Transcript
  • 8/2/2019 Virtualization a Limitless World

    1/6

    )Abstract:

    Virtuali

    suchas

    Theusu

    overall

    )Introducti

    Inthep

    Oneop

    machin

    eachoth

    were:

    Virtuali

    Robert

    Machin

    thetypi

    Ashep

    nonpri

    privilag

    softwar

    instructi

    softwar

    Virtuali

    thissoft

    systems

    operati

    machin

    switchin

    Support

    machin

    ation,inco

    ahardware

    algoalofvir

    ardwarere

    on:

    ast

    ratingsyste

    .Variousap

    er.Machine

    Lowserver

    Overallincr

    ationera

    .Goldberg

    sResearch.

    Virtualma

    calthirdgen

    intsout,su

    ilegedmod

    dmodethe

    nucleus(a

    ionsormak

    nucleusin

    ationisaso

    warelayerd

    .The

    Virtual

    gsystems.

    cannowh

    gbehindsc

    ingmultiple

    canhostse

    irtuali

    puting,ist

    platform,op

    tualizationi

    sourceutiliz

    mononem

    plicationsw

    utilisation

    tilization,a

    aseinhard

    escribesth

    Hesaid:

    hinesyste

    erationarch

    hsystemsh

    .Inprivileg

    yarenot.T

    ologustok

    supervisor

    ordertoha

    ftwarelayer

    oesistodiv

    izationLaye

    achOShas

    stanumbe

    nes.

    instanceso

    veralLinux/

    ation:

    ecreation

    eratingsyst

    tocentraliz

    ation.

    achine,sot

    ouldrunon

    asverylow

    nd

    arecost,e

    thenstate

    swere

    origi

    itecturesan

    adadualst

    dmodealli

    eo.sprovid

    rnel).User

    calls e.g.,

    eprivileged

    inbetween

    idethereso

    ris

    in

    charg

    theillusiont

    rofoperatin

    Operating

    Windowcop

    ALimi

    favirtual(

    em,astorag

    eadministr

    heOShadc

    thatmachin

    ,mosttime

    c.

    ofthingsin

    nallydevelo

    dMultipro

    atehardwar

    instructions

    esasmallr

    programsc

    SVC's (anal

    functions

    themachin

    urcesofthe

    ofmultiple

    hatitcontr

    gsystemsb

    ystems:Ho

    ies.

    less

    atherthan

    edeviceor

    tivetasks

    mpletecon

    e,butthese

    itwasbelo

    his1974pa

    pedto

    corre

    rammingo

    eorganizati

    areavailabl

    sidentprog

    uldexecute

    logoustosy

    .g.,I/O pe

    andtheop

    machinea

    xingthe

    har

    lsthecomp

    ecausethe

    ogeneous

    orld

    ctual)versi

    etworkres

    hileimprovi

    trolofther

    application

    25%.Othe

    ertitledSu

    ctsome

    of

    t

    eratingsyst

    naprivil

    totheappl

    amcalledt

    thenonpri

    temcalls)t

    rformedon

    eratingsyst

    ongallthe

    wareresou

    letehardwa

    irtualization

    orHeteroge

    nofsomet

    urces.

    ingscalabilit

    esourcesin

    scouldaffe

    rdisadvanta

    veyofVirtu

    heshortco

    emse.g. O

    gedmode

    licationwhil

    eprivilege

    vilegedhard

    theprivile

    theirbehalf

    em.Essentia

    guestopera

    rcesto

    seve

    rebut,infa

    layermake

    neous,one

    ing,

    yand

    hat

    t

    ges

    al

    ingsof

    /360.

    nda

    innon

    ware

    ed

    .

    llywhat

    ing

    ral

    t,the

    sallthe

    hysical

  • 8/2/2019 Virtualization a Limitless World

    2/6

    )Hardware

    x86mo

    Thepro

    Thegre

    Thefig.

    (reservecriticals

    softwar

    Thepro

    fromac

    process

    Tocarry

    recogni

    Curre

    task.Iti

    privilegchanges

    level.

    Descri

    theDPL

    executi

    compar

    DPLisin

    Reque

    selector

    withth

    accesst

    ofsuffic

    CPL,the

    doesno

    privileg

    Privileg

    segmen

    control

    followin

    Virtual

    Eachvir

    thepri

    TheVM

    Specificatio

    es:Privilag

    cessorsseg

    ternumber

    showshow

    d

    for

    the

    moftware,us

    .(Systems

    cessoruses

    essingase

    rdetectsa

    outprivileg

    esthefollo

    tprivilegel

    sstoredinb

    level

    of

    thetheCPLwh

    ptorprivileg

    fieldofthe

    gcodeseg

    dtotheCP

    terpreteddi

    stedprivile

    s.Itisstore

    CPLtodete

    oasegment

    ientprivileg

    RPLoverrid

    taccessase

    sforthats

    levelsarec

    tregister.T

    amongcode

    gsections.

    achineM

    tualmachin

    arylinkbet

    Mprimarily:

    Presentse

    IsolatesVM

    ns:

    elevels

    entprotec

    smeanless

    heselevels

    st

    privilegeallytheker

    hatuseonl

    rivilegelev

    mentwith

    privilegelev

    elevelchec

    ingthreet

    vel(CPL)

    its0and1o

    code

    segmenprogram

    elevel(DPL)

    egmentor

    entattemp

    LandRPLof

    ifferently,d

    elevel(RPL

    inbits0an

    rmineifacc

    hassufficie

    elevel.That

    estheCPL,

    gmentonb

    gment.

    heckedwhe

    echecksus

    segments;t

    nitor

    interfaces

    eenaVM

    ulatedhard

    fromtheh

    tionmecha

    rprivileges.

    ofprivilege

    code,

    datanelofanop

    2ofthe4p

    lstopreve

    greaterpri

    elviolation,

    ksbetween

    pesofprivil

    TheCPList

    ftheCSand

    nt

    from

    whcontrolistr

    TheDPL

    atedescrip

    tstoaccess

    thesegmen

    pendingon

    TheRPL

    d1ofthese

    esstoaseg

    tprivileget

    is,iftheRP

    ndvicever

    halfofana

    nthesegme

    edfordata

    herefore,th

    ithits

    host

    ndthehost

    waretothe

    ostOSandf

    ismrecogni

    anbeinter

    ,

    and

    stacks)ratingsyst

    ossibleprivi

    taprogram

    ilege,exce

    itgenerates

    codesegme

    legelevels:

    heprivilege

    SSsegment

    ich

    instructinsferredto

    istheprivil

    orforthes

    asegment

    torgatesel

    thetypeof

    isanoverri

    gmentsele

    entisallo

    oaccessth

    ofasegme

    a.TheRPL

    pplicationp

    ntselector

    ccessdiffer

    etwokinds

    systemvia

    OSandhar

    virtualmac

    romeachot

    zes4privile

    retedasrin

    is

    used

    for

    m.Outerrin

    legelevelss

    ortaskope

    tundercon

    ageneralp

    ntsanddata

    levelofthe

    registers.N

    ns

    are

    beinacodeseg

    gelevelof

    gmentorg

    rgate,the

    ector(asde

    segmentor

    eprivilegel

    tor.Thepro

    ed.Evenif

    segment,a

    ntselectori

    anbeused

    rogramunle

    fasegmen

    fromthose

    ofaccesses

    hevirtual

    m

    ware,theV

    ine

    her

    elevels,nu

    gsofprotec

    he

    segmentgsareused

    houldusele

    ratingatal

    rolledsitua

    rotectionex

    segments,t

    currentlyex

    ormally,the

    fetched.

    Tentwitha

    segmento

    te.Whent

    PLofthese

    cribedlater

    atebeinga

    evelthatis

    cessorchec

    heprogram

    ccessisdeni

    numericall

    oinsureth

    sstheprogr

    descriptori

    sedfortra

    areconsider

    achinemon

    MMprovid

    mberedfro

    tion.Thece

    s

    containingforlesscriti

    vels0and3

    sserprivile

    tions.When

    ception(#G

    heprocesso

    ecutingpro

    CPLisequa

    e

    processoifferentpri

    gate.Itiss

    ecurrently

    gmentorga

    inthissecti

    ccessed.

    ssignedtos

    kstheRPLal

    ortaskreq

    ediftheRP

    greaterth

    tprivileged

    amitselfha

    isloadedint

    sfersofpro

    edseparate

    itor(VMM).

    sacrucialr

    0to3.

    ter

    the

    al

    .)

    elevel

    the

    ).

    r

    ramor

    ltothe

    ilege

    oredin

    teis

    on).The

    egment

    ong

    esting

    isnot

    nthe

    code

    access

    oa

    gram

    lyinthe

    Being

    ole.

  • 8/2/2019 Virtualization a Limitless World

    3/6

    ThrottlesindividualVMaccesstosystemresources,preventinganunstableVMfrom

    impactingsystemperformance

    PasseshardwareinstructionstoandfromtheVMandthehostOS/hypervisorWhenfullvirtualizationisemployed,theVMMwillpresentacompletesetofemulatedhardwareto

    theVM'sguestoperatingsystem.ThisincludestheCPU,motherboard,memory,disk,diskcontroller,

    andnetworkcards.Forexample,MicrosoftVirtualServer2005emulatesanIntel21140NICcardand

    Intel440BXchipset.Regardlessoftheactualphysicalhardwareonthehostsystem,theemulated

    hardware

    remains

    the

    same.

    ThenextsignificantroleoftheVMMistoprovideisolation.TheVMMhasfullcontrolofthephysical

    hostsystem'sresources,leavingindividualvirtualmachineswithaccessonlytotheiremulated

    hardwareresources.TheVMMcontainsnomechanismsforinterVMcommunication,thusrequiring

    thattwovirtualmachineswishingtoexchangedatadosooverthenetwork.

    AnothermajorroleoftheVMMistomanagehostsystemresourceaccess.Thisisimportant,asit

    canpreventoverutilizationofoneVMfromstarvingouttheperformanceofotherVMsonthesame

    host.Throughthesystemconfigurationconsole,systemhardwareresourcessuchastheCPU,

    network,anddiskaccesscanbethrottled,withmaximumusagepercentagesassignedtoeach

    individualVM.ThisallowstheVMMtoproperlyscheduleaccesstohostsystemresourcesaswellas

    toguaranteethatcriticalVMswillhaveaccesstotheamountofhardwareresourcestheyneedto

    sustain

    their

    operations.

    ClassicallytherearetwotypesofVMM.

    AtypeIIVMMisonethatrunsontopofahostingoperatingsystemandthenspawnshigherlevelvirtualmachines. ExamplesoftypeIIVMMsincludetheJavaVMand.Netenvironment. These

    VMMsmonitortheirvirtualmachinesandredirectrequestsforresourcetoappropriateAPIsinthe

    hostingenvironment(withsomelevelofprocessinginbetween).

    AtypeIVMMisonethatrunsdirectlyonthehardwarewithouttheneedofahostingoperatingsystem. TypeIVMMsarealsoknownas'hypervisors' sotheonlytruedifferencebetweenaVMM

    andahypervisoriswhereitruns. Thefunctionalityprovidedbybothisequitable. ExamplesoftypeI

    VMMsincludethemainframevirtualizationsolutionsofferedbycompaniessuchasAmdahland

    IBM,andonmoderncomputersbysolutionslikeVMwareESX,XenandWindowsvirtualization.

    HypervisorTheprimaryroleofthehypervisoristoworkwiththeVMMtocoordinateaccesstothephysicalhost

    system'shardwareresources.ThisincludesschedulingaccesstotheCPUaswellasthedriversfor

    communicationwiththephysicaldevicesonthehost,suchasitsnetworkcards.

    Thetermhypervisorisusedtodescribealightweightoperatingshellthathasthesolepurposeof

    providingVMhostingservices.ThehypervisordiffersfromatraditionalOSinthattheOSmaybe

    designedforotherrolesonthenetwork.AsitistailoredtoVMhosting,ahypervisorsolution

    generallyoffersbetterperformanceandshouldhavefewersecurityvulnerabilitiesbecauseitruns

    fewservicesandcontainsonlyessentialcode.Hypervisorswrittenforhardwareassisted

    virtualizationcanembedthemselvesmuchdeeperintothesystemarchitectureandoffersuperior

    performanceimprovementsasaresult.

    LikeanytraditionalOS,ahypervisorbasedOSstillcontainsitsownoperatingsystemcode;

    therefore,maintainingsecurityupdatesisstillimportant.UnlikeatraditionalOS,hypervisorsare

    vendorspecific,soanyneededhypervisorpatchesorsecurityupdateswillcomedirectlyfromthe

    virtualizationsoftwarevendor.Becausehypervisorsarevendorcentric,individualdevicesupport

    oftencomesdirectlyfromthevirtualizationvendors.Hence,itisimportantfortheorganizationto

    ensurethatanyplannedvirtualizationproductsarecompatiblewithitsexistingorplannedsystem

    hardware.WhenhostingVMsonatraditionalOSsuchasSUSELinuxEnterpriseServerorWindows

    ServerLonghorn,theorganizationwillfindthatwhilethehostOShasalargerfootprintthana

    hypervisor,it

    does

    provide

    additional

    flexibility

    with

    hardware

    devices.

    Bothhypervisorsandoperatingsystemshavetheirstrengthsandweaknesses.Operatingsystems

    providegreaterdevicesupportthanhypervisors,butalsorequireattentiontoensurethattheyare

    currentonallpatchesandsecurityupdates.Hypervisorsrunonminimaldiskandstorageresources,

    butpatchesanddevicedriversmustcomedirectlyfromthevirtualizationsoftwarevendor.

  • 8/2/2019 Virtualization a Limitless World

    4/6

    VMMv

    Therea

    Machin

    monitor

    theVM

    provide

    Compar

    Operati

    whichis

    deviced

    Inavirt

    anddev

    VMMru

    theVM

    access.I

    wouldn

    paravirt

    )Generatio

    Basedo

    categori

    Full

    fullvirt

    environ

    virtualiz

    several

    memor

    machin

    capable

    operati

    standal

    Para

    paravi

    machin

    modifie

    operati

    virtualiz

    guest(s)

    thevirt

    may

    allfromth

    machin

    Hypervisor

    reanumber

    Monitor'.

    ingandenf

    keepstra

    resources,

    ingTraditio

    gsystemsd

    wherethey

    riveraccess

    alizedenvir

    icedrivers.

    nsallVMsa

    mustprov

    Iftheguest

    otbeneces

    ualizationc

    nsofVirtua

    ntheextent

    esbasedon

    irtualizatio

    ualizationis

    ent,namel

    ationrequir

    irtualmach

    access,and

    ,andthatis

    ofexecutio

    gsystems.

    oneusecan

    Virtualizati

    tualizationi

    sthatissim

    dinterfacei

    nswhichar

    edenviron

    andhostto

    aldomain(

    w

    thevirtuavirtualdo

    executioni

    ofdifferent

    Inthesimpl

    rcingpolicy

    kofeveryth

    redirects

    th

    alx86Arch

    esignedfor

    runprivileg

    tosystemh

    onment,th

    achVMcan

    tRing1.Be

    idetranslati

    Skerneldi

    aryandthu

    mesintopl

    lization

    ofvirtualiz

    theirgener

    ,

    avirtualiza

    ly,onethati

    sthatever

    inesinclu

    whatevero

    intendedt

    ontheraw

    heobvious

    successfull

    n,

    savirtualiza

    ilarbutnoti

    toreducet

    esubstantia

    ent.Thepa

    requestand

    hereexec

    l

    machine

    aintotheh

    nsidethevi

    programsa

    stterms t

    onthevirtu

    inghappeni

    virtual

    ma

    itecturean

    x86/x64en

    edOSinstru

    ardware.Ap

    VMMruns

    notbegive

    auseprivile

    oninorder

    notdeman

    sperforman

    y.

    tion,thew

    tions:

    iontechniq

    sacomplet

    salientfea

    ingthefulli

    therelemen

    runinavir

    hardwarec

    testofvirtu

    runinside

    tiontechniq

    denticaltot

    heportion

    llymorediff

    ravirtualizati

    acknowled

    tionperfor

    onitor(VMostdomain)

    tualguest

    ndimpleme

    eVMMist

    almachines

    nginsideof

    hine

    to

    res

    Virtualize

    ironments

    ctions.Privil

    plicationsr

    atRing0al

    fullaccess

    gedinstructi

    otrickth

    dRing0acc

    cewouldim

    rldofvirtu

    eusedtop

    simulation

    ureoftheh

    nstructions

    tsareused

    ualmachin

    anberunin

    lizationis

    virtualma

    uethatpres

    hatoftheu

    ftheguest'

    iculttoruni

    ionprovides

    ethesetas

    anceiswo

    )

    to

    be

    sim,and/orred

    ntationstha

    epieceofs

    forwhichit

    avirtualma

    urces,

    or

    de

    ResourceA

    rewrittent

    egedinstru

    natRing3.

    ngwiththe

    oRing0wi

    ionswithint

    guestinto

    essinthefir

    provesubst

    izationisdi

    rovideacer

    oftheunde

    ardwarebe

    et,input/ou

    bythesoftw

    .Insuchan

    thevirtual

    hetherano

    hine.

    entsasoftw

    nderlyingha

    execution

    navirtuale

    speciallyde

    s,whichw

    se).Asucce

    pler

    (by

    reloucetheove

    usethem

    oftwareres

    isresponsib

    hine,and

    nies

    access

    ccess

    havefulla

    tionsinclud

    hostoperat

    houtinduci

    heguestex

    elievingth

    stplace,the

    antially.Thi

    idedintoth

    ainkindof

    rlyinghard

    reflectedint

    putoperati

    arethatrun

    environme

    achineand

    peratingsys

    areinterfac

    rdware.The

    imespentp

    vironment

    fined'hook

    uldotherwi

    ssfulparavir

    cating

    execuallperform

    niker'Virtu

    onsiblefor

    le. Thisme

    hennecess

    o

    resources

    ccesstoRin

    eOSkernel

    ingsystem's

    gconflicts,

    ecttoruna

    tithasRing

    nthetransl

    iswhere

    reemajor

    irtualmach

    are.Full

    ooneof

    ons,interru

    sonthebar

    t,anysoftw

    ,inparticul

    temintende

    etovirtual

    intentofth

    erforming

    comparedt

    'toallowth

    sebeexecu

    tualizedpla

    tion

    of

    critiancedegrad

    l

    nsthat

    ry

    .

    0,

    nd

    kernel

    sothe

    tRing0,

    0

    tion

    ne

    ts,

    e

    are

    r,any

    dfor

    anon

    e

    edin

    form

    al

    tasks

    ationof

  • 8/2/2019 Virtualization a Limitless World

    5/6

    Hard

    hardw

    virtualiz

    virtualiz

    unmodi

    comple

    V)in

    20

    ithard

    5)Concl

    We

    sce

    Wi

    Ne

    asp

    Referen

    Website

    1)http:

    2)http:

    3)http:

    4)http:

    5)http:

    6)

    www

    Papers:

    XenPaul BarhAlex Ho,

    wareassiste

    areassisted

    ationusing

    ationisuse

    iedguesto

    eisolation.

    6.Hardwararevirtual

    usion

    cantakevir

    nerios,itss

    hvariousty

    worketc,it

    ectoflife.

    ces:

    s:

    /www.kern

    /blogs.msd

    /en.wikiped

    /en.wikiped

    /en.wikiped

    .vmware.co

    nd theam_, Boris Draolf Neugebaue

    dvirtualizat

    virtualizati

    elpfromha

    tosimulate

    eratingsyst

    Hardwarea

    assisted

    vi

    achine(HV

    tualization

    copeisund

    pesofvirtu

    application

    lthread.co

    .com/b/virt

    ia.org/wiki/

    ia.org/wiki/

    ia.org/wiki/

    rt of Virovic, Keir Frasry, Ian Pratt, A

    ion.

    nisaplatfo

    rdwarecap

    acomplete

    em(usingth

    sistedvirtu

    tualizationi

    M),VirtualI

    saneverlas

    ubtedlyexp

    lizationslik

    andecono

    /publicatio

    ual_pc_guy

    irtualizatio

    86_virtuali

    Operating_s

    tualizatir, Steven Han

    drew War_eld

    rmvirtualiz

    bilities,pri

    hardwaree

    esameinst

    lizationwa

    salso

    know

    oncallsitn

    tingtechnol

    ectedtobe

    Hardware,

    icnature

    ns/virtualiza

    archive/20

    n

    zation

    ystemlevel

    n, Tim Harris,

    tionapproa

    arilyfromt

    nvironment,

    uctionseta

    addedtox

    asaccelertivevirtuali

    ogyandwit

    omeexpon

    Desktop,M

    illdefinitely

    tion/

    6/07/10/66

    virtualizati

    chthatenab

    hehostpro

    orvirtualm

    thehostm

    6processor

    tedvirtuali

    zation.

    theadvan

    ntially mor

    mory,Soft

    bringtheb

    1958.aspx

    n

    lesefficient

    essors.Full

    achine,inw

    achine)exe

    s(IntelVTx

    ation;Xenca

    ementinot

    ewidespre

    are,Dataa

    onspreadi

    full

    hichan

    utesin

    rAMD

    lls

    her

    d.

    nd

    every

  • 8/2/2019 Virtualization a Limitless World

    6/6

    University of Cambridge Computer Laboratory15 JJ Thomson Avenue, Cambridge, UK, CB3 0FD

    [email protected]

    Personalthanksto:

    1)Mr.Saurabh Singh(BrainSoft,Noida)

    2)Mr.Abhay

    Verma

    (IT

    VIII

    Semester,

    AKGEC)

    SubmittedBy:

    AnkurVerma

    B.TechVISemester

    Emailid:[email protected]

    Contact:8860016877

    ComputerScienceEngineeringDepartment

    AjayKumarGargEngineeringCollege

    Ghaziabad

    Digitally signed by Ankur

    Verma

    Date: 2012.04.30 07:50:14

    +05'30'


Top Related