Virtual Square: All the Virtuality You Always Wanted but You Were Afraid to Ask

Total Page:16

File Type:pdf, Size:1020Kb

Virtual Square: All the Virtuality You Always Wanted but You Were Afraid to Ask Virtual Square: all the virtuality you always wanted but you were afraid to ask. Renzo Davoli i Computer Science Department vol Da ALMA MATER STUDIORUM: University of Bologna o Renz eft, yl WorkShop 2007 sul Calcolo e Reti dell'INFN op C 7 Rimini, 10 maggio 2007 00 2 © re ua Sq l ua t Vir Virtual Square VIRTUAL VIRTUAL VIRTUAL SQUARED i VIRTUAL SQUARE vol Da o VIRTUAL VIRTUAL Renz eft, VIRTUAL yl VIRTUAL op C 7 00 2 VIRTUAL © re VIRTUAL ua Sq l ua t Vir VIRTUALITY today ● Virtual Machines – historical topic – lots of papers – lots of tools i vol Da – ... but something is already missing o Renz ● Virtual Networking eft, yl op – less historical C 7 00 2 – several papers © re ua Sq l ua t Vir Virtual Square Virtualization concepts and tools are disconnected. i There is a world of new applications that vol Da can be realized by interoperating, o Renz integrated virtuality eft, yl op C 7 UNIFICATION IS NEEDED 00 2 © re ua Sq l ua t Vir Virtual Square © 2007 Copyleft, Renzo Davoli Vi rtual S qu are Some Examples of VM (free software) ● Qemu: PVM or SVM, User Mode User Access (or dual-mode with KQEMU, proprietary sw). – cross emulation platform (ia32, ia64, ppc, i m68k, sparc, arm...) vol Da o – dynamic translation Renz ● eft, XEN: SVM, Native. yl op C 7 – xen uses para-virtualization (O.S. in domain0 00 2 © has the real device drivers). re ua – (xen ideas come from the Denali project: Sq l ua t SVN, Native, real virtualization). Vir Some Examples of VM (free software) ● User-Mode Linux (U-ML): SCVM, User-Mode User Access. – Same ABI/Same ISA: Linux on Linux. – Uses the debugging interface ptrace to capture i vol the system calls. Da o ● OpenVZ: Native, SVM (but all the Vms share Renz eft, the same kernel, this category is also known yl op C 7 as: Operating System Level Virtualization). 00 2 – © derived from the proprietary product Virtuozzo. re ua – Sq the kernel itself provide different resource and l ua t different permissions to virtual instances of Linux. Vir Some Other Examples ● Mac-On-Linux: (free SW, SVM, Dual) ● Vmware: (proprietary, SCVM, Dual) ● VirtualPC/Virtual Server: (proprietary, i SVM, Dual) vol Da ● o PearPC: (free, SVM, User-Mode User- Renz Access) eft, yl op ● C Solaris “zones”: proprietary, Native, SVN 7 00 2 (OSLV). © re ua Sq l ua t Vir There are other kinds of Virtuality! The “classical” definition of Virtual Machines does not catch all the possible “Virtualities”... ● Virtual Network Interfaces: – tuntap ● Virtual Networks: i vol Da – VPN, Local VN provided with Virtual Machines o Renz ● Virtual Running Environments: eft, yl op – C chroot (POSIX syscall), fakeroot utility UNIX, Linux 7 00 2 Vserver © re ● ua Virtual File Systems Sq l ua t – Fuse, UnionFS, PlasticFS (uses LD_PRELOAD) Vir Other “Virtuality” ● Environmental Subsystems. – system call conversion: e.g. Posix -> Win32 ● System Call Interposition. – i Systrace: system call access manager vol Da – o Janus, Ostia: application firewall. Renz eft, yl op C 7 00 2 © re ua Sq l ua t Vir Virtual Square Goals ● We have seen a wide (wild ;-) world of different kinds of virtuality based on different ideas, several tools ● Keyword #1: communication – different VMs must be interconnected i ● vol Keyword #2: integration Da o – Renz different VMs can be seen as special cases of eft, a broaden idea of VM yl op C 7 ● Keyword #3: extension 00 2 © – re several needs could be captured by some VM ua Sq abstraction, but there is not the specific l ua t model of VM, nor the tool! Vir Virtual Square © 2007 Copyleft, Renzo Davoli ● free S I deas, t W oo . ls... mor 2 ½ e t Years! ha n 100,000li nes o f Keyword #1: Communication ● Virtual Distributed Ethernet: – VDE clients: User-Mode Linux, Qemu, virtual tap (all appl. using tap), tuntap (in linux kernel), slirp. i – VDE appears as a Local Area Network vol Da o (Ethernet complaint) from all the connected Renz entities. eft, yl – op The machines interconnected by a VDE may C 7 be distributed on different hosts (no limits of 00 2 © “distance”, km or hops). re ua Sq l ua t Vir VDE components SWITCH SWITCH CROSS CABLE i vol Da o Renz eft, yl op C 7 VDE SWITCH VDE SWITCH 00 2 © re ua VM VDE VdeWire VDE VM TunTap Sq l plug (e.g. ssh) plug ( e.g. QEMU) (e.g. U-ML) Linux Module ua t Vir VDE: Related Work ● VPN: (OpenVPN) point2point, for real machines ● Overlay Networks: specific for application (peer to peer, Akamai). i vol ● Da VM networking: (tools provided with VM, o Renz e.g. uml-switch) specific for VM eft, yl op VDE: C 7 00 ● 2 multipoint, general mesh © re ua ● no need for root (administration) access Sq l ua t ● Vir heterogeneous VM and non VM connected VDEv2: advertisement ● VDEv2: – modular design – compatible with user-mode linux, qemu, tuntap, (bochs, plex86), umview/lwipv6 – through the vdetaplib potentially compatible any application using tap i vol – VLAN (802.1Q) Da o – FST (fast spanning tree) Renz – run time maneageable via unixterm (telnet or eft, yl op web with vdetelweb) C 7 – includes slirpvde and wirefilter 00 2 – © status debug (NEW!) re ua – plugin support (NEW!) Sq l ua t Vir VDEv2 ● VDE-Switch – number of ports configurable on command line – port0 is reserved for management clients, n-1 i ports are available for connections. vol Da o – management UNIX socket for management Renz clients eft, yl op ● self-describing SMTP-like protocol C 7 00 – 2 modules: datasock (VM conn), tuntap, © re consmgmt (management) ua Sq l ua t Vir VDE cables ● VDE-plug – is a VM that converts the Ethernet packets of a VDE port into a stream connection (stdin- stdout) i ● vol VDE-wire Da o – can be any application able to give a Renz eft, stdin/stdout stream connection yl op C 7 00 2 © re ua Sq l ua t Vir Dual Pipe ● dpipe is a new (general purpose) command we have added. ● Pipe are well known abstractions. The following command prints the list of the i vol current directory: ls lpr Da o ls | lpr Renz eft, yl ● Dpipe creates a bi-irectional connection op C 7 between the processes cmd1 cmd2 00 2 © re dpipe cmd1 = cmd2 ua Sq l ua t Vir VDE cables, plugs, wires and dpipe ● dpipe is used to create VDE-cables: dpipe vde_plug = ssh vde.students.cs.unibo.it vde_plug ● this command connects by a dpipe the local vde_plug with a vde_plug running on i vol a remote host (the wire is ssh) Da o ● Renz other applications can be used as wire eft, yl (e.g.netcat) op C 7 ● 00 In the example vde_plug refers to the 2 © re default switch. It is possible to run several ua Sq l switches on the same host, an extra ua t Vir option is needed in this case. wirefilter ● wirefilter can be put on a cable (e.g. for network testing) dpipe vde_plug /tmp/s1 = wirefilter -m /tmp/m = vde_plug /tmp/s2 ● packet loss, delays, dup, speed, noise i vol figures, mtu, fifoness properties of the Da o line can be changed with command line Renz eft, options or real time via a management yl op C socket. 7 00 2 © re ua Sq l ua t Vir SlirpVDE VDE SWITCH VDE SWITCH 10.0.2.15 VDE VdeWire VDE 10.0.2.16 plug (e.g. ssh) plug VM VM i (e.g. QEMU) (e.g. U-ML) vol Da o Note: it supports Ipv4 only. Renz 10.0.2.2 Ipv6 is already eft, yl unsupported. SlirpVDE op Firefox C 7 00 http connection from slirpVDE 2 running on the hosting O.S. to © re http connection from firefox www.cs.unibo.it -> 130.136.1.110 ua running on 10.0.2.15 to Sq l w ww.cs.unibo.it -> 130.136.1.110 ua t Vir vde_cryptcab ● Coded by Daniele Lacamera (danielinux) ● A vde_cryptcab is a distributed cable manager for VDE switches. ● i Server side vol Da vde_cryptcab -s /tmp/vde2.ctl -p 2100 o Renz ● Client side eft, yl op vde_cryptcab -s /tmp/vde2.ctl -c [email protected]:2100 C 7 00 ● 2 use a blowfish channel (random key © re exchanged by scp). ua Sq l ua t Vir LWIPv6 ● It is a LWIPv4/v6 stack implemented as a library. ● Fork project from LWIP project (Adam Dunkels <[email protected]>) i vol ● Da Can be connected to any number of VDE, o Renz TUN, TAP interfaces. eft, yl ● op It is a hybrid stack (not a dual-stack). One C 7 00 single Ipv6 “engine” is able also to 2 © re manage Ipv4 packets in compatibility ua Sq l mode (130.136.1.110 is managed as ua t Vir 0::ffff:130.136.1.110). LWIPv6 ● PF_INET, PF_INET6 ● PF_PACKET for raw packet management – support for user-level network analysis tools (e.g. sniffers, ethereal) i vol – Da support for user-level dhcp clients. o ● Renz PF_NETLINK for configuration eft, yl op ● C Packet filtering 7 00 2 © re ua Sq l ua t Vir LWIPv6 interface definition API struct netif *lwip_vdeif_add(void *arg); struct netif *lwip_tapif_add(void *arg); struct netif *lwip_tunif_add(void *arg); int lwip_add_addr(struct netif *netif,struct ip_addr *ipaddr, struct ip_addr *netmask); int lwip_del_addr(struct netif *netif,struct ip_addr *ipaddr, struct ip_addr *netmask); i int lwip_add_route(struct ip_addr *addr, struct ip_addr *netmask, vol struct ip_addr *nexthop, struct netif *netif, int flags); Da o int lwip_del_route(struct ip_addr *addr, struct ip_addr *netmask, struct ip_addr *nexthop, struct netif *netif, int flags); Renz eft, yl int lwip_ifup(struct netif *netif); op int lwip_ifdown(struct netif *netif); C 7 00 2 © re ua Sq l ua t Vir LWIPv6 socket API (just put lwip_ ahead) int lwip_accept(int s, struct sockaddr *addr, socklen_t *addrlen); int lwip_bind(int s, struct sockaddr *name, socklen_t namelen); int lwip_shutdown(int s, int how); int lwip_getpeername (int s, struct sockaddr *name, socklen_t *namelen); int lwip_getsockname (int s, struct sockaddr *name, socklen_t *namelen); int lwip_getsockopt (int s, int level, int optname, void *optval, socklen_t *optlen); int lwip_setsockopt (int s,
Recommended publications
  • Design and Evaluation of Self-Management Approaches for Virtual Machine-Based Environments
    Fachhochschule Wiesbaden Fachbereich Design Informatik Medien Studiengang Informatik Master-Thesis zur Erlangung des akademischen Grades Master of Science – M.Sc. Design and Evaluation of Self-Management Approaches for Virtual Machine-Based Environments vorgelegt von Dan Marinescu am 29. Februar 2008 Referent: Prof. Dr. Reinhold Kröger Korreferent: Prof. Dr. Steffen Reith II Erklärung gem. BBPO, Ziff. 6.4.2 Ich versichere, dass ich die Master-Thesis selbstständig verfasst und keine anderen als die angegebenen Hilfsmittel benutzt habe. Wiesbaden, 29.02.2008 Dan Marinescu Hiermit erkläre ich mein Einverständnis mit den im Folgenden aufgeführten Verbreitungs- formen dieser Master-Thesis: Verbreitungsform ja nein Einstellung der Arbeit in die √ Bibliothek der FHW Veröffentlichung des Titels der √ Arbeit im Internet Veröffentlichung der Arbeit im √ Internet Wiesbaden, 29.02.2008 Dan Marinescu III IV Contents 1 Introduction 1 2 Background 5 2.1 Virtualization ................................ 5 2.1.1 Taxonomy ............................. 5 2.1.2 Case Study: Xen .......................... 10 2.1.3 Live Migration ........................... 13 2.1.4 Hardware-Assisted Virtualization ................. 16 2.1.5 Management of Vitual Machine Environments .......... 17 2.2 Service Level Management ......................... 20 2.3 Autonomic Computing ........................... 21 2.3.1 Motivation ............................. 21 2.3.2 Taxonomy ............................. 22 2.3.3 Architectural Considerations .................... 23 2.3.4 Examples of Autonomic Computing Systems ........... 24 2.4 Complexity theory and Optimization .................... 25 2.4.1 Introduction to Complexity Theory ................ 25 2.4.2 Complexity Classes ......................... 25 2.4.3 Optimization Problems ....................... 26 2.4.4 The Knapsack Family of Problems ................. 27 2.4.5 Approximation Algorithms ..................... 29 2.4.6 Heuristics .............................. 32 V 3 Analysis 37 3.1 State of the Art ..............................
    [Show full text]
  • Virtualization Technologies Overview Course: CS 490 by Mendel
    Virtualization technologies overview Course: CS 490 by Mendel Rosenblum Name Can boot USB GUI Live 3D Snaps Live an OS on mem acceleration hot of migration another ory runnin disk alloc g partition ation system as guest Bochs partially partially Yes No Container s Cooperati Yes[1] Yes No No ve Linux (supporte d through X11 over networkin g) Denali DOSBox Partial (the Yes No No host OS can provide DOSBox services with USB devices) DOSEMU No No No FreeVPS GXemul No No Hercules Hyper-V iCore Yes Yes No Yes No Virtual Accounts Imperas Yes Yes Yes Yes OVP (Eclipse) Tools Integrity Yes No Yes Yes No Yes (HP-UX Virtual (Integrity guests only, Machines Virtual Linux and Machine Windows 2K3 Manager in near future) (add-on) Jail No Yes partially Yes No No No KVM Yes [3] Yes Yes [4] Yes Supported Yes [5] with VMGL [6] Linux- VServer LynxSec ure Mac-on- Yes Yes No No Linux Mac-on- No No Mac OpenVZ Yes Yes Yes Yes No Yes (using Xvnc and/or XDMCP) Oracle Yes Yes Yes Yes Yes VM (manage d by Oracle VM Manager) OVPsim Yes Yes Yes Yes (Eclipse) Padded Yes Yes Yes Cell for x86 (Green Hills Software) Padded Yes Yes Yes No Cell for PowerPC (Green Hills Software) Parallels Yes, if Boot Yes Yes Yes DirectX 9 Desktop Camp is and for Mac installed OpenGL 2.0 Parallels No Yes Yes No partially Workstati on PearPC POWER Yes Yes No Yes No Yes (on Hypervis POWER 6- or (PHYP) based systems, requires PowerVM Enterprise Licensing) QEMU Yes Yes Yes [4] Some code Yes done [7]; Also supported with VMGL [6] QEMU w/ Yes Yes Yes Some code Yes kqemu done [7]; Also module supported
    [Show full text]
  • Vmware Et Sécurité
    HERVÉ SCHAUER CONSULTANTS Cabinet de Consultants en Sécurité Informatique depuis 1989 Spécialisé sur Unix, Windows, TCP/IP et Internet OSSIROSSIR GroupeGroupe SURSUR 88 juilletjuillet 20082008 VMwareVMware etet sécuritésécurité JulienJulien RaeisRaeis <[email protected]> NicolasNicolas CollignonCollignon <[email protected]> AgendaAgenda Rappels sur la virtualisation Mesures de sécurité intégrées à VMware Virtualisation et DMZ Revue des vulnérabilités Retour d'expérience HSC 2/64 Copyright Hervé Schauer Consultants 2008 - Reproduction Interdite Rappels sur la virtualisation 3/64 Copyright Hervé Schauer Consultants 2008 - Reproduction Interdite DéfinitionsDéfinitions « Virtuel : Se dit des éléments (terminaux, mémoire...) d'un système informatique considérés comme ayant des propriétés différentes de leurs caractéristiques physiques » - Grand Dictionnaire Encyclopédique Larousse « Virtualisation : abstraction des ressources d'un système informatique. » 4/64 Copyright Hervé Schauer Consultants 2008 - Reproduction Interdite HistoriqueHistorique Concept introduit dans les années 60 But : partitionner les ressources des coûteux mainframes de l'époque IBM M44/44X, naissance du terme « pseudo-machine » Première implémentation de machines virtuelles IBM CP-40 Système tournant sur S/360-40 Perte d'intérêt dans les années 80 Déport des applications sur des clients et serveurs x86 Architecture « bon marché » Mais coûts d'infrastructure physique élevés, manque de protection en cas de panne, maintenance des postes de travail coûteuse, etc.
    [Show full text]
  • Comparison of Platform Virtual Machines - Wikipedia
    Comparison of platform virtual machines - Wikipedia... http://en.wikipedia.org/wiki/Comparison_of_platform... Comparison of platform virtual machines From Wikipedia, the free encyclopedia The table below compares basic information about platform virtual machine (VM) packages. Contents 1 General Information 2 More details 3 Features 4 Other emulators 5 See also 6 References 7 External links General Information Name Creator Host CPU Guest CPU Bochs Kevin Lawton any x86, AMD64 CHARON-AXP Stromasys x86 (64 bit) DEC Alphaserver CHARON-VAX Stromasys x86, IA-64 VAX x86, x86-64, SPARC (portable: Contai ners (al so 'Zones') Sun Microsystems (Same as host) not tied to hardware) Dan Aloni helped by other Cooperati ve Li nux x86[1] (Same as parent) developers (1) Denal i University of Washington x86 x86 Peter Veenstra and Sjoerd with DOSBox any x86 community help DOSEMU Community Project x86, AMD64 x86 1 of 15 10/26/2009 12:50 PM Comparison of platform virtual machines - Wikipedia... http://en.wikipedia.org/wiki/Comparison_of_platform... FreeVPS PSoft (http://www.FreeVPS.com) x86, AMD64 compatible ARM, MIPS, M88K GXemul Anders Gavare any PowerPC, SuperH Written by Roger Bowler, Hercul es currently maintained by Jay any z/Architecture Maynard x64 + hardware-assisted Hyper-V Microsoft virtualization (Intel VT or x64,x86 AMD-V) OR1K, MIPS32, ARC600/ARC700, A (can use all OVP OVP Imperas [1] [2] Imperas OVP Tool s x86 (http://www.imperas.com) (http://www.ovpworld compliant models, u can write own to pu OVP APIs) i Core Vi rtual Accounts iCore Software
    [Show full text]
  • Deploying the Vmware Infrastructure John Arrasjid, Karthik Balachandran, Daniel Conde, Gary Lamb, and Steve Kaplan
    Short Topics in 18 18 System Administration Jane-Ellen Long, Series Editor Arrasjid, Balachandran, Conde, Lamb, and Kaplan and Lamb, Conde, Arrasjid, Balachandran, Deploying the VMware Infrastructure John Arrasjid, Karthik Balachandran, Daniel Conde, Gary Lamb, and Steve Kaplan Deploying the VMware Infrastructure VMware the Deploying cover.indd 1 8/8/08 9:54:21 AM Booklets in the Series #18: Deploying the VMware Infrastructure, by John Arrasjid, Karthik Balachandran, Daniel Conde, Gary Lamb, and Steve Kaplan #17: LCFG: A Practical Tool for System Configuration, by Paul Anderson #16: A System Engineer’s Guide to Host Configuration and Maintenance Using Cfengine, by Mark Burgess and Æleen Frisch #15: Internet Postmaster: Duties and Responsibilities, by Nick Christenson and Brad Knowles #14: System Configuration, by Paul Anderson #13: The Sysadmin’s Guide to Oracle, by Ben Rockwood #12: Building a Logging Infrastructure, by Abe Singer and Tina Bird #11: Documentation Writing for System Administrators, by Mark C. Langston #10: Budgeting for SysAdmins, by Adam Moskowitz #9: Backups and Recovery, by W. Curtis Preston and Hal Skelly #8: Job Descriptions for System Administrators, Revised and Expanded Edition, edited by Tina Darmohray #7: System and Network Administration for Higher Reliability, by John Sellens #6: A System Administrator’s Guide to Auditing, by Geoff Halprin #5: Hiring System Administrators, by Gretchen Phillips #4: Educating and Training System Administrators: A Survey, by David Kuncicky and Bruce Alan Wynn #3: System Security: A Management Perspective, by David Oppenheimer, David Wagner, and Michele D. Crabb, and edited by Dan Geer #2: A Guide to Developing Computing Policy Documents, edited by Barbara L.
    [Show full text]
  • Virtually Linux Virtualization Techniques in Linux
    Virtually Linux Virtualization Techniques in Linux Chris Wright OSDL [email protected] Abstract ware1 or software [16, 21, 19], may include any subset of a machine’s resources, and has Virtualization provides an abstraction layer a wide variety of applications. Such usages mapping a virtual resource to a real resource. include machine emulation, hardware consol- Such an abstraction allows one machine to be idation, resource isolation, quality of service carved into many virtual machines as well as resource allocation, and transparent resource allowing a cluster of machines to be viewed redirection. Applications of these usage mod- as one. Linux provides a wealth of virtual- els include virtual hosting, security, high avail- ization offerings. The technologies range in ability, high throughput, testing, and ease of the problems they solve, the models they are administration. useful in, and their respective maturity. This It is interesting to note that differing virtual- paper surveys some of the current virtualiza- ization models may have inversely correlated tion techniques available to Linux users, and proportions of virtual to physical resources. it reviews ways to leverage these technologies. For example, the method of carving up a sin- Virtualization can be used to provide things gle machine into multiple machines—useful such as quality of service resource allocation, in hardware consolidation or virtual hosting— resource isolation for security or sandboxing, looks quite different from a single system im- transparent resource redirection for availability age (SSI) [15]—useful in clustering. This pa- and throughput, and simulation environments per primarily focuses on providing multiple for testing and debugging. virtual instances of a single physical resource, however, it does cover some examples of a sin- 1 Introduction gle virtual resource mapping to multiple phys- ical resources.
    [Show full text]
  • An Apple a Day…
    LINUXCOVER USERSTORY SchlagwortMac on Linux sollte hier stehen Running Mac OS X under Linux AN APPLE A DAY… We used the Ubuntu distribution for the PowerPC processor, as it proved impossible to get either Gentoo or the commercial Yellow Dog distribution to display a GUI on our iBook G4/800 with a Radeon Mobility 9200 graphics chip. The Ubuntu installer works with the Debian apt-get package manager, which downloads files off the Internet. Mac-on- Linux needs a few kernel modules for PPC Linux, and you will need to compile these modules yourself. Compiling these modules means installing a few tools, if they are not already installed. The fol- lowing command downloads the pack- ages and installs them: sudo apt-get install build-U essential linux-headers-2.6-U powerpc If you are prompted for a password, type Emulators now give users the ability to run their beloved Mac OS X on your normal user account password, as Ubuntu does not typically have an Linux, bringing birds of a feather back together. administrative (root) account (see [8]). Instead, users can run commands that BY OLIVER FROMMEL typically need root privileges using sudo. Unfortunately, the standard Ubuntu repository does not include the files, so he easiest way to run Mac pro- also gives you Linux device drivers that you will first need to add the Multiverse grams on Linux is the free Mac- have been optimized for this application repository, which includes packages that Ton-Linux [1] software. Mac-on- in an approach similar to Vmware’s, are not part of the standard Ubuntu dis- Linux does not give you a hardware which explains why Mac-on-Linux is tribution.
    [Show full text]
  • Curriculum Vitae Simone Vellei
    Curriculum Vitae Simone Vellei Curriculum vitae - Simone Vellei Tel: +39.339.1298166 E-mail: [email protected] Blog: http://henomis.wordpress.com Consulting: http://opsys.dragas.org Person: • Born: November 7th 1979 • Nationality: Italian • Martial status: Married Profession: • GNU/Linux embedded system engineer at Inim Electronicsa. • Freelance IT consultant. • Project Manager ad developer of FlatNukea. Education: • March 2005: Master Degree in computer science at the Department of Computer Science, University of Bologna, Italy. • 1998: Diploma at “Liceo Statale B. Rossetti” in San Benedetto del Tronto, Italy. Employment: • 2006-now: GNU/Linux embedded system engineer at Inim Electronics (Monteprandone, AP - Italy) . – Research, design and implementation of a token-ring stack over RS485 bus, Renesas H8SX micro- controller (Hornet®a). – Research, design and implementation of SmartLANa, GNU/Linux embedded board that permits to control remotely SmartLoop system (Janus®a). – Implementation of SmartLAN TCP/IP comunication channel (WIN32 dll library). – Research, design and implementation of SmartLAN/Ga GNU/Linux embedded board that permits to control remotely SmartLiving system. – Implementation of SmartLAN/G TCP/IP comunication channel (WIN32 and GNU/Linux libraries). – Research, design and implementation of Evolutiona domotic and multimedia keypad for SmartLiv- ing system. Last update: April 16, 2012 pag. 1 Curriculum Vitae Simone Vellei • 2008-now: freelance IT consultant. – Several collaborations for software development with private companies. – Several collaborations for GNU/Linux courses with associations or cooperatives. – Several consultancies for internet/intranet security. • 2005: Software developer at Bentel Security (Corropoli, TE). – Development of internal usage software. – Development of WIN32 dlls for cryptographic level of SIA-IP protocol. – Research and study for the selection of GNU/Linux embedded platform.
    [Show full text]
  • Mac OS X Emulation Unter Windows XP
    WinXP Consoliero– Teil 1 Seite: 1/10 WinXP Consoliero Weiterführende Dokumentationen für Power User. WinXP Consoliero – Teil 1: Mac OS X Emulation unter Windows XP Christoph Müller, PTS Version: 1.1 Autor: Christoph Müller Datum: 11.06.2004 WinXP Consoliero– Teil 1 Seite: 2/10 Für welchen Windows Benutzer wäre es nicht ein Traum, das Mac OS X in seinem Zugriff zu haben? Zwei Studenten aus Deutschland bringen den Windows Benutzer diesen Traum etwas näher. Weit davon entfernt perfekt zu sein, haben sie einen kleinen Emulator auf ihrer Webseite, den es sich lohnt einmal genauer anzuschauen. PearPC 0.1.2 PearPC ist eine kleine Emulation eines PPC G3 Prozessors, sowie dem Boot-Rom. Das Programm ist noch weit davon entfernt vollständig zu sein. Es ist nicht besonders schnell und unterstützt unter PC auch noch keine Netzwerkkarten. Lediglich unter anderen Unix-Varianten wird eine Netzwerkkarte installiert. Zum Thema Linux und Mac OS X. Wer unter Linux einen Mac OS X Emulation laufen lassen will, soll sich einmal „Mac-on-Linux“ anschauen. Für alle anderen welche Mac OS X einmal auf dem PC laufen lassen möchten, nehmen sich ein paar Stunden Zeit und beschäftigen sich mit PearPC. Es ist zwar weit davon entfernt eine brauchbare Alternative zu Apple-Hardware zu sein. Spaßig ist es auf jeden Fall. Und verwunderte Blicke der Mac OS X Benutzer sind einem gewiss! Lesen Sie diese ganze Anleitung ganz durch, bevor Sie beginnen. So wird einem klar, wie das Konzept funktioniert. Ebenso werden einem die Vorbereitungen und die Art wie sie durchgeführt werden klar. Das hilft, denn die Installation wie auch die Vorbereitung, alles in allem etwa fünf Stunden in Anspruch nehmen.
    [Show full text]
  • Running Xen-A Hands-On Guide to the Art of Virt
    Running Xen: A Hands-On Guide to the Art of Virtualization by Jeanna N. Matthews; Eli M. Dow; Todd Deshane; Wenjin Hu; Jeremy Bongio; Patrick F. Wilbur; Brendan Johnson Publisher: Prentice Hall Pub Date: April 10, 2008 Print ISBN-10: 0-13-234966-3 Print ISBN-13: 978-0-13-234966-6 eText ISBN-10: 0-13-207467-2 eText ISBN-13: 978-0-13-207467-4 Pages: 624 Table of Contents | Index Overview "This accessible and immediately useful book expertly provides the Xen community with everything it needs to know to download, build, deploy and manage Xen implementations." –Ian Pratt, Xen Project Leader VP Advanced Technology, Citrix Systems The Real—World, 100% Practical Guide to Xen Virtualization in Production Environments Using free, open source Xen virtualization software, you can save money, gain new flexibility, improve utilization, and simplify everything from disaster recovery to software testing. Running Xen brings together all the knowledge you need to create and manage high—performance Xen virtual machines in any environment. Drawing on the unparalleled experience of a world—class Xen team, it covers everything from installation to administration–sharing field-tested insights, best practices, and case studies you can find nowhere else. The authors begin with a primer on virtualization: its concepts, uses, and advantages. Next, they tour Xen's capabilities, explore the Xen LiveCD, introduce the Xen hypervisor, and walk you through configuring your own hard—disk—based Xen installation. After you're running, they guide you through each leading method for creating "guests" and migrating existing systems to run as Xen guests.
    [Show full text]
  • Virtualizing the CIC Floppy Disk Project: an Experiment in Preservation Using Emulation Geoffrey Brown Indiana University Department of Computer Science
    Virtualizing the CIC Floppy Disk Project: An Experiment in PreservaTion Using Emulation Geoffrey Brown Indiana University Department of Computer Science Issues We are Trying To Solve Documents in FDP (for example) require obsolete applications and operating systems Installing documents to access them requires specialized expertise These problems generalize to SUDOC documents on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
    [Show full text]
  • A Lightweight Virtual Machine Framework
    A LIGHTWEIGHT VIRTUAL MACHINE FRAMEWORK Student: Aarón Jiménez Govea Advisor: Héctor A.Durán Limón. Universidad de Guadalajara, Centro Universitario de Ciencias Económico Administrativas (CUCEA), Periférico Norte 799, Zapopan, Jalisco, Mexico, 45100 [email protected] Abstract: Computer systems increasingly require optimum performance for satisfying the computing power demands. It is necessary to ensure that the resource demands will be covered without affecting the overall system performance or other applications. Virtualization is a paradigm that allows for optimising the use of the resources by obtaining multiple virtual resources e.g. multiple processors, file systems, disk storage etc. This is achieved by hiding the technical details to the end user. Heavyweight virtual machines (VMs) are effective mechanisms to maintain established quality of service (QoS) contracts. These VMs are able to provide a virtualization of a complete operating system environment over a host operating system. However, heavyweight VMs has a high cost in their performance (10-20%). This penalty is higher when there is a huge amount of IO operations. The main goal of this work is to develop a framework for deploying lightweight VMs. This kind of VMs focuses on virtualizing only the resources that are required by a particular kind of application, like CPU, memory buffer and network bandwidth. This framework will be responsible for the reservation of resources. It would operate as a resource scheduler for the applications. Keywords: Vitual machines (VMs), Lightweight virtual machine, Resource reservation, Quality of service (QoS). 1. Motivation In a distributed environment, the interaction between the real-time applications and the operating system could be critical because application may have an excessive demand for resources.
    [Show full text]