Performance Implications of Virtualization

Total Page:16

File Type:pdf, Size:1020Kb

Performance Implications of Virtualization Performance Implications of Virtualization Abstract Virtualization is a component of cloud computing. Virtualization transforms traditional inflexible, complex infrastructure of individual servers, storage, and network hardware into a flexible virtual resource pool and increases IT agility, flexibility, and scalability while creating significant cost savings. Additional benefits of virtualization include, greater work mobility, increased performance and availability of resources, and automated operations. Many virtualization solutions have been implemented. There are plenty of cloud providers using different virtualization solutions to provide virtual machines (VMs) and containers, respectively. Various virtualization solutions have different performance overheads due to their various implementations of virtualization and supported features. A cloud user should understand performance overheads of different virtualization solutions and the impact on the performance caused by different virtualization features, so that it can choose appropriate virtualization solution, for the services to avoid degrading their quality of services (QoSs). In this research, we investigate the impacts of different virtualization technologies such as, container-based, and hypervisor-based virtualization as well as various virtualization features such as, over-allocation of resources, live migration, scalability, and distributed resource scheduling on the performance of various applications for instance, Cassandra NoSQL database, and a large telecommunication application. According to our results, hypervisor-based virtualization has many advantages and is more mature compare to the recently introduced container-based virtualization. However, impacts of the hypervisor- based virtualization on the performance of the applications is much higher than the container-based virtualization as well as the non-virtualized solution. The findings of this research should be of benefit to the ones who provide planning, designing, and implementing of the IT infrastructure. i Acknowledgment This research work was founded by the Swedish Foundation for Knowledge and Development, KK-Stiftelsen, in Stockholm. Part of this research is result of the collaboration between Blekinge Institute of Technology, Ericsson Company and Compuverde Company located in Karlskrona, Sweden. I would like to thank my Supervisor, Professor Lars Lundberg for his invaluable guidance and support during my studies, and for giving me this opportunity to work in a real-world industrial project. I would also like to thank my secondary supervisors David Erman and Dragos Ilie for their invaluable feedback and suggestions. In addition, I would like to thank my colleagues both in Ericsson and Compuverde for their invaluable support. I would also like to thank all my colleagues, the library staff, and the supporting departments at BTH. Finally, I am also very grateful to my family and friends for supporting, encouraging, and motivating me. ii Preface This thesis is based on the work presented in the following eight papers. The papers II, III, IV, V, and VI are published in peer-reviewed conference proceedings. Paper I is published in a journal and Paper VII is been submitted to a conference and is currently under peer-reviewing. Paper VIII is been submitted to a Journal as well. The included papers have been modified to fit this format, but the content is unchanged. Paper I S. Shirinbab, L. Lundberg, D. Erman, ”Performance Evaluation of Distributed Storage Systems for Cloud Computing”, published in International Journal of Computer Applications (IJCA), 2013. Paper II S. Shirinbab, L. Lundberg, D. Ilie, ”Performance Comparison of KVM, VMware, and XenServer using a Large Telecommunication Application”, Proceedings of the Fifth International Conference on Cloud Computing, GRIDs, and Virtualization, pp. 25-29, 2014. Paper III S. Shirinbab, L. Lundberg, “Performance Implications of Over-Allocation of Virtual CPUs”, published in International Symposium on Networks, Computers and Communications (ISNCC), pp.1-6, 2015. Paper IV S. Shirinbab, L. Lundberg, J. Håkansson, ”Comparing Automatic Load Balancing using VMware DRS with a Human Expert”, published in IEEE International Conference on Cloud Engineering Workshop (IC2EW), pp. 1-8, 2016. Paper V S. Shirinbab, L. Lundberg, “Performance Implications of Resource Over- Allocation During the Live Migration”, published in IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 1-6, 2016. iii Paper VI S. Shirinbab, L. Lundberg, E. Casalicchio, ”Performance Evaluation of Container and Virtual Machine Running Cassandra Workload”, published in 3rd International Conference on Cloud Computing Technologies and Applications (CloudTech), 2017. Paper VII S. Shirinbab, L. Lundberg, E. Casalicchio, ”Performance Comparison between Horizontal Scaling of Hypervisor and Container Based Virtualization using Cassandra NoSQL Database”, submitted to a conference, pp. 1-6, 2018. Paper VIII S. Shirinbab, L. Lundberg, “Scheduling Tasks with Hard Deadlines in Cloud- Based Virtualized Software Systems”, will be submitted to a Journal. iv There are other papers that are not included in this thesis but are related to this research: Paper IX E. Casalicchio, L. Lundberg, S. Shirinbab, ”Optimal Adaptation for Apache Cassandra”, published in Self Orgnizing Self Managing Clouds (SoSeMC) workshop at 13th IEE International Conference on Autonomic Computing, pp. 1-6, 2016. Paper X E. Casalicchio, L. Lundberg, S. Shirinbab, ”An Energy-Aware Adaptation Model for Big Data Platforms”, (poster) published in Autonomic Computing, pp. 1-2, 2016. Paper XI S. Shirinbab, L. Lundberg, “Real-time Scheduling in Cloud-based Virtualized Software Systems”, Proceedings of the second Nordic Symposium on Cloud Computing and Internet Technologies, pp. 54-58, 2013. Paper XII S. Shirinbab, L. Lundberg, E. Casalicchio, ”Performance Evaluation of Containers and Virtual Machines when Running Cassandra Workload Concurrently”, submitted to a Journal. Paper XIII E. Casalicchio, L. Lundberg, S. Shirinbab, ”Energy-aware auto-scaling algorithms for Cassandra virtual data centers”, published in Cluster Computing journal, vol. 20, issue 3, pp. 2065-2082, 2017. v Table of Contents 1 Introduction .................................................................................................. 1 1.1 Background .......................................................................................... 1 1.1.1 Application virtualization ............................................................. 1 1.1.2 Desktop virtualization .................................................................. 2 1.1.3 Hardware virtualization ................................................................ 2 1.1.4 Network virtualization .................................................................. 3 1.1.5 Storage virtualization.................................................................... 3 1.2 Advantages and Disadvantages of Virtualization ................................. 4 1.2.1 Advantages of virtualization ......................................................... 4 1.2.2 Disadvantages of virtualization .................................................... 5 1.3 Thesis Outline and Structure ................................................................ 6 2 Approach ...................................................................................................... 7 2.1 Related Work ........................................................................................ 7 2.2 Aim and Scope ................................................................................... 10 2.3 Research Questions ............................................................................ 10 2.3.1 Research question 1 .................................................................... 11 2.3.2 Research question 2 .................................................................... 11 2.3.3 Research question 3 .................................................................... 11 2.3.4 Research question 4 .................................................................... 12 2.3.5 Research question 5 .................................................................... 12 2.3.6 Research question 6 .................................................................... 12 2.3.7 Research question 7 .................................................................... 13 2.3.8 Research question 8 .................................................................... 13 2.4 Research Methodology ....................................................................... 14 2.4.1 Experimental Study .................................................................... 14 2.4.2 Theoretical and Simulation Study .............................................. 15 3 Results ........................................................................................................ 15 vi 3.1 Contributions ...................................................................................... 15 3.1.1 Contributions in Paper I.............................................................. 15 3.1.2 Contributions in Paper II ............................................................ 15 3.1.3 Contributions in Paper III ........................................................... 16 3.1.4 Contributions in Paper IV ........................................................... 16 3.1.5 Contributions in Paper V ...........................................................
Recommended publications
  • Effective Virtual CPU Configuration with QEMU and Libvirt
    Effective Virtual CPU Configuration with QEMU and libvirt Kashyap Chamarthy <[email protected]> Open Source Summit Edinburgh, 2018 1 / 38 Timeline of recent CPU flaws, 2018 (a) Jan 03 • Spectre v1: Bounds Check Bypass Jan 03 • Spectre v2: Branch Target Injection Jan 03 • Meltdown: Rogue Data Cache Load May 21 • Spectre-NG: Speculative Store Bypass Jun 21 • TLBleed: Side-channel attack over shared TLBs 2 / 38 Timeline of recent CPU flaws, 2018 (b) Jun 29 • NetSpectre: Side-channel attack over local network Jul 10 • Spectre-NG: Bounds Check Bypass Store Aug 14 • L1TF: "L1 Terminal Fault" ... • ? 3 / 38 Related talks in the ‘References’ section Out of scope: Internals of various side-channel attacks How to exploit Meltdown & Spectre variants Details of performance implications What this talk is not about 4 / 38 Related talks in the ‘References’ section What this talk is not about Out of scope: Internals of various side-channel attacks How to exploit Meltdown & Spectre variants Details of performance implications 4 / 38 What this talk is not about Out of scope: Internals of various side-channel attacks How to exploit Meltdown & Spectre variants Details of performance implications Related talks in the ‘References’ section 4 / 38 OpenStack, et al. libguestfs Virt Driver (guestfish) libvirtd QMP QMP QEMU QEMU VM1 VM2 Custom Disk1 Disk2 Appliance ioctl() KVM-based virtualization components Linux with KVM 5 / 38 OpenStack, et al. libguestfs Virt Driver (guestfish) libvirtd QMP QMP Custom Appliance KVM-based virtualization components QEMU QEMU VM1 VM2 Disk1 Disk2 ioctl() Linux with KVM 5 / 38 OpenStack, et al. libguestfs Virt Driver (guestfish) Custom Appliance KVM-based virtualization components libvirtd QMP QMP QEMU QEMU VM1 VM2 Disk1 Disk2 ioctl() Linux with KVM 5 / 38 libguestfs (guestfish) Custom Appliance KVM-based virtualization components OpenStack, et al.
    [Show full text]
  • Starwind Vmware Backup Plug-Innew Complete Protection of Your Vmware Virtual Machines
    Solution Overview StarWind VMware Backup Plug-inNEW Complete Protection of Your VMware Virtual Machines Premium VMware backup of your virtual machines StarWind Software is focused on developing solutions for safe Server virtualization technology introduces multiple benefits to an IT environment, and it can and efficient virtual machine drastically cut down the costs associated with server infrastructures. VMware vSphere is the backup and restore processes industry leading virtualization platform, which has been adopted by thousands of companies using advanced data transfer and globally. Virtualization is the first step for creation of an effective and flexible datacenter. The storage technologies. next logical step is protection of virtual machines, applications, and data. BACKGROUND OF VMWARE Introducing StarWind VMware Backup Plug-in BACKUP DEVELOPMENT StarWind VMware Backup Plug-in is a powerful and multi-functional backup solution for easy StarWind Software, Inc., and fast VM backup and recovery, that delivers: known as a reliable vendor of Affordability – a simple per host pricing model storage virtualization software acknowledged the importance Cross-hypervisor support – full support for VMware vSphere and Microsoft Hyper-V of data backup in virtualized Agentless architecture – reduced administrative overhead and a simplified installation environments. Such a position Global deduplication – drastically reduced disk space requirements resulting in lower TCO inspired the company to develop Sandbox and autotesting – verification of VM archives’ recoverability a full-service backup solution for ESX virtual machines. F ast Reliable Simple Flexible BENEFITS OF STARWIND VMWARE One powerful solution for storage and backup BACKUP StarWind provides an end-to-end storage virtualization tool and backup data protection • Ease of installation and use developed specifically for VMware environments.
    [Show full text]
  • A Virtual Machine Environment for Real Time Systems Laboratories
    AC 2007-904: A VIRTUAL MACHINE ENVIRONMENT FOR REAL-TIME SYSTEMS LABORATORIES Mukul Shirvaikar, University of Texas-Tyler MUKUL SHIRVAIKAR received the Ph.D. degree in Electrical and Computer Engineering from the University of Tennessee in 1993. He is currently an Associate Professor of Electrical Engineering at the University of Texas at Tyler. He has also held positions at Texas Instruments and the University of West Florida. His research interests include real-time imaging, embedded systems, pattern recognition, and dual-core processor architectures. At the University of Texas he has started a new real-time systems lab using dual-core processor technology. He is also the principal investigator for the “Back-To-Basics” project aimed at engineering student retention. Nikhil Satyala, University of Texas-Tyler NIKHIL SATYALA received the Bachelors degree in Electronics and Communication Engineering from the Jawaharlal Nehru Technological University (JNTU), India in 2004. He is currently pursuing his Masters degree at the University of Texas at Tyler, while working as a research assistant. His research interests include embedded systems, dual-core processor architectures and microprocessors. Page 12.152.1 Page © American Society for Engineering Education, 2007 A Virtual Machine Environment for Real Time Systems Laboratories Abstract The goal of this project was to build a superior environment for a real time system laboratory that would allow users to run Windows and Linux embedded application development tools concurrently on a single computer. These requirements were dictated by real-time system applications which are increasingly being implemented on asymmetric dual-core processors running different operating systems. A real time systems laboratory curriculum based on dual- core architectures has been presented in this forum in the past.2 It was designed for a senior elective course in real time systems at the University of Texas at Tyler that combines lectures along with an integrated lab.
    [Show full text]
  • Understanding Full Virtualization, Paravirtualization, and Hardware Assist
    VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist Contents Introduction .................................................................................................................1 Overview of x86 Virtualization..................................................................................2 CPU Virtualization .......................................................................................................3 The Challenges of x86 Hardware Virtualization ...........................................................................................................3 Technique 1 - Full Virtualization using Binary Translation......................................................................................4 Technique 2 - OS Assisted Virtualization or Paravirtualization.............................................................................5 Technique 3 - Hardware Assisted Virtualization ..........................................................................................................6 Memory Virtualization................................................................................................6 Device and I/O Virtualization.....................................................................................7 Summarizing the Current State of x86 Virtualization Techniques......................8 Full Virtualization with Binary Translation is the Most Established Technology Today..........................8 Hardware Assist is the Future of Virtualization, but the Real Gains Have
    [Show full text]
  • Introduction to Virtualization Virtualization
    Introduction to Virtualization Prashant Shenoy Computer Science CS691D: Hot-OS Lecture 2, page 1 Virtualization • Virtualization: extend or replace an existing interface to mimic the behavior of another system. – Introduced in 1970s: run legacy software on newer mainframe hardware • Handle platform diversity by running apps in VMs – Portability and flexibility Computer Science CS691D: Hot-OS Lecture 2, page 2 Types of Interfaces • Different types of interfaces – Assembly instructions – System calls – APIs • Depending on what is replaced /mimiced, we obtain different forms of virtualization Computer Science CS691D: Hot-OS Lecture 2, page 3 Types of Virtualization • Emulation – VM emulates/simulates complete hardware – Unmodified guest OS for a different PC can be run • Bochs, VirtualPC for Mac, QEMU • Full/native Virtualization – VM simulates “enough” hardware to allow an unmodified guest OS to be run in isolation • Same hardware CPU – IBM VM family, VMWare Workstation, Parallels,… Computer Science CS691D: Hot-OS Lecture 2, page 4 Types of virtualization • Para-virtualization – VM does not simulate hardware – Use special API that a modified guest OS must use – Hypercalls trapped by the Hypervisor and serviced – Xen, VMWare ESX Server • OS-level virtualization – OS allows multiple secure virtual servers to be run – Guest OS is the same as the host OS, but appears isolated • apps see an isolated OS – Solaris Containers, BSD Jails, Linux Vserver • Application level virtualization – Application is gives its own copy of components that are not shared • (E.g., own registry files, global objects) - VE prevents conflicts – JVM Computer Science CS691D: Hot-OS Lecture 2, page 5 Examples • Application-level virtualization: “process virtual machine” • VMM /hypervisor Computer Science CS691D: Hot-OS Lecture 2, page 6 The Architecture of Virtual Machines J Smith and R.
    [Show full text]
  • Oracle® Linux Virtualization Manager Getting Started Guide
    Oracle® Linux Virtualization Manager Getting Started Guide F25124-11 September 2021 Oracle Legal Notices Copyright © 2019, 2021 Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Virtualizationoverview
    VMWAREW H WHITEI T E PPAPERA P E R Virtualization Overview 1 VMWARE WHITE PAPER Table of Contents Introduction .............................................................................................................................................. 3 Virtualization in a Nutshell ................................................................................................................... 3 Virtualization Approaches .................................................................................................................... 4 Virtualization for Server Consolidation and Containment ........................................................... 7 How Virtualization Complements New-Generation Hardware .................................................. 8 Para-virtualization ................................................................................................................................... 8 VMware’s Virtualization Portfolio ........................................................................................................ 9 Glossary ..................................................................................................................................................... 10 2 VMWARE WHITE PAPER Virtualization Overview Introduction Virtualization in a Nutshell Among the leading business challenges confronting CIOs and Simply put, virtualization is an idea whose time has come. IT managers today are: cost-effective utilization of IT infrastruc- The term virtualization broadly describes the separation
    [Show full text]
  • Oracle Virtualbox Installation, Setup, and Ubuntu Introduction
    ORACLE VIRTUALBOX INSTALLATION, SETUP, AND UBUNTU INTRODUCTION • VirtualBox is a hardware virtualization program. • Create virtual computers aka virtual machines. • Prototyping, sandboxing, testing. • The computer that VirtualBox is installed on is called the “host”, and each virtual machine is called a “guest”. PREREQUISITES Since virtual machines share resources with the host computer, we need to know what resources we have available on our host. • Click “Type here to search”. • Search for “System Information”. • Note the number of processor cores and the amount of RAM installed in your host. PREREQUISITES • Expand “Components”. • Expand “Storage”. • Select “Drives”. • Note the amount of free space available on your host. Every computer is different, so how we will need to balance these resources between our host and guest systems will differ. DOWNLOADING VIRTUALBOX • VISIT VIRTUALBOX.ORG • SELECT THE CORRECT PACKAGE • CLICK THE DOWNLOAD LINK. FOR YOUR HOST. INSTALLING VIRTUALBOX • Browse to where you downloaded VirtualBox and run the installer. • All default options will be fine. Simply follow the prompts. INSTALLING VIRTUALBOX • CLICK “FINISH”. • VIRTUALBOX INSTALLED! SETTING THINGS UP Before we build our first virtual machine, we need to download an operating system to install as our “guest”. • Visit Ubuntu.com • Click “Download”. • Select the current Ubuntu Desktop “LTS” release. • LTS releases focus on stability rather than cutting edge features. SETTING THINGS UP • IN VIRTUALBOX, CLICK “NEW”. • NAME THE VIRTUAL MACHINE. SETTING THINGS UP Here’s where we will need the system resources information that we looked up earlier. Each virtual machine functions like a separate computer in and of itself and will need to share RAM with the host.
    [Show full text]
  • Container and Kernel-Based Virtual Machine (KVM) Virtualization for Network Function Virtualization (NFV)
    Container and Kernel-Based Virtual Machine (KVM) Virtualization for Network Function Virtualization (NFV) White Paper August 2015 Order Number: 332860-001US YouLegal Lines andmay Disclaimers not use or facilitate the use of this document in connection with any infringement or other legal analysis concerning Intel products described herein. You agree to grant Intel a non-exclusive, royalty-free license to any patent claim thereafter drafted which includes subject matter disclosed herein. No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this document. All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel product specifications and roadmaps. The products described may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Copies of documents which have an order number and are referenced in this document may be obtained by calling 1-800-548-4725 or by visiting: http://www.intel.com/ design/literature.htm. Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Learn more at http:// www.intel.com/ or from the OEM or retailer. Results have been estimated or simulated using internal Intel analysis or architecture simulation or modeling, and provided to you for informational purposes. Any differences in your system hardware, software or configuration may affect your actual performance. For more complete information about performance and benchmark results, visit www.intel.com/benchmarks. Tests document performance of components on a particular test, in specific systems.
    [Show full text]
  • Storage Virtualization I What, Why, Where and How?
    Storage Virtualization I What, Why, Where and How? Presenter: Walt Hubis, Storage Architect at Large Author: Rob Peglar, Isilon / EMC SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced in their entirety without modification The SNIA must be acknowledged as the source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the author nor the presenter is an attorney and nothing in this presentation is intended to be, or should be construed as legal advice or an opinion of counsel. If you need legal advice or a legal opinion please contact your attorney. The information presented herein represents the author's personal opinion and current understanding of the relevant issues involved. The author, the presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. Storage Virtualization I – Who, What, Where, Why © 2011 Storage Networking Industry Association. All Rights Reserved. 2 Abstract/Agenda Goals of this tutorial: What is storage virtualization? Why do end users need it? Where is it performed? How does it work? A link to the SNIA Shared Storage Model The SNIA Storage Virtualization Taxonomy A survey through various virtualization approaches Enhanced storage and data services Q&A Storage Virtualization I – Who, What, Where, Why © 2011 Storage Networking Industry Association.
    [Show full text]
  • Cloudbyte Enables Storage Virtualization with the Help of Sandisk® Ssds
    CASE STUDY CloudByte Enables Storage Virtualization with the Help of SanDisk® SSDs Summary Solution Focus CloudByte is a storage virtualization company that brings the virtualization concept • Storage virtualization down into the storage layer. This provides “virtual storage machines” (VSMs), which • Storage on demand are the equivalent of virtualization on the server. The CloudByte ElastiStor Appliance (ESA), a completely self-managed storage solution, extends server virtualization Summary of Benefits to the storage component. It does this by employing SanDisk solid state drives for • Reliable, secure, manageable storage primary storage or hybrid solutions. • Access to hybrid and all-flash storage pools Background • Single storage platform Felix Xavier is the founder, CEO, and CTO of CloudByte. Four years ago he observed • Reduced data center footprint the proliferation of server virtualization and expected that a similar phenomenon • Reduced cost for storage would occur in the storage world. Seizing this opportunity, CloudByte developed advanced technologies to address both storage virtualization and the flexible allocation of storage resources on demand, creating Virtual Storage Machines (VSMs). VSMs are like a physical storage appliance at a logical software level, which can guarantee isolation as any physical appliance can. “We have consolidated everything on a simple, single appliance. We carve virtual containers out of the appliance and provide performance guarantees for each of the applications. This complements what server virtualization does,” explained Xavier. Xavier initially started the company as a software-only solution. However, CloudByte later developed an integrated hardware appliance, which required that they conduct research on various components, such as servers and flash drives. “We found SanDisk, who provides the enterprise-grade SAS drives that…meet our price and performance point requirements,” said Xavier.
    [Show full text]
  • Introduction to Real-Time Virtualization (Hypervisor)
    Introduction to the NI Real-Time Hypervisor 1 Agenda 1) NI Real-Time Hypervisor overview 2) Basics of virtualization technology 3) Configuring and using Real-Time Hypervisor systems 4) Performance and benchmarks 5) Case study: aircraft arrestor system NI Real-Time Hypervisor Overview NI Real-Time Hypervisor • Run NI LabVIEW Real-Time Windows XP LabVIEW Real-Time and Windows XP in parallel • Partition I/O devices, RAM, NI Real-Time Hypervisor and CPUs between OSs • Uses virtualization I/O RAM CPUs technology and Intel VT Benefits of the Real-Time Hypervisor • Capability: make use of real-time processing and Windows XP services Applications Determinism Graphics Real-Time I/O Services Timing Benefits of the Real-Time Hypervisor • Consolidation: reduce hardware costs, wiring, and physical footprint Virtualized System with NI Real-Time Hypervisor Benefits of the Real-Time Hypervisor • Efficiency: take advantage of multicore processors effectively Quad-Core Controller with Virtualization Windows XP LabVIEW Real-Time Basics of Virtualization Technology What Is Virtualization? • The term: refers to abstraction of OSs from hardware resources • In practice: running multiple OSs simultaneously on a single computer Virtualization Software Architectures • Software: virtual machine monitor (VMM) or Hypervisor • Two main variations: hosted and bare-metal Hosted (VMWare) Bare-Metal (NI Real-Time Hypervisor) How Does Virtualization Software Work? • OSs are “unaware” of being virtualized • Hypervisor is called only when needed • Various mechanisms for
    [Show full text]