Intro Comparing and Contrasting Virtualization Technologies

Total Page:16

File Type:pdf, Size:1020Kb

Intro Comparing and Contrasting Virtualization Technologies Intro Comparing and Contrasting Virtualization Technologies 9304 Do you knowAbstract the differences Part 1 between Xen and VMware? Abstract Part Two Do you know when it is more advantageous to use one over the other? Abstract Part Three Virtualization can be a complicated subject with many different facets. It is not always easy to choose the strategy that best fits your needs. I am here to help [email protected] Worldwide Design Centers Poughkeepsie, NY Montpellier, France [email protected] [email protected] Makuhari, Japan Boeblingen, Germany 6 [email protected] [email protected] Worldwide Design Centers Our mission – To architect & design innovative end to end solutions with selected worldwide clients that leverage leading-edge IBM technologies to accelerate their IT transformation . Analysis Define and analyze various solution options that meet existing and future requirements . Assessment Review and validate a planned solution, strategy, IT transformation, or architecture, and provide recommendations and roadmaps . Design Define an architecture and high level design for an IT infrastructure to meet business requirements 7 There is no There is no free free lunch lunch Types of Virtualization Hardware Virtualization Partitioned Partitioned OS OS Partition Controller Application Application Physical Machine OS FullHardware Virtualization OS OS Application Application Application Fully Virtualized Hypervisor Physical Machine ModifiedPara Virtualization Modified Modified OS OS OS Application Application Application Para Virtualized Hypervisor Physical Machine Application Application Container Container Application Application Application Application Operating System Physical Machine Application Virtualization Machine Machine Machine Network Machine Machine Machine Network Virtualization Storage Virtualization Machine Machine Machine Storage Network Network Address Translation Machine Machine Machine Router The Internet VLAN Trunking/Tagging VLAN 1 VLAN 2 VLAN 3 Switch 1 Backbone Switch 2 VLAN 1 VLAN 2 VLAN 3 Virtual Private Network Machine Machine Machine V The Internet P N Machine Machine Machine Storage External Terabytes Worldwide 14000 12000 10000 8000 6000 4000 2000 0 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 Logical Volume Management VG LV (/root) LV (/) LV (/usr) PE PE PE PE PE PE PE PE PV PV hdisk hdisk NPIV VM VM VM VM WWPN WWPN WWPN WWPN SAN Fabric SAN Volume Controller Machine Machine Machine SAN Volume Controller DS4500 EMC DS800 Virtual Machines In 1974, GeraldPopek Popek and and Goldberg Robert Goldberg released an article titled “Formal Requirements for Virtualizable Third Generation Architectures” Equivalence Resource Control Efficiency Requirements ● Privileged instructions ● Control sensitive instructions ● Behavior sensitive instructions Hypervisors Trap and Emulate VM runs in user mode Virtual All privileged instructions cause traps Machine Load Add Store PrivOp Load Trap Hypervisor emulation code … Translate, Trap and Emulate VM runs in user mode Virtual Some IA-32 Instructions must be replaced with trap ops Machine Load Add Store TrapOp Hypervisor PrivOP emulation Load Trap … code Paravirtualization VM runs in normal mode Virtual OS in VM call hypervisor to access real resources Machine Load Add Store Hcall Load Call Hypervisor service … Direct Hardware Virtualization VM runs in normal mode Virtual Hardware provides the virtualization Hypervisor provides control Machine Load Add Store PrivOp Hypervisor Hypervisor Load Exit … service calls System x Virtualizing IA-32 • The IA-32 was not designed to be virtualized • Many protected instructions are not required to be executed in protected mode • There are a great deal of devices which must be supported VMware VMware Virtualization • CPU: Direct Execution w/ Binary Translation • MEM: Shadow Table w/ Ballooning Driver • I/O: Hosted Architecture or Limited Support VMware Architecture OS OS OS Application Application Application Trap VMM VMM VMM VMware Kernel Service Scheduler Memory Mgmt SCSI Ethernet Console CPUCPU MemoryMemory DiskDisk NetworkNetwork IA-32 CPUCPU MemoryMemory DiskDisk NetworkNetwork Hardware VMware Device Driver Model OS OS OS Virtual Virtual Virtual Device Device Device VMware Kernel Service Real Device Driver Console IA-32 Real Device Hardware Xen Xen Architecture OS OS OS Application Application Application Mod Mod Trap Call Call Xen Intel VT Hyper call AMD V CPUCPU MemoryMemory DiskDisk NetworkNetwork IA-32 CPUCPU MemoryMemory DiskDisk NetworkNetwork Hardware Xen Device Driver Model Dom 0 Dom U Real Front End Back End Driver Driver Driver XenBus Xen IA-32 Real Device Hardware KVM KVM Architecture OS OS Process Application Application QEMU I/O QEMU I/O Process Trap Trap KVM Driver Linux Kernel CPUCPU MemoryMemory DiskDisk NetworkNetwork IA-32 CPUCPU MemoryMemory DiskDisk NetworkNetwork Hardware KVM Device Driver Model Admin OS OS OS Real Virtual Virtual Driver Driver Driver KVM IA-32 Real Device Hardware Hyper V Hyper V Root OS Child OS Child OS Device Driver Device Driver Linux VSC VS Provider VS Client Hypercall Adapter Hyper V Hypervisor Physical Machine Hyper V Device Driver Root OS Child Os Real VSP VSC Driver VMBus Hyper V Device driver IA-32 Real Device Hardware System p PowerVM Power VM LPAR LPAR HypervisorLPAR AIX AIX Linux Power VM Hypervisor Physical Machine Power VM Micro LPAR LPAR LPAR LPAR partitioningLPAR LPAR AIX AIX Linux Linux AIX AIX 1CPU 2 CPU 2 CPU 3 CPU pool Power VM Hypervisor Physical Machine with 8 CPUs Power VM Virtual CPUs Pool of RealMicro CPUs partitioning LPAR VIOSLPAR LPAR VIOS AIX Linux Resource Resource Resource Resource Power VM Hypervisor Resource Resource Physical Machine Live Partition LAN Mobility Server 1 Server 2 LPAR VIOS VIOS LPAR Power VM Power VM SAN AIX AIX WPAR 1 WPAR 3 WPAR 4 WPAR 5 WPAR 2 WPAR Migration One AIX AIX WPAR 1 WPAR 3 WPAR 4 WPAR 5 WPAR 2 WPAR Migration Two AIX AIX WPAR 1 WPAR 4 WPAR 5 WPAR 2 WPAR 3 WPAR Migration Three AIX AIX WPAR 1 WPAR 4 WPAR 5 WPAR 2 WPAR 3 WPAR Migration Three System z Virtualizing System/360 System z VM LPAR LPAR LPARHypervisor z/VM Linux z/OS z/OS z/VSE z/VM Linux Linux z/TPF PR/SM Physical Machine Chip Design Affects Virtualization Cache Workload Speed Workload Workload Speed Cache Workload Workload Workload Design Differences Core Core Core Core Bus Core Core Core Core Core Core Core Core Bus Core Core Core Core Comparison of 64-way Machines Other System z System Assist Processors Application Processors Cross check processors Spares Application Processors DCSS and XIP LPAR z/VM Linux Linux Linux /xipfs /xipfs /xipfs Shared Segement HiperSockets LPAR LPAR z/VM Linux Linux z/OS Linux HiperSockets HiperSockets PR/SM Physical Machine VSwitch LPAR z/VM VM Linux Linux Controller VSwitch Port Port Multiplexer Port Port Port Port Port OSA OSA OSA OSA OSA NPIV LPAR LPAR LPAR z/VM Linux z/OS z/OS Linux WWPN WWPN WWPN WWPN SAN Fabric Other Types of Virtualization Emulation 3270 ScummVM Script Creation Utility for Maniac Mansion Wii Wine Chroot (jail) Grid If computers of the kind I have advocated become the computers of the future, then computing may someday be organized as a public utility just as the telephone system is a public utility... The computer utility could become the basis of a new and important industry. —John McCarthy, MIT Centennial in 1961 Cloud Logical Blocks of Cloud Computing Software as a Service (SAAS) Platform as a Service (PAAS) Infrastructure as a Service (PAAS) How do I choose? What are the pain points Cost Complexity Power Cooling People Maintenance Know your workload NewNew Problems Problems Utilization 120.00% 100.00% 80.00% 60.00% 40.00% 20.00% 0.00% Servers Storage Staff Network Management Challenges 300 250 cal ysi Ph l nd sica l a Phy 200 tua Vir 150 100 50 0 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 Agent Proliferation Where is my data ? Accountability Security Image Management Where to start ? Go for the low hanging fruit Development Test Quality Assurance Production The End Intro Comparing and Contrasting Virtualization Technologies 9304 Do you knowAbstract the differences Part 1 between Xen and VMware? Xen and Vmware are too of the main virtualization products available for the Intel space. But the end of this presentation, one should be able to understand some of the architectural differences between the platforms. Abstract Part Two Do you know when it is more advantageous to use one over the other? No company uses a single hardware platform. Therefore, there may be times when a company would want to use more than one hardware virtualizatoin technology. This presentation should help understand which platform provided the most advantage for a given application or workload. Abstract Part Three Virtualization can be a complicated subject with many different facets. It is not always easy to choose the strategy that best fits your needs. Making a choice is hard when you don't have the knowledge to make an informed decision. This pretension should help frame the question such that one can become better suited to make that decision. I am here to help [email protected] This is me. I am here to help. I include this chart so that people can have my email. The reason I created this presentation is based on the past few years working with customers. Helping them understand that there is a lot of virtualization out there. Although I might look young, I have been in the IT field for almost 15 years. Virtualization has been a core technology for me for most of it. Worldwide Design Centers Poughkeepsie, NY Montpellier, France [email protected] [email protected] Makuhari, Japan Boeblingen, Germany 6 [email protected] [email protected] The different places where I work. This slide is to show that the Design Center has a world wide presence, and that we can help customers in almost all geographies. Because we have such a wide reach, we have have insight into a wide variety of customer profiles.
Recommended publications
  • Understanding Full Virtualization, Paravirtualization, and Hardware Assist
    VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist Contents Introduction .................................................................................................................1 Overview of x86 Virtualization..................................................................................2 CPU Virtualization .......................................................................................................3 The Challenges of x86 Hardware Virtualization ...........................................................................................................3 Technique 1 - Full Virtualization using Binary Translation......................................................................................4 Technique 2 - OS Assisted Virtualization or Paravirtualization.............................................................................5 Technique 3 - Hardware Assisted Virtualization ..........................................................................................................6 Memory Virtualization................................................................................................6 Device and I/O Virtualization.....................................................................................7 Summarizing the Current State of x86 Virtualization Techniques......................8 Full Virtualization with Binary Translation is the Most Established Technology Today..........................8 Hardware Assist is the Future of Virtualization, but the Real Gains Have
    [Show full text]
  • Paravirtualization (PV)
    Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels of privilege known as Ring 0, 1, 2 and 3 to operating systems and applications to manage access to the computer hardware. While user level applications typically run in Ring 3, the operating system needs to have direct access to the memory and hardware and must execute its privileged instructions in Ring 0. x86 privilege level architecture without virtualization Technique 1: Full Virtualization using Binary Translation This approach relies on binary translation to trap (into the VMM) and to virtualize certain sensitive and non-virtualizable instructions with new sequences of instructions that have the intended effect on the virtual hardware. Meanwhile, user level code is directly executed on the processor for high performance virtualization. Binary translation approach to x86 virtualization Full Virtualization using Binary Translation This combination of binary translation and direct execution provides Full Virtualization as the guest OS is completely decoupled from the underlying hardware by the virtualization layer. The guest OS is not aware it is being virtualized and requires no modification. The hypervisor translates all operating system instructions at run-time on the fly and caches the results for future use, while user level instructions run unmodified at native speed. VMware’s virtualization products such as VMWare ESXi and Microsoft Virtual Server are examples of full virtualization. Full Virtualization using Binary Translation The performance of full virtualization may not be ideal because it involves binary translation at run-time which is time consuming and can incur a large performance overhead.
    [Show full text]
  • Full Virtualization on Low-End Hardware: a Case Study
    Full Virtualization on Low-End Hardware: a Case Study Adriano Carvalho∗, Vitor Silva∗, Francisco Afonsoy, Paulo Cardoso∗, Jorge Cabral∗, Mongkol Ekpanyapongz, Sergio Montenegrox and Adriano Tavares∗ ∗Embedded Systems Research Group Universidade do Minho, 4800–058 Guimaraes˜ — Portugal yInstituto Politecnico´ de Coimbra (ESTGOH), 3400–124 Oliveira do Hospital — Portugal zAsian Institute of Technology, Pathumthani 12120 — Thailand xUniversitat¨ Wurzburg,¨ 97074 Wurzburg¨ — Germany Abstract—Most hypervisors today rely either on (1) full virtua- a hypervisor-specific, often proprietary, interface. Full virtua- lization on high-end hardware (i.e., hardware with virtualization lization on low-end hardware, on the other end, has none of extensions), (2) paravirtualization, or (3) both. These, however, those disadvantages. do not fulfill embedded systems’ requirements, or require legacy software to be modified. Full virtualization on low-end hardware Full virtualization on low-end hardware (i.e., hardware with- (i.e., hardware without virtualization extensions), on the other out dedicated support for virtualization) must be accomplished end, has none of those disadvantages. However, it is often using mechanisms which were not originally designed for it. claimed that it is not feasible due to an unacceptably high Therefore, full virtualization on low-end hardware is not al- virtualization overhead. We were, nevertheless, unable to find ways possible because the hardware may not fulfill the neces- real-world quantitative results supporting those claims. In this paper, performance and footprint measurements from a sary requirements (i.e., “the set of sensitive instructions for that case study on low-end hardware full virtualization for embedded computer is a subset of the set of privileged instructions” [1]).
    [Show full text]
  • Taxonomy of Virtualization Technologies Master’S Thesis
    A taxonomy of virtualization technologies Master’s thesis Delft University of Technology Faculty of Systems Engineering Policy Analysis & Management August, 2010 Paulus Kampert 1175998 Taxonomy of virtualization technologies Preface This thesis has been written as part of the Master Thesis Project (spm5910). This is the final course from the master programme Systems Engineering, Policy Analysis & Management (SEPAM), educated by Delft University of Technology at the Faculty of Technology, Policy and Management. This thesis is the product of six months of intensive work in order to obtain the Master degree. This research project provides an overview of the different types of virtualization technologies and virtualization trends. A taxonomy model has been developed that demonstrates the various layers of a virtual server architecture and virtualization domains in a structured way. Special thanks go to my supervisors. My effort would be useless without the priceless support from them. First, I would like to thank my professor Jan van Berg for his advice, support, time and effort for pushing me in the right direction. I am truly grateful. I would also like to thank my first supervisor Sietse Overbeek for frequently directing and commenting on my research. His advice and feedback was very constructive. Many thanks go to my external supervisor Joris Haverkort for his tremendous support and efforts. He made me feel right at home at Atos Origin and helped me a lot through the course of this research project. Especially, the lectures on virtualization technologies and his positive feedback gave me a better understanding of virtualization. Also, thanks go to Jeroen Klompenhouwer (operations manager at Atos Origin), who introduced me to Joris Haverkort and gave me the opportunity to do my graduation project at Atos Origin.
    [Show full text]
  • Virtualization Basics: Understanding Techniques and Fundamentals
    Virtualization Basics: Understanding Techniques and Fundamentals Hyungro Lee School of Informatics and Computing, Indiana University 815 E 10th St. Bloomington, IN 47408 [email protected] ABSTRACT example of growing involvement in virtualization technolo- Virtualization is a fundamental part of cloud computing, gies with the cloud. Early technologies and developments especially in delivering Infrastructure as a Service (IaaS). in the virtualization have been accomplished by some com- Exploring different techniques and architectures of the vir- panies such as IBM from 1967 and VMware from 1998. In tualization helps us understand the basic knowledge of virtu- open source communities, Xen, KVM, Linux-vServer, LXC alization and the server consolidation in the cloud with x86 and others have supported virtualization in different plat- architecture. This paper describes virtualization technolo- forms with different approaches. In this paper, x86 archi- gies, architectures and optimizations regarding the sharing tecture virtualization will be discussed with these historical CPU, memory and I/O devices on x86 virtual machine mon- changes. itor. In cloud computing, Infrastructure-as-a-Service (IaaS) pro- vides on-demand virtual machine instances with virtualiza- Categories and Subject Descriptors tion technologies. IaaS has been broadly used to provide re- C.0 [General]: Hardware/software interface; C.4 [Performance quired compute resources in shared resource environments. of systems]: Performance attributes; D.4.7 [Operating Amazon Web Services (AWS), Google Compute Engine, Mi- Systems]: Organization and design crosoft Windows Azure, and HP Cloud offer commercial cloud services. OpenStack, Eucalyptus, SaltStack, Nimbus, General Terms and many others provide private open source cloud plat- Performance, Design forms with community support in development.
    [Show full text]
  • NIST 800-125: Guide to Security for Full Virtualization Technologies
    Special Publication 800-125 Guide to Security for Full Virtualization Technologies Recommendations of the National Institute of Standards and Technology Karen Scarfone Murugiah Souppaya Paul Hoffman NIST Special Publication 800-125 Guide to Security for Full Virtualization Technologies Recommendations of the National Institute of Standards and Technology Karen Scarfone Murugiah Souppaya Paul Hoffman C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 January 2011 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Director GUIDE TO SECURITY FOR FULL VIRTUALIZATION TECHNOLOGIES Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-125 Natl. Inst. Stand. Technol. Spec. Publ. 800-125, 35 pages (January 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately.
    [Show full text]
  • Virtualization Technology
    Virtualization Technology Zhonghong Ou Data Communications Software Lab, Aalto University 1 Definition • Virtualization refers to a concept in which access to a single underlying piece of hardware, like a server, is coordinated so that multiple guest operating systems can share that single piece of hardware, with no guest operating system being aware that it is actually sharing anything at all. (A guest operating system is an operating system that’s hosted by the underlying virtualization software layer, which is often, you guessed it, called the host system.) • A guest operating system appears to the applications running on it as a complete operating system (OS), and the guest OS itself is completely unaware that it’s running on top of a layer of virtualization software rather than directly on the physical hardware. Source: Virtualization for dummies 2 Four drivers of virtualization • Hardware is underutilized – Moore’s Law: “The complexity for minimum component costs has increased at a rate of roughly a factor of two per year…”, (actually, most people estimate the timeframe at around 18 months) i.e. the number of transistors that can be placed inexpensively on an integrated circuit has doubled approximately every two years. Moore’s law • Data centers run out of space – The net effect of explosion of data is that huge numbers of servers have been put into use over the past decade, which is causing a real -estate problem for companies. • Energy costs go through the roof – The cost of running computers, coupled with the fact that many of the machines filling up data centers are running at low utilization rates, means that virtualization’s ability to reduce the total number of physical servers can significantly reduce the overall cost of energy for companies.
    [Show full text]
  • Notes on Virtualization
    Notes on Virtualization Version 9.0 Andrew Herbert 6th October 2015 Introduction The story of virtualization and the important role it has played in Operating Systems over the past 50 years. The systems and papers mentioned in the text are the author’s choice of exemplars for the concepts being discussed, they not an exhaustive list of all related research and products, nor a statement about precedence over other systems. What is “Virtualization”? In broad terms, “virtualization” in the context of operating systems principles relates to operating systems that give the illusion of efficiently running multiple independent computers known as “virtual machines”. Depending upon the specific requirements and means of virtualization, the virtual machines be directly executed by (i.e., exactly mimic) the underlying physical machine, or they may comprise a more abstract system, parts or all of which are simulated by the physical machine. Origins The term “virtual” originated with “(dynamic) virtual memory” to express the abstraction of having a large contiguously addressed store available to programs, implemented by swapping portions of data and program between main store and magnetic drum. Some of the pioneers of operating systems (Maurice Wilkes, Brian Randell, Bob Nelson) have suggested the use of the word “virtual” was inspired by optics, in the sense of “virtual” versus “real” images. The term “virtual” was then extended to include “virtual devices” with the advent of input-output spooling and file systems. A typical virtual device interface would replace the hardware input-output instructions and device interrupt handling structures with a more convenient abstract interface with functions such as OPEN, CLOSE, READ, WRITE, CREATE, and DELETE.
    [Show full text]
  • Virtualization
    Starting Point: A Physical Machine ! Physical Hardware • Processors, memory, chipset, I/O devices, etc. Virtualization • Resources often grossly underutilized ! Software • Tightly coupled to physical hardware • Single active OS instance Based on materials from: • OS controls hardware Introduction to Virtual Machines by Carl Waldspurger Understanding Intel® Virtualization Technology (VT) by N. B. Sahgal and D. Rodgers Intel Virtualization Technology Roadmap and VT-d Support in Xen by Jun Nakajima A Performance Comparison of Container-based Virtualization Systems for MapReduce Clusters by M. G. Xavier, M. V. Neves, and C.A.F. De Rose 2 © 2010 VMware Inc. All rights reserved What is a Virtual Machine? Virtualization Properties ! Isolation • Fault isolation ! Software Abstraction • Performance isolation • Behaves like hardware ! Encapsulation • Encapsulates all OS and • Cleanly capture all VM state application state • Enables VM snapshots, clones ! Virtualization Layer ! Portability • Extra level of indirection • Independent of physical hardware • Decouples hardware, OS • Enables migration of live, running VMs • Enforces isolation ! Interposition • Multiplexes physical hardware Transformations on instructions, memory, I/O across VMs • • Enables transparent resource overcommitment, encryption, compression, replication … 3 4 1 Virtualization Applications Types of Virtualization ! Process Virtualization • Language-level Java, .NET, Smalltalk • OS-level processes, Solaris Zones, BSD Jails, Docker Containers • Cross-ISA emulation Apple 68K-PPC-x86
    [Show full text]
  • DB2 Virtualization
    Front cover DB2 Virtualization Learn setting up and configuring DB2 on PowerVM, VMware, and Hyper-V Leverage virtualization technologies See best practices Whei-Jen Chen Jason Chan Olaf Mueller Malcolm Singh Tapio Väättänen ibm.com/redbooks International Technical Support Organization DB2 Virtualization September 2009 SG24-7805-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (September 2009) This edition applies to DB2 for Linux, UNIX, and Windows Version 9.1 or later, PowerVM, POWER5, POWER6, VMware Virtual Infrastructure 3 or later, vSphere 4 or later, and Microsoft Windows Server 2008 SP2 with Hyper-V RTM (Update KB950050). © Copyright International Business Machines Corporation 2009. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix The team who wrote this book . x Acknowledgement. xi Become a published author . xi Comments welcome. xii Chapter 1. Introduction . 1 1.1 Overview . 2 1.1.1 What is virtualization . 2 1.1.2 History . 4 1.1.3 Benefits . 4 1.2 Terminology and definitions . 5 1.2.1 Virtual server . 6 1.2.2 Virtual machine monitor . 6 1.2.3 Machine-based virtualization. 8 1.2.4 Operating-system-based virtualization . 11 Chapter 2. Virtualization technologies . 13 2.1 DB2 support for virtualization . 14 2.1.1 Support matrix. 14 2.1.2 Features and functions . 15 2.1.3 Licensing . 28 2.2 PowerVM on Power Systems . 31 2.3 VMware vSphere.
    [Show full text]
  • Virtualization for Cloud Computing
    Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF University of CLOUD COMPUTING UNF NORTH FLORIDA • On demand provision of computational resources (Infrastructure, Platform, Software). • Requires high availability of resources and optimum use. • Virtualization is the enabling technology and creates virtual machines that allows a single machine to act as if it were many machines. • Benefits of virtualization for cloud computing: Reduces capital expenses and maintenance costs through server consolidation, reduces physical space needed in data centers. Resource Management, Migration, Maintainability, High availability and Fault tolerance are other benefits. • Virtualization is implemented using hypervisors. 2 University of VIRTUALIZATION UNF NORTH FLORIDA Machine Stack showing virtualization opportunities • Creation of a virtual version of hardware using software. Application • Runs several applications at the same time on a single physical server by hosting each of them inside their own virtual machine. • By running multiple virtual machines Libraries simultaneously, a physical server can be utilized efficiently. Operating Primary approaches to virtualization System • Platform virtualization Ex : Server • Resources virtualization Ex : Storage, Network Hardware 3 University of HYPERVISOR UNF NORTH FLORIDA • Hypervisor plays an important role in the virtualization scenario by virtualization of hardware. It provides support for running multiple operating systems concurrently in virtual servers created within a physical server. • The virtualization layer is the software responsible for hosting and managing all VMs. The virtualization layer is a hypervisor running directly on the hardware. • Example: VMWare, Xen, KVM. 4 University of SERVER WITHOUT VIRTUALIZATION UNF NORTH FLORIDA • Only one OS can run at a time within a server.
    [Show full text]
  • Towards Full Virtualization of Embedded Real-Time Systems
    A thesis submitted to the Faculty of Computer Science, Electrical Engineering and Mathematics of the University of Paderborn in partial fulfillment of the requirements for the degree of Dr. rer. nat. submitted by Dipl.-Inform. Timo Kerstan Paderborn, 21. März 2011 TOWARDSFULLVIRTUALIZATIONOF EMBEDDEDREAL-TIMESYSTEMS Supervisor________________________________________________ Prof. Dr. rer. nat. Franz Josef Rammig Referees________________________________________________ Prof. Dr. rer. nat. Franz Josef Rammig Prof. Dr. rer. nat. Marco Platzner Timo Kerstan: Towards full virtualization of embedded real-time systems– © University of Paderborn, 21. März 2011 ABSTRACT The growing complexity and the need for high level functional- ity in embedded hard real-time systems lead to conflicting goals for the design of the underlying system software. Adding the re- quired high level functionality endangers the properties of being small, robust, efficient, safe and secure typically stated for em- bedded real-time operating systems. On the other side, the capa- bility of handling hard real-time loads in a general purpose OS is often not compatible due to strong non determinisms in gen- eral purpose OSes. Top of the line cars already house more than 70 interconnected embedded control units (ECUs). The question is how to cope with this additional complexity. Will the next generation of cars house even more ECUs or will there be pow- erful general purpose ECUs executing more than one dedicated task to reduce the number of ECUs, as the growing number of ECUs is not adequately manageable any more? When looking towards the direction of using more powerful ECUs, the con- flicting goals of general purpose OSes and real-time OSes arise again.
    [Show full text]