SlideShare a Scribd company logo
1 of 22
Download to read offline
Virtual System &
Services
Lecture No.2
Hardware Virtualization
L
Virtualization
1
Hardware-level virtualization
● It is a virtualization technique that provides an
abstract execution environment in terms of
computer hardware on top of which a guest
OS can be run.
● It is also called as system virtualization.
Virtualization
Hardware-level virtualization
2
Virtualization
3
Hypervisor
● Hypervisor runs above the supervisor mode.
● It runs in supervisor mode.
● It recreates a h/w environment.
● It is a piece of s/w that enables us to run one or
more VMs on a physical server(host).
● Two major types of hypervisor
– Type -I
– Type-II
Virtualization
Type-I Hypervisor
● It runs directly on top of the hardware.
● Takes place of OS.
● Directly interact with the ISA exposed by the
underlying hardware.
● Also known as native virtual machine.
4
Virtualization
Type-II Hypervisor
● It require the support of an
operating system to provide
virtualization services.
● Programs managed by the
OS.
● Emulate the ISA of virtual
h/w.
● Also called hosted virtual
machine.
5
Virtualization
6
Virtual Machine Manager (VMM)
● Main Modules :-
– Dispatcher
● Entry Point of VMM
● Reroutes the instructions issued by VM instance.
– Allocator
● Deciding the system resources to be provided to the VM.
● Invoked by dispatcher
– Interpreter
● Consists of interpreter routines
● Executed whenever a VM executes a privileged instruction.
● Trap is triggered and the corresponding routine is executed.
Virtualization
Virtual Machine Manager (VMM)
7
Virtualization
8
Criteria of VMM
● Equivalence – same behavior as when it is
executed directly on the physical host.
● Resource control – it should be in complete
control of virtualized resources.
● Efficiency – a statistically dominant fraction of
the machine instructions should be executed
without intervention from the VMM
Virtualization
9
Theorems
● Popek and Goldberg provided a
classification of the instruction set and
proposed three theorems that define the
properties that hardware instructions need
to satisfy in order to efficiently support
virtualization.
● Classification of IS-
– Privileged Instructions
● Trap if the processor is in user mode
– Control sensitive Instructions
– Behavior sensitive Instructions
Virtualization
Theorems (cont..)
● Theorem no. 1
– For any conventional third-generation computer, a
VMM may be constructed if the set of sensitive
instructions for that computer is a subset of the set of
privileged instructions.
Virtualization
● Theorem no. 2
– A conventional third-generation computers is
recursively virtualizable if:
● It is virtualizable and
● A VMM without any timing dependencies can be
constructed for it.
Theorems (Cont..)
Virtualization
● Theorem no. 3
– A hybrid VMM may be constructed third-
generation machine in which the set of user-
sensitive instructions is a subset of the set of
privileged instructions.
– In HVM, more instructions are interpreted
rather than being executed directly.
Theorems (Cont..)
Virtualization
Hardware virtualization Techniques
● CPU installed on the host is only one set,
but each VM that runs on the host
requires their own CPU.
● It means CPU needs to virtualized, done
by hypervisor.
Virtualization
Hardware virtualization Techniques (Cont..)
● Full virtualization
– Ability to run program (OS) directly on top of a
virtual machine and without any modification.
– VMM require complete emulation of the entire
underneath h/w
– Advantages
● Complete isolation
● Enhanced security
● Ease of emulation of different architectures and
coexistence
– Key challenge is interception of privileged
instructions
Virtualization
Full Virtualization (Cont..)
● Hypervisor has Ring 0 authority
● and , guest OS has Ring 1 authority
● ISA of guest OS are converted into ISA of
host using binary translation process.
● Privileged instructions are traped.
Virtualization
● Hardware-assisted virtualization
– In this hardware provides architectural
support for building a VMM able to run a
guest OS in complete isolation.
– Intel VT and AMD V extensions.
– Early products were using binary translation
to trap some sensitive instructions and
provide an emulated version
Hardware virtualization Techniques
(Cont..)
Virtualization
Hardware-assisted virtualization
(Cont..)
● Additional Ring -1
● No binary translation of
privileged instructions
● Commands are are
executed directly to h/w via
the hypervisor
Virtualization
● Paravirtualization
– Not-transparent virtualization
– Thin VMM
– Expose software interface to the virtual machine
that is slightly modified from the host.
– Guest OS need to be modified.
– Simply transfer the execution of instructions
which were hard to virtualized, directly to the
host.
Hardware-assisted virtualization
(Cont..)
Virtualization
Paravirtualization (Cont..)
● Privileged instructions of
guest OS is delivered to
the hypervisor by using
hyper-calls
● Hyper-calls handles these
instructions and accesses
the h/w and return the
result.
● Guest has authority to
directly control of
resources.
Virtualization
● Partial virtualization
– Partial emulation of the underlying hardware
– Not allow complete isolation to guest OS.
– Address space virtualization is a common
feature of contemporary operating systems.
– Address space virtualization used in time-
sharing system.
Hardware-assisted virtualization
(Cont..)
Virtualization
End..

More Related Content

Similar to HWVIRT Virtualization Hardware Techniques

VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxkumari36
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualizationhktripathy
 
A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2Krishna Kumar Singh
 
Virtualization with KVM
Virtualization with KVMVirtualization with KVM
Virtualization with KVMDanishka Navin
 
Device virtualization and management in xen
Device virtualization and management in xenDevice virtualization and management in xen
Device virtualization and management in xenLingfei Kong
 
Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptxBinod Rimal
 
lecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxlecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxAnilkumarbehera16
 
Chapter 5 – Cloud Resource Virtua.docx
Chapter 5 – Cloud Resource                        Virtua.docxChapter 5 – Cloud Resource                        Virtua.docx
Chapter 5 – Cloud Resource Virtua.docxmadlynplamondon
 
Chapter 5 – Cloud Resource Virtua.docx
Chapter 5 – Cloud Resource                        Virtua.docxChapter 5 – Cloud Resource                        Virtua.docx
Chapter 5 – Cloud Resource Virtua.docxgertrudebellgrove
 
Virtualization, The future of computing (archived)
Virtualization, The future of computing (archived)Virtualization, The future of computing (archived)
Virtualization, The future of computing (archived)Bud Siddhisena
 
Embedded Systems Conference 2014 Presentation
Embedded Systems Conference 2014 PresentationEmbedded Systems Conference 2014 Presentation
Embedded Systems Conference 2014 PresentationManish Jaggi
 
Virtualization
VirtualizationVirtualization
Virtualizationvishnurk
 
Chap 2 virtulizatin
Chap 2 virtulizatinChap 2 virtulizatin
Chap 2 virtulizatinRaj Sarode
 

Similar to HWVIRT Virtualization Hardware Techniques (20)

Vcp6.7 episode 1
Vcp6.7 episode 1Vcp6.7 episode 1
Vcp6.7 episode 1
 
Hypervisors
HypervisorsHypervisors
Hypervisors
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docx
 
Live VM Migration
Live VM MigrationLive VM Migration
Live VM Migration
 
Virtual machine subhash gupta
Virtual machine subhash guptaVirtual machine subhash gupta
Virtual machine subhash gupta
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2
 
Virtualization with KVM
Virtualization with KVMVirtualization with KVM
Virtualization with KVM
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Device virtualization and management in xen
Device virtualization and management in xenDevice virtualization and management in xen
Device virtualization and management in xen
 
ch16.ppt
ch16.pptch16.ppt
ch16.ppt
 
Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptx
 
lecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxlecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptx
 
Chapter 5 – Cloud Resource Virtua.docx
Chapter 5 – Cloud Resource                        Virtua.docxChapter 5 – Cloud Resource                        Virtua.docx
Chapter 5 – Cloud Resource Virtua.docx
 
Chapter 5 – Cloud Resource Virtua.docx
Chapter 5 – Cloud Resource                        Virtua.docxChapter 5 – Cloud Resource                        Virtua.docx
Chapter 5 – Cloud Resource Virtua.docx
 
Virtualization, The future of computing (archived)
Virtualization, The future of computing (archived)Virtualization, The future of computing (archived)
Virtualization, The future of computing (archived)
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Embedded Systems Conference 2014 Presentation
Embedded Systems Conference 2014 PresentationEmbedded Systems Conference 2014 Presentation
Embedded Systems Conference 2014 Presentation
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Chap 2 virtulizatin
Chap 2 virtulizatinChap 2 virtulizatin
Chap 2 virtulizatin
 

More from RiyaBatool

Legal Liabilities of a software product.pptx
Legal Liabilities of a software product.pptxLegal Liabilities of a software product.pptx
Legal Liabilities of a software product.pptxRiyaBatool
 
Shaikh Ahmad Sarhindi.pptx
Shaikh Ahmad Sarhindi.pptxShaikh Ahmad Sarhindi.pptx
Shaikh Ahmad Sarhindi.pptxRiyaBatool
 
Lecture5(VM).pptx
Lecture5(VM).pptxLecture5(VM).pptx
Lecture5(VM).pptxRiyaBatool
 
lecture3(VM).pptx
lecture3(VM).pptxlecture3(VM).pptx
lecture3(VM).pptxRiyaBatool
 
Lecture1(VM).pptx
Lecture1(VM).pptxLecture1(VM).pptx
Lecture1(VM).pptxRiyaBatool
 
lecture4(VM).ppt
lecture4(VM).pptlecture4(VM).ppt
lecture4(VM).pptRiyaBatool
 
Xen Hypervisor.pptx
Xen Hypervisor.pptxXen Hypervisor.pptx
Xen Hypervisor.pptxRiyaBatool
 
TeleCom Lecture 04.pptx
TeleCom Lecture 04.pptxTeleCom Lecture 04.pptx
TeleCom Lecture 04.pptxRiyaBatool
 
TeleCom Lecture 02.pptx
TeleCom Lecture 02.pptxTeleCom Lecture 02.pptx
TeleCom Lecture 02.pptxRiyaBatool
 
chapter 5.pptx
chapter 5.pptxchapter 5.pptx
chapter 5.pptxRiyaBatool
 
chapter 10,11,13.pptx
chapter 10,11,13.pptxchapter 10,11,13.pptx
chapter 10,11,13.pptxRiyaBatool
 
TeleCom Lecture 07.ppt
TeleCom Lecture 07.pptTeleCom Lecture 07.ppt
TeleCom Lecture 07.pptRiyaBatool
 
TeleCom Lecture 06.pptx
TeleCom Lecture 06.pptxTeleCom Lecture 06.pptx
TeleCom Lecture 06.pptxRiyaBatool
 
TeleCom Lecture 05.pptx
TeleCom Lecture 05.pptxTeleCom Lecture 05.pptx
TeleCom Lecture 05.pptxRiyaBatool
 

More from RiyaBatool (18)

Hashing.pptx
Hashing.pptxHashing.pptx
Hashing.pptx
 
Legal Liabilities of a software product.pptx
Legal Liabilities of a software product.pptxLegal Liabilities of a software product.pptx
Legal Liabilities of a software product.pptx
 
Shaikh Ahmad Sarhindi.pptx
Shaikh Ahmad Sarhindi.pptxShaikh Ahmad Sarhindi.pptx
Shaikh Ahmad Sarhindi.pptx
 
Lecture5(VM).pptx
Lecture5(VM).pptxLecture5(VM).pptx
Lecture5(VM).pptx
 
lecture3(VM).pptx
lecture3(VM).pptxlecture3(VM).pptx
lecture3(VM).pptx
 
Lecture1(VM).pptx
Lecture1(VM).pptxLecture1(VM).pptx
Lecture1(VM).pptx
 
lecture4(VM).ppt
lecture4(VM).pptlecture4(VM).ppt
lecture4(VM).ppt
 
Xen Hypervisor.pptx
Xen Hypervisor.pptxXen Hypervisor.pptx
Xen Hypervisor.pptx
 
TeleCom Lecture 04.pptx
TeleCom Lecture 04.pptxTeleCom Lecture 04.pptx
TeleCom Lecture 04.pptx
 
TeleCom Lecture 02.pptx
TeleCom Lecture 02.pptxTeleCom Lecture 02.pptx
TeleCom Lecture 02.pptx
 
part 3.pptx
part 3.pptxpart 3.pptx
part 3.pptx
 
VSS LEC5.pdf
VSS LEC5.pdfVSS LEC5.pdf
VSS LEC5.pdf
 
chapter 5.pptx
chapter 5.pptxchapter 5.pptx
chapter 5.pptx
 
chapter 10,11,13.pptx
chapter 10,11,13.pptxchapter 10,11,13.pptx
chapter 10,11,13.pptx
 
VSS-1.pdf
VSS-1.pdfVSS-1.pdf
VSS-1.pdf
 
TeleCom Lecture 07.ppt
TeleCom Lecture 07.pptTeleCom Lecture 07.ppt
TeleCom Lecture 07.ppt
 
TeleCom Lecture 06.pptx
TeleCom Lecture 06.pptxTeleCom Lecture 06.pptx
TeleCom Lecture 06.pptx
 
TeleCom Lecture 05.pptx
TeleCom Lecture 05.pptxTeleCom Lecture 05.pptx
TeleCom Lecture 05.pptx
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

HWVIRT Virtualization Hardware Techniques

  • 1. Virtual System & Services Lecture No.2 Hardware Virtualization L
  • 2. Virtualization 1 Hardware-level virtualization ● It is a virtualization technique that provides an abstract execution environment in terms of computer hardware on top of which a guest OS can be run. ● It is also called as system virtualization.
  • 4. Virtualization 3 Hypervisor ● Hypervisor runs above the supervisor mode. ● It runs in supervisor mode. ● It recreates a h/w environment. ● It is a piece of s/w that enables us to run one or more VMs on a physical server(host). ● Two major types of hypervisor – Type -I – Type-II
  • 5. Virtualization Type-I Hypervisor ● It runs directly on top of the hardware. ● Takes place of OS. ● Directly interact with the ISA exposed by the underlying hardware. ● Also known as native virtual machine. 4
  • 6. Virtualization Type-II Hypervisor ● It require the support of an operating system to provide virtualization services. ● Programs managed by the OS. ● Emulate the ISA of virtual h/w. ● Also called hosted virtual machine. 5
  • 7. Virtualization 6 Virtual Machine Manager (VMM) ● Main Modules :- – Dispatcher ● Entry Point of VMM ● Reroutes the instructions issued by VM instance. – Allocator ● Deciding the system resources to be provided to the VM. ● Invoked by dispatcher – Interpreter ● Consists of interpreter routines ● Executed whenever a VM executes a privileged instruction. ● Trap is triggered and the corresponding routine is executed.
  • 9. Virtualization 8 Criteria of VMM ● Equivalence – same behavior as when it is executed directly on the physical host. ● Resource control – it should be in complete control of virtualized resources. ● Efficiency – a statistically dominant fraction of the machine instructions should be executed without intervention from the VMM
  • 10. Virtualization 9 Theorems ● Popek and Goldberg provided a classification of the instruction set and proposed three theorems that define the properties that hardware instructions need to satisfy in order to efficiently support virtualization. ● Classification of IS- – Privileged Instructions ● Trap if the processor is in user mode – Control sensitive Instructions – Behavior sensitive Instructions
  • 11. Virtualization Theorems (cont..) ● Theorem no. 1 – For any conventional third-generation computer, a VMM may be constructed if the set of sensitive instructions for that computer is a subset of the set of privileged instructions.
  • 12. Virtualization ● Theorem no. 2 – A conventional third-generation computers is recursively virtualizable if: ● It is virtualizable and ● A VMM without any timing dependencies can be constructed for it. Theorems (Cont..)
  • 13. Virtualization ● Theorem no. 3 – A hybrid VMM may be constructed third- generation machine in which the set of user- sensitive instructions is a subset of the set of privileged instructions. – In HVM, more instructions are interpreted rather than being executed directly. Theorems (Cont..)
  • 14. Virtualization Hardware virtualization Techniques ● CPU installed on the host is only one set, but each VM that runs on the host requires their own CPU. ● It means CPU needs to virtualized, done by hypervisor.
  • 15. Virtualization Hardware virtualization Techniques (Cont..) ● Full virtualization – Ability to run program (OS) directly on top of a virtual machine and without any modification. – VMM require complete emulation of the entire underneath h/w – Advantages ● Complete isolation ● Enhanced security ● Ease of emulation of different architectures and coexistence – Key challenge is interception of privileged instructions
  • 16. Virtualization Full Virtualization (Cont..) ● Hypervisor has Ring 0 authority ● and , guest OS has Ring 1 authority ● ISA of guest OS are converted into ISA of host using binary translation process. ● Privileged instructions are traped.
  • 17. Virtualization ● Hardware-assisted virtualization – In this hardware provides architectural support for building a VMM able to run a guest OS in complete isolation. – Intel VT and AMD V extensions. – Early products were using binary translation to trap some sensitive instructions and provide an emulated version Hardware virtualization Techniques (Cont..)
  • 18. Virtualization Hardware-assisted virtualization (Cont..) ● Additional Ring -1 ● No binary translation of privileged instructions ● Commands are are executed directly to h/w via the hypervisor
  • 19. Virtualization ● Paravirtualization – Not-transparent virtualization – Thin VMM – Expose software interface to the virtual machine that is slightly modified from the host. – Guest OS need to be modified. – Simply transfer the execution of instructions which were hard to virtualized, directly to the host. Hardware-assisted virtualization (Cont..)
  • 20. Virtualization Paravirtualization (Cont..) ● Privileged instructions of guest OS is delivered to the hypervisor by using hyper-calls ● Hyper-calls handles these instructions and accesses the h/w and return the result. ● Guest has authority to directly control of resources.
  • 21. Virtualization ● Partial virtualization – Partial emulation of the underlying hardware – Not allow complete isolation to guest OS. – Address space virtualization is a common feature of contemporary operating systems. – Address space virtualization used in time- sharing system. Hardware-assisted virtualization (Cont..)