Professional Documents
Culture Documents
Virtualization
Virtualization
Cloud Computing
Virtualization
A S S T. P R O F. H A R S H K A N TA W A L A
C O M P U T E R E N G I N E E R I N G D E P T,
G . H . P AT E L C O L L E G E O F E N G I N E E R I N G & T E C H N O L O G Y harshkantawala@gcet.ac.in
Introduction
❑ Technology that allows us to create virtual resources such as servers, networks, and storage in the
cloud.
❑ Physical machines are operated by cloud providers, who take care of maintenance, and hardware
supplies.
❑ Virtualization is a broad concept that refers to the creation of a virtual version of something,
whether hardware, software environment, storage, or network.
❑ In a virtualized environment there are three major components: guest, host, and virtualization
layer.
❑ Each guest runs on the host using shared resources donated to it by the host.
❑ The operating system, works as the host and manages the physical resource management, and
the device support.
❑ It is an additional abstraction layer between a network and storage hardware, computing, and the
application running on it.
❑ Guests usually consist of one or more virtual disk files, and a VM definition file.
❑ Virtual Machines are centrally managed by a host application that sees and manages each virtual
machine as a different application.
▪ It is being used by the employees of Company B around 50% of the time (on an average), per
day (over a 24 hour time period).
▪ The rest of the time it is lying idle (and is not being utilized)
❑ Java Virtual machine (JVM) - One of the most common forms of PVM:
▪ Creates and uses a logically separate slice of resources such as RAM memory for itself.
Programmer
Step 2: When a Java program is
compiled, it is first converted into
an intermediate byte code. It is
Java Byte Code usually stored as a *.java or *.jar
(*.java) file. The Byte code is platform
independent.
Application 2
Application n
Applications (or
processes) execute
on the shared OS
and Hardware
PVM n
PVM 1
PVM 2
………….
❑ In System Virtual Machine (Host) [SVM-Host], the virtual machines instances share the same
hardware, and the same operating system (“host operating system”)
❑ A SVM-Host can have many “instances” of the same operating system (say Linux or Windows)
being run on it (“Guest OS”)
Application 2
Application 1
Application 2
Application 2
Application 1
Application 1
Applicationsexecuting
on top of theVM’s
(Windows)
Multiple operating
Guest OS2
(Windows)
Guest OS3
Guest OS1
Guest OSn
(Unix)
systems installed on the
(Linux)
………….
same System virtual
machine (Host)
Shared Hardware
Shared hardware
amongst all the
virtual machines
❑ The virtual machine monitor is installed and executes directly on the shared underlying hardware.
❑ VMM is responsible for creating and running the virtual machine instances on the underlying
shared hardware (this process is known as “native”; in contrast to the shared host OS)
Application 2
Application 1
Application 2
Application 2
Application 1
Application 1
Applicationsexecuting
on top of theVM’s
Multiple operating
(Windows)
(Windows)
Guest OSn
Guest OS1
Guest OS3
Guest OS2
systems installed on the
(Linux)
………….
(Unix)
same System virtual
machine (Host)
Shared Hardware
Shared hardware
amongst all the
virtual machines
Each system virtual machine needs to be able The various processes share the same
Operating System to run a full operating system (of its own) and operating system andcannot execute
maintain isolation with their virtualmachines or run their own operating system
❑ Server Virtualization
❑ Desktop Virtualization
❑ Applications Virtualization
❑ Storage Virtualization
❑ Network Virtualization is the process of combining hardware and software network resources and
network functionality into a single, software-based administrative entity, a virtual network.
❑ Central-server(physical server) is divided into multiple different virtual servers by changing the
identity number, processors.
❑ Each system can operate its own operating systems in isolate manner. Where each sub-server
knows the identity of the central server.
❑ To control and monitoring the processor, memory and other hardware resources.
❑ It refers to a single physical server that consolidates multiple physical servers into virtual servers
for running the key physical server.
❑ Improves performance.
❑ Lower overhead.
❑ It is achieved by using a hypervisor (virtual machine monitor), which lives on top of the host
server hardware to run and allows virtual desktops to use the computing power of the basic
server hardware.
❑ The server stores all personal information and other characteristics of the application but can still
run on a local workstation through the internet.
❑ Example of this would be a user who needs to run two different versions of the same software.
❑ It makes managing storage from multiple sources to be managed and utilized as a single
repository.
❑ Virtualization is one of the hardware reducing, cost saving and energy saving technology.
Hardware
Hardware
❑ VMMs make co-existing on one system possible and consolidate workloads and
multiple operating environments.
❑ Security may become an issue. While robust, hypervisors may become an easy
cyberattack target. Vulnerability increases because of the centralized system, the
company network, server rooms, etc.
❑ To tackle this, there exists a hypervisor. What hypervisor does is, it acts as a bridge
between virtual OS and hardware to enable its smooth functioning of the instance.
❑ There are five levels of virtualizations available that are most commonly used in the
industry. These are as follows:
❑ Library Level
❑ Application Level
❑ One source instruction may require tens or hundreds of native target instructions to
perform its function.
❑ On the other hand, the process manages the underlying hardware through
virtualization. The idea is to virtualize a computer’s resources, such as its processors,
memory, and I/O devices so as hardware utilization rate by multiple users
concurrently may be upgraded .
❑ The software tool WINE has implemented this approach to support Windows
applications on top of UNIX hosts.
❑ Another example is the vCUDA which allows applications executing within VMs to
leverage GPU hardware acceleration.
❑ The most popular approach is to deploy high level language (HLL) VMs.
❑ In this scenario, the virtualization layer exports an abstraction of a VM that can run
programs written and compiled to a particular abstract machine definition.
❑ Any program written in the HLL and compiled for this VM will be able to run on it.
The Microsoft .NET CLR and Java Virtual Machine (JVM) are two good examples of this
class of VM.
❑ Cost of IT infrastructure
❑ High availability.
❑ Xen is a micro-kernel hypervisor, which separates the policy from the mechanism.
❑ The Xen hypervisor implements all the mechanisms, leaving the policy to be handled by
Domain 0, as shown in Figure Xen does not include any device drivers natively.
❑ It just provides a mechanism by which a guest OS can have direct access to the physical
devices.
❑ Xen provides a virtual environment located between the hardware and the OS.
❑ Like other virtualization systems, many guest OSes can run on top of the hypervisor. However,
not all guest OSes are created equal, and one in particular controls the others.
❑ The guest OS, which has control ability, is called Domain 0, and the others are called Domain
U. Domain 0 is a privileged guest OS of Xen.
❑ As shown in Figure, VMware puts the VMM at Ring 0 and the guest OS at Ring 1.
❑ The VMM scans the instruction stream and identifies the privileged, control- and behavior-sensitive instructions.
❑ When these instructions are identified, they are trapped into the VMM, which emulates the behavior of these
instructions.
❑ The virtualization layer can be inserted at different positions in a machine soft-ware stack.
However, para-virtualization attempts to reduce the virtualization overhead, and thus improve
performance by modifying only the guest OS kernel.
❑ According to the x86 ring definition, the virtualization layer should also be installed at Ring 0.
❑ However, when the guest OS kernel is modified for virtualization, it can no longer run on the
hardware directly.
❑ Memory management and scheduling activities are carried out by the existing Linux kernel.
❑ The KVM does the rest, which makes it simpler than the hypervisor that controls the entire
machine.
❑ According to the x86 ring definition, the virtualization layer should also be installed at Ring 0.
❑ However, when the guest OS kernel is modified for virtualization, it can no longer run on the
hardware directly.
❑ Sharing: Virtualization allows the creation of a separate computing environment within the
same host. This basic feature is used to reduce the number of active servers and limit power
consumption.
❑ Aggregation: It is possible to share physical resources among several guests, but virtualization
also allows aggregation, which is the opposite process. A group of separate hosts can be tied
together and represented to guests as a single virtual host.