) A VLAN (Reference 4)

Prior to Network Virtualization Virtual Private Networks Possibility to build virtual networks using a shared infrastructure (usually Internet, but might be a dedicated networks) Site interconnection Extranets But: No real insolation between the different networks traffic over the shared infrastructure

Prior to Network Virtualization Virtual Private Networks Reference 5 (LAN Interconnection)

Prior to Network Virtualization Virtual Private Networks Reference 5 (LAN Interconnection)

Prior to Network Virtualization Overlays Logical networks built on top of real networks (e.g. skype) A same physical node might be part of several overlays But: Overlays might interact in a harmful way Used mainly at application layer and does not enable experimentation of lower layer protocols

Overlays Prior to Network Virtualization

Prior to Network Virtualization Overlays P2P overlay Characteristics own topology that may be different from the topology of the real network Own protocols that may be different from the protocols used in the real network May come with an application embedded in it (e.g. Skype) or as an infrastructure that can be used by other applications (e.g. CHORD) APIs, toolkits are provided when the application is not embedded in the overlay

A Case Study on Network Virtualization (Reference 3) Business model of current Internet: Internet Service Providers (ISPs) (e.g. Bell, Rogers) Service Providers (eg. Google, Akamai)

A Case Study on Network Virtualization New business model (4 roles): Reference 3

A Case Study on Network Virtualization Reference 3 New business model (6 interfaces):

A Case Study on Network Virtualization Simplified scenario Reference 3

A Case Study on Network Virtualization (Reference 3) Prototype Node level virtualization XEN VNET description XML

A Case Study on Network Virtualization (Reference 3) Topology used for Vnet instantiation measurements (end to end from Vnet request by service provider till full provisioning of VNET

A The End.