SlideShare a Scribd company logo
1 of 55
Chapter 5 – Cloud Resource
Virtualization
Contents
ult isolation.
Cloud Computing: Theory and Practice. Chapter 5 2 Dan C.
Marinescu
Motivation
abstractions necessary to describe the operation of a computing
systems.
simplifies the
management of physical resources for the three abstractions.
machine
monitor (VMM) can de saved and migrated to another server to
balance the load.
are
familiar with, rather than forcing them to idiosyncratic ones.
Cloud Computing: Theory and Practice.
Chapter 5 3 Dan C. Marinescu
Motivation (cont’d)
the same hardware.
o
migrate
from one platform to another.
provider.
Cloud Computing: Theory and Practice.
Chapter 5 4 Dan C. Marinescu
Virtualization
ace to a physical object by:
instance
of a physical object. Example - a processor is multiplexed
among a number of processes or threads.
tiple
physical
objects. Example - a number of physical disks are aggregated
into a RAID disk.
of a
physical object. Example - a physical disk emulates a Random
Access Memory (RAM).
- virtual memory with
paging multiplexes real memory and disk; a virtual address
emulates a real address.
Cloud Computing: Theory and Practice.
Chapter 5 5 Dan C. Marinescu
Layering
– a common approach to manage system
complexity.
complex
system.
subsystem is
abstracted through its interfaces with the other subsystems.
are able to design, implement, and modify the individual
subsystems independently.
Cloud Computing: Theory and Practice.
Chapter 5 6 Dan C. Marinescu
Interfaces
– at the boundary between
hardware and software.
– allows the ensemble
consisting
of the application and the library modules to access the
hardware;
the ABI does not include privileged system instructions, instead
it
invokes system calls.
- defines the set of
instructions
the hardware was designed to execute and gives the application
access to the ISA; it includes HLL library calls which often
invoke
system calls.
Cloud Computing: Theory and Practice.
Chapter 5 7 Dan C. Marinescu
Cloud Computing: Theory and Practice.
Chapter 5 8 Dan C. Marinescu
Application Programming Interface, Application Binary
Interface,
and Instruction Set Architecture . An application uses library
functions (A1), makes system calls (A2), and executes machine
instructions (A3).
Hardware
Operating System
ISA
Libraries
ABI
API
System calls
Applications
System ISA User ISA
A1
A2
A3
Code portability
specific
operating systems are not portable.
machine (VM) environment where portable code is produced
and distributed and then converted by binary translators to the
ISA of the host system.
A dynamic binary translation converts blocks of guest
instructions from the portable code to the host instruction and
leads to a significant performance improvement, as such blocks
are cached and reused
Cloud Computing: Theory and Practice.
Chapter 5 9 Dan C. Marinescu
Cloud Computing: Theory and Practice.
Chapter 5 10 Dan C. Marinescu
Compiler front-end
Intermediate
code
HLL code
Compiler
Portable
code
Compiler back-end
Object code
Loader
Memory
image
VM loader
VM compiler/
interpreter
VM image
VM compiler/
interpreter
Memory
image ISA-1
Memory
image ISA-2
Virtual machine monitor (VMM / hypervisor)
virtual
machines (VMs). Allows several operating systems to run
concurrently on a single hardware platform.
o share the same platform.
- the movement of a server from one platform
to
another.
compatibility
with the original system.
Cloud Computing: Theory and Practice.
Chapter 5 11 Dan C. Marinescu
VMM virtualizes the CPU and the memory
enforces the correctness and safety of the operation.
ps interrupts and dispatches them to the individual guest
operating systems.
replicates
any modification made by the guest OS in its own shadow page
table. This shadow page table points to the actual page frame
and it is used by the Memory Management Unit (MMU) for
dynamic address translation.
to
avoid performance degradation. For example, the VMM may
swap out a Virtual Machine to avoid thrashing.
Cloud Computing: Theory and Practice.
Chapter 5 12 Dan C. Marinescu
Virtual machines (VMs)
- isolated environment that appears to be a whole
computer,
but actually only has access to a portion of the computer
resources.
- a virtual platform created for an individual
process
and destroyed once the process terminates.
- supports an operating system together with
many
user processes.
- supports multiple virtual machines and runs
directly on the hardware.
- shares the hardware with a host operating
system and
supports multiple virtual machines.
- runs under a host operating system.
Cloud Computing: Theory and Practice.
Chapter 5 13 Dan C. Marinescu
Traditional, hybrid, and hosted VMs
Cloud Computing: Theory and Practice.
Chapter 5 14 Dan C. Marinescu
VMM
Hardware
A
p
p
li
c
a
ti
o
n
Application
Guest OS
Host OS
A
p
p
li
c
a
ti
o
n
A
p
p
li
c
a
ti
o
n
Hardware
Host OS
Virtual Machine Monitor
VM-1
Application
Guest OS -1
VM-n
Application
Guest OS -n
(c) (d)
Virtual Machine Monitor
Hardware
(b)
Application
VM-n
Guest
OS -n
VM-1
Application
Guest
OS -1
(a)
System VMs
Traditional
VM
Hybrid VM
Hosted VM
Process VMs
Whole
system VM
Codesigned
VM
Dynamic
translators
HLL VMs
Binary
optimizers
Multi
program
Same ISASame ISA Different ISADifferent ISA
Cloud Computing: Theory and Practice.
Chapter 5 15 Dan C. Marinescu
Performance and security isolation
-time behavior of an application is affected by other
applications running concurrently on the same platform and
competing for CPU cycles, cache, main memory, disk and
network
access. Thus, it is difficult to predict the completion time!
- a critical condition for QoS
guarantees in
shared computing environments.
a
traditional operating system. Example - Xen has approximately
60,000 lines of code; Denali has only about half, 30,000.
as the
systems expose a much smaller number of privileged functions.
Cloud Computing: Theory and Practice.
Chapter 5 16 Dan C. Marinescu
Computer architecture and virtualization
essentially identical to that demonstrated when running on an
equivalent machine directly.
resources.
must be
executed without the intervention of the VMM.
- require special precautions at execution time:
- instructions that attempt to change either
the
memory allocation or the privileged mode.
- instructions whose behavior is different in
the
privileged mode.
- not sensitive.
Cloud Computing: Theory and Practice.
Chapter 5 17 Dan C. Marinescu
Full virtualization and paravirtualization
– a guest OS can run unchanged under the
VMM
as if it was running directly on the hardware platform.
- a guest operating system is modified to
use only
instructions that can be virtualized. Reasons for
paravirtualization:
Examples: Xen, Denaly
Cloud Computing: Theory and Practice.
Chapter 5 18 Dan C. Marinescu
Full virtualization and paravirtualization
Cloud Computing: Theory and Practice.
Chapter 5 19 Dan C. Marinescu
Guest OS
Hypervisor
Hardware
abstraction
layer
Hardware
Guest OS
Hypervisor
Hardware
abstraction
layer
Hardware
(a) Full virtualization (b) Paravirtualization
Virtualization of x86 architecture
-privileging - a VMMs forces the operating system
and the
applications to run at a privilege level greater than 0.
- a guest OS is forced to run at a privilege level
other
than that it was originally designed for.
- a VMM uses parts of the guest
address space to store several system data structures.
-faulting access to privileged state - several store
instructions
can only be executed at privileged level 0 because they operate
on
data structures that control the CPU operation. They fail silently
when executed at a privilege level other than 0.
rivilege
level 0
must be emulated by the VMM.
- in response to a physical interrupt,
the VMM
generates a ``virtual interrupt'' and delivers it later to the target
guest
OS which can mask interrupts.
Cloud Computing: Theory and Practice.
Chapter 5 20 Dan C. Marinescu
Virtualization of x86 architecture (cont’d)
- elements of the system state, e.g.,
descriptor caches for segment registers, are hidden; there is no
mechanism for saving and restoring the hidden components
when
there is a context switch from one VM to another.
- paging and segmentation protect VMM
code
from being overwritten by guest OS and applications. Systems
running in 64-bit mode can only use paging, but paging does not
distinguish between privilege levels 0, 1, and 2, thus the guest
OS
must run at privilege level 3, the so called (0/3/3) mode.
Privilege
levels 1 and 2 cannot be used thus, the name ring compression.
-priority register is frequently used by a guest OS;
the
VMM must protect the access to this register and trap all
attempts
to access it. This can cause a significant performance
degradation.
Cloud Computing: Theory and Practice.
Chapter 5 21 Dan C. Marinescu
VT-x, a major architectural enhancement
- for VMM operations.
-root - support a VM.
-state
and
guest-state areas.
try - the processor state is loaded from the guest-state
of the VM
scheduled to run; then the control is transferred from VMM to
the VM.
- saves the processor state in the guest-state area of
the
running VM; then it loads the processor state from the host-
state area,
finally transfers control to the VMM.
Cloud Computing: Theory and Practice.
Chapter 5 22 Dan C. Marinescu
VT- x
Cloud Computing: Theory and Practice.
Chapter 5 23 Dan C. Marinescu
VMX root VMX non-root
VM entry
VM exit
Virtual-machine control structure
(a) (b)
host-state
guest-state
VT-d, a new virtualization architecture
peripheral devices.
-d supports:
translation for device DMA
transfers.
routing.
administrator to a VM in any configurations.
ts and records DMA and interrupt
errors that my otherwise corrupt memory and impact VM
isolation.
Cloud Computing: Theory and Practice.
Chapter 5 24 Dan C. Marinescu
Xen - a VMM based on paravirtualization
- design a VMM capable of
scaling
to about 100 VMs running standard applications and services
without any modifications to the Application Binary Interface
(ABI).
operate
as paravirtualized Xen guest OS running on x86, x86-64,
Itanium,
and ARM architectures.
- ensemble of address spaces hosting a guest OS
and
applications running under the guest OS. Runs on a virtual
CPU.
- dedicated to execution of Xen control functions and
privileged
instructions.
- a user domain.
by Xen; privileged instructions issued by a guest OS are
paravirtualized and must be validated by Xen.
Cloud Computing: Theory and Practice.
Chapter 5 25 Dan C. Marinescu
Xen
Cloud Computing: Theory and Practice.
Chapter 5 26 Dan C. Marinescu
X86 hardware
Domain0 control
interface
Virtual x86
CPU
Virtual physical
memory
Virtual network
Virtual block
devices
Xen
Management
OS
Xen-aware
device drivers
Application Application Application
Guest OS
Xen-aware
device drivers
Guest OS
Xen-aware
device drivers
Xen-aware
device drivers
Guest OS
Xen-aware
device drivers
Xen implementation on x86 architecture
applications at Level 3.
TLB
entries or the software management of the TLB. Thus, address
space switching, when the VMM activates a different OS,
requires a
complete TLB flush; this has a negative impact on the
performance.
Solution
- load Xen in a 64 MB segment at the top of each address
space and delegate the management of hardware page tables to
the guest OS with minimal intervention from Xen. This region
is not
accessible or re-mappable by the guest OS.
Time
(BVT) scheduling algorithm.
Xen a description table with
the
addresses of exception handlers for validation.
Cloud Computing: Theory and Practice.
Chapter 5 27 Dan C. Marinescu
Dom0 components
– a Dom0 process.
-wide registry and naming service.
-value storage.
storage
they have subscribed to.
Dom0
privileges.
- responsible for creating, destroying, and
managing the
resources and privileges of VMs.
describing
memory and CPU allocations and device configurations.
ites this information in
XenStore.
load a
kernel and virtual BIOS and to set up initial communication
channels
with XenStore and with the virtual console when a new VM is
created.
Cloud Computing: Theory and Practice.
Chapter 5 28 Dan C. Marinescu
Strategies for virtual memory management, CPU multiplexing,
and
I/O devices
Cloud Computing: Theory and Practice.
Chapter 5 29 Dan C. Marinescu
Xen abstractions for networking and I/O
(VIFs)
which support the functionality of a network interface card. A
VIF is
attached to a Virtual Firewall-Router (VFR).
-end in the DomU and the back-end
in
Dom0; the two communicate via a ring in shared memory.
- a circular queue of descriptors allocated by a domain
and
accessible within Xen. Descriptors do not contain data, the data
buffers are allocated off-band by the guest OS.
one for
packet receiving, are supported.
pies only the packet header, not the payload, and
Cloud Computing: Theory and Practice.
Chapter 5 30 Dan C. Marinescu
Xen zero-copy semantics for data transfer using I/O rings. (a)
The communication
between a guest domain and the driver domain over an I/O and
an event channel;
NIC is the Network Interface Controller. (b) the circular ring of
buffers.
Cloud Computing: Theory and Practice.
Chapter 5 31 Dan C. Marinescu
Consumer Request
(private pointer in Xen)
Producer Request
(shared pointer updated
by the guest OS)
Producer Response
(shared pointer updated
by Xen)
Consumer Response
(private pointer maintained by
the guest OS)Response queue
Request queue
Unused
descriptors
Outstanding
descriptors
Bridge
Driver domain Guest domain
Backend
Frontend
XEN
Network
interface
NIC
(a)
(b)
I/O channel
Event channel
Xen 2.0
- takes advantage of the capabilities of some
physical NICs, such as checksum offload.
- rather than copying a data buffer holding a
packet,
each packet is allocated in a new page and then the physical
page containing the packet is re-mapped into the target domain.
- takes advantage of the superpage and global
page mapping hardware on Pentium and Pentium Pro
processors. A superpage entry covers 1,024 pages of physical
memory and the address translation mechanism maps a set of
contiguous pages to a set of contiguous physical pages. This
helps reduce the number of TLB misses.
Cloud Computing: Theory and Practice.
Chapter 5 32 Dan C. Marinescu
Xen network architecture .(a) The original architecture;
(b) The optimized architecture
Cloud Computing: Theory and Practice.
Chapter 5 33 Dan C. Marinescu
Driver domain Guest domain
Virtual
Interface
Backend
Interface
NIC
Driver
Physical
NIC
Xen VMM
Bridge
(a)
Driver domain Guest domain
High Level
Virtual
Interface
Backend
Interface
NIC
Driver
Physical
NIC
Xen VMM
(b)
I/O
channel
I/O
channel
Offload
Driver
Bridge
A comparison of send and receive data rates for a native Linux
system, the Xen
driver domain, an original Xen guest domain, and an optimized
Xen guest domain.
Cloud Computing: Theory and Practice.
Chapter 5 34 Dan C. Marinescu
Performance comparison of virtual machines
standard
operating system, a plain vanilla Linux.
ow the performance scales up with the load?
individual
servers?
er
than that of
OpenVZ and that this is due primarily to L2-cache misses.
also
noticeable for Xen.
server is
not an optimal solution.
Cloud Computing: Theory and Practice.
Chapter 5 35 Dan C. Marinescu
The setup for the performance comparison of a native Linux
system with OpenVZ, and
the Xen systems. The applications are a web server and a
MySQL database server. (a)
The first experiment, the web and the DB, share a single
system; (b) The second
experiment, the web and the DB, run on two different systems;
(c) The third experiment,
the web and the DB, run on two different systems and each has
four instances.
Cloud Computing: Theory and Practice.
Chapter 5 36 Dan C. Marinescu
Web
server
Web
server
Web
server
Web
server
MySQL
server
MySQL
server
MySQL
server
MySQL
server
Web
server
MySQL
server
Web
server
MySQL
server
Web
server
MySQL
server
Web
server
MySQL
server
Web
server
MySQL
server
Web
server
Web
server
Web
server
Web
server
MySQL
server
MySQL
server
MySQL
server
MySQL
server
Web
server
Web
server
Web
server
Web
server
MySQL
server
MySQL
server
MySQL
server
MySQL
server
Web
server
MySQL
server
Xen
Xen
Xen
Linux
Linux
Linux
OpenVZ
OpenVZ
OpenVZ
(a)
(b)
(c)
The darker side of virtualization
be
disabled by malware running at a layer below it.
-Machine
Based Rootkit
(VMBR) between the physical hardware and an operating
system.
- malware with a privileged access to a system.
enable a separate malicious OS to run
surreptitiously and make this malicious OS invisible to the
guest OS
and to the application running under it.
e state of the target system.
-of-
service
attacks.
Cloud Computing: Theory and Practice.
Chapter 5 37 Dan C. Marinescu
The insertion of a Virtual-Machine Based Rootkit (VMBR) as
the lowest
layer of the software stack running on the physical hardware;
(a) below an
operating system; (b) below a legitimate virtual machine
monitor. The
VMBR enables a malicious OS to run surreptitiously and makes
it invisible
to the genuine or the guest OS and to the application.
Cloud Computing: Theory and Practice.
Chapter 5 38 Dan C. Marinescu
Hardware
Virtual machine based rootkit
Operating
system (OS)
Application
Hardware
Virtual machine monitor
Guest OS
Application
Virtual machine based rootkit
(a) (b)
Malicious
OS
Malicious
OS
The features of the SFI for the Native Client on the x86-32,
x86-64 , and ARM.
Cloud Computing: Theory and Practice.
Chapter 5 39 Dan C. Marinescu
Chapter 5 – Cloud Resource                        Virtua.docx

More Related Content

Similar to Chapter 5 – Cloud Resource Virtua.docx

Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud ComputingRishikese MR
 
Performance management in the virtual data center
Performance management in the virtual data centerPerformance management in the virtual data center
Performance management in the virtual data centerMark Friedman
 
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18The lies we tell our code, LinuxCon/CloudOpen 2015-08-18
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18Casey Bisson
 
Vmm concepts
Vmm conceptsVmm concepts
Vmm conceptsLibin M
 
Hardware Support for Efficient VirtualizationJohn Fisher-O
Hardware Support for Efficient VirtualizationJohn Fisher-OHardware Support for Efficient VirtualizationJohn Fisher-O
Hardware Support for Efficient VirtualizationJohn Fisher-Osimisterchristen
 
cloud basics.
cloud basics.cloud basics.
cloud basics.Mercy joy
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containersSelvaraj Kesavan
 
CH14-Virtual Machines.pptx
CH14-Virtual Machines.pptxCH14-Virtual Machines.pptx
CH14-Virtual Machines.pptxAmirZaman21
 
More on Virtualization.ppt
More on Virtualization.pptMore on Virtualization.ppt
More on Virtualization.pptshruti533256
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 
Disco: Running Commodity Operating Systems on Scalable Multiprocessors Disco
Disco: Running Commodity Operating Systems on Scalable Multiprocessors DiscoDisco: Running Commodity Operating Systems on Scalable Multiprocessors Disco
Disco: Running Commodity Operating Systems on Scalable Multiprocessors DiscoMagnus Backman
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server VirtualisationAlan McSweeney
 
The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)Casey Bisson
 
Virtual Pc Seminar
Virtual Pc SeminarVirtual Pc Seminar
Virtual Pc Seminarguest5b5549
 
A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2Krishna Kumar Singh
 
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...Editor IJCATR
 

Similar to Chapter 5 – Cloud Resource Virtua.docx (20)

Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
Ss(virtual machine)
Ss(virtual machine)Ss(virtual machine)
Ss(virtual machine)
 
Performance management in the virtual data center
Performance management in the virtual data centerPerformance management in the virtual data center
Performance management in the virtual data center
 
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18The lies we tell our code, LinuxCon/CloudOpen 2015-08-18
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18
 
Vmm concepts
Vmm conceptsVmm concepts
Vmm concepts
 
Vmm concepts
Vmm conceptsVmm concepts
Vmm concepts
 
Usenix Invited Talk
Usenix Invited TalkUsenix Invited Talk
Usenix Invited Talk
 
Hardware Support for Efficient VirtualizationJohn Fisher-O
Hardware Support for Efficient VirtualizationJohn Fisher-OHardware Support for Efficient VirtualizationJohn Fisher-O
Hardware Support for Efficient VirtualizationJohn Fisher-O
 
cloud basics.
cloud basics.cloud basics.
cloud basics.
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
 
CH14-Virtual Machines.pptx
CH14-Virtual Machines.pptxCH14-Virtual Machines.pptx
CH14-Virtual Machines.pptx
 
More on Virtualization.ppt
More on Virtualization.pptMore on Virtualization.ppt
More on Virtualization.ppt
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Disco: Running Commodity Operating Systems on Scalable Multiprocessors Disco
Disco: Running Commodity Operating Systems on Scalable Multiprocessors DiscoDisco: Running Commodity Operating Systems on Scalable Multiprocessors Disco
Disco: Running Commodity Operating Systems on Scalable Multiprocessors Disco
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
 
The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)
 
Virtual Pc Seminar
Virtual Pc SeminarVirtual Pc Seminar
Virtual Pc Seminar
 
A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2
 
Virtualization
VirtualizationVirtualization
Virtualization
 
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
 

More from gertrudebellgrove

-I am unable to accept emailed exams or late exams. No exception.docx
-I am unable to accept emailed exams or late exams. No exception.docx-I am unable to accept emailed exams or late exams. No exception.docx
-I am unable to accept emailed exams or late exams. No exception.docxgertrudebellgrove
 
-delineate characteristics, prevalence of  exceptionality-evalua.docx
-delineate characteristics, prevalence of  exceptionality-evalua.docx-delineate characteristics, prevalence of  exceptionality-evalua.docx
-delineate characteristics, prevalence of  exceptionality-evalua.docxgertrudebellgrove
 
-1st play name is READY STEADY YETI GO-2nd play name is INTO .docx
-1st play name is READY STEADY YETI GO-2nd play name is INTO .docx-1st play name is READY STEADY YETI GO-2nd play name is INTO .docx
-1st play name is READY STEADY YETI GO-2nd play name is INTO .docxgertrudebellgrove
 
-6th-Edition-Template-without-Abstract.dotWhat are Heuristics .docx
-6th-Edition-Template-without-Abstract.dotWhat are Heuristics .docx-6th-Edition-Template-without-Abstract.dotWhat are Heuristics .docx
-6th-Edition-Template-without-Abstract.dotWhat are Heuristics .docxgertrudebellgrove
 
- write one 5-7 page paper about All forms of Euthanasia are moral..docx
- write one 5-7 page paper about All forms of Euthanasia are moral..docx- write one 5-7 page paper about All forms of Euthanasia are moral..docx
- write one 5-7 page paper about All forms of Euthanasia are moral..docxgertrudebellgrove
 
-1st Play name is BERNHARDTHAMLET -2nd Play name is READY ST.docx
-1st Play name is BERNHARDTHAMLET -2nd Play name is READY ST.docx-1st Play name is BERNHARDTHAMLET -2nd Play name is READY ST.docx
-1st Play name is BERNHARDTHAMLET -2nd Play name is READY ST.docxgertrudebellgrove
 
. 1. Rutter and Sroufe identified _____________ as one of three impo.docx
. 1. Rutter and Sroufe identified _____________ as one of three impo.docx. 1. Rutter and Sroufe identified _____________ as one of three impo.docx
. 1. Rutter and Sroufe identified _____________ as one of three impo.docxgertrudebellgrove
 
-Prior to the Civil War, how did the (dominant) discourse over the U.docx
-Prior to the Civil War, how did the (dominant) discourse over the U.docx-Prior to the Civil War, how did the (dominant) discourse over the U.docx
-Prior to the Civil War, how did the (dominant) discourse over the U.docxgertrudebellgrove
 
- Using the definition Awareness of sensation and perception to ex.docx
- Using the definition Awareness of sensation and perception to ex.docx- Using the definition Awareness of sensation and perception to ex.docx
- Using the definition Awareness of sensation and perception to ex.docxgertrudebellgrove
 
- should include an introduction to the environmental issue and its .docx
- should include an introduction to the environmental issue and its .docx- should include an introduction to the environmental issue and its .docx
- should include an introduction to the environmental issue and its .docxgertrudebellgrove
 
- FIRST EXAM SPRING 20201. Describe how the view of operations.docx
- FIRST EXAM SPRING 20201. Describe how the view of operations.docx- FIRST EXAM SPRING 20201. Describe how the view of operations.docx
- FIRST EXAM SPRING 20201. Describe how the view of operations.docxgertrudebellgrove
 
- Considering the concepts, examples and learning from the v.docx
- Considering the concepts, examples and learning from the v.docx- Considering the concepts, examples and learning from the v.docx
- Considering the concepts, examples and learning from the v.docxgertrudebellgrove
 
- Discuss why a computer incident response team (CIRT) plan is neede.docx
- Discuss why a computer incident response team (CIRT) plan is neede.docx- Discuss why a computer incident response team (CIRT) plan is neede.docx
- Discuss why a computer incident response team (CIRT) plan is neede.docxgertrudebellgrove
 
- Discuss why a computer incident response team (CIRT) plan is n.docx
- Discuss why a computer incident response team (CIRT) plan is n.docx- Discuss why a computer incident response team (CIRT) plan is n.docx
- Discuss why a computer incident response team (CIRT) plan is n.docxgertrudebellgrove
 
- 2 -Section CPlease write your essay in the blue book.docx
- 2 -Section CPlease write your essay in the blue book.docx- 2 -Section CPlease write your essay in the blue book.docx
- 2 -Section CPlease write your essay in the blue book.docxgertrudebellgrove
 
- Confidence intervals for a population mean, standard deviation kno.docx
- Confidence intervals for a population mean, standard deviation kno.docx- Confidence intervals for a population mean, standard deviation kno.docx
- Confidence intervals for a population mean, standard deviation kno.docxgertrudebellgrove
 
) Create a new thread. As indicated above, select  two tools describ.docx
) Create a new thread. As indicated above, select  two tools describ.docx) Create a new thread. As indicated above, select  two tools describ.docx
) Create a new thread. As indicated above, select  two tools describ.docxgertrudebellgrove
 
(Write 3 to 4 sentences per question)  1. Describe one way y.docx
(Write 3 to 4 sentences per question)  1. Describe one way y.docx(Write 3 to 4 sentences per question)  1. Describe one way y.docx
(Write 3 to 4 sentences per question)  1. Describe one way y.docxgertrudebellgrove
 
( America and Venezuela) this is a ppt. groups assignment. Below is .docx
( America and Venezuela) this is a ppt. groups assignment. Below is .docx( America and Venezuela) this is a ppt. groups assignment. Below is .docx
( America and Venezuela) this is a ppt. groups assignment. Below is .docxgertrudebellgrove
 
++ 2 PAGES++Topic Make a bill to legalize all felon has the rig.docx
++ 2 PAGES++Topic Make a bill to legalize all felon has the rig.docx++ 2 PAGES++Topic Make a bill to legalize all felon has the rig.docx
++ 2 PAGES++Topic Make a bill to legalize all felon has the rig.docxgertrudebellgrove
 

More from gertrudebellgrove (20)

-I am unable to accept emailed exams or late exams. No exception.docx
-I am unable to accept emailed exams or late exams. No exception.docx-I am unable to accept emailed exams or late exams. No exception.docx
-I am unable to accept emailed exams or late exams. No exception.docx
 
-delineate characteristics, prevalence of  exceptionality-evalua.docx
-delineate characteristics, prevalence of  exceptionality-evalua.docx-delineate characteristics, prevalence of  exceptionality-evalua.docx
-delineate characteristics, prevalence of  exceptionality-evalua.docx
 
-1st play name is READY STEADY YETI GO-2nd play name is INTO .docx
-1st play name is READY STEADY YETI GO-2nd play name is INTO .docx-1st play name is READY STEADY YETI GO-2nd play name is INTO .docx
-1st play name is READY STEADY YETI GO-2nd play name is INTO .docx
 
-6th-Edition-Template-without-Abstract.dotWhat are Heuristics .docx
-6th-Edition-Template-without-Abstract.dotWhat are Heuristics .docx-6th-Edition-Template-without-Abstract.dotWhat are Heuristics .docx
-6th-Edition-Template-without-Abstract.dotWhat are Heuristics .docx
 
- write one 5-7 page paper about All forms of Euthanasia are moral..docx
- write one 5-7 page paper about All forms of Euthanasia are moral..docx- write one 5-7 page paper about All forms of Euthanasia are moral..docx
- write one 5-7 page paper about All forms of Euthanasia are moral..docx
 
-1st Play name is BERNHARDTHAMLET -2nd Play name is READY ST.docx
-1st Play name is BERNHARDTHAMLET -2nd Play name is READY ST.docx-1st Play name is BERNHARDTHAMLET -2nd Play name is READY ST.docx
-1st Play name is BERNHARDTHAMLET -2nd Play name is READY ST.docx
 
. 1. Rutter and Sroufe identified _____________ as one of three impo.docx
. 1. Rutter and Sroufe identified _____________ as one of three impo.docx. 1. Rutter and Sroufe identified _____________ as one of three impo.docx
. 1. Rutter and Sroufe identified _____________ as one of three impo.docx
 
-Prior to the Civil War, how did the (dominant) discourse over the U.docx
-Prior to the Civil War, how did the (dominant) discourse over the U.docx-Prior to the Civil War, how did the (dominant) discourse over the U.docx
-Prior to the Civil War, how did the (dominant) discourse over the U.docx
 
- Using the definition Awareness of sensation and perception to ex.docx
- Using the definition Awareness of sensation and perception to ex.docx- Using the definition Awareness of sensation and perception to ex.docx
- Using the definition Awareness of sensation and perception to ex.docx
 
- should include an introduction to the environmental issue and its .docx
- should include an introduction to the environmental issue and its .docx- should include an introduction to the environmental issue and its .docx
- should include an introduction to the environmental issue and its .docx
 
- FIRST EXAM SPRING 20201. Describe how the view of operations.docx
- FIRST EXAM SPRING 20201. Describe how the view of operations.docx- FIRST EXAM SPRING 20201. Describe how the view of operations.docx
- FIRST EXAM SPRING 20201. Describe how the view of operations.docx
 
- Considering the concepts, examples and learning from the v.docx
- Considering the concepts, examples and learning from the v.docx- Considering the concepts, examples and learning from the v.docx
- Considering the concepts, examples and learning from the v.docx
 
- Discuss why a computer incident response team (CIRT) plan is neede.docx
- Discuss why a computer incident response team (CIRT) plan is neede.docx- Discuss why a computer incident response team (CIRT) plan is neede.docx
- Discuss why a computer incident response team (CIRT) plan is neede.docx
 
- Discuss why a computer incident response team (CIRT) plan is n.docx
- Discuss why a computer incident response team (CIRT) plan is n.docx- Discuss why a computer incident response team (CIRT) plan is n.docx
- Discuss why a computer incident response team (CIRT) plan is n.docx
 
- 2 -Section CPlease write your essay in the blue book.docx
- 2 -Section CPlease write your essay in the blue book.docx- 2 -Section CPlease write your essay in the blue book.docx
- 2 -Section CPlease write your essay in the blue book.docx
 
- Confidence intervals for a population mean, standard deviation kno.docx
- Confidence intervals for a population mean, standard deviation kno.docx- Confidence intervals for a population mean, standard deviation kno.docx
- Confidence intervals for a population mean, standard deviation kno.docx
 
) Create a new thread. As indicated above, select  two tools describ.docx
) Create a new thread. As indicated above, select  two tools describ.docx) Create a new thread. As indicated above, select  two tools describ.docx
) Create a new thread. As indicated above, select  two tools describ.docx
 
(Write 3 to 4 sentences per question)  1. Describe one way y.docx
(Write 3 to 4 sentences per question)  1. Describe one way y.docx(Write 3 to 4 sentences per question)  1. Describe one way y.docx
(Write 3 to 4 sentences per question)  1. Describe one way y.docx
 
( America and Venezuela) this is a ppt. groups assignment. Below is .docx
( America and Venezuela) this is a ppt. groups assignment. Below is .docx( America and Venezuela) this is a ppt. groups assignment. Below is .docx
( America and Venezuela) this is a ppt. groups assignment. Below is .docx
 
++ 2 PAGES++Topic Make a bill to legalize all felon has the rig.docx
++ 2 PAGES++Topic Make a bill to legalize all felon has the rig.docx++ 2 PAGES++Topic Make a bill to legalize all felon has the rig.docx
++ 2 PAGES++Topic Make a bill to legalize all felon has the rig.docx
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

Chapter 5 – Cloud Resource Virtua.docx

  • 1. Chapter 5 – Cloud Resource Virtualization Contents ult isolation.
  • 2. Cloud Computing: Theory and Practice. Chapter 5 2 Dan C. Marinescu Motivation abstractions necessary to describe the operation of a computing systems. simplifies the management of physical resources for the three abstractions. machine monitor (VMM) can de saved and migrated to another server to balance the load. are familiar with, rather than forcing them to idiosyncratic ones.
  • 3. Cloud Computing: Theory and Practice. Chapter 5 3 Dan C. Marinescu Motivation (cont’d) the same hardware. o migrate from one platform to another. provider. Cloud Computing: Theory and Practice. Chapter 5 4 Dan C. Marinescu Virtualization ace to a physical object by:
  • 4. instance of a physical object. Example - a processor is multiplexed among a number of processes or threads. tiple physical objects. Example - a number of physical disks are aggregated into a RAID disk. of a physical object. Example - a physical disk emulates a Random Access Memory (RAM). - virtual memory with paging multiplexes real memory and disk; a virtual address emulates a real address. Cloud Computing: Theory and Practice. Chapter 5 5 Dan C. Marinescu Layering – a common approach to manage system
  • 5. complexity. complex system. subsystem is abstracted through its interfaces with the other subsystems. are able to design, implement, and modify the individual subsystems independently. Cloud Computing: Theory and Practice. Chapter 5 6 Dan C. Marinescu Interfaces
  • 6. – at the boundary between hardware and software. – allows the ensemble consisting of the application and the library modules to access the hardware; the ABI does not include privileged system instructions, instead it invokes system calls. - defines the set of instructions the hardware was designed to execute and gives the application access to the ISA; it includes HLL library calls which often invoke system calls. Cloud Computing: Theory and Practice. Chapter 5 7 Dan C. Marinescu Cloud Computing: Theory and Practice.
  • 7. Chapter 5 8 Dan C. Marinescu Application Programming Interface, Application Binary Interface, and Instruction Set Architecture . An application uses library functions (A1), makes system calls (A2), and executes machine instructions (A3). Hardware Operating System ISA Libraries ABI API System calls Applications System ISA User ISA A1 A2 A3
  • 8. Code portability specific operating systems are not portable. machine (VM) environment where portable code is produced and distributed and then converted by binary translators to the ISA of the host system. A dynamic binary translation converts blocks of guest instructions from the portable code to the host instruction and leads to a significant performance improvement, as such blocks are cached and reused Cloud Computing: Theory and Practice. Chapter 5 9 Dan C. Marinescu Cloud Computing: Theory and Practice. Chapter 5 10 Dan C. Marinescu Compiler front-end
  • 9. Intermediate code HLL code Compiler Portable code Compiler back-end Object code Loader Memory image VM loader VM compiler/ interpreter VM image VM compiler/ interpreter Memory
  • 10. image ISA-1 Memory image ISA-2 Virtual machine monitor (VMM / hypervisor) virtual machines (VMs). Allows several operating systems to run concurrently on a single hardware platform. o share the same platform. - the movement of a server from one platform to another. compatibility with the original system.
  • 11. Cloud Computing: Theory and Practice. Chapter 5 11 Dan C. Marinescu VMM virtualizes the CPU and the memory enforces the correctness and safety of the operation. ps interrupts and dispatches them to the individual guest operating systems. replicates any modification made by the guest OS in its own shadow page table. This shadow page table points to the actual page frame and it is used by the Memory Management Unit (MMU) for dynamic address translation. to avoid performance degradation. For example, the VMM may
  • 12. swap out a Virtual Machine to avoid thrashing. Cloud Computing: Theory and Practice. Chapter 5 12 Dan C. Marinescu Virtual machines (VMs) - isolated environment that appears to be a whole computer, but actually only has access to a portion of the computer resources. - a virtual platform created for an individual process and destroyed once the process terminates. - supports an operating system together with many user processes. - supports multiple virtual machines and runs directly on the hardware. - shares the hardware with a host operating system and supports multiple virtual machines.
  • 13. - runs under a host operating system. Cloud Computing: Theory and Practice. Chapter 5 13 Dan C. Marinescu Traditional, hybrid, and hosted VMs Cloud Computing: Theory and Practice. Chapter 5 14 Dan C. Marinescu VMM Hardware A p p li c a ti o n Application Guest OS
  • 15. Application Guest OS -1 VM-n Application Guest OS -n (c) (d) Virtual Machine Monitor Hardware (b) Application VM-n Guest OS -n VM-1 Application Guest OS -1 (a)
  • 16. System VMs Traditional VM Hybrid VM Hosted VM Process VMs Whole system VM Codesigned VM Dynamic translators HLL VMs Binary optimizers Multi program Same ISASame ISA Different ISADifferent ISA
  • 17. Cloud Computing: Theory and Practice. Chapter 5 15 Dan C. Marinescu Performance and security isolation -time behavior of an application is affected by other applications running concurrently on the same platform and competing for CPU cycles, cache, main memory, disk and network access. Thus, it is difficult to predict the completion time! - a critical condition for QoS guarantees in shared computing environments. a traditional operating system. Example - Xen has approximately 60,000 lines of code; Denali has only about half, 30,000. as the systems expose a much smaller number of privileged functions.
  • 18. Cloud Computing: Theory and Practice. Chapter 5 16 Dan C. Marinescu Computer architecture and virtualization essentially identical to that demonstrated when running on an equivalent machine directly. resources. must be executed without the intervention of the VMM. - require special precautions at execution time: - instructions that attempt to change either the memory allocation or the privileged mode. - instructions whose behavior is different in
  • 19. the privileged mode. - not sensitive. Cloud Computing: Theory and Practice. Chapter 5 17 Dan C. Marinescu Full virtualization and paravirtualization – a guest OS can run unchanged under the VMM as if it was running directly on the hardware platform. - a guest operating system is modified to use only instructions that can be virtualized. Reasons for paravirtualization:
  • 20. Examples: Xen, Denaly Cloud Computing: Theory and Practice. Chapter 5 18 Dan C. Marinescu Full virtualization and paravirtualization Cloud Computing: Theory and Practice. Chapter 5 19 Dan C. Marinescu Guest OS Hypervisor Hardware abstraction layer Hardware Guest OS Hypervisor Hardware abstraction layer
  • 21. Hardware (a) Full virtualization (b) Paravirtualization Virtualization of x86 architecture -privileging - a VMMs forces the operating system and the applications to run at a privilege level greater than 0. - a guest OS is forced to run at a privilege level other than that it was originally designed for. - a VMM uses parts of the guest address space to store several system data structures. -faulting access to privileged state - several store instructions can only be executed at privileged level 0 because they operate on data structures that control the CPU operation. They fail silently when executed at a privilege level other than 0. rivilege level 0 must be emulated by the VMM.
  • 22. - in response to a physical interrupt, the VMM generates a ``virtual interrupt'' and delivers it later to the target guest OS which can mask interrupts. Cloud Computing: Theory and Practice. Chapter 5 20 Dan C. Marinescu Virtualization of x86 architecture (cont’d) - elements of the system state, e.g., descriptor caches for segment registers, are hidden; there is no mechanism for saving and restoring the hidden components when there is a context switch from one VM to another. - paging and segmentation protect VMM code from being overwritten by guest OS and applications. Systems running in 64-bit mode can only use paging, but paging does not distinguish between privilege levels 0, 1, and 2, thus the guest OS must run at privilege level 3, the so called (0/3/3) mode.
  • 23. Privilege levels 1 and 2 cannot be used thus, the name ring compression. -priority register is frequently used by a guest OS; the VMM must protect the access to this register and trap all attempts to access it. This can cause a significant performance degradation. Cloud Computing: Theory and Practice. Chapter 5 21 Dan C. Marinescu VT-x, a major architectural enhancement - for VMM operations. -root - support a VM. -state and guest-state areas. try - the processor state is loaded from the guest-state of the VM scheduled to run; then the control is transferred from VMM to
  • 24. the VM. - saves the processor state in the guest-state area of the running VM; then it loads the processor state from the host- state area, finally transfers control to the VMM. Cloud Computing: Theory and Practice. Chapter 5 22 Dan C. Marinescu VT- x Cloud Computing: Theory and Practice. Chapter 5 23 Dan C. Marinescu VMX root VMX non-root VM entry VM exit Virtual-machine control structure (a) (b) host-state guest-state
  • 25. VT-d, a new virtualization architecture peripheral devices. -d supports: translation for device DMA transfers. routing. administrator to a VM in any configurations. ts and records DMA and interrupt errors that my otherwise corrupt memory and impact VM isolation. Cloud Computing: Theory and Practice. Chapter 5 24 Dan C. Marinescu Xen - a VMM based on paravirtualization
  • 26. - design a VMM capable of scaling to about 100 VMs running standard applications and services without any modifications to the Application Binary Interface (ABI). operate as paravirtualized Xen guest OS running on x86, x86-64, Itanium, and ARM architectures. - ensemble of address spaces hosting a guest OS and applications running under the guest OS. Runs on a virtual CPU. - dedicated to execution of Xen control functions and privileged instructions. - a user domain. by Xen; privileged instructions issued by a guest OS are paravirtualized and must be validated by Xen.
  • 27. Cloud Computing: Theory and Practice. Chapter 5 25 Dan C. Marinescu Xen Cloud Computing: Theory and Practice. Chapter 5 26 Dan C. Marinescu X86 hardware Domain0 control interface Virtual x86 CPU Virtual physical memory Virtual network Virtual block devices Xen Management OS
  • 28. Xen-aware device drivers Application Application Application Guest OS Xen-aware device drivers Guest OS Xen-aware device drivers Xen-aware device drivers Guest OS Xen-aware device drivers Xen implementation on x86 architecture applications at Level 3.
  • 29. TLB entries or the software management of the TLB. Thus, address space switching, when the VMM activates a different OS, requires a complete TLB flush; this has a negative impact on the performance. Solution - load Xen in a 64 MB segment at the top of each address space and delegate the management of hardware page tables to the guest OS with minimal intervention from Xen. This region is not accessible or re-mappable by the guest OS. Time (BVT) scheduling algorithm.
  • 30. Xen a description table with the addresses of exception handlers for validation. Cloud Computing: Theory and Practice. Chapter 5 27 Dan C. Marinescu Dom0 components – a Dom0 process. -wide registry and naming service. -value storage. storage they have subscribed to.
  • 31. Dom0 privileges. - responsible for creating, destroying, and managing the resources and privileges of VMs. describing memory and CPU allocations and device configurations. ites this information in XenStore. load a kernel and virtual BIOS and to set up initial communication channels with XenStore and with the virtual console when a new VM is
  • 32. created. Cloud Computing: Theory and Practice. Chapter 5 28 Dan C. Marinescu Strategies for virtual memory management, CPU multiplexing, and I/O devices Cloud Computing: Theory and Practice. Chapter 5 29 Dan C. Marinescu Xen abstractions for networking and I/O (VIFs)
  • 33. which support the functionality of a network interface card. A VIF is attached to a Virtual Firewall-Router (VFR). -end in the DomU and the back-end in Dom0; the two communicate via a ring in shared memory. - a circular queue of descriptors allocated by a domain and accessible within Xen. Descriptors do not contain data, the data buffers are allocated off-band by the guest OS. one for packet receiving, are supported.
  • 34. pies only the packet header, not the payload, and Cloud Computing: Theory and Practice. Chapter 5 30 Dan C. Marinescu Xen zero-copy semantics for data transfer using I/O rings. (a) The communication between a guest domain and the driver domain over an I/O and an event channel; NIC is the Network Interface Controller. (b) the circular ring of buffers. Cloud Computing: Theory and Practice.
  • 35. Chapter 5 31 Dan C. Marinescu Consumer Request (private pointer in Xen) Producer Request (shared pointer updated by the guest OS) Producer Response (shared pointer updated by Xen) Consumer Response (private pointer maintained by the guest OS)Response queue Request queue
  • 36. Unused descriptors Outstanding descriptors Bridge Driver domain Guest domain Backend Frontend XEN Network interface NIC (a)
  • 37. (b) I/O channel Event channel Xen 2.0 - takes advantage of the capabilities of some physical NICs, such as checksum offload. - rather than copying a data buffer holding a packet, each packet is allocated in a new page and then the physical page containing the packet is re-mapped into the target domain. - takes advantage of the superpage and global
  • 38. page mapping hardware on Pentium and Pentium Pro processors. A superpage entry covers 1,024 pages of physical memory and the address translation mechanism maps a set of contiguous pages to a set of contiguous physical pages. This helps reduce the number of TLB misses. Cloud Computing: Theory and Practice. Chapter 5 32 Dan C. Marinescu Xen network architecture .(a) The original architecture; (b) The optimized architecture Cloud Computing: Theory and Practice. Chapter 5 33 Dan C. Marinescu
  • 39. Driver domain Guest domain Virtual Interface Backend Interface NIC Driver Physical NIC Xen VMM Bridge (a) Driver domain Guest domain High Level
  • 41. channel Offload Driver Bridge A comparison of send and receive data rates for a native Linux system, the Xen driver domain, an original Xen guest domain, and an optimized Xen guest domain. Cloud Computing: Theory and Practice. Chapter 5 34 Dan C. Marinescu Performance comparison of virtual machines
  • 42. standard operating system, a plain vanilla Linux. ow the performance scales up with the load? individual servers? er than that of OpenVZ and that this is due primarily to L2-cache misses. also
  • 43. noticeable for Xen. server is not an optimal solution. Cloud Computing: Theory and Practice. Chapter 5 35 Dan C. Marinescu The setup for the performance comparison of a native Linux system with OpenVZ, and the Xen systems. The applications are a web server and a MySQL database server. (a) The first experiment, the web and the DB, share a single system; (b) The second experiment, the web and the DB, run on two different systems;
  • 44. (c) The third experiment, the web and the DB, run on two different systems and each has four instances. Cloud Computing: Theory and Practice. Chapter 5 36 Dan C. Marinescu Web server Web server Web server Web server
  • 51. The darker side of virtualization be disabled by malware running at a layer below it. -Machine Based Rootkit (VMBR) between the physical hardware and an operating system. - malware with a privileged access to a system. enable a separate malicious OS to run surreptitiously and make this malicious OS invisible to the guest OS and to the application running under it.
  • 52. e state of the target system. -of- service attacks. Cloud Computing: Theory and Practice. Chapter 5 37 Dan C. Marinescu The insertion of a Virtual-Machine Based Rootkit (VMBR) as the lowest layer of the software stack running on the physical hardware; (a) below an operating system; (b) below a legitimate virtual machine monitor. The
  • 53. VMBR enables a malicious OS to run surreptitiously and makes it invisible to the genuine or the guest OS and to the application. Cloud Computing: Theory and Practice. Chapter 5 38 Dan C. Marinescu Hardware Virtual machine based rootkit Operating system (OS) Application Hardware Virtual machine monitor Guest OS
  • 54. Application Virtual machine based rootkit (a) (b) Malicious OS Malicious OS The features of the SFI for the Native Client on the x86-32, x86-64 , and ARM. Cloud Computing: Theory and Practice. Chapter 5 39 Dan C. Marinescu