Virtual Machine

Total Page:16

File Type:pdf, Size:1020Kb

Virtual Machine Topic 11: Virtual Machine Tongping Liu University of Massachusetts Amherst 1 Outline • Virtual machine concepts/types • Para-virtualization • Full-virtualization University of Massachusetts Amherst 2 Traditional OS structure App App App App Operating System Host Machine University of Massachusetts Amherst 3 Coarser Abstraction: Virtual Machine • We’ve already seen a kind of virtual machine – OS gives processes virtual memory – Each process runs on a (virtualized) CPU • Virtual machine: another abstraction – An execution environment – May or may not correspond to physical reality – Provide an interface identical to the underlying bare hardware University of Massachusetts Amherst 4 5 Virtual Machine • A Virtual Machine is a software that creates a virtualized environment between the computer platform and the end user in which the end user can operate software. University of Massachusetts Amherst 5 Virtualization • Virtualization is an abstraction layer that decouples the physical hardware from the operating system to deliver greater IT resource utilization and flexibility. • It allows multiple virtual machines, with heterogeneous operating systems to run in isolation, side-by-side on the same physical machine. 6 University of Massachusetts Amherst 6 Virtual Machine Options • How to implement a virtual machine? Java virtual 1. Interpreted virtual machines machine – Translate every VM instruction – Kind of like on-the-fly compilation – VM instruction à HW instruction(s) 2. Direct execution – Execute instructions directly VirtualBox – Emulate the hard ones University of Massachusetts Amherst 7 Java Virtual Machine The JVM is an abstract machine that reads the Java bytecode and does whatever computation it describes. The core of a JVM interpreter is basically this: do { byte opcode = fetch an opcode; switch (opcode) { case opCode1 : fetch operands for opCode1; execute action for opCode1; break; case opCode2 : fetch operands for opCode2; execute action for opCode2; break; case ... } while (more to do) University of Massachusetts Amherst 8 Full vs Interpreted • Why would I use VirtualBox instead of JVM? – Support for legacy applications – Do not force users to use a particular language – Do not force users to use a particular OS • Why would I use JVM instead of VirtualBox? – Nice properties of type-safe language – Can prove safety at compile time University of Massachusetts Amherst 9 Virtualization Types Level of isolation varies from weak to strong • Resource Containers • LXC and Docker • Emulate virtual hardware • Bochs, QEMU • Para-virtualization • Xen • Full virtualization • VMware, VirtualBox University of Massachusetts Amherst 10 Type 1 and Type 2 Hypervisor • Type 1: Running on bare machine – Xen, XenServer, VMware, KVM and OpenVZ. • Type 2: Runs as an application on an established operating system – VirtualBox University of Massachusetts Amherst 11 Foundation of “cloud” VMware IPO: $19.1 billion Xen sale: $500 million University of Massachusetts Amherst 12 Benefits of VMs to Cloud Consolidate underutilized servers X Avoid downtime with relocation Dynamically re-balance workload to guarantee application quality of service X X Enforce security policy University of Massachusetts Amherst 13 Traditional Virtual Machine Guest Guest Guest App App App Guest OS Guest OS Guest OS Virtual Machine Monitor (Hypervisor) Host Machine University of Massachusetts Amherst 14 Virtual Machine Monitor • The host software that provides virtualization is often referred to as a virtual machine monitor (VMM) or hypervisor. • The VMM gives each virtual machine an illusion of a complete computer to itself. University of Massachusetts Amherst 15 Hypervisor Benefits • Code reuse – Can run old operating systems + apps on new hardware – Original purpose of VMs by IBM in the 60s • Encapsulation – Can put entire state of an “application” in one thing – Move it, restore it, copy it, etc • Isolation, security – All interactions with hardware are mediated – Hypervisor can keep one VM from affecting another – Hypervisor cannot be corrupted by guest operating systems • Aids code development and debugging University of Massachusetts Amherst 16 Encapsulation • If I want to suspend/restore/migrate an application • I decide to write the process mem + PCB to disk • I reboot my kernel and restart the process • Will this work? – No, application state is spread out in many places – Application might involve multiple processes – Applications have state in the kernel (lost on reboot) – Residual dependencies (e.g. open files, locks, process ids, driver states, etc) University of Massachusetts Amherst 17 Encapsulation • Virtual machines capture all of these states • Can suspend/restore an application – On same machine between boots – On different machines • Migration much harder for containers – Kernel is a moving target • Doesn’t explicitly isolate and track dependent state – Every version might be different University of Massachusetts Amherst 18 Security • Can user processes corrupt the kernel? – Can overwrite logs – Overwrite kernel file – Can boot a new kernel – Exploit a bug in the system call interface • If use a hypervisor., is my data any less vulnerable? – All the state in the guest is still vulnerable (file systems, etc) • So what’s the point? – Hypervisors can observe the guest OS – Security services in hypervisor are safe, makes detection easier University of Massachusetts Amherst 19 Security • Hypervisors buggy too, why trust them more than kernels? – Narrower interface to malicious code (no system calls) – No way for kernel to call into hypervisor – Smaller, (hopefully) less complex codebase – Should be fewer bugs • Anything wrong with this argument? – Hypervisors are still complex – May be able to take over hypervisor via non-syscall interfaces – Paravirtualization (in Xen) may compromise this University of Massachusetts Amherst 20 Outline • Virtual machine concepts/types • Para-virtualization • Full-virtualization University of Massachusetts Amherst 21 Challenges of Implementing VM • Privilege modes – guest OS think it runs in kernel mode • Memory management – guest OS thinks it has access to physical memory • Performance – two levels of context switching • Protection – interference between guests may violate isolation University of Massachusetts Amherst 22 Views of the CPU • How is a process’ view of the CPU different than OS’s? – Kernel mode – Access to physical memory – Manipulation of page tables – Other “privileged instructions” – Turn on/off interrupts – Traps University of Massachusetts Amherst 23 Xen’s Approach • Start with VMM, “para-virtualize” • Goals – Performance isolation – Support many operating systems – Reduce performance overhead of virtualization University of Massachusetts Amherst 24 Xen Architecture Guest Guest Host App App App Guest OS Guest OS Domain 0 Xen Host Machine University of Massachusetts Amherst 25 Para-Virtualization • Full virtualization – Fool OS into thinking it has access to hardware • Para-virtualization – Expose real and virtual resources to OS • Why do we need para-virtualization? – Mostly because x86 architectures (used to) make full virtualization hard University of Massachusetts Amherst 26 Why Para-Virtualize? • Previous limitations of x86 – Privileged instructions fail silently – VMM must execute these instructions – Cannot rely on traps to VMM – How does VMware deal with this? • At run-time rewrite guest kernel binary • Insert traps into the VMM, when necessary University of Massachusetts Amherst 27 Why Para-Virtualize? • Previous limitations of x86 • Timing issues – May want to expose “real time” to OS – TCP time outs, RTT estimates • Support for performance optimizations – Supporting huge pages in memory; increases TLB coverage University of Massachusetts Amherst 28 Xen: Physical Memory • Allocated by hypervisor when VM is created • Why can’t we allow guest OS to update PTBR? – Might map virtual addrs to physical addrs they don’t own • VMware and Xen handled this differently – VMware maintains “shadow page tables” – Xen uses “hypercalls” – (Xen and VMware actually support both mechanisms now) University of Massachusetts Amherst 29 Xen: Hypercalls Virtual → Machine Update PTE hypercall Guest OS 1) Validation check 2) Perform update VMM Hardware MMU University of Massachusetts Amherst 30 Para-Virtualized CPU • Hypervisor runs at higher privilege than guest OS – Ring 0 à hypervisor, ring 1 à guest OS, ring 3 à guest apps • Handling exceptions – Guest registers handlers with Xen (must modify guest OS!) • System calls – Guests register "fast" handler with Xen – Xen validates handler, inserts in CPU’s handler table University of Massachusetts Amherst 31 Para-Virtualization • Pros – Better performance – Scales better than full virtualization • Cons – OS needs (minor) changes – How well does it actually scale? Depends… – Impure abstractions – Is it important to provide good abstractions? • I say yes • Bad interfaces lead to code complexity, maintainability issues University of Massachusetts Amherst 32 Outline • Virtual machine concepts/types • Para-virtualization • Full-virtualization University of Massachusetts Amherst 33 VMware Approach Host World VMM World Target Target App App Host VM App Target OS App Virtual Machine Host OS VM Driver Monitor Host Machine University of Massachusetts Amherst 34 VMware Approach • Designed without hardware support • Uses dynamic binary instrumentation https://www.geeksforgeeks.org/virtualization-vmware-full-virtualization/ University of Massachusetts Amherst 35 VMware Approach:
Recommended publications
  • Understanding Full Virtualization, Paravirtualization, and Hardware Assist
    VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist Contents Introduction .................................................................................................................1 Overview of x86 Virtualization..................................................................................2 CPU Virtualization .......................................................................................................3 The Challenges of x86 Hardware Virtualization ...........................................................................................................3 Technique 1 - Full Virtualization using Binary Translation......................................................................................4 Technique 2 - OS Assisted Virtualization or Paravirtualization.............................................................................5 Technique 3 - Hardware Assisted Virtualization ..........................................................................................................6 Memory Virtualization................................................................................................6 Device and I/O Virtualization.....................................................................................7 Summarizing the Current State of x86 Virtualization Techniques......................8 Full Virtualization with Binary Translation is the Most Established Technology Today..........................8 Hardware Assist is the Future of Virtualization, but the Real Gains Have
    [Show full text]
  • Attacker Chatbots for Randomised and Interactive Security Labs, Using Secgen and Ovirt
    Hackerbot: Attacker Chatbots for Randomised and Interactive Security Labs, Using SecGen and oVirt Z. Cliffe Schreuders, Thomas Shaw, Aimée Mac Muireadhaigh, Paul Staniforth, Leeds Beckett University Abstract challenges, rewarding correct solutions with flags. We deployed an oVirt infrastructure to host the VMs, and Capture the flag (CTF) has been applied with success in leveraged the SecGen framework [6] to generate lab cybersecurity education, and works particularly well sheets, provision VMs, and provide randomisation when learning offensive techniques. However, between students. defensive security and incident response do not always naturally fit the existing approaches to CTF. We present 2. Related Literature Hackerbot, a unique approach for teaching computer Capture the flag (CTF) is a type of cyber security game security: students interact with a malicious attacker which involves collecting flags by solving security chatbot, who challenges them to complete a variety of challenges. CTF events give professionals, students, security tasks, including defensive and investigatory and enthusiasts an opportunity to test their security challenges. Challenges are randomised using SecGen, skills in competition. CTFs emerged out of the and deployed onto an oVirt infrastructure. DEFCON hacker conference [7] and remain common Evaluation data included system performance, mixed activities at cybersecurity conferences and online [8]. methods questionnaires (including the Instructional Some events target students with the goal of Materials Motivation Survey (IMMS) and the System encouraging interest in the field: for example, PicoCTF Usability Scale (SUS)), and group interviews/focus is an annual high school competition [9], and CSAW groups. Results were encouraging, finding the approach CTF is an annual competition for students in Higher convenient, engaging, fun, and interactive; while Education (HE) [10].
    [Show full text]
  • Ovirt and Openstack Storage (Present and Future)
    oVirt and OpenStack Storage (present and future) Federico Simoncelli Principal Software Engineer, Red Hat January 2014 1 Federico Simoncelli – oVirt and OpenStack Storage (present and future) Agenda ● Introduction ● oVirt and OpenStack Overview ● Present ● oVirt and Glance Integration ● Importing and Exporting Glance Images ● Current Constraints and Limitations ● Future ● Glance Future Integration ● Keystone Authentication in oVirt ● oVirt and Cinder Integration 2 Federico Simoncelli – oVirt and OpenStack Storage (present and future) oVirt Overview ● oVirt is a virtualization management application ● manages hardware nodes, storage and network resources, in order to deploy and monitor virtual machines running in your data center ● Free open source software released under the terms of the Apache License 3 Federico Simoncelli – oVirt and OpenStack Storage (present and future) The oVirt Virtualization Architecture 4 Federico Simoncelli – oVirt and OpenStack Storage (present and future) OpenStack Overview ● Cloud computing project to provide an Infrastructure as a Service (IaaS) ● Controls large pools of compute, storage, and networking resources ● Free open source software released under the terms of the Apache License ● Project is managed by the OpenStack Foundation, a non-profit corporate entity established in September 2012 5 Federico Simoncelli – oVirt and OpenStack Storage (present and future) OpenStack Glance Service ● Provides services for discovering, registering, and retrieving virtual machine images ● RESTful API that allows querying
    [Show full text]
  • Paravirtualization (PV)
    Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels of privilege known as Ring 0, 1, 2 and 3 to operating systems and applications to manage access to the computer hardware. While user level applications typically run in Ring 3, the operating system needs to have direct access to the memory and hardware and must execute its privileged instructions in Ring 0. x86 privilege level architecture without virtualization Technique 1: Full Virtualization using Binary Translation This approach relies on binary translation to trap (into the VMM) and to virtualize certain sensitive and non-virtualizable instructions with new sequences of instructions that have the intended effect on the virtual hardware. Meanwhile, user level code is directly executed on the processor for high performance virtualization. Binary translation approach to x86 virtualization Full Virtualization using Binary Translation This combination of binary translation and direct execution provides Full Virtualization as the guest OS is completely decoupled from the underlying hardware by the virtualization layer. The guest OS is not aware it is being virtualized and requires no modification. The hypervisor translates all operating system instructions at run-time on the fly and caches the results for future use, while user level instructions run unmodified at native speed. VMware’s virtualization products such as VMWare ESXi and Microsoft Virtual Server are examples of full virtualization. Full Virtualization using Binary Translation The performance of full virtualization may not be ideal because it involves binary translation at run-time which is time consuming and can incur a large performance overhead.
    [Show full text]
  • Oracle Virtualbox Installation, Setup, and Ubuntu Introduction
    ORACLE VIRTUALBOX INSTALLATION, SETUP, AND UBUNTU INTRODUCTION • VirtualBox is a hardware virtualization program. • Create virtual computers aka virtual machines. • Prototyping, sandboxing, testing. • The computer that VirtualBox is installed on is called the “host”, and each virtual machine is called a “guest”. PREREQUISITES Since virtual machines share resources with the host computer, we need to know what resources we have available on our host. • Click “Type here to search”. • Search for “System Information”. • Note the number of processor cores and the amount of RAM installed in your host. PREREQUISITES • Expand “Components”. • Expand “Storage”. • Select “Drives”. • Note the amount of free space available on your host. Every computer is different, so how we will need to balance these resources between our host and guest systems will differ. DOWNLOADING VIRTUALBOX • VISIT VIRTUALBOX.ORG • SELECT THE CORRECT PACKAGE • CLICK THE DOWNLOAD LINK. FOR YOUR HOST. INSTALLING VIRTUALBOX • Browse to where you downloaded VirtualBox and run the installer. • All default options will be fine. Simply follow the prompts. INSTALLING VIRTUALBOX • CLICK “FINISH”. • VIRTUALBOX INSTALLED! SETTING THINGS UP Before we build our first virtual machine, we need to download an operating system to install as our “guest”. • Visit Ubuntu.com • Click “Download”. • Select the current Ubuntu Desktop “LTS” release. • LTS releases focus on stability rather than cutting edge features. SETTING THINGS UP • IN VIRTUALBOX, CLICK “NEW”. • NAME THE VIRTUAL MACHINE. SETTING THINGS UP Here’s where we will need the system resources information that we looked up earlier. Each virtual machine functions like a separate computer in and of itself and will need to share RAM with the host.
    [Show full text]
  • Vmware Workstation Pro 16.0 Using Vmware Workstation Pro
    Using VMware Workstation Pro VMware Workstation Pro 16.0 Using VMware Workstation Pro You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Using VMware Workstation Pro 14 1 Introduction and System Requirements 15 Host System Requirements for Workstation Pro 15 Processor Requirements for Host Systems 15 Supported Host Operating Systems 16 Memory Requirements for Host Systems 16 Display Requirements for Host Systems 16 Disk Drive Requirements for Host Systems 17 Local Area Networking Requirements for Host Systems 18 ALSA Requirements 18 Virtual Machine Features and Specifications 18 Supported Guest Operating Systems 18 Virtual Machine Processor Support 18 Virtual Machine Chipset and BIOS Support 19 Virtual Machine Memory Allocation 19 Virtual Machine Graphics and Keyboard Support 19 Virtual Machine IDE Drive Support 19 Virtual Machine SCSI Device Support 20 Virtual Machine Floppy Drive Support 20 Virtual Machine Serial and Parallel Port Support 20 Virtual Machine USB Port Support 20 Virtual Machine Mouse and Drawing Tablet Support 21 Virtual Machine Ethernet Card Support 21 Virtual Machine Networking Support 21 Virtual Machine Sound Support 21 2 Installing and Using Workstation Pro 23 Obtaining the Workstation Pro Software and License Key 23 Trial Version Expiration Date Warnings 24 Installing Workstation Pro with Other VMware Products 24 Reinstalling Workstation Pro When Upgrading a Windows Host Operating System 24 Installing the Integrated Virtual Debuggers for Eclipse 25 Installing Workstation Pro 25 Install Workstation Pro on a Windows Host 26 Run an Unattended Workstation Pro Installation on a Windows Host 26 Install Workstation Pro on a Linux Host 28 Upgrading Workstation Pro 31 VMware, Inc.
    [Show full text]
  • Oracle VM Virtualbox Data Sheet
    ORACLE DATA SHEET ORACLE VM VIRTUALBOX KEY FEATURES Oracle VM VirtualBox is cross-platform virtualization software that allows you • Available for Windows, Mac OS X, Linux to extend your existing computer to run multiple operating systems at the same and Oracle Solaris host operating systems time. Designed for IT professionals, Oracle VM VirtualBox runs on Windows, • Supports a wide-range of guest Mac OS X, Linux and Oracle Solaris systems and is ideal for testing, platforms developing, demonstrating and deploying solutions across multiple platforms on • Easy to use graphical user interface one machine. • Powerful, scriptable command-line interface • Import and export virtual machines using OVF/OVA standards • Shared folders between guest vm and host machine • Seamless, resizable, and full screen window display modes • Video and 3D (OpenGL, DirectX) acceleration • Multiple virtual screen support • Powerful and flexible networking options • USB and serial ports • SAS, SATA, SCSI and IDE storage controllers • Built-in iSCSI initiator • Built-in Remote Display Server • Multi-generational branched snapshots • Linked and Full Clones • Controllable Copy-and-Paste • VM Groups Easy to use, Fast and Powerful, Great Platform coverage KEY BENEFITS Designed for use on systems ranging from ultrabooks to high-end server class hardware, • Run almost any type of application on your existing machine Oracle VM VirtualBox is lightweight and easy to install and use. Yet under the deceptively simple exterior lies an extremely fast and powerful virtualization engine. With a formidable • Quickly and easily try out new platforms reputation for speed and agility, Oracle VM VirtualBox contains innovative features to deliver • Create an optimum test and tangible business benefits: significant performance improvements; a more powerful development environment virtualization system; and a wider range of supported guest operating system platforms.
    [Show full text]
  • Full Virtualization on Low-End Hardware: a Case Study
    Full Virtualization on Low-End Hardware: a Case Study Adriano Carvalho∗, Vitor Silva∗, Francisco Afonsoy, Paulo Cardoso∗, Jorge Cabral∗, Mongkol Ekpanyapongz, Sergio Montenegrox and Adriano Tavares∗ ∗Embedded Systems Research Group Universidade do Minho, 4800–058 Guimaraes˜ — Portugal yInstituto Politecnico´ de Coimbra (ESTGOH), 3400–124 Oliveira do Hospital — Portugal zAsian Institute of Technology, Pathumthani 12120 — Thailand xUniversitat¨ Wurzburg,¨ 97074 Wurzburg¨ — Germany Abstract—Most hypervisors today rely either on (1) full virtua- a hypervisor-specific, often proprietary, interface. Full virtua- lization on high-end hardware (i.e., hardware with virtualization lization on low-end hardware, on the other end, has none of extensions), (2) paravirtualization, or (3) both. These, however, those disadvantages. do not fulfill embedded systems’ requirements, or require legacy software to be modified. Full virtualization on low-end hardware Full virtualization on low-end hardware (i.e., hardware with- (i.e., hardware without virtualization extensions), on the other out dedicated support for virtualization) must be accomplished end, has none of those disadvantages. However, it is often using mechanisms which were not originally designed for it. claimed that it is not feasible due to an unacceptably high Therefore, full virtualization on low-end hardware is not al- virtualization overhead. We were, nevertheless, unable to find ways possible because the hardware may not fulfill the neces- real-world quantitative results supporting those claims. In this paper, performance and footprint measurements from a sary requirements (i.e., “the set of sensitive instructions for that case study on low-end hardware full virtualization for embedded computer is a subset of the set of privileged instructions” [1]).
    [Show full text]
  • Managed Conversion of Guests to Ovirt
    Managed Conversion of Guests to oVirt Arik Hadas Senior Software Engineer Red Hat 21/8/15 KVM Forum, August 2015 Agenda ● Motivation ● Architecture ● Demonstration ● Implementation ● Future work KVM Forum, August 2015 Many ways to run Virtual Machines ● There are many virtualization tools ● Different hypervisors – KVM, E !"E Xi, Xen, VirtualBo$, .%% ● Different management systems – oVirt, virt'manager, v phere, Ganeti, .%% KVM Forum, August 2015 “I don't want to lose my VMs” ● Virtualization technologies are used for a long time ● +o standardization ● ,eople are tied up to the technologies they currently use ● Conversion tools are neede). KVM Forum, August 2015 virt-v2v ● ,art of virt tools – /pen source virtualization management tools ● Foreign hypervisor -0 KVM ● Standalone conversion tool KVM Forum, August 2015 Conversion to oVirt using virt-v2v ● Converts disk formats ● Enables VirtIO drivers (If needed) – Network, torage ● Fixes boot'loader ● ,roduces full oVirt-compatible OVF ● Outputs the VM in oVirt's export domain KVM Forum, August 2015 Drawbacks ● Slow ● Tedious ● Error-prone ● 5equires separate installation ● Do not support conversion of OVA 7les ● Error handlin& KVM Forum, August 2015 Our goal Improve the conversion process to oVirt – Faster – Tools are availa1le – Graphical user interface ● To con7&ure ● To monitor/cancel – Ro1ust – Support conversion of OVA files KVM Forum, August 2015 Design principles ● 8se virt-v9v capabilities – For &uest-level operations ● oVirt mana&es the conversion – -on7&ure conversion properties
    [Show full text]
  • Taxonomy of Virtualization Technologies Master’S Thesis
    A taxonomy of virtualization technologies Master’s thesis Delft University of Technology Faculty of Systems Engineering Policy Analysis & Management August, 2010 Paulus Kampert 1175998 Taxonomy of virtualization technologies Preface This thesis has been written as part of the Master Thesis Project (spm5910). This is the final course from the master programme Systems Engineering, Policy Analysis & Management (SEPAM), educated by Delft University of Technology at the Faculty of Technology, Policy and Management. This thesis is the product of six months of intensive work in order to obtain the Master degree. This research project provides an overview of the different types of virtualization technologies and virtualization trends. A taxonomy model has been developed that demonstrates the various layers of a virtual server architecture and virtualization domains in a structured way. Special thanks go to my supervisors. My effort would be useless without the priceless support from them. First, I would like to thank my professor Jan van Berg for his advice, support, time and effort for pushing me in the right direction. I am truly grateful. I would also like to thank my first supervisor Sietse Overbeek for frequently directing and commenting on my research. His advice and feedback was very constructive. Many thanks go to my external supervisor Joris Haverkort for his tremendous support and efforts. He made me feel right at home at Atos Origin and helped me a lot through the course of this research project. Especially, the lectures on virtualization technologies and his positive feedback gave me a better understanding of virtualization. Also, thanks go to Jeroen Klompenhouwer (operations manager at Atos Origin), who introduced me to Joris Haverkort and gave me the opportunity to do my graduation project at Atos Origin.
    [Show full text]
  • Ovirt at Leeds Beckett University
    oVirt at Leeds Beckett University Using oVirt to provide a FOSS VDI solution to teach cyber security in a sandboxed realistic environment to remote students oVirt at Leeds Beckett University Paul Staniforth [email protected] Leeds Beckett University Leeds Polytechnic Leeds Metropolitan University Leeds Beckett University Previous teaching provision ● PC network workstations. ● 3 labs 25 PCs. ● Scripted imaging system (IMS). Why oVirt? ● Looking for a managed KVM solution. ● Free and Open Source Software. ● Open SDK and API. ● JAVA PYTHON RUBY Web. ● Community Support with option a vendor support. ● Scalable and Manageable. First Stages ● POC based on PC Workstations. ● Test Class with feedback session from students. ● Planned integration into course modules. Original Setup ● 1 Datacenter ● 1 Cluster ● 3 Hosts Resource Usage Upgrades to system ● 1 Datacenter ● 1 Cluster ● 3 Hosts + Increase Memory ● 4 Extra Hosts ● 8 more Hosts Security Courses ● Originally running on IMS machine. ● VMware Player. ● VirtualBox. ● Most Now moved to oVirt. Advantages with the oVirt System ● On premises there was a time penalty running VMs on physical machines. ● More flexible approach and quicker to roll out updates and changes. ● Less maintenance needed by the students. ● Can access the VMs remotely and on site. ● Staff can provide teaching support to students remotely. ● Extra flexiblility with group working. Networking for Security ● We separate the oVirt service networking and the VM networking for students. ● We have an air-gapped switch for student VM networks. ● Access outside the isolated networks is via a proxy. Remote Access for Students ● For student use they require web access to the portal really only https: ● And access to the console ports on the oVirt hosts.
    [Show full text]
  • Setting up C Programming Environment Before You Start
    Setting up C Programming Environment Before you start.. ! Please note that this is “NOT” a required part of the course and is not a homework. ! This manual is written for someone who has never programmed / never used Linux before. If you have background knowledge, you can ignore this. ! If you have any questions, please email Yoonji Shin [email protected] ! Don’t be scared, programming is fun! Enjoy :) Install VirtualBox 1. Visit http://www.virtualbox.org/wiki/downloads 2. Download VirtualBox platform packages for your OS 3. Open the Installation Package by double clicking MAC PC Install VirtualBox 4. Click continue and finish installing VirtualBox MAC PC 5. When finished installation, close the window. Download Linux 1. Visit the page http://www.ubuntu.com/download/ubuntu/download 2. Choose the Latest version of Ubuntu and 32-bit and click “Start Download” CLICK Install Linux using Virtual Box 1. Run VirtualBox by double-clicking the icon 2. Click “New” button on the top left corner MAC PC Install Linux using Virtual Box 3. Click “Continue” on the pop-up window 4. Type VM name, select “Linux” for the OS and choose “Ubuntu” for the version. MAC PC Install Linux using Virtual Box 5. Choose the amount of memory to allocate (I suggest choosing between 512 MB to 1024 MB) 6. Click Continue or Next MAC PC Install Linux using Virtual Box 7. Choose create a new virtual hard disk 8. Click Continue or Next MAC PC Install Linux using Virtual Box 9. Choose VDI (VirtualBox Disk Image) 10. Click Continue or Next MAC PC Install Linux using Virtual Box 11.
    [Show full text]