MIT IAP Course Lecture #1: Virtualization 101

Total Page:16

File Type:pdf, Size:1020Kb

MIT IAP Course Lecture #1: Virtualization 101 MIT IAP Course Lecture #1: Virtualization 101 Carl Waldspurger (SB SM ’89 PhD ’95) VMware R&D January 16, 2007 Copyright © 2007 VMware, Inc. All rights reserved. What is Virtualization? vir •tu •al (adj): existing in essence or effect, though not in actual fact Virtual systems • Abstract physical components using logical objects • Dynamically bind logical objects to physical configurations Examples • Network – Virtual LAN (VLAN), Virtual Private Network (VPN) • Storage – Storage Area Network (SAN), LUN • Computer – Virtual Machine (VM), simulator Copyright © 2007 VMware, Inc. All rights reserved. 2 Overview Virtual Machines Virtualization Approaches Processor Virtualization Additional Topics Copyright © 2007 VMware, Inc. All rights reserved. 3 Starting Point: A Physical Machine Physical Hardware • Processors, memory, chipset, I/O bus and devices, etc. • Physical resources often underutilized Software • Tightly coupled to hardware • Single active OS image • OS controls hardware Copyright © 2007 VMware, Inc. All rights reserved. 4 What is a Virtual Machine? Hardware-Level Abstraction • Virtual hardware: processors, memory, chipset, I/O devices, etc. • Encapsulates all OS and application state Virtualization Software • Extra level of indirection decouples hardware and OS • Multiplexes physical hardware across multiple “guest” VMs • Strong isolation between VMs • Manages physical resources, improves utilization Copyright © 2007 VMware, Inc. All rights reserved. 5 VM Isolation Secure Multiplexing • Run multiple VMs on single physical host • Processor hardware isolates VMs, e.g. MMU Strong Guarantees • Software bugs, crashes, viruses within one VM cannot affect other VMs Performance Isolation • Partition system resources • Example: VMware controls for reservation, limit, shares Copyright © 2007 VMware, Inc. All rights reserved. 6 VM Encapsulation Entire VM is a File • OS, applications, data • Memory and device state Snapshots and Clones • Capture VM state on the fly and restore to point-in-time • Rapid system provisioning, backup, remote mirroring Easy Content Distribution • Pre-configured apps, demos • Virtual appliances Copyright © 2007 VMware, Inc. All rights reserved. 7 VM Compatibility Hardware-Independent • Physical hardware hidden by virtualization layer • Standard virtual hardware exposed to VM Create Once, Run Anywhere • No configuration issues • Migrate VMs between hosts Legacy VMs • Run ancient OS on new platform • E.g. DOS VM drives virtual IDE and vLance devices, mapped to modern SAN and GigE hardware Copyright © 2007 VMware, Inc. All rights reserved. 8 Common Virtualization Uses Today Test and Development – Rapidly provision test and development servers; store libraries of pre-configured test machines Server Consolidation and Containment – Eliminate server sprawl by deploying systems into virtual machines that can run safely and move transparently across shared hardware Business Continuity – Reduce cost and complexity by encapsulating entire systems into single files that can be replicated and restored onto any target server Enterprise Desktop – Secure unmanaged PCs without compromising end-user autonomy by layering a security policy in software around desktop virtual machines Copyright © 2007 VMware, Inc. All rights reserved. 9 Overview Virtual Machines Virtualization Approaches • Virtual machine monitors (VMMs) • Virtualization platform types • Alternative system virtualizations Processor Virtualization Additional Topics Copyright © 2007 VMware, Inc. All rights reserved. 10 What is a Virtual Machine Monitor? An Old Concept VMM Characteristics • Classic definition from • Fidelity Popek & Goldberg ’74 • Performance • IBM mainframes since ’60s • Isolation / Safety Copyright © 2007 VMware, Inc. All rights reserved. 11 VMM Technology So this is just like Java, right? • No, a Java VM is very different from the physical machine that runs it • A hardware-level VM reflects underlying processor architecture Like a simulator or emulator that can run old Nintendo games? • No, they emulate the behavior of different hardware architectures • Simulators generally have very high overhead • A hardware-level VM utilizes the underlying physical processor directly Copyright © 2007 VMware, Inc. All rights reserved. 12 VMMs Past An Old Idea • Hardware-level VMs since ’60s • IBM S/360, IBM VM/370 mainframe systems • Timeshare multiple single-user OS instances on expensive hardware Classical VMM • Run VM directly on hardware • “Trap and emulate” model From IBM VM/370 product announcement, ca . 1972 for privileged instructions • Vendors had vertical control over proprietary hardware, operating systems, VMM Copyright © 2007 VMware, Inc. All rights reserved. 13 VMMs Present Renewed Interest • Academic research since ’90s • VMs for commodity systems • Server consolidation VMM for x86 • Industry-standard hardware, from laptops to datacenter • Run unmodified commodity VMware Fusion for Mac OS X running WinXP, 2006 guest operating systems • Significant challenges, e.g. “non-virtualizable” instructions • Pioneered by VMware in ’98 Copyright © 2007 VMware, Inc. All rights reserved. 14 VMM Platform Types Hosted Architecture • Install as application on existing x86 “host” OS, e.g. Windows, Linux, OS X • Small context-switching driver • Leverage host I/O stack and resource management • Examples: VMware Player/Workstation/Server, Microsoft Virtual PC/Server, Parallels Desktop Bare-Metal Architecture • “Hypervisor” installs directly on hardware • Acknowledged as preferred architecture for high-end servers • Examples: VMware ESX Server, Xen, Microsoft Viridian (2008) Copyright © 2007 VMware, Inc. All rights reserved. 15 System Virtualization Alternatives Virtual machines abstracted using a layer at different places Language Level OS Level Hardware Level Copyright © 2007 VMware, Inc. All rights reserved. 16 System Virtualization Taxonomy System Virtualization Hardware Level High-Level Language • Java • Microsoft .NET / Mono • Smalltalk Bare-Metal/ Hosted Hypervisor • Microsoft Virtual Server • HP Integrity VM • Microsoft Virtual PC • IBM zSeries z/VM • Parallels Desktop • VMware ESX Server • VMware Player • Xen • VMware Workstation OS Level Emulators • VMware Server • FreeBSD Jail • Bochs • HP Secure Resource • Microsoft VPC for Mac Para-virtualization Partitions • QEMU • Sun Solaris Zones • Virtutech Simics • Virtual Iron • SWsoft Virtuozzo • VMware VMI • User-Mode Linux • Xen Copyright © 2007 VMware, Inc. All rights reserved. 17 Overview Virtual Machines Virtualization Approaches Processor Virtualization • Classical techniques • Software x86 VMM • Hardware-assisted x86 VMM • Para-virtualization Additional Topics Copyright © 2007 VMware, Inc. All rights reserved. 18 Classical Instruction Virtualization Trap and Emulate • Run guest operating system deprivileged • All privileged instructions trap into VMM • VMM emulates instructions against virtual state e.g. disable virtual interrupts, not physical interrupts • Resume direct execution from next guest instruction Implementation Technique • This is just one technique • Popek and Goldberg criteria permit others Copyright © 2007 VMware, Inc. All rights reserved. 19 Classical Memory Virtualization Traditional VMM Approach VPN Extra Level of Indirection guest • Virtual →→→ “Physical” shadow Guest maps VPN to PPN page table using primary page tables • “Physical” →→→ Machine PPN hardware TLB VMM maps PPN to MPN VMM Shadow Page Table • Composite of two mappings MPN • For ordinary memory references Hardware maps VPN to MPN • Cached by physical TLB Copyright © 2007 VMware, Inc. All rights reserved. 20 Memory Traces Shadow Page Table • Derived from primary page table in guest • VMM must keep primary and shadow coherent Trace = Coherency Mechanism • Write-protect primary page table • Trap guest writes to primary • Update or invalidate corresponding shadow • Transparent to guest Copyright © 2007 VMware, Inc. All rights reserved. 21 Classical VMM Performance Native Speed Except for Traps • No overhead in direct execution • Overhead = trap frequency × average trap cost Trap Sources • Most frequent: Guest page table traces • Privileged instructions • Memory-mapped device traces Copyright © 2007 VMware, Inc. All rights reserved. 22 x86 Virtualization Challenges Not Classically Virtualizable • x86 ISA includes instructions that read or modify privileged state • But which don’t trap in unprivileged mode Example: POPF instruction • Pop top-of-stack into EFLAGS register • EFLAGS.IF bit privileged (interrupt enable flag) • POPF silently ignores attempts to alter EFLAGS.IF in unprivileged mode! • So no trap to return control to VMM Deprivileging not possible with x86! Copyright © 2007 VMware, Inc. All rights reserved. 23 How to Virtualize x86? Interpretation • Problem – too inefficient • x86 decoding slow Code Patching • Problem – not transparent • Guest can inspect its own code Binary Translation (BT) • Approach pioneered by VMware • Run any unmodified x86 OS in VM Extend x86 Architecture Copyright © 2007 VMware, Inc. All rights reserved. 24 Software VMM: Binary Translation Direct execute unprivileged guest application code • Will run at full speed until it traps, we get an interrupt, etc. “Binary translate” all guest kernel code, run it unprivileged • Since x86 has non-virtualizable instructions, proactively transfer control to the VMM (no need for traps) • Safe instructions are emitted without change • For “unsafe” instructions, emit a controlled emulation sequence • VMM translation cache for good performance Copyright
Recommended publications
  • Para-Virtualization
    Large-Scale Data & Systems Group Virtualization Jana Giceva [email protected] PeterDepartment R. Pietzuch of Computing Imperial College London [email protected]://lsds.doc.ic.ac.uk Fall 2018 Intro to Virtualization 2 Why do we need virtualizaton? • Recall previous lecture… 3 What is virtualization? • Broadly speaking… Virtualization: simulate or emulate a function of a resource (object) in software, identical to that of the physical one. Abstraction to make software look and behave like hardware. • Recall – virtual memory • Computer software gains access to more memory than it is physically installed, via the background swapping of data to disk storage. • Similarly, virtualization techniques can be applied to other IT infrastructure layers, including networks, storage, laptop or server hardware, OSs and applications. 4 Virtual infrastructure • Allows multiple VMs with different OSs and applications to run in isolation, side by side on the same physical machine. • VMs can be provisioned to any system. • Machine independence of OS and applications. • Can manage an application and its OS as a unit, encapsulating them in a single VM. src: VMWare whitepaper -- Virtualization 5 Properties of Virtual Machines • Key properties of VMs: • 1. Partitioning – Run multiple OS on one physical machine – Divide system resources between VMs • 2. Isolation – Provide fault and security isolation at the hardware level – Preserve performance with advanced resource controls • 3. Encapsulation – Save the entire state of a VM to files – Move and copy VMs as easily as copying and moving files • 4. Hardware independence – Provision or migrate any VM to any physical server 6 Virtualization – Definitions and Terms Virtual Machine (VM): a tightly isolated software container with an operating system (OS) and an application inside.
    [Show full text]
  • Network Virtualization for Open Cloud
    Πανεπιστήμιο Δυτικής Αττικής Τμήμα Μηχανικών Πληροφορικής και Υπολογιστών ΠΤΥΧΙΑΚΗ ΕΡΓΑΣΙΑ της ΣΟΥΒΑΛΙΩΤΗ ΜΑΡΙΑΣ Επιβλέπων Καθηγητής: Ξυδάς Ιωάννης Επίκουρος Καθηγητής ΠΑ.Δ.Α. Αθήνα, Σεπτέμβριος, 2018 Περιεχόμενα Περίληψη ...............................................................................................................................................9 Αbstract...................................................................................................................................................9 Ευχαριστίες.............................................................................................................................................10 ΚΕΦΑΛΑΙΟ 1 – Εισαγωγή ..................................................................................................................11 1.1. Περίληψη Κεφαλαίου..................................................................................................................11 1.2. Virtualization ...............................................................................................................................11 1.2.1. Hypervisor – Virtual Machine Manager................................................................................12 1.2.1.1. Ενσωματωμένοι Hypervisors.........................................................................................13 1.2.2. Network Virtualization..........................................................................................................13 1.2.2.1. Συνδυασμοί Network Virtualization...............................................................................14
    [Show full text]
  • Understanding Full Virtualization, Paravirtualization, and Hardware Assist
    VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist Contents Introduction .................................................................................................................1 Overview of x86 Virtualization..................................................................................2 CPU Virtualization .......................................................................................................3 The Challenges of x86 Hardware Virtualization ...........................................................................................................3 Technique 1 - Full Virtualization using Binary Translation......................................................................................4 Technique 2 - OS Assisted Virtualization or Paravirtualization.............................................................................5 Technique 3 - Hardware Assisted Virtualization ..........................................................................................................6 Memory Virtualization................................................................................................6 Device and I/O Virtualization.....................................................................................7 Summarizing the Current State of x86 Virtualization Techniques......................8 Full Virtualization with Binary Translation is the Most Established Technology Today..........................8 Hardware Assist is the Future of Virtualization, but the Real Gains Have
    [Show full text]
  • Manage Your Virtual Environments with Virtual Machine Manager 2008
    Virtualisation In this article, I will examine VMM 2008 The red box on the upper-left represents At a glance: and the new features it brings to IT adminis- the Virtual Machine Manager 2008 server Support for VMware VMs trators. I’ll then look at the requirements and service. Above it are the different interfaces Windows PowerShell- based scripting and the steps involved with a VMM installation. into the service: the Administrator Console, automation Finally, I’ll take a closer look at how to use the Windows PowerShell interface, and the Consolidated, centralised some of the new features of VMM 2008. management Installation procedures An introduction to Virtual Machine There are significantly Manager 2008 System Center Virtual Machine Manager more interfaces to 2008 is a standalone application that provides centralised, enterprise-class management of the VMM system in virtual machines running under Microsoft Virtual Server 2005 R2 SP1, Windows Serv- VMM 2008 er 2008 Hyper-V, Microsoft Hyper-V Server Manage your virtual 2008 and VMware Infrastructure 3 (ESX/ ESXi) servers. Together with other System Self-Service Web Portal with delegated user Center products, VMM provides end-to-end access. Windows PowerShell forms the basis physical and virtual infrastructure manage- for all access to the VMM server. The VMM environments with ment. Figure 1 shows the architectural lay- Admin Console is built entirely on Win- out of Virtual Machine Manager. dows PowerShell, so you can simply create As those familiar with VMM 2007 will Windows PowerShell scripts that the VMM note, there are significantly more interfaces server service runs. Thus, the public API for Virtual Machine to the VMM system in VMM 2008 (see Fig- VMM 2008 is Windows PowerShell, and any ure 1).
    [Show full text]
  • The Server Virtualization Landscape, Circa 2007
    ghaff@ illuminata.com Copyright © 2007 Illuminata, Inc. single user license Gordon R Haff Illuminata, Inc. TM The Server Virtualization Bazaar, Circa 2007 Inspired by both industry hype and legitimate customer excitement, many Research Note companies seem to have taken to using the “virtualization” moniker more as the hip phrase of the moment than as something that’s supposed to convey actual meaning. Think of it as “eCommerce” or “Internet-enabled” for the Noughts. The din is loud. It doesn’t help matters that virtualization, in the broad sense of “remapping physical resources to more useful logical ones,” spans a huge swath of Gordon Haff technologies—including some that are so baked-in that most people don’t even 27 July 2007 think of them as virtualization any longer. Personally licensed to Gordon R Haff of Illuminata, Inc. for your personal education and individual work functions. Providing its contents to external parties, including by quotation, violates our copyright and is expressly forbidden. However, one particular group of approaches is capturing an outsized share of the limelight today. That would, of course, be what’s commonly referred to as “server virtualization.” Although server virtualization is in the minds of many inextricably tied to the name of one company—VMware—there are many companies in this space. Their offerings include not only products that let multiple virtual machines (VMs) coexist on a single physical server, but also related approaches such as operating system (OS) virtualization or containers. In the pages that follow, I offer a guide to today’s server virtualization bazaar— which at first glance can perhaps seem just a dreadfully confusing jumble.
    [Show full text]
  • Vmware Converter Enterprise-Class Migration Tool for Converting Physical Machines, Virtual Machines Or Other Third-Party Image Formats to Vmware Virtual Machines
    PRODUCT DATASHEET VMware Converter Enterprise-class migration tool for converting physical machines, virtual machines or other third-party image formats to VMware virtual machines What Is VMware Converter? How Does VMware Converter Work? VMware® Converter is a highly robust and scalable enterprise-class VMware Converter is managed through a simple, task based UI that migration tool that reduces the time that IT managers spend convert- enables customers to convert physical machines, other VMware ing physical machines to VMware virtual machines. Using a snapshot- product formats or other third-party formats to VMware virtual based cloning mechanism that is extremely fast and reliable, VMware machines in three easy steps: Converter enables remote conversions without disrupting the source • Step 1: Specify the source physical server, virtual machine or third- server during the conversion process. party format to convert. VMware Converter provides a full range of physical-to-virtual and • Step 2: Specify the destination format, virtual machine name, and virtual-to-virtual conversions, allowing users to: location for the new virtual machine to be created. • Convert physical machines running Windows operating systems 1 to • Step 3: Automate the virtual machine creation and conversion pro- VMware virtual machines cess with VMware Converter. • Import older VMware virtual machine formats to new VMware virtual machine formats What are Benefits and Applications of VMware • Convert third-party formats such as Symantec Backup Exec System Converter? Recovery (formerly Symantec LiveState Recovery) and Microsoft Vir- tual Server/Virtual PC to VMware virtual machines Customers often want to convert a large number of physical servers to VMware virtual machines, for example, during a server consoli- • Populate new virtual machine environments quickly from large direc- dation project.
    [Show full text]
  • Vmware Converter User's Manual: Vmware Converter 3
    VMware Converter User’s Manual VMware Converter 3 VMware Converter User’s Manual VMware Converter User’s Manual Version: 3.0.2 Revision: 20071018 Item: VMC-ENG-Q407-281 You can find the most up-to-date technical documentation on our Web site at http://www.vmware.com/support/ The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: [email protected] © 2006-2007 VMware, Inc. All rights reserved. Protected by one or more of U.S. Patent Nos. 6,397,242, 6,496,847, 6,704,925, 6,711,672, 6,725,289, 6,735,601, 6,785,886, 6,789,156, 6,795,966, 6,880,022, 6,944,699, 6,961,806, 6,961,941, 7,069,413, 7,082,598, 7,089,377, 7,111,086, 7,111,145, 7,117,481, 7,149,843, 7,155,558, 7,222,221, 7,260,815, 7,260,820, and 7,269,683; patents pending. VMware, the VMware “boxes” logo and design, Virtual SMP and VMotion are registered trademarks or trademarks of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com 2 VMware, Inc. Contents Preface 7 1 Introduction to VMware Converter 9 Migration with VMware Converter 9 VMware Converter Editions 10 Cloning and System Reconfiguration of Physical Machines 10 Hot and Cold Cloning 11 Local and Remote Cloning 11 Example of Remote Hot Cloning 11 Example of Local Cold Cloning 13 Cloning Modes 14 Volume‐Based Cloning 14 Disk‐Based Cloning 15 Migrating Existing Virtual Machines
    [Show full text]
  • A Virtual Software Appliance for LHC Applications
    CernVM - a virtual software appliance for LHC applications C. Aguado-Sanchez 1) , P. Buncic 1) , L. Franco 1) , S. Klemer 1) , P. Mato 1) 1) CERN, Geneva, Switzerland Predrag Buncic (CERN/PH-SFT) • Talk Outline Introduction CernVM Project • Building blocks • Scalability and performance • User Interface and API • Release status Future plans & directions Conclusions ACAT 2008 CernVM – A Virtial Machine for LHC Experiments Erice, 6/11/2008 - 2 Introduction Enjoying “Frequency scaling Era” Cluster of Clusters (GRID) Workstation & PC Clusters Mainframes Single, multi and many cores IBM-VM 360, CERNVM,1988 ACAT 2008 CernVM – A Virtial Machine for LHC Experiments Erice, 6/11/2008 - 4 RecentTrends (h/w) • Multi & many cores CPU Core CPU Core and and Software benefits from multicore architectures L1 Caches L1 Caches where code can be executed in parallel Bus Interface and • Under most common operating systems this L2 Caches requires code to execute in separate threads or processes. Unfortunatelly, HEP/LHC applications were developed during period when it looked like any performance issue can be easily solved by simply waiting 2 more years • Support for hardware assisted virtualization VMM can now efficiently virtualize the entire x86 instruction set • Intel VT and AMD-V implementations • VMware, Xen 3.x (including derivatives like Virtual Iron), Linux KVM and Microsoft Hyper-V Running Virtual Machine will benefit from adoption of multiple core architectures since each virtual machine runs independently of others and can be executed in
    [Show full text]
  • Paravirtualization (PV)
    Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels of privilege known as Ring 0, 1, 2 and 3 to operating systems and applications to manage access to the computer hardware. While user level applications typically run in Ring 3, the operating system needs to have direct access to the memory and hardware and must execute its privileged instructions in Ring 0. x86 privilege level architecture without virtualization Technique 1: Full Virtualization using Binary Translation This approach relies on binary translation to trap (into the VMM) and to virtualize certain sensitive and non-virtualizable instructions with new sequences of instructions that have the intended effect on the virtual hardware. Meanwhile, user level code is directly executed on the processor for high performance virtualization. Binary translation approach to x86 virtualization Full Virtualization using Binary Translation This combination of binary translation and direct execution provides Full Virtualization as the guest OS is completely decoupled from the underlying hardware by the virtualization layer. The guest OS is not aware it is being virtualized and requires no modification. The hypervisor translates all operating system instructions at run-time on the fly and caches the results for future use, while user level instructions run unmodified at native speed. VMware’s virtualization products such as VMWare ESXi and Microsoft Virtual Server are examples of full virtualization. Full Virtualization using Binary Translation The performance of full virtualization may not be ideal because it involves binary translation at run-time which is time consuming and can incur a large performance overhead.
    [Show full text]
  • Virtualize Servers with Microsoft Hyper-V and Netapp by Brian Gracely, Netapp
    This article was originally published in NetApp’s Tech OnTap Newsletter. To receive the newsletter monthly and enjoy other great benefits, sign up today at www.netapp.com/us/communities/tech-ontap Virtualize Servers with Microsoft Hyper-V and NetApp By Brian Gracely, NetApp Microsoft® Hyper-V™ is a new virtualiza- • Introduction to Hyper-V BRIAN GRACELY tion technology that is a key component of • Storage considerations for Hyper-V MANAGER, REFERENCE Windows® Server 2008. Hyper-V provides • Deduplication and thin provisioning ARCHITECTURE, NETAPP the ability to virtualize server resources and • Backup and disaster recovery Brian manages the Virtualization Refer- manage them within the Windows manage- ence Architecture team within NetApp’s ment framework and is a good choice for INTRODUCTION TO HYPER-V Virtualization and Grid Infrastructure customers whose core infrastructure is built Microsoft Hyper-V (previously known business unit (VGIBU). His team of primarily on Windows Server and other as Microsoft Server Virtualization) is a Microsoft Hyper-V experts is based in Microsoft application technologies. hypervisor-based server virtualization Seattle, Research Triangle Park (RTP), technology that is an integral part of all and Bangalore and is focused on design, Like all server virtualization solutions, Windows Server 2008 editions (as of implementation, and training for Hyper-V Hyper-V increases the demand on back-end its release in late June 2008). Hyper-V deployments using NetApp storage. storage in terms of reliability, performance, significantly extends the virtualization ® and data management capabilities. NetApp capabilities that Microsoft provided NETAPP AND MICROSOFT storage solutions are well suited for Hyper-V through its still shipping Microsoft Virtual NetApp maintains a close relationship environments, offering storage virtualization Server product.
    [Show full text]
  • Eseguire Il Backup Di Macchine Virtuali Con Volumi Logici (Noti Anche Come Volumi LVM) O Periferiche MD (Note Anche Come RAID Software Linux)
    Acronis Backup & Recovery 11.5 Virtual Edition Backup di macchine virtuali Informazioni sul copyright Copyright © Acronis International GmbH, 2002-2012. Tutti i diritti riservati. "Acronis" e "Acronis Secure Zone" sono marchi registrati di Acronis International GmbH. "Acronis Compute with Confidence", "Acronis Startup Recovery Manager", "Acronis Active Restore" e il logo Acronis sono marchi registrati di Acronis International GmbH. Linux è un marchio registrato di Linus Torvalds. VMware e VMware Ready sono marchi commerciali e/o marchi registrati di VMware, Inc. negli Stati Uniti e/o in altre giurisdizioni. Windows e MS-DOS sono marchi registrati di Microsoft Corporation. Tutti gli altri marchi commerciali e copyright a cui si fa riferimento sono proprietà dei rispettivi titolari. La diffusione di versioni di questo documento modificate sostanzialmente è proibita senza il permesso esplicito del titolare del copyright. La diffusione di quest'opera o di opere da essa derivate sotto qualsiasi forma standard di libro (cartaceo) a scopi commerciali è proibita in assenza del permesso da parte del titolare del copyright. LA PRESENTE DOCUMENTAZIONE È FORNITA "COSÌ COME SI PRESENTA" E QUALSIVOGLIA CONDIZIONE, DICHIARAZIONE E GARANZIA, SIA ESSA ESPRESSA O IMPLICITA, IVI INCLUSA QUALSIASI GARANZIA IMPLICITA DI COMMERCIABILITÀ, IDONEITÀ AD UN FINE SPECIFICO O PER EVITARE TRASGRESSIONI, SI INTENDE ESCLUSA, NELLA MISURA IN CUI LE SUDDETTE RINUNCE SIANO DA INTENDERSI LEGALMENTE CONSENTITE. Assieme al Software e/o al Servizio potrebbe essere fornito codice di terze parti. I termini di licenza di tali terze parti sono descritti in dettaglio nel file license.txt che si trova nella directory di installazione principale. È sempre possibile trovare l'elenco degli ultimi aggiornamenti del codice di terze parti e i relativi termini di licenza utilizzati con il Software e/o il servizio all'indirizzo http://kb.acronis.com/content/7696 Tecnologie protette da brevetto Acronis Le tecnologie utilizzate in questo prodotto sono protette dai seguenti brevetti: brevetto U.S.
    [Show full text]
  • Virtualization Technologies Overview Course: CS 490 by Mendel
    Virtualization technologies overview Course: CS 490 by Mendel Rosenblum Name Can boot USB GUI Live 3D Snaps Live an OS on mem acceleration hot of migration another ory runnin disk alloc g partition ation system as guest Bochs partially partially Yes No Container s Cooperati Yes[1] Yes No No ve Linux (supporte d through X11 over networkin g) Denali DOSBox Partial (the Yes No No host OS can provide DOSBox services with USB devices) DOSEMU No No No FreeVPS GXemul No No Hercules Hyper-V iCore Yes Yes No Yes No Virtual Accounts Imperas Yes Yes Yes Yes OVP (Eclipse) Tools Integrity Yes No Yes Yes No Yes (HP-UX Virtual (Integrity guests only, Machines Virtual Linux and Machine Windows 2K3 Manager in near future) (add-on) Jail No Yes partially Yes No No No KVM Yes [3] Yes Yes [4] Yes Supported Yes [5] with VMGL [6] Linux- VServer LynxSec ure Mac-on- Yes Yes No No Linux Mac-on- No No Mac OpenVZ Yes Yes Yes Yes No Yes (using Xvnc and/or XDMCP) Oracle Yes Yes Yes Yes Yes VM (manage d by Oracle VM Manager) OVPsim Yes Yes Yes Yes (Eclipse) Padded Yes Yes Yes Cell for x86 (Green Hills Software) Padded Yes Yes Yes No Cell for PowerPC (Green Hills Software) Parallels Yes, if Boot Yes Yes Yes DirectX 9 Desktop Camp is and for Mac installed OpenGL 2.0 Parallels No Yes Yes No partially Workstati on PearPC POWER Yes Yes No Yes No Yes (on Hypervis POWER 6- or (PHYP) based systems, requires PowerVM Enterprise Licensing) QEMU Yes Yes Yes [4] Some code Yes done [7]; Also supported with VMGL [6] QEMU w/ Yes Yes Yes Some code Yes kqemu done [7]; Also module supported
    [Show full text]