Oe Cc Module 1 Notes
Oe Cc Module 1 Notes
MODULE_1
VIRTUALIZATION AND HYPERVISORS
Describing virtualization
Virtualization
Fundamental idea
Abstract hardware of a single computer into several different execution
environments
• Similar to layered approach
• Layer creates virtual system (virtual machine, or VM) on which applications can run
Several components
• Host– underlying hardware system
• Virtual machine monitor / manager(VMM) or hypervisor– creates and runs virtual
machines by providing interface that is identical to the host
• Guest– Virtual machine ( Usually an operating system)
• Single physical machine can run multiple operating systems concurrently, each in its
own virtual machine.
Describing a Hypervisor
• The hypervisor is a layer of software that resides below the virtual machines and
above the hardware which provides an environment for programs that are identical to
original machine with minor decreases in execution speed together with complete
control over resource allocation.
• . The hypervisor manages the interactions between each virtual machine and the
hardware that the guests all share.
Initially, virtual machine monitors were used for the development and
debugging of operating systems because they provided a sandbox for
programmers to test rapidly and repeatedly, without using all of the resources
of the hardware.
They added the ability to run multiple environments concurrently, carving the
hardware resources into virtual servers that could each run its own operating
system.
•A , also called as a virtual machine manager/monitor (VMM), or
virtualization manager, is a program that allows multiple operating systems to share a
single hardware host.
• Each guest operating system appears to have the host's processor, memory, and other
resources all to itself.
• Hypervisor controls the host processor and resources, by allocating what is needed
to each operating system in turn and making sure that the guest operating systems
(called virtual machines) cannot disrupt each other.
2
Page
Properties of VMM
• According to Popek and Goldberg
(Who described the requirements for a computer system to support virtualization.)
VMM needs to exhibit three properties in order to correctly satisfy their definition:
• Fidelity (reliability) the environment it creates for the VM is essentially identical to
the original (hardware) physical machine.
• Isolation or Safety the VMM must have complete control of the system resources.
• Performance There should be little or no difference in performance between the VM
and a physical equivalent.
• Microsoft Windows was developed during the 1980s primarily as a personal computer
operating system.
• Companies moved from paper based records to running their accounting, human
resources, and many other industry-specific applications on mainframes or
minicomputers.
• These computers usually ran vendor-specific operating systems, making it difficult, if
not impossible, for companies and IT professionals to easily transfer information
among incompatible systems.
• This led to the need for standards, agreed upon methods for exchanging information.
So operating systems and programs should be able to run on many different vendors’
hardware. For example UNIX operating systems.
Data Center
purchased in the last three to five years, and if it is closer to five years, you are
Page
• For example, digital cameras first captured images at less than one megapixel resolution and
now routinely provide more than 12 megapixel resolutions. PCs, and now smart phones,
Initially offered memory (RAM) measured in kilobytes; today the standard is giga bytes, an
increase of two orders of magnitude.
Moore’s Law
It is called Moore’s Law, and it deals with the rate at which certain
technologies improve
Moore’s Law applies not just to processing power (the speed and capacity of
computer chips) but to many other related technologies as well (such as
memory capacity and the megapixel count in digital cameras).
• There was a wild explosion of data centers overfilled with servers; but as time passed,
in a combination of the effect of Moore’s Law and the “one server, one application”
model, those servers did less and less work.
• Popek and Goldberg’s definition, virtualization allows many operating systems to run
on the same server hardware at the same time, while keeping each virtual machine
functionally isolated from all the others. The first commercially available solution to
provide virtualization for x86 computers came from VMware in 2001.
Benefits of virtualization:
• Sharing- of resources helps cost reduction
• Isolation-virtual machines are isolated from each other’s as if they are physically
separated.
• Encapsulation-virtual machine encapsulate a complete computing environment.
• Hardware independence-virtual machine run independently underlying hardware.
• Portability-virtual machine can be migrated between different hosts.
Server consolidation and Containment:
• With virtualization, overfull data centers and underutilized servers was the ability to condense
4
multiple physical servers into one server that would run many virtual machines, allowing that
Page
They no longer purchased new hard ware when their leases were over, or if
they owned the equipment, when their hardware maintenance licenses
expired.
Instead, they virtualized those server workloads. This is called containment.
• Apple for example, recently offered the iCloud where you can store your music,
pictures, books, and other digital possessions and then accesses them from anywhere.
Other companies, such as Microsoft, Amazon, and Google are offering similar cloud-
based services.
• Virtualization and, by extension, cloud computing provide greater automation
opportunities that reduce administrative costs and increase a company’s ability to
dynamically deploy solutions.
• Personal computers are changing into tablets and thin clients, but the applications that
run on PCs still need to be offered to users.
• One way to achieve this is desktop virtualization. Those applications can also be
virtualized, packaged up, and delivered to users.
• Virtualization is even being pushed down to the other mobile devices such as smart
phones
1. Virtualizing Servers
2. Virtualizing Desktops
3. Virtualizing Applications
• Computer programs, or applications, can also be virtualized. Like both server and
desktop virtualization, there are a number of different solutions for this problem.
• There are two main reasons for application virtualization;
1. the first is ease of deployment.
Think about the number of programs you have on your PC. Some companies must
manage hundreds or even thousands of different applications. Every time a new
version of each of those applications is available, the company, if it decides to
upgrade to that newer version, has to push out a copy to all of its PCs. For one or a
small number of computers, this may be a relatively trivial task. But how would you
do this to a hundred PCs? Or a thousand?
• 2. The second reason has to do with how different applications interact with each
other.
Types of Virtualization
• There are two different techniques of server or machine virtualization they are hosted
approach and the bare metal approach. The techniques differ depending on the type of
hypervisor used.
7
Page
• In this approach of machine virtualization, the hypervisor is directly installed over the
physical machine.
• Since, the hypervisor is the first layer over hardware resources; hence, the technique
is referred as bare metal approach.
• Here, the VMM or the hypervisor communicates directly with system hardware.
• In this approach, the hypervisor acts as low-level virtual machine monitor and also
called as Type 1 hypervisor or Native Hypervisor.
• VMware’s ESX and ESXi Servers, Microsoft’s Hyper-V, solution Xen are some of
the examples of bare-metal hypervisors.
• Benefits: Since the bare metal hypervisor can directly access the hardware resources
in most of the cases it provides better performance in comparison to the hosted
hypervisor.
• For bigger application like enterprise data centers, bare-metal virtualization is more
suitable because usually it provides advanced features for resource and security
management. Administrators get more control over the host environment.
• Drawbacks: As any hypervisor usually have limited set of device drivers built into it,
so the bare metal hypervisors have limited hardware support and cannot run on a wide
variety of hardware platform.
• This OS installed over the host machine is referred as host operating system.
Page
• The hypervisor is then installed over this host OS. This type of hypervisor is referred
to as Type 2 hypervisor or Hosted hypervisor.
• Figure represents the hosted machine virtualization technique. So, here the host OS
works as the first layer of software over the physical resources.
• Hypervisor is the second layer of software and guest operating systems run as the
third layer of software.
• Products like VMWare Workstation and Microsoft Virtual PC are the most common
examples of Hosted Approach & Type 2 Hypervisor.
• In this approach, an operating system is first installed on the physical machine to
activate it.
• This OS installed over the host machine is referred as host operating system.
• The hypervisor is then installed over this host OS. This type of hypervisor is referred
to as Type 2 hypervisor or Hosted hypervisor.
System Independence Has direct access to hardware Are not allowed to directly
NEETHU PONNACHAN (LECTURER IN CT) GPTC NEDUMANGAD
OE-CLOUD COMPUTING
Type 1 hypervisors are also considered to be more secure than Type 2 hypervisors. Guest operations
are handed off, and, as such, a guest cannot affect the hypervisor on which it is supported. A virtual
machine can damage only itself, causing a single guest crash, but that event does not escape the VM
boundaries. Other guests continue processing, and the hypervisor is unaffected as well. A malicious
guest, where code is deliberately trying to interfere with the hypervisor or the other guests would be
unable to do so. Figure illustrates a guest failure in a Type 1 hypervisor.
VMware ESX
ESX was a Type 1 hypervisor
All the virtual machine or Guest OS installed on ESXi server.
Linux-derived Service Console.
Used to provide an interactive environment through which users could interact with
10
hypervisor.
Page
Citrix Xen
Is a software layer that runs directly on the harware below any OS.
The Xen model has a special guest called Domain 0, also referred to as Dom0.
This guest gets booted when the hypervisor is booted, and it has management
privileges different from the other guests. Because it has direct access to the
hardware, it handles all of the I/O for the individual guests. It also handles the
hardware device driver support.
When additional guests make requests of the underlying hardware resources, those
requests go through the hypervisor, up to the Dom0 guest, and then to the resource.
Results from those resources reverse that trip to return to the guests.
11
Microsoft Hyper-V
Page
Hyper-V is a Type 1 hypervisor because the hypervisor code lives directly on the
hardware.
The nomenclature is slightly different, though—rather than guests, the virtualized
workloads are called partitions.
12
Page