CCA - Module 1-Virtualization
CCA - Module 1-Virtualization
computing applications
Module 1
2020-2021[ODD]
2
17CS742 –
Cloud computing applications
*
3
Course Outcomes
► Reference Book:
Dan C. Marinescu, Cloud Computing Theory and Practice, Morgan
Kaufmann, Elsevier 2013.
5
Module 1
► Virtualization(Chapter 3)
► Introduction
► Characteristics of Virtualized Environments
► Taxonomy of Virtualization Techniques
► Execution Virtualization
► Other Types of Virtualization
► Virtualization and Cloud Computing
► Pros and Cons of Virtualization
► Technology Examples
► Xen: Paravirtualization,
► VMware: Full Virtualization
► Microsoft Hyper-V
7
Virtualization
8
Virtualization (Chapter 3)
► Introduction
► Characteristics of Virtualized Environments
► Taxonomy of Virtualization Techniques
► Execution Virtualization
► Other Types of Virtualization
► Technology Examples
► Xen: Paravirtualization
► VMware: Full Virtualization
► Microsoft Hyper-V
Increased performance and compute capacity
Introduction • Normal PC have enough resources to host a virtual machine manager.
• Supercomputers have immense compute power and can accommodate 100’s or 9
1000’s of VM’s
Underutilized hardware and software resources
• Underutilization happens because of i) increased performance/computing capacity
ii) limited/sporadic use of resources.
• Many computers are only partially used during work hours.
► virtualization technologies • 24/7/365 basis : requires a transparent environment
provide a virtual environ-
ment for not only Lack of space
executing applications • Server consolidation – brings several different applications under one server,
but also for storage, improves hardware underutilization, reduces power consumption
memory, and networking Green initiatives
► Supported by VM-based • Datacenter –requires energy to keep the servers on and also cooling them.
programming languages. • Virtualization technology provides efficient means for server consolidation.
► Java VM – applets Rise of administrative costs
► .NET Framework • Servers require administrators – h/w monitoring, replacing defective components,
server setup, updates, resource monitoring, backups.
► Google – Java and
• Cooling and administrative costs are higher than the IT equipment
Python
• Virtualization – reduces the number of servers, reduces cost of administrative
personnel.
10
Increased
Security
Characteristics
of Virtualized Managed
Execution
Environments
Portability
11
Virtualization Model
► Increased Security
► All operations by guest are performed by VM
► Portability
► Hardware virtualization : guest is packaged as a VM image.
► Storage
► Networks
► an application
► Privileged Instructions
► Executed under specific restrictions
► Non-privileged Instructions
► can be used without interfering with other tasks because they do not access
shared resources
► all the floating, fixed-point, and arithmetic instructions.
22
Hierarchy of Privileges
► User Mode.
► Has restrictions on machine-level resources.
► If code invokes privileged instructions, hardware interrupts and traps potentially harmful execution.
► Crucial to understand role of hypervisor - that runs above the supervisor mode.
► The division between privileged and non-privileged instructions pose challenge for design of VMM’s
► all the sensitive instructions will be executed in privileged mode, which requires supervisor mode in order to
avoid traps.
► Original ISA – 17 sensitive instructions can be called from user mode.
► Prevents multiple OS managed by single OS to be isolated