SlideShare a Scribd company logo
2
Most read
12
Most read
Virtualization Paul Krzyzanowski [email_address] [email_address] Distributed Systems Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License.
Virtualization Memory virtualization Process feels like it has its own address space Created by MMU, configured by OS Storage virtualization Logical view of disks “connected” to a machine External pool of storage CPU/Machine virtualization Each process feels like it has its own CPU Created by OS preemption and scheduler
Storage Virtualization Dissociate knowledge of physical disks Software between the computer and the disks manages the view of storage.  Examples: Make four 500 GB disks appear as one 2 TB disk Make one 500 GB disk appear as two 200 GB disks and one 100 GB disk, with each of the 200 GB virtual disks available to different servers while the 100 GB disk can be shared by all. Have all writes get mirrored to a backup disk Virtualization software translates read-block/write-block requests for logical devices to read-block/write-block requests for physical devices
Virtualization Storage virtualization Logical view of disks “connected” to a machine Separate logical view from phyisical storage External pool of storage Virtualization appliance Fibre-channel switch Host 1 Host 2 Host n ... Replication Snapshots Pooling Partitioning
Virtual CPU Each process feels like it has its own CPU But cannot execute privileged instructions (e.g., modify the MMU or the interval timer, halt the processor, access I/O) Created by OS preemption and scheduler
Virtual CPUs Pseudo-machine with interpreted instructions 1966: O-code for BCPL 1973: P-code for Pascal 1995: Java Virtual Machine Run anywhere
Virtual Machines Machine virtualization Partition a physical computer to act like several real machines Migrate an entire OS + applications from one machine to another 1972: IBM System 370
Machine Virtualization Privileged  vs.  unprivileged  instructions Regular applications use unprivileged instructions Easy to virtualize If regular applications execute privileged instructions, they  trap VM catches the trap and emulates the instruction
Intel Ugliness Intel x86 arch doesn’t support trapping privileged instructions Two approaches Binary translation (BT) Scan instruction stream and replace privileged instructions with something the VM can intercept. (VMware approach) Paravirtualization Don’t use non-virtualizable instructions (Xen approach)
Virtual Machine Monitor (VMM) Program in charge of virtualization Aka  Hypervisor Arbitrates access to physical resources Presents a set of virtual device interfaces to each host Guest OS runs until: Privileged instruction traps System interrupts Exceptions (page faults) Explicit call: VMCALL (intel) or VMMCALL (AMD)
Architectural Support Intel Virtual Technology (Intel Core 2 Duo) AMD Opteron Certain privileged instructions are intercepted as VM exits to the VMM Exceptions, faults, and external interrupts are intercepted as VM exits Virtualized exceptions/faults are injected as VM entries
Popular VM Platforms Xen Runs under an OS and provides virtual containers for running other operating systems. Runs a subset of x86. Routes all hardware accesses to the host OS. Altris Software Virtualization Services Windows registry & directory tweaking Allows multiple instances of applications to be installed Microsoft Virtual Server Parallels VMWare
Security Threats Hypervisor-based rootkits A system with no virtualization software installed but with hardware-assisted virtualization can have a hypervisor-based rootkit installed. Rootkit runs at a higher privilege level than the OS. It’s possible to write it in a way that the kernel will have a limited ability to detect it.
Muiltiprocessor Virutalization 3Leaf Systems Custom ASIC to  allow networked processors to act like one SMP system Cache-coherent links between servers A connection between servers keeps memory coherent and makes a remote processor look like it’s on the same system bus Planned for 2010
The end

More Related Content

PPTX
2. Distributed Systems Hardware & Software concepts
PPT
Coda file system
PPTX
Distributed web based systems
PDF
Deadlock in Distributed Systems
PPTX
Fault tolerance in distributed systems
PPT
Distributed Systems
PPTX
GOOGLE FILE SYSTEM
PPTX
Virtual machines and their architecture
2. Distributed Systems Hardware & Software concepts
Coda file system
Distributed web based systems
Deadlock in Distributed Systems
Fault tolerance in distributed systems
Distributed Systems
GOOGLE FILE SYSTEM
Virtual machines and their architecture

What's hot (20)

DOC
Naming in Distributed System
PPT
Introduction to SSH
PDF
CS8791 Cloud Computing - Question Bank
PPTX
virtualization and hypervisors
PPTX
Message passing in Distributed Computing Systems
PPTX
Introduction to Distributed System
PPTX
Synchronization in distributed computing
PDF
Fault tolerance
PPTX
Inter Process Communication
PPT
System models in distributed system
PPTX
Cloud File System with GFS and HDFS
PPT
parallel programming models
PPTX
distributed Computing system model
PDF
Operating system structures
PPTX
Operating system paging and segmentation
PPT
Shared memory
PPTX
Operating system 02 os as an extended machine
PDF
CS9222 Advanced Operating System
PPTX
Message and Stream Oriented Communication
PPT
remote procedure calls
Naming in Distributed System
Introduction to SSH
CS8791 Cloud Computing - Question Bank
virtualization and hypervisors
Message passing in Distributed Computing Systems
Introduction to Distributed System
Synchronization in distributed computing
Fault tolerance
Inter Process Communication
System models in distributed system
Cloud File System with GFS and HDFS
parallel programming models
distributed Computing system model
Operating system structures
Operating system paging and segmentation
Shared memory
Operating system 02 os as an extended machine
CS9222 Advanced Operating System
Message and Stream Oriented Communication
remote procedure calls
Ad

Viewers also liked (20)

PPT
Distributed information sys
DOC
Unit 1 architecture of distributed systems
PPT
Distributed Processing
PPTX
Server virtualization
PDF
Security for distributed systems
PPT
Clock synchronization in distributed system
PPTX
Distributed System - Security
PDF
Distributed processing
PPT
Clock Synchronization (Distributed computing)
PPT
Group Communication (Distributed computing)
PPT
Lamport’s algorithm for mutual exclusion
PPSX
Election algorithms
PPTX
Security in distributed systems
PPT
Communications is distributed systems
PPT
process management
PDF
6.Distributed Operating Systems
PDF
Clock Synchronization in Distributed Systems
PPTX
1.Introduction to virtualization
DOCX
Distributed System
PDF
Virtualization and cloud Computing
Distributed information sys
Unit 1 architecture of distributed systems
Distributed Processing
Server virtualization
Security for distributed systems
Clock synchronization in distributed system
Distributed System - Security
Distributed processing
Clock Synchronization (Distributed computing)
Group Communication (Distributed computing)
Lamport’s algorithm for mutual exclusion
Election algorithms
Security in distributed systems
Communications is distributed systems
process management
6.Distributed Operating Systems
Clock Synchronization in Distributed Systems
1.Introduction to virtualization
Distributed System
Virtualization and cloud Computing
Ad

Similar to Virtualization (Distributed computing) (20)

PPTX
cloud basics.
PPT
CC_virtualization is in the cloud UNIT 3.1.ppt
PPT
Virtualization ppt1
PPTX
Virtualization of computing and servers
PPTX
Overview of System Virtualization
PDF
AOS Lab 11: Virtualization
PPT
An Introduction To Server Virtualisation
PPTX
Vitualisation
PPTX
Server virtualization
PPTX
Disco: Running Commodity Operating Systems on Scalable Multiprocessors Disco
PPTX
Operating system Virtualization_NEW.pptx
PPTX
Virtualization-Presentation-with-History
PDF
Cloud computing | Cloud security | unit 2
PDF
virtual-machine-150316004018-conversion-gate01.pdf
PPTX
Virtual machine
PPTX
Vitualisation
PPT
Virtualization
PPT
incs775_lect6.ppt
PDF
D1 t2 jonathan brossard - breaking virtualization by switching to virtual 8...
PPT
Unit II.ppt
cloud basics.
CC_virtualization is in the cloud UNIT 3.1.ppt
Virtualization ppt1
Virtualization of computing and servers
Overview of System Virtualization
AOS Lab 11: Virtualization
An Introduction To Server Virtualisation
Vitualisation
Server virtualization
Disco: Running Commodity Operating Systems on Scalable Multiprocessors Disco
Operating system Virtualization_NEW.pptx
Virtualization-Presentation-with-History
Cloud computing | Cloud security | unit 2
virtual-machine-150316004018-conversion-gate01.pdf
Virtual machine
Vitualisation
Virtualization
incs775_lect6.ppt
D1 t2 jonathan brossard - breaking virtualization by switching to virtual 8...
Unit II.ppt

More from Sri Prasanna (20)

PDF
Qr codes para tech radar
PDF
Qr codes para tech radar 2
DOC
DOC
PDF
PDF
PDF
PDF
PDF
About stacks
PDF
About Stacks
PDF
About Stacks
PDF
About Stacks
PDF
About Stacks
PDF
About Stacks
PDF
About Stacks
PDF
About Stacks
PPT
Network and distributed systems
PPT
Introduction & Parellelization on large scale clusters
PPT
Mapreduce: Theory and implementation
PPT
Other distributed systems
Qr codes para tech radar
Qr codes para tech radar 2
About stacks
About Stacks
About Stacks
About Stacks
About Stacks
About Stacks
About Stacks
About Stacks
Network and distributed systems
Introduction & Parellelization on large scale clusters
Mapreduce: Theory and implementation
Other distributed systems

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
KodekX | Application Modernization Development
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Spectroscopy.pptx food analysis technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Approach and Philosophy of On baking technology
NewMind AI Weekly Chronicles - August'25 Week I
Reach Out and Touch Someone: Haptics and Empathic Computing
Network Security Unit 5.pdf for BCA BBA.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Programs and apps: productivity, graphics, security and other tools
MIND Revenue Release Quarter 2 2025 Press Release
KodekX | Application Modernization Development
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectroscopy.pptx food analysis technology
The AUB Centre for AI in Media Proposal.docx
Review of recent advances in non-invasive hemoglobin estimation
Dropbox Q2 2025 Financial Results & Investor Presentation
Building Integrated photovoltaic BIPV_UPV.pdf
Electronic commerce courselecture one. Pdf
Spectral efficient network and resource selection model in 5G networks
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Per capita expenditure prediction using model stacking based on satellite ima...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx

Virtualization (Distributed computing)

  • 1. Virtualization Paul Krzyzanowski [email_address] [email_address] Distributed Systems Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License.
  • 2. Virtualization Memory virtualization Process feels like it has its own address space Created by MMU, configured by OS Storage virtualization Logical view of disks “connected” to a machine External pool of storage CPU/Machine virtualization Each process feels like it has its own CPU Created by OS preemption and scheduler
  • 3. Storage Virtualization Dissociate knowledge of physical disks Software between the computer and the disks manages the view of storage. Examples: Make four 500 GB disks appear as one 2 TB disk Make one 500 GB disk appear as two 200 GB disks and one 100 GB disk, with each of the 200 GB virtual disks available to different servers while the 100 GB disk can be shared by all. Have all writes get mirrored to a backup disk Virtualization software translates read-block/write-block requests for logical devices to read-block/write-block requests for physical devices
  • 4. Virtualization Storage virtualization Logical view of disks “connected” to a machine Separate logical view from phyisical storage External pool of storage Virtualization appliance Fibre-channel switch Host 1 Host 2 Host n ... Replication Snapshots Pooling Partitioning
  • 5. Virtual CPU Each process feels like it has its own CPU But cannot execute privileged instructions (e.g., modify the MMU or the interval timer, halt the processor, access I/O) Created by OS preemption and scheduler
  • 6. Virtual CPUs Pseudo-machine with interpreted instructions 1966: O-code for BCPL 1973: P-code for Pascal 1995: Java Virtual Machine Run anywhere
  • 7. Virtual Machines Machine virtualization Partition a physical computer to act like several real machines Migrate an entire OS + applications from one machine to another 1972: IBM System 370
  • 8. Machine Virtualization Privileged vs. unprivileged instructions Regular applications use unprivileged instructions Easy to virtualize If regular applications execute privileged instructions, they trap VM catches the trap and emulates the instruction
  • 9. Intel Ugliness Intel x86 arch doesn’t support trapping privileged instructions Two approaches Binary translation (BT) Scan instruction stream and replace privileged instructions with something the VM can intercept. (VMware approach) Paravirtualization Don’t use non-virtualizable instructions (Xen approach)
  • 10. Virtual Machine Monitor (VMM) Program in charge of virtualization Aka Hypervisor Arbitrates access to physical resources Presents a set of virtual device interfaces to each host Guest OS runs until: Privileged instruction traps System interrupts Exceptions (page faults) Explicit call: VMCALL (intel) or VMMCALL (AMD)
  • 11. Architectural Support Intel Virtual Technology (Intel Core 2 Duo) AMD Opteron Certain privileged instructions are intercepted as VM exits to the VMM Exceptions, faults, and external interrupts are intercepted as VM exits Virtualized exceptions/faults are injected as VM entries
  • 12. Popular VM Platforms Xen Runs under an OS and provides virtual containers for running other operating systems. Runs a subset of x86. Routes all hardware accesses to the host OS. Altris Software Virtualization Services Windows registry & directory tweaking Allows multiple instances of applications to be installed Microsoft Virtual Server Parallels VMWare
  • 13. Security Threats Hypervisor-based rootkits A system with no virtualization software installed but with hardware-assisted virtualization can have a hypervisor-based rootkit installed. Rootkit runs at a higher privilege level than the OS. It’s possible to write it in a way that the kernel will have a limited ability to detect it.
  • 14. Muiltiprocessor Virutalization 3Leaf Systems Custom ASIC to allow networked processors to act like one SMP system Cache-coherent links between servers A connection between servers keeps memory coherent and makes a remote processor look like it’s on the same system bus Planned for 2010