Arwed Tschoeke, Systems Architect tschoeke@de.ibm.com IBM Systems and Technology Group



Similar documents
The Consolidation Process

IBM Systems and Technology Group Technical Conference

SHARE in Pittsburgh Session 15591

Monitoring Linux Guests and Processes with Linux Tools

Session Title: Cloud Computing 101 What every z Person must know

Full and Para Virtualization

Cloud Computing with xcat on z/vm 6.3

Positioning the Roadmap for POWER5 iseries and pseries

Virtualization and the U2 Databases

SuSE Linux High Availability Extensions Hands-on Workshop

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh

Virtualization. Dr. Yingwu Zhu

Performance and scalability of a large OLTP workload

SAS deployment on IBM Power servers with IBM PowerVM dedicated-donating LPARs

Backups in the Cloud Ron McCracken IBM Business Environment

Implementing Tivoli Storage Manager on Linux on System z

Virtual Machines.

Server Virtualization: The Essentials

<Insert Picture Here> Oracle Database Support for Server Virtualization Updated December 7, 2009

Distributed Systems. Virtualization. Paul Krzyzanowski

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

COS 318: Operating Systems. Virtual Machine Monitors

Virtualization. Types of Interfaces

Virtualization. Pradipta De

Managed Services - A Paradigm for Cloud- Based Business Continuity

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management

Managing z/vm & Linux Performance Best Practices

Cloud Computing #6 - Virtualization

Virtualization. Jia Rao Assistant Professor in CS

x86 ISA Modifications to support Virtual Machines

Virtualization. Jukka K. Nurminen

Total Cost of Ownership (TCO): Comparing System z and Distributed Platforms

DB2 Database Demonstration Program Version 9.7 Installation and Quick Reference Guide

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

IBM Tivoli Web Response Monitor

The Art of Virtualization with Free Software

Virtualization Technology. Zhiming Shen

Data Deduplication in a Virtual Tape Library Environment

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

IBM WebSphere Data Interchange V3.3

IBM Infrastructure Suite for z/vm and Linux

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

z/vm and Linux on zseries Performance Monitoring An Update on How and With What Products

Models For Modeling and Measuring the Performance of a Xen Virtual Server

Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer

Virtualization Performance Analysis November 2010 Effect of SR-IOV Support in Red Hat KVM on Network Performance in Virtualized Environments

Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1

Virtualization for Cloud Computing

Intel Virtualization Technology (VT) in Converged Application Platforms

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Management with IBM Director

Hard Partitioning and Virtualization with Oracle Virtual Machine. An approach toward cost saving with Oracle Database licenses

Oracle Database Scalability in VMware ESX VMware ESX 3.5

nanohub.org An Overview of Virtualization Techniques

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

9/26/2011. What is Virtualization? What are the different types of virtualization.

Enterprise-Class Virtualization with Open Source Technologies

SUSE Linux Enterprise 10 SP2: Virtualization Technology Support

Title. Click to edit Master text styles Second level Third level

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D

Jukka Ylitalo Tik TKK, April 24, 2006

Running Linux on System z as a z/vm Guest: Useful Things to Know

Accelerate with ATS DS8000 Hardware Management Console (HMC) Best practices and Remote Support Configuration September 23rd, 2014.

CS z/os Network Security Configuration Assistant GUI

Virtualization: Concepts, Applications, and Performance Modeling

KVM KERNEL BASED VIRTUAL MACHINE

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition

Migrating LAMP stack from x86 to Power using the Server Consolidation Tool

WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach

Virtualization Technologies (ENCS 691K Chapter 3)

Basics of Virtualisation

Cloud^H^H^H^H^H Virtualization Technology. Andrew Jones May 2011

Introduction to Virtualization

Intro to Virtualization

Enhanced Virtualization on Intel Architecturebased

Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009

Managing z/vm and Linux Performance Best Practices

IOS110. Virtualization 5/27/2014 1

Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool

z/tpf FTP Client Support

Redbooks Paper. Local versus Remote Database Access: A Performance Test. Victor Chao Leticia Cruz Nin Lei

System z Batch Network Analyzer Tool (zbna) - Because Batch is Back!

Java Application Performance Analysis and Tuning on IBM System i

IBM Tivoli Monitoring for Databases

COS 318: Operating Systems. Virtual Machine Monitors

Chapter 2 Addendum (More on Virtualization)

Introduction to Virtual Machines

VMware Server 2.0 Essentials. Virtualization Deployment and Management

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

Oracle On Demand Infrastructure: Virtualization with Oracle VM. An Oracle White Paper November 2007

Server Virtualization with VMWare

What is virtualization

Virtualization. Clothing the Wolf in Wool. Wednesday, April 17, 13

Transcription:

Virtualization in a Nutshell Arwed Tschoeke, Systems Architect tschoeke@de.ibm.com and Technology Group Virtualization Say What? Virtual Resources Proxies for real resources: same interfaces/functions, different attributes. May be part of a physical resource or multiple physical resources. Virtualization Creates virtual resources and "maps" them to real resources. Primarily accomplished with software and/or firmware. Resources Components with architected interfaces/functions. May be centralized or distributed. Usually physical. Examples: CPUs, memory, storage, network devices. Separates presentation of resources to users from actual resources Aggregates pools of resources for allocation to users as virtual resources 2 1

Virtualization Say What? Virtualization comprises the abstraction of physical systems to virtual systems Divison of static relationships between logical system environments (environment of services and applications) and physical systems Two possible directions: Integration of many single physical systems to one logical system Segmentation of one physical system into many logical systems Such logical systems are named as virtual machines A virtual machine is a fully protected and isolated simulation of the underlaying hardware altough virtualization comprises both integration and segmentation, this presentation concentrates on segmentation. 3 Important Terms Concerning Virtualization Supervisor and Hypervisor Supervisor is another term for an operating system of an virtual machine Controls the virtual machine and its dedicated resources Hypervisor (or Virtual Machine Monitor) is another term for an controller of virtual machines Controls the physical system resources and dedicates them to virtual machines. Controls and handles processes of virtual machines which are critical to physical hardware Isolation of virtual machines Switching (context switching) between virtual machines (e.g., exits, time slicing) Supervisor Supervisor Supervisor Supervisor Hypervisor Physical Resources 4 2

Important Terms Concerning Virtualization Kernel (Privileged) Mode and User Mode Kernel Mode provides full access to system resources. It is the mode of the operating system which administers and dedicates physical system resources. User Mode provides restricted access to system resources (e.g., applications) Privileged and Non-Privileged instructions Privileged instructions can only be executed within Kernel Mode Sensitive and Non-Sensitive instructions Sensitive instructions invoke critical hardware areas Application Operating System Non-Privileged Privileged Application Operating System Hypervisor Non-Privilege Non-Privileged Privileged 5 Server Virtualization Approaches Hardware Partitioning Bare Metal Hypervisor Hosted Hypervisor Partition Controller Adjustable partitions Hypervisor Type 1 Hypervisor Host Type 2 SMP Server SMP Server SMP Server Server is subdivided into fractions each of which can run an Physical partitioning S/370 SI-to-PP and PP-to-SI, Sun Domains, HP npars ogical partitioning pseries PAR, HP (PA) vpars Hypervisor provides fine-grained timesharing of all resources Hypervisor software/firmware runs directly on server System z PR/SM and z/vm POWER Hypervisor VMware ESX Server Xen Hypervisor Hypervisor uses services to do timesharing of all resources Hypervisor software runs on a host operating system VMware GSX Microsoft Virtual Server HP Integrity VM User Mode inux Hardware partitioning subdivides a server into fractions, each of which can run an Hypervisors use a thin layer of code to achieve fine-grained, dynamic resource sharing Type 1 hypervisors with high efficiency and availability will become dominant for servers Type 2 hypervisors will be mainly for clients where host integration is desirable 6 3

Virt Mach A ST PrivOp Trap and Emulate Trap VM runs in user mode All privileged instructions cause traps Hypervisor PrivOp emulation code Hypervisor Implementation Methods Translate, Trap, and Emulate Virt Mach A ST TrapOp Trap VM runs in user mode Some IA-32 instructions must be replaced with trap ops Hypervisor PrivOp emulation code Examples: Benefits: Issues: CP-67, VM/370 Runs unmodified Substantial overhead Examples: Benefits: Issues: VMware (today), Microsoft VS Runs unmodified, translated May have some substantial overhead 7 Hypervisor Calls ( Paravirtualization ) Virt Mach VM runs in normal modes in VM calls hypervisor A in case of critical Syscalls ST Hcall Call Hypervisor service Examples: POWER Hypervisor, Xen (today), HP Integrity VM Benefits: High efficiency depending of Hypervisor code + eventual HW support Issues: -Kernel must be modified to issue Hcalls. & Hypervisor levels must be in sync Direct Hardware Virtualization A ST PrivOp(*) Examples: Benefits: Issues: Virt Mach Exit VM runs in normal modes HW does most of the virtualization SIE arch set architecture of VM, provide status, translation & assists) Hypervisor provides control Hypervisor service (*) ONY for some control instructions, executed rather infrequent PR/SM, z/vm (also use hypervisor calls) for a some functional enhancements Highest efficiency depending on HW/ucode support. Runs unmodified Requires HW & ucode support Partitioning Defined Partitioning is the division of a single server s resources* into multiple, independent, isolated systems capable of running their own operating system Three types of partitioning: Hardware resources are allocated to partitions on a one-to-one basis with the underlying physical hardware (no sharing among partitions) ogical resources are managed by hardware firmware and allocated to partitions with a finer granularity than hardware partitioning (resource sharing among partitions) Software resources are managed by a software layer, aggregated into shared resource pools, and apportioned to users as virtual system resources, separating the presentation of the resources from the actual physical entities * Resources include: processors, memory, I/O adapters and devices, networking interfaces, co-processors 8 4

Hypervisor Technologies Trap and Emulate method Guest runs in user mode Hypervisor runs in privileged mode Privileged instructions issued by guest operating system(s) are trapped by hypervisor IA-32 (Intel) complications: Some instructions behave differently in privileged and user modes User mode instructions that access privileged resources/state cannot be trapped; instruction must be changed to something that can be trapped Some guest kernel binary translation may be required - Translate, Trap and Emulate method Reduces resource-overhead Originally used by mainframes in 1960s and 1970s (VM/370) Used today by VMware 9 Hypervisor Technologies Hypervisor Call method ( Paravirtualization ) Guest runs in privileged mode Hypervisor runs in super-privileged mode Guest kernel (e.g., AIX, i5/, inux) is modified to do hypervisor calls for I/O, memory management, yield rest of time slice, etc. Memory mapping architecture is used to isolate guests from each other and to protect the hypervisor Used by POWER5 today 10 5

Hypervisor Technologies Direct Hardware method Guest runs in privileged mode Guest can be run unmodified, but can issue some hypervisor calls to improve performance or capability I/O (z/vm) Yield time slice (PR/SM TM and z/vm) Extensive hardware assists for hypervisor (virtual processor dispatching, I/O pass-through, memory partitioning, etc.) Used by System z (PR/SM TM and z/vm) 11 et s talk about Business Value! 12 6

What are data centres facing today? Exploiding numbers of systems! 13 What are data centres facing today? Exploiding numbers of systems! 14 7

Exploiding numbers of systems? Consequences! 15 Data Center Heating Source: Uptime Institute, Footprint Heat Density Trends 16 8

IT Consolidation is the answer but virtualization makes it real! 17 Why perform the effort of virtualization? - The Business Value! Reduced hardware costs Higher physical resource utilization Smaller footprints Reduced management costs Fewer physical servers to manage Many common management tasks become much easier Improved flexibility and responsiveness Virtual resources can be adjusted dynamically to meet new or changing needs and to optimize service level achievement Provisioning and removing of servers within minutes Virtualization based on SHARING RESSOURCES allows an installation to grow dynamically both Vertically & Horizontally on the same server assuming we are dealing with Efficient Virtualization Roles: Consolidations Dynamic provisioning / hosting Workload management Workload isolation Software release migration Mixed production and test Mixed types/releases Reconfigurable clusters ow-cost backup servers Virtual Servers Virtualization Physical Server Benefits: Higher resource utilization Greater usage flexibility Improved workload QoS Higher availability / security ower cost of availability ower management costs Improved interoperability egacy compatibility Investment protection 18 9

Hindi Thank You English Russian Gracias Spanish Thai Traditional Chinese Obrigado Arabic Brazilian Portuguese Danke Grazie Italian Simplified Chinese Merci French German Japanese Tamil Korean 19 Trademarks The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. For a complete list of IBM Trademarks, see www.ibm.com/legal/copytrade.shtml: AS/400, DB2, e-business logo, ESCON, eserver, FICON, IBM, IBM ogo, iseries, MVS, /390, pseries, RS/6000, S/390, System z9, VM/ESA, VSE/ESA, WebSphere, xseries, z/, zseries, z/vm. The following are trademarks or registered trademarks of other companies Java and all Java-related trademarks and logos are trademarks of Sun Microsystems, Inc., in the United States and other countries. INUX is a registered trademark of inux Torvalds in the United States and other countries. UNIX is a registered trademark of The Open Group in the United States and other countries. Microsoft, Windows and Windows NT are registered trademarks of Microsoft Corporation. SET and Secure Electronic Transaction are trademarks owned by SET Secure Electronic Transaction C. Intel is a registered trademark of Intel Corporation. * All other products may be trademarks or registered trademarks of their respective companies. NOTES: Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput improvements equivalent to the performance ratios stated here. IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply. All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions. This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area. All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Information about non-ibm products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography. References in this document to IBM products or services do not imply that IBM intends to make them available in every country. Any proposed use of claims in this presentation outside of the United States must be reviewed by local IBM country counsel prior to such use. The information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-ibm Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. 20 10