Unit - 2 - Virtualization
Unit - 2 - Virtualization
Concepts
Virtualization
Definition
Buzzword: A word or phrase connected with a specialized field or group that usually sounds important
or technical and is used primarily to impress laypersons.
Motivation
Hardware virtualization
Desktop virtualization
Other types
Nested virtualization
Hardware virtualization
Bare-Metal Virtualization
Hypervisor runs directly on the host’s hardware.
Multiple guest operating systems could then run on top
of this hypervisor (also referred as Type 1 Hypervisor)
Ex: Citrix XenServer, VMware ESXi, Linux KVM, and
Microsoft Hyper-V etc.
Approaches to Server Virtualization
Type 1 hypervisors are typically more efficient because they
have direct access to the underlying hardware and can deliver
superior performance as compared to their Type 2
counterparts.
Type 2 hypervisors support a wider range of platforms and I/O
devices, because they run on top of a standard operating
system such as Microsoft Windows or Red Hat Linux.
Components of Server Virtualization
CPU virtualization
Memory virtualization
I/O virtualization
1: CPU Virtualization
X86 operating systems are
designed to run directly on the
bare-metal hardware, so they
naturally assume they fully
‘own’ the computer hardware.
The x86 architecture offers
four levels of privilege
known as Ring 0, 1, 2 and 3 to
operating systems and
applications to manage access
to the computer hardware.
The term x86 usually
User level applications typically
represented any 8086
run in Ring 3, the operating compatible CPU. Today,
system needs to have direct however, x86 usually implies
access to the memory and a binary compatibility also
hardware and must execute its with the 32-bit instruction set
of the 80386
privileged instructions in Ring
0.
Challenge: CPU Virtualization
Virtualizing the x86 architecture requires placing a
virtualization layer under the operating system
(which expects to be in the most privileged Ring 0)
to create and manage the virtual machines that
deliver shared resources.
Security
Virtualization reduces the number of configuration points
in the network, which in turn lowers the complexity and
the probability of miss-configuration, ultimately leading
to successful enforcement of the desired security policy.
Logical Segmentation: One to Many
A single physical network is logically segmented
into multiple virtual networks.
Asymmetric or out-of-band
The virtualization device in this approach sits outside
the data path between the host and storage device.
This means a special software is needed on the hosts,
which knows to first request the location of data from
the virtualization device and then use that mapped
physical address to perform the I/O.
It has additional complexity because of the changes
required on the host side.
Caching is not an option anymore because I/O does not
pass through the mapping device.
Network-Based Storage Virtualization (Contd…)
Hybrid split-path
This method uses a combination of in-band and out-of-
band approaches, taking advantage of intelligent SAN
switches to perform I/O redirection and other
virtualization tasks at wire speed.
Specialized software running on a dedicated highly
available appliance interacts with the intelligent switch
ports to manage I/O traffic and map logical-to-physical
storage resources at wire speed.
In typical in-band solutions the CPU is susceptible to
being overwhelmed by I/O traffic, but in the split-path
approach the I/O-intensive work is offloaded to
dedicated port-level ASICs (application-specific
integrated circuits) on the SAN switch.
Desktop Virtualization
Desktop virtualization is the concept of isolating a
logical operating system (OS) instance from the client
that is used to access it.
Shared hosted
Users connect to either a shared desktop or simply individual
applications that run on a server.
Shared hosted is also known as remote desktop services or
terminal services.