1) The document discusses three main techniques for virtualizing the x86 CPU: full virtualization using binary translation, OS-assisted virtualization (paravirtualization), and hardware-assisted virtualization.
2) Full virtualization using binary translation allows any x86 OS to run virtualized without modification but has more overhead than other techniques. Paravirtualization requires OS modifications to replace privileged instructions but has lower overhead. Hardware assistance traps privileged instructions to the hypervisor but current implementations have high transition overhead.
3) VMware currently uses all techniques - binary translation is most established, hardware assistance benefits future gains, and VMware fosters standards while balancing performance and flexibility across techniques.
Cloud Foundry Platform as a Service on Vblock SystemEMC
This white paper describes how to build a PaaS service with Cloud Foundry enabled by Pivotal CF on Vblock systems while ensuring scalability and elasticity of underlying cloud structure including storage, compute, and networking layers.
This document describes the reference architecture of the EMC infrastructure for VMware View 5.1, EMC VNX Series (FC), VMware vSphere 5.0, VMware View Persona Management, VMware View Storage Accelerator, and VMware View Composer 3.0 solution, which was tested and validated by the EMC Solutions group.
White Paper: EMC Infrastructure for Microsoft Private Cloud EMC
This white paper presents a solution that explores the scalability and performance for mixed application workloads on a Microsoft Hyper-V virtualized platform using an EMC VNX5300 storage array.
Cloud Foundry Platform as a Service on Vblock SystemEMC
This white paper describes how to build a PaaS service with Cloud Foundry enabled by Pivotal CF on Vblock systems while ensuring scalability and elasticity of underlying cloud structure including storage, compute, and networking layers.
This document describes the reference architecture of the EMC infrastructure for VMware View 5.1, EMC VNX Series (FC), VMware vSphere 5.0, VMware View Persona Management, VMware View Storage Accelerator, and VMware View Composer 3.0 solution, which was tested and validated by the EMC Solutions group.
White Paper: EMC Infrastructure for Microsoft Private Cloud EMC
This white paper presents a solution that explores the scalability and performance for mixed application workloads on a Microsoft Hyper-V virtualized platform using an EMC VNX5300 storage array.
Learn about IBM SmartCloud Desktop Infrastructure with Citrix XenDesktop. This document describes the reference architecture for using Citrix XenDesktop 5.6 on VMware ESXi 5 hypervisor. This document gives an architecture overview and component model of the Citrix XenDesktop and then describes the Deployment model of Citrix XenDesktop using different number of users. For more information on IBM Systems, visit http://ibm.co/RKEeMO.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
Vmware Certified Professional 6 2V0-621 DumpsShamar41
pass4sureexam is a website which can help you save time and energy to rapidly and efficiently master the vmware certification 2v0-621d exam dumps.
https://www.pass4sureexam.com/2V0-621.html
The values of server virtualization are well understood today. Customers implement
server virtualization to increase server utilization, handle peak loads efficiently,
decrease total cost of ownership (TCO), and streamline server landscapes.
Similarly, storage virtualization helps to address the same challenges as server
virtualization. Storage virtualization also expands beyond the boundaries of physical
resources and helps to control how IT infrastructures adjust to rapidly changing
business demands. Storage virtualization benefits customers through improved
physical resource utilization and improved hardware efficiency, as well as reduced
power and cooling expenses. In addition, consolidation of resources obtained
through virtualization offers measurable returns on investment for today’s
businesses. Finally, virtualization serves as one of the key enablers of cloud
solutions, which are designed to deliver services economically and on demand.
This White Paper describes the EMC Backup-as-a-Service (BaaS) solution based on EMC Avamar, EMC Data Protection Advisor, and EMC HomeBase, which allows service providers to deliver backup services for cloud and traditional hosted environments, reduce storage space, increase backup speeds, and provide portal-based backup management.
TechBook: Using EMC VNX Storage with VMware vSphereEMC
This EMC Engineering TechBook describes how VMware vSphere works with the EMC VNX series. The content in this TechBook is intended for storage administrators, system administrators, and VMware vSphere administrators.
This white paper describes EMC VNX Snapshots. The paper reviews and explains operations and best practices for the feature, as well as limits and functions.
White Paper: Using VPLEX Metro with VMware High Availability and Fault Tolera...EMC
This white paper discusses using best of breed technologies from VMware and EMC to create federated continuous availability solutions. The following topics are reviewed: choosing between federated FT or federated HA, design considerations and constraints, and operational best practice.
White Paper: EMC Infrastructure for VMware Cloud Environments EMC
This white paper describes an automated storage tiering solution for mission-critical applications virtualized with VMware vSphere on the Symmetrix VMAX 40K storage platform. SRDF coordination with FAST VP provides site-to-site replication for disaster recovery and assured performance by automatically monitoring and tuning storage at both sites.
The purpose of this reference architecture is to build and demonstrate the functionality, performance, and scalability of virtual desktops enabled by EMC VNX series (NFS), VMware vSphere 5.0, VMware View 5.1, VMware View Persona Management, VMware View Storage Accelerator, and VMware View Composer 3.0.
White Paper: New Features in EMC Enginuity 5876 for Mainframe Environments EMC
This white paper discusses the new features and functionality introduced with the Enginuity 5876 code release for EMC Symmetrix VMAX subsystems in the IBM System z environment.
Learn about IBM SmartCloud Desktop Infrastructure with Citrix XenDesktop. This document describes the reference architecture for using Citrix XenDesktop 5.6 on VMware ESXi 5 hypervisor. This document gives an architecture overview and component model of the Citrix XenDesktop and then describes the Deployment model of Citrix XenDesktop using different number of users. For more information on IBM Systems, visit http://ibm.co/RKEeMO.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
Vmware Certified Professional 6 2V0-621 DumpsShamar41
pass4sureexam is a website which can help you save time and energy to rapidly and efficiently master the vmware certification 2v0-621d exam dumps.
https://www.pass4sureexam.com/2V0-621.html
The values of server virtualization are well understood today. Customers implement
server virtualization to increase server utilization, handle peak loads efficiently,
decrease total cost of ownership (TCO), and streamline server landscapes.
Similarly, storage virtualization helps to address the same challenges as server
virtualization. Storage virtualization also expands beyond the boundaries of physical
resources and helps to control how IT infrastructures adjust to rapidly changing
business demands. Storage virtualization benefits customers through improved
physical resource utilization and improved hardware efficiency, as well as reduced
power and cooling expenses. In addition, consolidation of resources obtained
through virtualization offers measurable returns on investment for today’s
businesses. Finally, virtualization serves as one of the key enablers of cloud
solutions, which are designed to deliver services economically and on demand.
This White Paper describes the EMC Backup-as-a-Service (BaaS) solution based on EMC Avamar, EMC Data Protection Advisor, and EMC HomeBase, which allows service providers to deliver backup services for cloud and traditional hosted environments, reduce storage space, increase backup speeds, and provide portal-based backup management.
TechBook: Using EMC VNX Storage with VMware vSphereEMC
This EMC Engineering TechBook describes how VMware vSphere works with the EMC VNX series. The content in this TechBook is intended for storage administrators, system administrators, and VMware vSphere administrators.
This white paper describes EMC VNX Snapshots. The paper reviews and explains operations and best practices for the feature, as well as limits and functions.
White Paper: Using VPLEX Metro with VMware High Availability and Fault Tolera...EMC
This white paper discusses using best of breed technologies from VMware and EMC to create federated continuous availability solutions. The following topics are reviewed: choosing between federated FT or federated HA, design considerations and constraints, and operational best practice.
White Paper: EMC Infrastructure for VMware Cloud Environments EMC
This white paper describes an automated storage tiering solution for mission-critical applications virtualized with VMware vSphere on the Symmetrix VMAX 40K storage platform. SRDF coordination with FAST VP provides site-to-site replication for disaster recovery and assured performance by automatically monitoring and tuning storage at both sites.
The purpose of this reference architecture is to build and demonstrate the functionality, performance, and scalability of virtual desktops enabled by EMC VNX series (NFS), VMware vSphere 5.0, VMware View 5.1, VMware View Persona Management, VMware View Storage Accelerator, and VMware View Composer 3.0.
White Paper: New Features in EMC Enginuity 5876 for Mainframe Environments EMC
This white paper discusses the new features and functionality introduced with the Enginuity 5876 code release for EMC Symmetrix VMAX subsystems in the IBM System z environment.
A Rookie-level presentation on Virtualization, and a sneak peek Cloud Computing.
This is a presentation created for a seminar presentation on Cloud and Virtualization Technologies.
Under normal conditions, this presentation may take upto 20-40 mins to complete.
Created and presented in Oct 2014.
The battle to be your virtualization vendor is in full swing, and it
has important ramifications for the vendors involved, and for your
data center. The goal of this whitepaper is to analyze the
technical aspects of the two major choices: VMware vSphere 4
and Microsoft Hyper-V R2 (as part of Windows Server 2008 R2).
The two contenders are described in technical detail, and then
those details are compared head-to-head. Typical pricing in two
scenarios is included. Analysis of these tools, how they will
impact your datacenter virtualization, and what the future likely
holds is included. »
In recent years, we have seen an overwhelming number of TV commercials that promise that the Cloud can help with many problems, including some family issues. What stands behind the terms “Cloud” and “Cloud Computing,” and what we can actually expect from this phenomenon? A group of students of the Computer Systems Technology department and Dr. T. Malyuta, whom has been working with the Cloud technologies since its early days, will provide an overview of the business and technological aspects of the Cloud.
White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...EMC
This white paper discusses how VMware's vSphere Storage APIs for Array Integration, also known as VAAI, can be used to offload perform various virtual machine operations on the EMC Symmetrix.
Customers are using NSX to drive business benefits as show in the figure below. The main themes for NSX deployments are Security, IT automation and Application Continuity.
Figure 3: NSX Use Cases
• Security:
NSX can be used to create a secure infrastructure, which can create a zero-trust security model. Every virtualized workload can be protected with a full stateful firewall engine at a very granular level. Security can be based on constructs such as MAC, IP, ports, vCenter objects and tags, active directory groups, etc. Intelligent dynamic security grouping can drive the security posture within the infrastructure.
NSX can be used in conjunction with 3rd party security vendors such as Palo Alto Networks, Checkpoint, Fortinet, or McAffee to provide a complete DMZ like security solution within a cloud infrastructure.
NSX has been deployed widely to secure virtual desktops to secure some of the most vulnerable workloads, which reside in the data center to prohibit desktop-to-desktop hacking.
• Automation:
VMware NSX provides a full RESTful API to consume networking, security and services, which can be used to drive automation within the infrastructure. IT admins can reduce the tasks and cycles required to provision workloads within the datacenter using NSX.
NSX is integrated out of the box with automation tools such as vRealize automation, which can provide customers with a one-click deployment option for an entire application, which includes the compute, storage, network, security and L4-L7 services.
6
Developers can use NSX with the OpenStack platform. NSX provides a neutron plugin that can be used to deploy applications and topologies via OpenStack
• Application Continuity:
NSX provides a way to easily extend networking and security up to eight vCenters either within or across data center In conjunction with vSphere 6.0 customers can easily vMotion a virtual machine across long distances and NSX will ensure that the network is consistent across the sites and ensure that the firewall rules are consistent. This essentially maintains the same view across sites.
NSX Cross vCenter Networking can help build active – active data centers. Customers are using NSX today with VMware Site Recovery Manager to provide disaster recovery solutions. NSX can extend the network across data centers and even to the cloud to enable seamless networking and security.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
2. VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist
Contents i
Contents
Introduction .................................................................................................................1
Overview of x86 Virtualization..................................................................................2
CPU Virtualization .......................................................................................................3
The Challenges of x86 Hardware Virtualization...........................................................................................................3
Technique 1 - Full Virtualization using Binary Translation......................................................................................4
Technique 2 - OS Assisted Virtualization or Paravirtualization.............................................................................5
Technique 3 - Hardware Assisted Virtualization..........................................................................................................6
Memory Virtualization................................................................................................6
Device and I/O Virtualization.....................................................................................7
Summarizing the Current State of x86 Virtualization Techniques......................8
Full Virtualization with Binary Translation is the Most Established Technology Today..........................8
Hardware Assist is the Future of Virtualization, but the Real Gains Have Yet to Arrive..........................9
Xen’s CPU Paravirtualization Delivers Performance Benefits with Maintenance Costs.........................9
VMware’s Transparent Paravirtualization Balances Performance Benefits with Maintenance Costs
..............................................................................................................................................................................................................11
VMware is Fostering an Open Standards Approach to Virtualization ..........................................................13
VMware Leverages a Multi-Mode VMM Architecture for Performance and Flexibility.......................13
Conclusion ..................................................................................................................14
Next Steps...................................................................................................................14
3. VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist
Introduction 1
Figure 1 – Summary timeline of x86 virtualization technologies
Introduction
In 1998, VMware figured out how to virtualize the x86 platform, once thought to be impossible,
and created the market for x86 virtualization. The solution was a combination of binary translation
and direct execution on the processor that allowed multiple guest OSes to run in full isolation on
the same computer with readily affordable virtualization overhead.
The savings that tens of thousands of companies have generated from the deployment of this
technology is further driving the rapid adoption of virtualized computing from the desktop to the
data center. As new vendors enter the space and attempt to differentiate their products, many are
creating confusion with their marketing claims and terminology. For example, while hardware
assist is a valuable technique that will mature and expand the envelope of workloads that can be
virtualized, paravirtualization is not an entirely new technology that offers an “order of
magnitude” greater performance.
While this is a complex and rapidly evolving space, the technologies employed can be readily
explained to help companies understand their options and choose a path forward. This white
paper attempts to clarify the various techniques used to virtualize x86 hardware, the strengths
and weaknesses of each, and VMware’s community approach to develop and employ the most
effective of the emerging virtualization techniques. Figure 1 provides a summary timeline of x86
virtualization technologies from VMware’s binary translation to the recent application of kernel
paravirtualization and hardware-assisted virtualization.
4. VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist
Overview of x86 Virtualization 2
Figure 2 – x86 virtualization layer
Figure 3 – The hypervisor manages virtual machine monitors
that host virtual machines
Overview of x86 Virtualization
The term virtualization broadly describes the
separation of a service request from the
underlying physical delivery of that service. With
x86 computer virtualization, a virtualization layer is
added between the hardware and operating
system as seen in Figure 2. This virtualization layer
allows multiple operating system instances to run
concurrently within virtual machines on a single
computer, dynamically partitioning and sharing
the available physical resources such as CPU,
storage, memory and I/O devices.
As desktop and server processing capacity has
consistently increased year after year,
virtualization has proved to be a powerful
technology to simplify software development and
testing, to enable server consolidation, and to
enhance data center agility and business continuity.
As it turns out, fully abstracting the operating system and applications from the hardware and
encapsulating them into portable virtual machines has enabled virtual infrastructure features
simply not possible with hardware alone. For example, servers can now run in extremely fault
tolerant configurations on virtual infrastructure 24x7x365 with no downtime needed for backups
or hardware maintenance. VMware has customers with production servers that have been
running without downtime for over three years.
For industry standard x86 systems, virtualization approaches use either a hosted or a hypervisor
architecture. A hosted architecture installs and runs the virtualization layer as an application on
top of an operating system and supports the broadest range of hardware configurations. In
contrast, a hypervisor (bare-metal) architecture installs the virtualization layer directly on a clean
x86-based system. Since it has direct access to the hardware resources rather than going through
an operating system, a hypervisor is more efficient than a hosted architecture and delivers greater
scalability, robustness and performance. VMware Player, ACE, Workstation and Server employ a
hosted architecture for flexibility, while ESX Server employs a hypervisor architecture on certified
hardware for data center class performance.
To better understand the
techniques employed for x86
virtualization, a brief background
on the component parts is useful.
The virtualization layer is the
software responsible for hosting
and managing all virtual machines
on virtual machine monitors
(VMMs). As depicted in Figure
3Figure 3, the virtualization layer is
a hypervisor running directly on
5. VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist
CPU Virtualization 3
Figure 4 – x86 privilege level architecture
without virtualization
the hardware. The functionality of the hypervisor varies greatly based on architecture and
implementation. Each VMM running on the hypervisor implements the virtual machine hardware
abstraction and is responsible for running a guest OS. Each VMM has to partition and share the
CPU, memory and I/O devices to successfully virtualize the system.
CPU Virtualization
The Challenges of x86 Hardware Virtualization
X86 operating systems are designed to run directly on
the bare-metal hardware, so they naturally assume they
fully ‘own’ the computer hardware. As shown in Figure
4, the x86 architecture offers four levels of privilege
known as Ring 0, 1, 2 and 3 to operating systems and
applications to manage access to the computer
hardware. While user level applications typically run in
Ring 3, the operating system needs to have direct
access to the memory and hardware and must execute
its privileged instructions in Ring 0. Virtualizing the x86
architecture requires placing a virtualization layer under
the operating system (which expects to be in the
most privileged Ring 0) to create and manage the
virtual machines that deliver shared resources.
Further complicating the situation, some sensitive
instructions can’t effectively be virtualized as they have different semantics when they are not
executed in Ring 0. The difficulty in trapping and translating these sensitive and privileged
instruction requests at runtime was the challenge that originally made x86 architecture
virtualization look impossible.
VMware resolved the challenge in 1998, developing binary translation techniques that allow the
VMM to run in Ring 0 for isolation and performance, while moving the operating system to a user
level ring with greater privilege than applications in Ring 3 but less privilege than the virtual
machine monitor in Ring 0. While VMware’s full virtualization approach using binary translation is
the de facto standard today based on VMware’s 20,000 customer installed base and large partner
ecosystem, the industry as a whole has not yet agreed on open standards to define and manage
virtualization. Each company developing virtualization solutions is free to interpret the technical
challenges and develop solutions with varying strengths and weaknesses.
As clarified below, three alternative techniques now exist for handling sensitive and privileged
instructions to virtualize the CPU on the x86 architecture:
• Full virtualization using binary translation
• OS assisted virtualization or paravirtualization
• Hardware assisted virtualization (first generation)
6. VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist
CPU Virtualization 4
Figure 5 – The binary translation
approach to x86 virtualization
Technique 1 – Full Virtualization using Binary Translation
VMware can virtualize any x86 operating system using a
combination of binary translation and direct execution
techniques. This approach, depicted in Figure 5,
translates kernel code to replace nonvirtualizable
instructions with new sequences of instructions that
have the intended effect on the virtual hardware.
Meanwhile, user level code is directly executed on the
processor for high performance virtualization. Each
virtual machine monitor provides each Virtual Machine
with all the services of the physical system, including a
virtual BIOS, virtual devices and virtualized memory
management.
This combination of binary translation and direct
execution provides Full Virtualization as the guest OS is
fully abstracted (completely decoupled) from the
underlying hardware by the virtualization layer. The guest OS is not aware it is being virtualized
and requires no modification. Full virtualization is the only option that requires no hardware assist
or operating system assist to virtualize sensitive and privileged instructions. The hypervisor
translates all operating system instructions on the fly and caches the results for future use, while
user level instructions run unmodified at native speed.
Full virtualization offers the best isolation and security for virtual machines, and simplifies
migration and portability as the same guest OS instance can run virtualized or on native
hardware. VMware’s virtualization products and Microsoft Virtual Server are examples of full
virtualization.
7. VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist
CPU Virtualization 5
Figure 6 – The Paravirtualization approach to x86
Virtualization
Technique 2 – OS Assisted Virtualization or Paravirtualization
“Para-“ is an English affix of Greek origin that
means "beside," "with," or "alongside.” Given the
meaning “alongside virtualization,”
paravirtualization refers to communication
between the guest OS and the hypervisor to
improve performance and efficiency.
Paravirtualization, as shown in Figure 6, involves
modifying the OS kernel to replace non-
virtualizable instructions with hypercalls that
communicate directly with the virtualization layer
hypervisor. The hypervisor also provides hypercall
interfaces for other critical kernel operations such
as memory management, interrupt handling and
time keeping.
Paravirtualization is different from full
virtualization, where the unmodified OS does not know it is virtualized and sensitive OS calls are
trapped using binary translation. The value proposition of paravirtualization is in lower
virtualization overhead, but the performance advantage of paravirtualization over full
virtualization can vary greatly depending on the workload. As paravirtualization cannot support
unmodified operating systems (e.g. Windows 2000/XP), its compatibility and portability is poor.
Paravirtualization can also introduce significant support and maintainability issues in production
environments as it requires deep OS kernel modifications. The open source Xen project is an
example of paravirtualization that virtualizes the processor and memory using a modified Linux
kernel and virtualizes the I/O using custom guest OS device drivers.
While it is very difficult to build the more sophisticated binary translation support necessary for
full virtualization, modifying the guest OS to enable paravirtualization is relatively easy. VMware
has used certain aspects of paravirtualization techniques across the VMware product line for years
in the form of VMware tools and optimized virtual device drivers. The VMware tools service
provides a backdoor to the VMM Hypervisor used for services such as time synchronization,
logging and guest shutdown. Vmxnet is a paravirtualized I/O device driver that shares data
structures with the hypervisor. It can take advantage of host device capabilities to offer improved
throughput and reduced CPU utilization. It is important to note for clarity that the VMware tools
service and the vmxnet device driver are not CPU paravirtualization solutions. They are minimal,
non-intrusive changes installed into the guest OS that do not require OS kernel modification.
Looking forward, VMware is helping develop paravirtualized versions of Linux to support proofs of
concept and product development. Further information is provided later in this paper on page 11.
8. VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist
Memory Virtualization 6
Figure 7 – The hardware assist approach to x86
virtualization
Technique 3 – Hardware Assisted Virtualization
Hardware vendors are rapidly embracing
virtualization and developing new features
to simplify virtualization techniques. First
generation enhancements include Intel
Virtualization Technology (VT-x) and AMD’s
AMD-V which both target privileged
instructions with a new CPU execution
mode feature that allows the VMM to run
in a new root mode below ring 0. As
depicted in Figure 7, privileged and
sensitive calls are set to automatically trap
to the hypervisor, removing the need for
either binary translation or
paravirtualization. The guest state is stored in
Virtual Machine Control Structures (VT-x) or
Virtual Machine Control Blocks (AMD-V).
Processors with Intel VT and AMD-V became available in 2006, so only newer systems contain
these hardware assist features.
Due to high hypervisor to guest transition overhead and a rigid programming model, VMware’s
binary translation approach currently outperforms first generation hardware assist
implementations in most circumstances. The rigid programming model in the first generation
implementation leaves little room for software flexibility in managing either the frequency or the
cost of hypervisor to guest transitions1
. Because of this, VMware only takes advantage of these
first generation hardware features in limited cases such as for 64-bit guest support on Intel
processors.
Memory Virtualization
Beyond CPU virtualization, the next critical component is memory virtualization. This involves
sharing the physical system memory and dynamically allocating it to virtual machines. Virtual
machine memory virtualization is very similar to the virtual memory support provided by modern
operating systems. Applications see a contiguous address space that is not necessarily tied to the
underlying physical memory in the system. The operating system keeps mappings of virtual page
numbers to physical page numbers stored in page tables. All modern x86 CPUs include a memory
management unit (MMU) and a translation lookaside buffer (TLB) to optimize virtual memory
performance.
1
For more information, see “A Comparison of Software and Hardware Techniques for x86 Virtualization” by Adams and Agesen
presented at ASPLOS 2006
9. VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist
Device and I/O Virtualization 7
Figure 8 – Memory Virtualization
Figure 9 – Device and I/O virtualization
To run multiple virtual machines on
a single system, another level of
memory virtualization is required.
In other words, one has to
virtualize the MMU to support the
guest OS. The guest OS continues
to control the mapping of virtual
addresses to the guest memory
physical addresses, but the guest OS
cannot have direct access to the
actual machine memory. The VMM is responsible for mapping guest physical memory to the
actual machine memory, and it uses shadow page tables to accelerate the mappings. As depicted
by the red line in Figure 8, the VMM uses TLB hardware to map the virtual memory directly to the
machine memory to avoid the two levels of translation on every access. When the guest OS
changes the virtual memory to physical memory mapping, the VMM updates the shadow page
tables to enable a direct lookup. MMU virtualization creates some overhead for all virtualization
approaches, but this is the area where second generation hardware assisted virtualization will
offer efficiency gains.
Device and I/O Virtualization
The final component required beyond CPU and
memory virtualization is device and I/O
virtualization. This involves managing the routing
of I/O requests between virtual devices and the
shared physical hardware.
Software based I/O virtualization and
management, in contrast to a direct pass-through
to the hardware, enables a rich set of features and
simplified management. With networking for
example, virtual NICs and switches create virtual
networks between virtual machines without the
network traffic consuming bandwidth on the
physical network, NIC teaming allows multiple
physical NICS to appear as one and failover
transparently for virtual machines, and virtual
machines can be seamlessly relocated to different systems using VMotion while keeping their
existing MAC addresses. The key to effective I/O virtualization is to preserve these virtualization
benefits while keeping the added CPU utilization to a minimum.
The hypervisor virtualizes the physical hardware and presents each virtual machine with a
standardized set of virtual devices as seen in Figure 9. These virtual devices effectively emulate
well-known hardware and translate the virtual machine requests to the system hardware. This
standardization on consistent device drivers also helps with virtual machine standardization and
portability across platforms as all virtual machines are configured to run on the same virtual
hardware regardless of the actual physical hardware in the system.
10. VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist
Summarizing the Current State of x86 Virtualization Techniques 8
Figure 10 – Summary comparison of x86 processor virtualization techniques
Summarizing the Current State of x86 Virtualization
Techniques
VMware is currently utilizing all of these x86 virtualization techniques either in production or in
the development lab to deliver the best balance between performance and functionality. With
the overview of virtualization techniques covered, the summary comparison in Figure 10 is useful
for understanding the high-level strengths and weaknesses of each technique.
Full Virtualization with
Binary Translation
Hardware Assisted
Virtualization
OS Assisted
Virtualization /
Paravirtualization
Technique Binary Translation and
Direct Execution
Exit to Root Mode on
Privileged Instructions
Hypercalls
Guest Modification /
Compatibility
Unmodified Guest OS
Excellent compatibility
Unmodified Guest OS
Excellent compatibility
Guest OS codified to issue
Hypercalls so it can’t run
on Native Hardware or
other Hypervisors
Poor compatibility; Not
available on Windows
OSes
Performance Good Fair
Current performance lags
Binary Translation
virtualization on various
workloads but will improve
over time
Better in certain cases
Used By VMware, Microsoft,
Parallels
VMware, Microsoft,
Parallels, Xen
VMware, Xen
Guest OS Hypervisor
Independent?
Yes Yes XenLinux runs only on Xen
Hypervisor
VMI-Linux is Hypervisor
agnostic
Full Virtualization with Binary Translation is the Most Established
Technology Today
Full Virtualization with Binary Translation is currently the most established and reliable
virtualization technology available. VMware’s implementation also delivers the highest
virtualization performance across commonly deployed Windows and Linux operating systems
with the most robust feature set and greatest ease of management. With the exception of 64-bit
guests running on Intel CPUs with binary translation, VMware can support both full virtualization
and hardware assisted virtualization on production servers with the choice depending on the
relative performance.
11. VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist
Summarizing the Current State of x86 Virtualization Techniques 9
Full virtualization with binary translation will continue to be a useful technique for years to come
as newer and faster hardware continues to advance binary translation performance for
unmodified guest OSes, however, hardware assisted virtualization is where virtualization is going
with processor paravirtualization being a performance enhancing stopgap along the way.
Hardware Assist is the Future of Virtualization, but the Real Gains Have Yet
to Arrive
Intel and AMD’s first generation hardware assist features released in 2006 are the first step in
removing the need for hypervisors to employ binary translation and OS-assisted processor
paravirtualization. As Xen has demonstrated, these early features have made it much easier to
build a simple hypervisor without having to address binary translation or paravirtualize the
operating system. Xen is using these hardware assist features to virtualize Windows, but with
significantly reduced efficiency versus either VMware’s binary translation or XenLinux’s
paravirtualization. The challenge is that these first generation implementations employ a rigid
programming model with high hypervisor to guest transition overhead, resulting in lower
virtualization performance than VMware’s binary translation approach. VMware is working with
partners Intel and AMD to enhance future hardware designs to better take advantage of
software’s inherent flexibility to address virtualization challenges.
Second generation hardware assist technologies are in development that will have a greater
impact on virtualization performance while reducing memory overhead. Both AMD and Intel have
announced future development roadmaps, including hardware support for memory virtualization
(AMD Nested Page Tables [NPT] and Intel Extended Page Tables [EPT]) as well as hardware
support for device and I/O virtualization (Intel VT-d, AMD IOMMU).
Compute-intensive workloads already run well with binary translation of privileged instructions
and direct execution of non-privileged instructions, but NPT/EPT will provide noticeable
performance improvements for memory-remapping intensive workloads by removing the need
for shadow page tables that consume system memory. Increased performance and reduced
overhead expected in future CPUs will provide motivation to use hardware assist features much
more broadly, but don’t expect revolutionary improvements. As processors get significantly faster
each year, each year’s processor performance increases will likely have a greater impact on
virtualization capacity and performance than future hardware assist optimizations.
Over time, expect to see hardware assisted virtualization offset paravirtualization’s near-term
performance benefits related to processor and memory virtualization. As hardware assist is further
developed for the CPU, memory and device I/O, the performance benefits of paravirtualization
over hardware assisted direct execution will grow smaller. As hardware assist features develop
and mature, hypervisors will commoditize as they increasingly leverage a common set of
hardware assist features, but they will continue to compete on performance, manageability and
features.
Xen’s CPU Paravirtualization Delivers Performance Benefits with
Maintenance Costs
Xen likes to position paravirtualization as the second generation of virtualization, labeling
VMware‘s full virtualization technology as the first generation. The reality is that paravirtualization
is an old and useful virtualization technique that does deliver performance benefits for some
workloads but typically with added maintenance costs. No one is disputing the value of installing
12. VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist
Summarizing the Current State of x86 Virtualization Techniques 10
virtualization management applications and device drivers into guest operating systems to
increase performance, but data centers must weigh the advantage of reduced virtualization
overhead versus the maintenance and support costs of running a modified guest OS kernel to
enable processor paravirtualization. The performance advantage depends on the nature of the
workload. Most user space workloads gain very little, and near native performance is not achieved
for all workloads.
Xen’s first major challenge is that processor paravirtualization does not apply to unmodified guest
OSes, so it is not an option for guests that can’t be modified (e.g. Windows) and guests where
modifications are undesired (e.g. when supported versions of Linux are required). Most data
centers are not willing to run production business applications on a third party paravirtualized
Linux kernel running on an open source hypervisor. Additionally, the invasive kernel modifications
tightly couple the guest OS to the hypervisor with data structure dependencies, preventing the
modified guest OS from running on other hypervisors or native hardware.
Even though major Linux distributions are starting to bundle paravirtualization into the OS kernel,
deploying servers using these paravirtualized operating system can increase maintenance costs
and reduce portability. As many companies have found XenLinux’s paravirtualization approach
unsuitable for enterprise use, many new virtualization vendors with open source Xen-derived
offerings are abandoning Linux paravirtualization entirely. Virtual Iron, for example, has declared
paravirtualization a “dead-end approach2
” and is focusing entirely on full virtualization of
unmodified guest operating systems using hardware assist.
This leads to Xen’s second competitive challenge. Xen 3.x only recently introduced support for
hardware assisted full virtualization of unmodified guest OSes (e.g. Windows). As VMware’s binary
translation is far more sophisticated and higher performing than Xen's employment of first
generation hardware assist, Xen vendors can’t compete with VMware’s overall performance,
reliability, and ease of management. Those that haven’t given up on processor paravirtualization
entirely often try to confuse the issue by implying that their Linux paravirtualization performance
benefits carry over to unmodified guest OSes that use no processor paravirtualization and require
hardware assist for virtualization.
To be clear, VMware does find processor paravirtualization to increase performance significantly
on some workloads today, but the longer term performance delta when second generation
hardware assist features are available is unclear. The performance difference may be reduced,
eliminated, or expanded as enhancements to the paravirtualization interface may create new
opportunities. It’s an open question.
As VMware sees it, the major problem with processor paravirtualization is the need for guest OS
modification that makes it dependent on a specific hypervisor to run. The Xen interface, for
example, implements deep paravirtualization with strong hypervisor dependency. The OS kernel
is closely tied to structures in the hypervisor implementation. This creates an incompatibility as
the XenLinux kernel can’t run on native hardware or other hypervisors, doubling the number of
kernel distributions that have to be maintained. Additionally, it’s limited to newer, open source
operating systems as the intrusive changes to the guest OS kernel require OS vendor support.
Finally, the strong hypervisor dependency impedes the independent evolution of the kernel.
2
http://www.virtualiron.com/fusetalk/blog/blogpost.cfm?catid=3&threadid=10
13. VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist
Summarizing the Current State of x86 Virtualization Techniques 11
Figure 11 – Transparent paravirtualization
with the Virtual Machine Interface (VMI)
VMware’s Transparent Paravirtualization Balances Performance Benefits
with Maintenance Costs
While Xen has implemented paravirtualization that
is deeply rooted and intrusive to the Linux kernel,
VMware has been working on a standard interface
to gain the performance advantages of OS assisted
paravirtualization while mitigating the maintenance
costs. In 2005, VMware proposed a transparent
paravirtualization interface, the Virtual Machine
Interface (VMI), as a standardized communication
mechanism between the guest operating system
and the hypervisor.
As depicted in Figure 11, the Virtual Machine
Interface is a layer between the hypervisor and the
paravirtualized guest OS. Transparent paravirtualization is delivered as the same guest OS kernel
can run either natively on the hardware or virtualized on any compatible hypervisor. It works by
design as all VMI calls have two implementations, inline native instructions for bare hardware and
indirect calls to a layer between the guest OS and hypervisor in a virtual machine. Both
implementations deliver high performance. Maintainability and extensibility is achieved as VMI
versioning can allow independent development of the hypervisor and guest OS. The VMI layer
also supports hypervisor diversity as VMI-Linux can run using an appropriate indirection layer on
the Xen hypervisor. Portability is subjective, but a succession of Linux versions have been ported
to the VMI interface.
VMware is continuing its collaboration with the Linux community to develop a paravirtualization
interface that supports multiple hypervisors. In 2006, VMware released the VMI specification as an
open specification, and the VMI proposal at the Ottawa Linux Symposium led to the development
of the paravirt-ops interface in the Linux community. The paravirt-ops interface, which was
developed by a joint team from IBM, VMware, Red Hat, and XenSource, incorporates many of the
concepts of VMI including the support of transparent paravirtualization. Using this interface, a
paravirtualized Linux operating system will be able to run on any hypervisor that supports it.
VMware is actively working on the paravirt-ops guest OS interface which can use the VMI interface
to a hypervisor, and paravirt-ops became a part of the official Linux kernel starting with version
2.6.20. Version 2.6.22 also included the VMI backend to supplement the paravirt-ops interface.
With this common specification, Linux OS distributors and ISVs can support a single kernel image
solution that is paravirtualized without compromising performance or maintainability. This has
the opportunity to raise the compatibility of processor paravirtualization from poor to good.
In order to foster industry evaluation and feedback, VMware has included experimental support
for VMI in Workstation 6 that demonstrates support for paravirtualized operating systems in a
hosted environment. This Workstation release provides an implementation of the transparent
paravirtualization interface discussed with the Linux community since 2005. You can also
download a fully functional VMware Player virtual machine monitor that supports the
paravirtualization interface and your choice of a paravirtualization-enabled Linux kernel from
popular Linux distributions. This experimental support in VMware Player and Workstation is
intended for developers who wish to evaluate paravirtualization technology from VMware.
Because this experimental support is based on a hosted virtual machine architecture, it is not
intended to demonstrate I/O performance improvement for paravirtualization. It will, however,
14. VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist
Summarizing the Current State of x86 Virtualization Techniques 12
demonstrate improved performance on CPU intensive workloads. Subsequent implementations
on a bare-metal hypervisor architecture, such as the VMware ESX Server, will demonstrate
improved CPU and I/O performance due to paravirtualization. VMware is planning to add support
for paravirtualized operating systems as they become adopted in commercial operating system
distributions across its virtual infrastructure platform products.
15. VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist
Summarizing the Current State of x86 Virtualization Techniques 13
VMware is Fostering an Open Standards Approach to Virtualization
For the past several years, VMware has been collaborating with a group of leading technology
vendors to define open virtualization standards. As an initial step, VMware has contributed its
existing frameworks and APIs to facilitate the development of these standards in an industry
neutral manner. VMware is proposing these open interfaces and formats because the most
successful interfaces and formats in the technology business have been based on de facto
customer deployed standards. VMware's technology has been deployed widely for over seven
years and incorporates a significant amount of real-world experience.
In every industry, open interfaces and formats have proven to be a critical enabler to accelerating
ubiquitous adoption, and virtualization is no different. As great as the momentum is today for
virtualization, it is still in its early stages of adoption. VMware has taken this step to spur the
growth of virtualization, accelerate solution delivery to customers and achieve widespread
virtualization adoption.
VMware is also taking this step because partners and customers have asked for it. Open interfaces
and formats benefit customers by providing access to a broader range of virtualization solutions
that are compatible across an increased number of products. Open interfaces and formats benefit
the industry by facilitating greater collaboration and innovation across an ecosystem of
virtualization vendors to expand the market opportunities for all.
VMware has made available the following open interfaces and formats:
• Virtual Machine Interface — APIs between hypervisors and guest operating systems.
• Management Interface — Framework that governs the standardized operation and management of
stand-alone virtual machine environments as well as highly dynamic, data center scale deployment of
virtualized systems.
• Virtual Machine Disk Format — Virtual machine disk formats that enable virtual machine
provisioning, migration and maintenance across platforms.
VMware intends this to be an open, vendor neutral effort. Any vendor that shares in the common
goal of open virtualization standards can participate.
VMware Leverages a Multi-Mode VMM Architecture for Performance and
Flexibility
Most startup virtualization vendors only have the resources to build a product that leverages a
single strategy for virtualization. They naturally have a motivation to focus on the strengths of
their virtualization approach and minimize their approach’s weaknesses and feature gaps. This
tends to generate market confusion as companies make one-sided claims that distort reality.
With each product release, VMware employs the combination of these and future virtualization
technologies that strikes the most effective balance between performance, stability, functionality
and ease of management. VMware also proactively works with partners to develop an
interoperable ecosystem for enterprise computing virtualization.
16. VMware Understanding Full Virtualization, Paravirtualization, and Hardware Assist
Conclusion 14
Figure 12 – Multi-mode VMM architecture
VMware offers a flexible “multi-mode” VMM architecture depicted in Figure 12 that enables a
separate VMM to host each virtual machine. VMware allows you to select the mode that achieves
the best workload-specific performance based on the
CPU support available. The same VMM architecture is
used for ESX Server, Player, Server, Workstation and ACE.
While today’s workloads can employ a 32-bit BT VMM or
a 64-bit VMM with BT or VT-x, tomorrow’s workloads will
be hosted on VMMs that support 32 and 64-bit versions
of AMD-V + NPT and VT-x + EPT.
VMware provides a flexible architecture to support
emerging virtualization technologies. Multi-mode VMM
utilizes binary translation, hardware assist and
paravirtualization to select the best operating mode for
each workload and processor combination. Hardware
assist will continue to mature and broaden the workloads
that can be readily virtualized.
Conclusion
There is a range of strategies that VMware is pursuing to improve virtualization performance over
time. Binary translation, hardware assist and OS assist (paravirtualization) are all effective
techniques for x86 virtualization, but their relative value and importance will remain in flux as the
enterprise computing virtualization market continues to evolve and mature. VMware started this
revolution nearly a decade ago, and is continuing to lead the industry in building out an open
standards and operating system agnostic virtualization ecosystem to help companies transform
their IT environments.
Tomorrow’s virtualization likely involves vendor-supported paravirtualized OSes that are installed
into industry standard disk format files and able to run either natively or on a variety of
compatible and interchangeable hypervisors that take advantage of hardware assisted
management of the CPU, memory and I/O devices.
Today, VMware virtualization technology has been deployed by 100% of the Fortune 100 and 84%
of the Fortune 1000 as the leading solution on the market. There is no alternative that compares
to VMware's performance, stability, ease of management, security, support, features and vast
partner ecosystem.
Next Steps
Enterprises evaluating computing virtualization should consider the value VMware Infrastructure
can deliver. The VMware Sales Team can help your IT organization determine how VMware
Infrastructure can benefit in your particular environment. Using consolidation assessments, ROI
tools, case studies, and other tools, VMware will work with your team to design and implement
specific success criteria so you can evaluate our software effectively. Visit us at www.vmware.com,
email us at sales@vmware.com, or call us at 877-4VMWARE to get started.