SlideShare a Scribd company logo
1 of 35
1
Xen and the Art of Virtualization
Abdul Majeed, Ph.D.
Department of Information and Electronics Engineering,
Korea Aerospace University, South Korea.
Big Data Computing & Applications
12/27/2018
2
Presentation Contents
Motivation
Abstract
Introduction
Detailed Design of Xen
Evaluation
Related Work
Discussions
Conclusion
Future Work
XEN: Approach & Overview
12/27/2018 2
3
Motivation
Conventional Way Xen Virtualization
Why is xen so popular?
Increased server utilization
Reduced IT TCO(Total cost of ownership)
Improved IT agility
12/27/2018 3
4
Abstract
 Many systems have been designed which use virtualization to subdivide the resources of computer.
Problems
 Some systems require specialized hardware.
 Some systems cannot support different operating systems (Linux, BSD, windows).
 Some systems require 100% binary compatibility but hurt performance.
 Some systems sacrifice security or functionality for speed.
 Some systems are vulnerable to denial of service(DOS) attacks.
This paper presents Xen, an x86 virtual machine monitor(VMM) called as hyperviswer which allows
multiple operating systems to share hardware in a safe and resource managed fashion without
sacrificing either security or functionality.
 Idealized virtual machine abstraction to which different operating systems can be easily ported.
 Targeted hosting up to 100 virtual machines.
12/27/2018 4
5
• Modern computers are sufficiently powerful.
• Modern Computers use virtualization to give illusion of many smaller virtual machines.
• This has lead to an innovation in VM technology.
• In virtualization a single machine is partitioned to support the concurrent execution of multiple
operating systems.
• Virtualization introduces various challenges
o Virtual machines isolation (e.g., operating of one machine should not affect any other
machine).
o Variety of operating systems (e.g., Linux, Unix, Windows etc.).
o Performance overhead (It should be minimum).
Introduction
12/27/2018 5
6
Introduction
Several Problems
 Administration will become very
time consuming task.
 Performance isolation
 Scheduling priority
 Memory demand
 Network traffic
 Disk accesses
Simplest way to build system
12/27/2018 6
7
• Xen a virtual machine monitor enable server consolidation, co-located hosting, distributed web
services, secure application platforms and application mobility.
• Xen can host different operating systems with small modifications.
• Xen enable users to dynamically start an operating system and execute whatever they want.
• Xen provides performance isolation and manage hardware resources efficiently between different
guest operating systems.
• Xen uses paravirtualization rather than full virtualization.
• Xen efficiently handle the trade-off of performance and functionality.
Introduction
12/27/2018 7
8
XEN APPROACH & OVERVIEW
1
12/27/2018 8
9
Xen approach & Overview
Example: VMware Example: Xen, Denali etc.
12/27/2018 9
10
• In full virtualization, the virtual machine hardware used is functionally identical to the underlying
machine.
• Full virtualization is beneficial but it has certain drawbacks,
-> Support of full virtualization is not part of x86 architecture.
-> Executing certain instructions with privileges fails badly.
-> Efficient virtualization of x86 MMU is also difficult.
• Xen resolves the above mentioned limitation of the full virtualization by introducing
paravirtualization, which improves performance.
• Although it requires some modification in the guest operating system but the changes are not
been made in the guest applications.
Xen approach & Overview
12/27/2018 10
11
Xen discussion based on mainly following design principles.
 Performance isolation between guests (resource control for some guarantee of QoS).
 Minimal performance overheads.
 Support for different Operating Systems.
 Maintain Guest OS ABI (thus allowing existing applications to run unmodified).
 Need to support full multi-application operating systems.
Xen approach & Overview
Xen’s set of Design Principles/Goals
12/27/2018 11
12
Xen approach & Overview
Sr.# Denali Project Xen (Hypervisor)
1.
Denali is designed to support
thousands of virtual machines.
Xen is intended to scale to approximately 100
virtual machines.
2. Denali does not target existing ABIs. Xen target existing ABIs.
3.
Denali Does not support application
multiplexing, nor multiple address
spaces.
In xen single virtual machine host a real
operating system and its multiplexed with
thousands of user level processes.
4.
VMM perform all paging to and from
the disk.
Each guest operating perform its own paging.
5.
Denali virtualizes the namespace of
all virtual machines that may result in
malicious resource access.
Secure access control within the hypervisor is
sufficient to ensure protection across all
machines.
Comparison & Contrast between Xen and Denali
12/27/2018 12
13
Xen approach & Overview
The Virtual Machine Interface
12/27/2018 13
14
The Cost of Porting an OS to Xen
Xen approach & Overview
12/27/2018 14
15
Xen approach & Overview
Xen System Structure
12/27/2018 15
16
• Xen design and implementation goal was to separate policy from mechanism.
• Even though the hypervisor is involved in how CPU shared among domain, filtering network
packets, enforcing access control mechanism, or how CPU will be shared, what type of packets
will be transmitted.
• Xen provides basic control operations only.
• Domain0 is responsible for hosting the application level management software.
• Control interface support creation and deletion of network interfaces.
• Most importunately Domain0 facilitate the management of entire server.
Xen approach & Overview
Control and Management
12/27/2018 16
17
XEN DETAILED DESIGN
2
12/27/2018 17
18
Xen Detailed Design
Control Transfer: Hyper calls and events
Domains
Synchronous-calls
Xen
Hyper call()
Events()
Asynchronous-Events
The use of a hyper call is to request a set of
page table updates, in which Xen validates
and applies a list of updates, returning
control to the calling domain when this is
completed.
This is analogous to the use of system calls
in conventional operating system.
Communication from Xen to a domain is
provided through an asynchronous event
mechanism.
For instance, events are used to indicate that
new data has been received over the network,
or that a virtual disk request has completed.
Major Functionalities Major Functionalities
12/27/2018 18
19
Xen Detailed Design
Data transfer: I/O Rings
 No direct protection between guest
operating system and I/O devices.
 Data transfer mechanism is crucial for
little overheads.
 Two main factors,
• Resource management
• Event notifications
12/27/2018 19
20
Xen Detailed Design
Subsystem virtualization
CPU Scheduling Time & Timers
Virtual Address Translation
- Domain scheduling based on
Borrowed Virtual Time (BVT)
scheduling algorithm.
-Work-conserving
-Low-latency wake-up
- Per-domain scheduling
parameters can be adjusted
by management software
running in Domain0.
- Xen provides guest OSes
with notions of real time.
- Expressed in nanoseconds
-Maintained till end.
- Each guest OS can
program a pair of alarm
timers, one for real time and
the other for virtual time.
-Xen attempts to virtualize
memory access with as little
overhead as possible.
-The type system is also used to
track which frames have already
been validated for use in page
tables.
-To ensure safety, requests are
validated by xen before being
applied.
CPU Scheduling Time & Timers Virtual Address Translation
12/27/2018 20
21
Xen Detailed Design
- Statically partitioned between
domains.
- A maximum allowable
reservation may also be
specified.
- Guest operating systems can
claim additional
memory pages from Xen.
- Guest can release unused
memory to xen.
- Xen provides the
abstraction of a virtual
firewall-router.
- Domain0 is responsible for
inserting and removing rules
about network.
- Rules will be installed to
prevent IP source address
spoofing.
- Xen ensure safety during
data transmission.
- Only Domain0 has direct
unchecked access to
physical disks.
- All other domains access
persistent storage through
the abstraction of virtual
block devices.
- Xen has more complete
knowledge of the actual
disks.
- Future work will investigate
providing more predictable
isolation and differentiated
service.
Physical Memory Network Disks
Subsystem virtualization
12/27/2018 21
22
EVALUATION
3
12/27/2018 22
23
Xen evaluation based on following five criteria
Evaluation
Xen’s Evaluation
Relative Performance
Operating system Benchmark
Concurrent virtual Machines
Performance isolation
Scalability
1
2
3
4
5
12/27/2018 23
24
Evaluation
3.1 Relative Performance
12/27/2018 24
25
Evaluation
3.2 Operating System
Benchmark
12/27/2018 25
26
Evaluation
3.3 Concurrent virtual Machines
12/27/2018 26
27
• At the current time no implementation based on Linux 2.4 available.
• Xen performance isolation works as expected even in the presence of malicious workload.
• We ran four domains configured with equal resources.
 Domain 1: PostgreSQL/OSDB-IR & SPEC WEB99.
 Domain 2: PostgreSQL/OSDB-IR & SPEC WEB99.
 Domain 3: A disk bandwidth hog (sustained dd ) with a file system intensive workload.
 Domain 4: ‘fork bomb’ at the same time as a virtual memory intensive application.
• Xen achieves 4% and 2% below the results reported across all domains.
• VMware Workstation achieves similar levels of isolation, but at reduced levels of absolute performance.
Evaluation
3.4 Performance isolation
12/27/2018 27
28
Evaluation
3.5 Scalability
12/27/2018 28
29
RELATED WORK
4
12/27/2018 29
30
• Virtualization has been applied to operating systems both research and commercially for nearly 30 years.
• BM VM/370 first made use of virtualization to allow binary support for legacy code.
• VMware and Connectix both virtualize commodity PC hardware, allowing multiple operating systems to run on a
single host. Both use full virtualization.
• Two competitors IBM Para virtualized version of Linux and Denali are capable of hosting vast number of
virtualized operating system instances.
• Two other efforts to use low level virtualization for building a distributed infrastructure are ‘vMatrixs’ and IBM
‘Managed Hosting’.
• Resource-managed JVM can host untrusted applications, these necessary applications must be compiled to java
bytecode and follow the system security model.
• Language level virtual machines approaches are needed and xen readily support language level virtual machines.
Related Work
12/27/2018 30
31
DISCUSSIONS & CONCLUSION
5
12/27/2018 31
32
• We have presented the Xen hypervisor which partitions the resources of a computer between
different domains each running guest operating systems.
• The Para-virtualizing design of Xen places a particular emphasis on performance and resource
management.
• We have also described and evaluated XenoLinux, a fully-featured port of a Linux 2.4 kernel
that runs over Xen.
Discussions
Summary of the paper (three key-points of the paper)
12/27/2018 32
33
• Xen provides an excellent platform for deploying a wide variety of network-centric services,
 Local mirroring of dynamic web contents
 Media stream transcoding and distribution
 Multiplayer game
 Virtual reality servers
 Smart proxies
• Allowing 100 operating system to run on a single server reduced the cost by two orders of magnitude.
• Each operating system can be easily ported in Xen with in smaller timescale.
• High performance, Strong isolation and Effective scaling
• The performance of XenoLinux(a guest operating system) over Xen is practically equivalent to the
performance of the baseline Linux system.
• Our ongoing work to port the BSD and Windows XP kernels to operate over Xen is confirming the
generality of the interface that Xen exposes.
Conclusion
12/27/2018 33
34
• Up to now, We believe that Xen and XenoLinux are sufficiently complete to
be useful to a wider audience.
• Further improvements which are part of our research will be added to it.
I. Controlled data sharing to our design without sacrificing isolation.
II. To provide better physical memory performance, we plan to implement a last-chance page
cache (LPC).
III. Internet-scale computing infrastructure beyond individual machines.
IV. Auditing and forensic logging for better administration and management.
V. We are continuing our work on XenoXP .
Future Work
12/27/2018 34
3512/27/2018 35
Email Address: abdulmajid09398@kau.kr & abdulmajid09398@gmail.com
Any Query Regarding Contents

More Related Content

What's hot

Metro Cluster High Availability or SRM Disaster Recovery?
Metro Cluster High Availability or SRM Disaster Recovery?Metro Cluster High Availability or SRM Disaster Recovery?
Metro Cluster High Availability or SRM Disaster Recovery?David Pasek
 
Spectrum Scale Best Practices by Olaf Weiser
Spectrum Scale Best Practices by Olaf WeiserSpectrum Scale Best Practices by Olaf Weiser
Spectrum Scale Best Practices by Olaf WeiserSandeep Patil
 
Overview of Distributed Virtual Router (DVR) in Openstack/Neutron
Overview of Distributed Virtual Router (DVR) in Openstack/NeutronOverview of Distributed Virtual Router (DVR) in Openstack/Neutron
Overview of Distributed Virtual Router (DVR) in Openstack/Neutronvivekkonnect
 
VMworld 2017 - Top 10 things to know about vSAN
VMworld 2017 - Top 10 things to know about vSANVMworld 2017 - Top 10 things to know about vSAN
VMworld 2017 - Top 10 things to know about vSANDuncan Epping
 
Five common customer use cases for Virtual SAN - VMworld US / 2015
Five common customer use cases for Virtual SAN - VMworld US / 2015Five common customer use cases for Virtual SAN - VMworld US / 2015
Five common customer use cases for Virtual SAN - VMworld US / 2015Duncan Epping
 
OpenStack Neutron IPv6 Lessons
OpenStack Neutron IPv6 LessonsOpenStack Neutron IPv6 Lessons
OpenStack Neutron IPv6 LessonsAkihiro Motoki
 
VMware HA deep Dive
VMware HA deep DiveVMware HA deep Dive
VMware HA deep DiveEric Sloof
 
PCF-VxRail-ReferenceArchiteture
PCF-VxRail-ReferenceArchiteturePCF-VxRail-ReferenceArchiteture
PCF-VxRail-ReferenceArchitetureVuong Pham
 
A day in the life of a VSAN I/O - STO7875
A day in the life of a VSAN I/O - STO7875A day in the life of a VSAN I/O - STO7875
A day in the life of a VSAN I/O - STO7875Duncan Epping
 
Using the KVMhypervisor in CloudStack
Using the KVMhypervisor in CloudStackUsing the KVMhypervisor in CloudStack
Using the KVMhypervisor in CloudStackShapeBlue
 
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesDeep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesVeritas Technologies LLC
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualizationrjain51
 
Storage Management using LVM
Storage Management using LVMStorage Management using LVM
Storage Management using LVMPriyank Kapadia
 
Linux admin interview questions
Linux admin interview questionsLinux admin interview questions
Linux admin interview questionsKavya Sri
 

What's hot (20)

Metro Cluster High Availability or SRM Disaster Recovery?
Metro Cluster High Availability or SRM Disaster Recovery?Metro Cluster High Availability or SRM Disaster Recovery?
Metro Cluster High Availability or SRM Disaster Recovery?
 
Spectrum Scale Best Practices by Olaf Weiser
Spectrum Scale Best Practices by Olaf WeiserSpectrum Scale Best Practices by Olaf Weiser
Spectrum Scale Best Practices by Olaf Weiser
 
Xen Hypervisor
Xen HypervisorXen Hypervisor
Xen Hypervisor
 
Overview of Distributed Virtual Router (DVR) in Openstack/Neutron
Overview of Distributed Virtual Router (DVR) in Openstack/NeutronOverview of Distributed Virtual Router (DVR) in Openstack/Neutron
Overview of Distributed Virtual Router (DVR) in Openstack/Neutron
 
VMworld 2017 - Top 10 things to know about vSAN
VMworld 2017 - Top 10 things to know about vSANVMworld 2017 - Top 10 things to know about vSAN
VMworld 2017 - Top 10 things to know about vSAN
 
Five common customer use cases for Virtual SAN - VMworld US / 2015
Five common customer use cases for Virtual SAN - VMworld US / 2015Five common customer use cases for Virtual SAN - VMworld US / 2015
Five common customer use cases for Virtual SAN - VMworld US / 2015
 
OpenStack Neutron IPv6 Lessons
OpenStack Neutron IPv6 LessonsOpenStack Neutron IPv6 Lessons
OpenStack Neutron IPv6 Lessons
 
VMware HA deep Dive
VMware HA deep DiveVMware HA deep Dive
VMware HA deep Dive
 
Domain Name System (DNS)
Domain Name System (DNS)Domain Name System (DNS)
Domain Name System (DNS)
 
Chapter Two.pptx
Chapter Two.pptxChapter Two.pptx
Chapter Two.pptx
 
Knox Manage Sales Deck
Knox Manage Sales DeckKnox Manage Sales Deck
Knox Manage Sales Deck
 
PCF-VxRail-ReferenceArchiteture
PCF-VxRail-ReferenceArchiteturePCF-VxRail-ReferenceArchiteture
PCF-VxRail-ReferenceArchiteture
 
A day in the life of a VSAN I/O - STO7875
A day in the life of a VSAN I/O - STO7875A day in the life of a VSAN I/O - STO7875
A day in the life of a VSAN I/O - STO7875
 
Using the KVMhypervisor in CloudStack
Using the KVMhypervisor in CloudStackUsing the KVMhypervisor in CloudStack
Using the KVMhypervisor in CloudStack
 
Active Directory
Active Directory Active Directory
Active Directory
 
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesDeep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
 
Control plane
Control planeControl plane
Control plane
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Storage Management using LVM
Storage Management using LVMStorage Management using LVM
Storage Management using LVM
 
Linux admin interview questions
Linux admin interview questionsLinux admin interview questions
Linux admin interview questions
 

Similar to Xen and the art of virtualization

Xen Hypervisor.pptx
Xen Hypervisor.pptxXen Hypervisor.pptx
Xen Hypervisor.pptxRiyaBatool
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Scale17x: Thinking outside of the conceived tech comfort zone
Scale17x: Thinking outside of the conceived tech comfort zoneScale17x: Thinking outside of the conceived tech comfort zone
Scale17x: Thinking outside of the conceived tech comfort zoneThe Linux Foundation
 
Data Analytics Using Container Persistence Through SMACK - Manny Rodriguez-Pe...
Data Analytics Using Container Persistence Through SMACK - Manny Rodriguez-Pe...Data Analytics Using Container Persistence Through SMACK - Manny Rodriguez-Pe...
Data Analytics Using Container Persistence Through SMACK - Manny Rodriguez-Pe...{code} by Dell EMC
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using EucalyptusAbhishek Dey
 
Presentation citrix desktop virtualization
Presentation   citrix desktop virtualizationPresentation   citrix desktop virtualization
Presentation citrix desktop virtualizationxKinAnx
 
Kernel Recipes 2014 - Xen as a foundation for cloud infrastructure
Kernel Recipes 2014 - Xen as a foundation for cloud infrastructureKernel Recipes 2014 - Xen as a foundation for cloud infrastructure
Kernel Recipes 2014 - Xen as a foundation for cloud infrastructureAnne Nicolas
 
Virtualization
VirtualizationVirtualization
VirtualizationBirju Tank
 
Xen & the Art of Virtualization
Xen & the Art of VirtualizationXen & the Art of Virtualization
Xen & the Art of VirtualizationTareque Hossain
 
Cloud Computing Hypervisors and Comparison Xen KVM
Cloud Computing Hypervisors and Comparison Xen KVM Cloud Computing Hypervisors and Comparison Xen KVM
Cloud Computing Hypervisors and Comparison Xen KVM cloudresearcher
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology Ravindra Dastikop
 
Citrix XenApp and XenDesktop 7.X
Citrix XenApp and XenDesktop 7.XCitrix XenApp and XenDesktop 7.X
Citrix XenApp and XenDesktop 7.XIzaak Salman
 
Adhila_CV_DevOps_Linux_Profile
Adhila_CV_DevOps_Linux_ProfileAdhila_CV_DevOps_Linux_Profile
Adhila_CV_DevOps_Linux_ProfileAdhila Ansari
 
Virtulization
VirtulizationVirtulization
VirtulizationAntu Sabu
 

Similar to Xen and the art of virtualization (20)

Xen Hypervisor.pptx
Xen Hypervisor.pptxXen Hypervisor.pptx
Xen Hypervisor.pptx
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A Xen Case Study
A Xen Case StudyA Xen Case Study
A Xen Case Study
 
Scale17x: Thinking outside of the conceived tech comfort zone
Scale17x: Thinking outside of the conceived tech comfort zoneScale17x: Thinking outside of the conceived tech comfort zone
Scale17x: Thinking outside of the conceived tech comfort zone
 
Data Analytics Using Container Persistence Through SMACK - Manny Rodriguez-Pe...
Data Analytics Using Container Persistence Through SMACK - Manny Rodriguez-Pe...Data Analytics Using Container Persistence Through SMACK - Manny Rodriguez-Pe...
Data Analytics Using Container Persistence Through SMACK - Manny Rodriguez-Pe...
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using Eucalyptus
 
Presentation citrix desktop virtualization
Presentation   citrix desktop virtualizationPresentation   citrix desktop virtualization
Presentation citrix desktop virtualization
 
Kernel Recipes 2014 - Xen as a foundation for cloud infrastructure
Kernel Recipes 2014 - Xen as a foundation for cloud infrastructureKernel Recipes 2014 - Xen as a foundation for cloud infrastructure
Kernel Recipes 2014 - Xen as a foundation for cloud infrastructure
 
Prasant chettri resume
Prasant chettri resumePrasant chettri resume
Prasant chettri resume
 
Unit 2
Unit 2Unit 2
Unit 2
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Xen
XenXen
Xen
 
En
EnEn
En
 
Xen & the Art of Virtualization
Xen & the Art of VirtualizationXen & the Art of Virtualization
Xen & the Art of Virtualization
 
Cloud Computing Hypervisors and Comparison Xen KVM
Cloud Computing Hypervisors and Comparison Xen KVM Cloud Computing Hypervisors and Comparison Xen KVM
Cloud Computing Hypervisors and Comparison Xen KVM
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
 
Citrix XenApp and XenDesktop 7.X
Citrix XenApp and XenDesktop 7.XCitrix XenApp and XenDesktop 7.X
Citrix XenApp and XenDesktop 7.X
 
Xen revisited
Xen revisitedXen revisited
Xen revisited
 
Adhila_CV_DevOps_Linux_Profile
Adhila_CV_DevOps_Linux_ProfileAdhila_CV_DevOps_Linux_Profile
Adhila_CV_DevOps_Linux_Profile
 
Virtulization
VirtulizationVirtulization
Virtulization
 

Recently uploaded

100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...shivangimorya083
 
Zuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxZuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxolyaivanovalion
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Researchmichael115558
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 

Recently uploaded (20)

100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Zuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxZuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptx
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 

Xen and the art of virtualization

  • 1. 1 Xen and the Art of Virtualization Abdul Majeed, Ph.D. Department of Information and Electronics Engineering, Korea Aerospace University, South Korea. Big Data Computing & Applications 12/27/2018
  • 2. 2 Presentation Contents Motivation Abstract Introduction Detailed Design of Xen Evaluation Related Work Discussions Conclusion Future Work XEN: Approach & Overview 12/27/2018 2
  • 3. 3 Motivation Conventional Way Xen Virtualization Why is xen so popular? Increased server utilization Reduced IT TCO(Total cost of ownership) Improved IT agility 12/27/2018 3
  • 4. 4 Abstract  Many systems have been designed which use virtualization to subdivide the resources of computer. Problems  Some systems require specialized hardware.  Some systems cannot support different operating systems (Linux, BSD, windows).  Some systems require 100% binary compatibility but hurt performance.  Some systems sacrifice security or functionality for speed.  Some systems are vulnerable to denial of service(DOS) attacks. This paper presents Xen, an x86 virtual machine monitor(VMM) called as hyperviswer which allows multiple operating systems to share hardware in a safe and resource managed fashion without sacrificing either security or functionality.  Idealized virtual machine abstraction to which different operating systems can be easily ported.  Targeted hosting up to 100 virtual machines. 12/27/2018 4
  • 5. 5 • Modern computers are sufficiently powerful. • Modern Computers use virtualization to give illusion of many smaller virtual machines. • This has lead to an innovation in VM technology. • In virtualization a single machine is partitioned to support the concurrent execution of multiple operating systems. • Virtualization introduces various challenges o Virtual machines isolation (e.g., operating of one machine should not affect any other machine). o Variety of operating systems (e.g., Linux, Unix, Windows etc.). o Performance overhead (It should be minimum). Introduction 12/27/2018 5
  • 6. 6 Introduction Several Problems  Administration will become very time consuming task.  Performance isolation  Scheduling priority  Memory demand  Network traffic  Disk accesses Simplest way to build system 12/27/2018 6
  • 7. 7 • Xen a virtual machine monitor enable server consolidation, co-located hosting, distributed web services, secure application platforms and application mobility. • Xen can host different operating systems with small modifications. • Xen enable users to dynamically start an operating system and execute whatever they want. • Xen provides performance isolation and manage hardware resources efficiently between different guest operating systems. • Xen uses paravirtualization rather than full virtualization. • Xen efficiently handle the trade-off of performance and functionality. Introduction 12/27/2018 7
  • 8. 8 XEN APPROACH & OVERVIEW 1 12/27/2018 8
  • 9. 9 Xen approach & Overview Example: VMware Example: Xen, Denali etc. 12/27/2018 9
  • 10. 10 • In full virtualization, the virtual machine hardware used is functionally identical to the underlying machine. • Full virtualization is beneficial but it has certain drawbacks, -> Support of full virtualization is not part of x86 architecture. -> Executing certain instructions with privileges fails badly. -> Efficient virtualization of x86 MMU is also difficult. • Xen resolves the above mentioned limitation of the full virtualization by introducing paravirtualization, which improves performance. • Although it requires some modification in the guest operating system but the changes are not been made in the guest applications. Xen approach & Overview 12/27/2018 10
  • 11. 11 Xen discussion based on mainly following design principles.  Performance isolation between guests (resource control for some guarantee of QoS).  Minimal performance overheads.  Support for different Operating Systems.  Maintain Guest OS ABI (thus allowing existing applications to run unmodified).  Need to support full multi-application operating systems. Xen approach & Overview Xen’s set of Design Principles/Goals 12/27/2018 11
  • 12. 12 Xen approach & Overview Sr.# Denali Project Xen (Hypervisor) 1. Denali is designed to support thousands of virtual machines. Xen is intended to scale to approximately 100 virtual machines. 2. Denali does not target existing ABIs. Xen target existing ABIs. 3. Denali Does not support application multiplexing, nor multiple address spaces. In xen single virtual machine host a real operating system and its multiplexed with thousands of user level processes. 4. VMM perform all paging to and from the disk. Each guest operating perform its own paging. 5. Denali virtualizes the namespace of all virtual machines that may result in malicious resource access. Secure access control within the hypervisor is sufficient to ensure protection across all machines. Comparison & Contrast between Xen and Denali 12/27/2018 12
  • 13. 13 Xen approach & Overview The Virtual Machine Interface 12/27/2018 13
  • 14. 14 The Cost of Porting an OS to Xen Xen approach & Overview 12/27/2018 14
  • 15. 15 Xen approach & Overview Xen System Structure 12/27/2018 15
  • 16. 16 • Xen design and implementation goal was to separate policy from mechanism. • Even though the hypervisor is involved in how CPU shared among domain, filtering network packets, enforcing access control mechanism, or how CPU will be shared, what type of packets will be transmitted. • Xen provides basic control operations only. • Domain0 is responsible for hosting the application level management software. • Control interface support creation and deletion of network interfaces. • Most importunately Domain0 facilitate the management of entire server. Xen approach & Overview Control and Management 12/27/2018 16
  • 18. 18 Xen Detailed Design Control Transfer: Hyper calls and events Domains Synchronous-calls Xen Hyper call() Events() Asynchronous-Events The use of a hyper call is to request a set of page table updates, in which Xen validates and applies a list of updates, returning control to the calling domain when this is completed. This is analogous to the use of system calls in conventional operating system. Communication from Xen to a domain is provided through an asynchronous event mechanism. For instance, events are used to indicate that new data has been received over the network, or that a virtual disk request has completed. Major Functionalities Major Functionalities 12/27/2018 18
  • 19. 19 Xen Detailed Design Data transfer: I/O Rings  No direct protection between guest operating system and I/O devices.  Data transfer mechanism is crucial for little overheads.  Two main factors, • Resource management • Event notifications 12/27/2018 19
  • 20. 20 Xen Detailed Design Subsystem virtualization CPU Scheduling Time & Timers Virtual Address Translation - Domain scheduling based on Borrowed Virtual Time (BVT) scheduling algorithm. -Work-conserving -Low-latency wake-up - Per-domain scheduling parameters can be adjusted by management software running in Domain0. - Xen provides guest OSes with notions of real time. - Expressed in nanoseconds -Maintained till end. - Each guest OS can program a pair of alarm timers, one for real time and the other for virtual time. -Xen attempts to virtualize memory access with as little overhead as possible. -The type system is also used to track which frames have already been validated for use in page tables. -To ensure safety, requests are validated by xen before being applied. CPU Scheduling Time & Timers Virtual Address Translation 12/27/2018 20
  • 21. 21 Xen Detailed Design - Statically partitioned between domains. - A maximum allowable reservation may also be specified. - Guest operating systems can claim additional memory pages from Xen. - Guest can release unused memory to xen. - Xen provides the abstraction of a virtual firewall-router. - Domain0 is responsible for inserting and removing rules about network. - Rules will be installed to prevent IP source address spoofing. - Xen ensure safety during data transmission. - Only Domain0 has direct unchecked access to physical disks. - All other domains access persistent storage through the abstraction of virtual block devices. - Xen has more complete knowledge of the actual disks. - Future work will investigate providing more predictable isolation and differentiated service. Physical Memory Network Disks Subsystem virtualization 12/27/2018 21
  • 23. 23 Xen evaluation based on following five criteria Evaluation Xen’s Evaluation Relative Performance Operating system Benchmark Concurrent virtual Machines Performance isolation Scalability 1 2 3 4 5 12/27/2018 23
  • 26. 26 Evaluation 3.3 Concurrent virtual Machines 12/27/2018 26
  • 27. 27 • At the current time no implementation based on Linux 2.4 available. • Xen performance isolation works as expected even in the presence of malicious workload. • We ran four domains configured with equal resources.  Domain 1: PostgreSQL/OSDB-IR & SPEC WEB99.  Domain 2: PostgreSQL/OSDB-IR & SPEC WEB99.  Domain 3: A disk bandwidth hog (sustained dd ) with a file system intensive workload.  Domain 4: ‘fork bomb’ at the same time as a virtual memory intensive application. • Xen achieves 4% and 2% below the results reported across all domains. • VMware Workstation achieves similar levels of isolation, but at reduced levels of absolute performance. Evaluation 3.4 Performance isolation 12/27/2018 27
  • 30. 30 • Virtualization has been applied to operating systems both research and commercially for nearly 30 years. • BM VM/370 first made use of virtualization to allow binary support for legacy code. • VMware and Connectix both virtualize commodity PC hardware, allowing multiple operating systems to run on a single host. Both use full virtualization. • Two competitors IBM Para virtualized version of Linux and Denali are capable of hosting vast number of virtualized operating system instances. • Two other efforts to use low level virtualization for building a distributed infrastructure are ‘vMatrixs’ and IBM ‘Managed Hosting’. • Resource-managed JVM can host untrusted applications, these necessary applications must be compiled to java bytecode and follow the system security model. • Language level virtual machines approaches are needed and xen readily support language level virtual machines. Related Work 12/27/2018 30
  • 32. 32 • We have presented the Xen hypervisor which partitions the resources of a computer between different domains each running guest operating systems. • The Para-virtualizing design of Xen places a particular emphasis on performance and resource management. • We have also described and evaluated XenoLinux, a fully-featured port of a Linux 2.4 kernel that runs over Xen. Discussions Summary of the paper (three key-points of the paper) 12/27/2018 32
  • 33. 33 • Xen provides an excellent platform for deploying a wide variety of network-centric services,  Local mirroring of dynamic web contents  Media stream transcoding and distribution  Multiplayer game  Virtual reality servers  Smart proxies • Allowing 100 operating system to run on a single server reduced the cost by two orders of magnitude. • Each operating system can be easily ported in Xen with in smaller timescale. • High performance, Strong isolation and Effective scaling • The performance of XenoLinux(a guest operating system) over Xen is practically equivalent to the performance of the baseline Linux system. • Our ongoing work to port the BSD and Windows XP kernels to operate over Xen is confirming the generality of the interface that Xen exposes. Conclusion 12/27/2018 33
  • 34. 34 • Up to now, We believe that Xen and XenoLinux are sufficiently complete to be useful to a wider audience. • Further improvements which are part of our research will be added to it. I. Controlled data sharing to our design without sacrificing isolation. II. To provide better physical memory performance, we plan to implement a last-chance page cache (LPC). III. Internet-scale computing infrastructure beyond individual machines. IV. Auditing and forensic logging for better administration and management. V. We are continuing our work on XenoXP . Future Work 12/27/2018 34
  • 35. 3512/27/2018 35 Email Address: abdulmajid09398@kau.kr & abdulmajid09398@gmail.com Any Query Regarding Contents