Professional Documents
Culture Documents
Chapter 03 Mod 2
Chapter 03 Mod 2
1-1
1-2
1-3
1-4
1-5
1-7
Advantage:
Has higher performance and good application isolation
Shortcoming & limitation:
Very expensive to implement (complexity)
1-8
1-9
Virtualization at OS Level
10
1 - 10
11
1 - 11
12
1 - 12
13
1 - 13
14
1 - 14
15
1 - 15
16
1 - 16
User-Application level:
It virtualizes an application as a virtual machine.
This layer sits as an application program on top of an
operating system and exports an abstraction of a VM that
can run programs written and compiled to a particular
abstract machine definition.
Typical systems: JVM , NET CLI , Panot
Advantage:
has the best application isolation
Shortcoming & limitation:
low performance, low application flexibility and high
implementation complexity.
Copyright 2012, Elsevier Inc. All rights reserved.
17
1 - 17
18
1 - 18
Hypervisor
A hypervisor is a hardware virtualization technique allowing multiple
operating systems, called guests to run on a host machine. This is also
called the Virtual Machine Monitor (VMM).
19
1 - 19
20
1 - 20
21
1 - 21
22
1 - 22
23
1 - 23
Para virtualization
Reduces the overhead, but cost of maintaining a paravirtualized OS is
high.
The improvement depends on the workload.
Para virtualization must modify guest OS, non-virtualizable instructions
are replaced by hypercalls that communicate directly with the hypervisor
or VMM.
Para virtualization is supported by Xen, Denali and VMware ESX.
Copyright 2012, Elsevier Inc. All rights reserved.
24
1 - 24
Full Virtualization
25
1 - 25
Binary
Translation
of Guest OS
Requests
using a
VMM:
26
1 - 26
27
1 - 27
28
1 - 28
29
1 - 29
30
1 - 30
31
1 - 31
32
1 - 32
Multi-Core Virtualization:
VCPU vs. traditional CPU
Figure 3.16 Four VCPUs are exposed to the software, only three cores are actually
present. VCPUs V0, V1, and V3 have been transparently migrated, while VCPU V2
has been transparently suspended. (Courtesy of Wells, et al., Dynamic
Heterogeneity and the Need for Multicore Virtualization, ACM SIGOPS Operating
Systems Review, ACM Press, 2009 [68] )
Copyright 2012, Elsevier Inc. All rights reserved.
33
1 - 33
Design of software
becomes easier as the
hardware assists the
software in dynamic
resource utilization.
Hardware provides no
assistance to the software
and is hence simpler.
Hardware provides
assistance to the software
and is hence more
complex.
1 - 34
35
1 - 35
36
1 - 36
A VM runs with a guest OS, which is often different from the host OS, that manages the
resources in the physical machine, where the VM is implemented.
The purpose of using VMs is to consolidate multiple functionalities on the same server.
This will greatly enhance the server utilization and application flexibility.
VMs can be colonized (replicated) in multiple servers for the purpose of promoting
distributed parallelism, fault tolerance, and disaster recovery.
The size (number of nodes) of a virtual cluster can grow or shrink dynamically, similarly to
the way an overlay network varies in size in a P2P network.
The failure of any physical nodes may disable some VMs installed on the failing nodes.
But the failure of VMs will not pull down the host system.
Copyright 2012, Elsevier Inc. All rights reserved.
37
1 - 37
38
1 - 38
39
1 - 39
40
1 - 40
41
1 - 41
42
1 - 42
43
1 - 43
44
1 - 44
45
1 - 45
46
1 - 46
47
1 - 47
48
1 - 48
49
1 - 49
50
1 - 50
51
1 - 51
52
1 - 52
53
1 - 53
Insulate
Anti-malware
infrastructure from
Malware, Trojans Cybercrime
and cybercriminals
intelligence
Federate
identities with
public clouds
APP
OS
Control and
Virtual isolate VM in
network the virtual
security infrastructure
APP
OS
Tenant #2
Virtual Infrastructure
APP
OS
APP
OS
Insulate
information
from other Data loss
prevention
tenants
Tenant #1
Virtual Infrastructure
Access Segregate and
Mgmt control user
access
Strong
authentication
Cloud Provider
Physical Infrastructure
Insulate
information
from cloud
providers
employees
Encryption &
key mgmt
Tokenization
GRC
(Courtesy of L. Nick, EMC 2008)
54
1 - 54