Home
Introduction to Virtualization
Contents
1. Huge architecture Difficult to configure a new workload Rigid and not inflexible General technical platform Easy management system Shared resource library Simple architecture Easy to configure the new workload On demand and flexible Main Points Definition of virtualization ON ature of virtualization Previous computing system or components that run in real environment are now running in virtual environment Real computing model Virtual Computing model Operating System Operating System Operating System Virtual Execution Virtual Execution Environment Environment Definition Virtualization is an abstraction of computer resources We can access resources in a consistent way before and after abstraction through virtualization This kind of resource abstraction is not limited by implementation geographical location or the underlying physical configuration Operating System Operating System Operating System Virtual Execution Virtual Execution Environment Environment CPU Hard Disk I O Devices 474 S a e eris Main Points Common types of virtualization lim 5 Common types of Virtualization Types Infrastructure Virtualization System Virtualization Software Virtualization Infrastructure Virtualiza
2. au D init d su we root init dl etc init d vsftpd start wt vsftpd AE vsftpd BA JE root init di B bash 3 2 eth Use ifconfig command to find the ip address of the local network adapter Inet addr of Eth0 is the local IP address ifconfig Link encap Ethernet HWaddr 00 0C 29 02 A7 C7 inet addr 192 168 66 136 Bcast 192 168 66 255 Mask 255 255 255 0 inet6 addr fe80 20c 29ff fe02 a7c7 64 Scope Link UP BROADCAST RUNNING MULTICAST MTU 1500 Metric l RX packets 9344 errors 0 dropped 0 overruns 0 frame 0 TX packets 89 errors 0 dropped 0 overruns 0 carrier 0 collisions 0 txgueuelen 0 RX bytes 2503588 2 3 MiB TX bytes 21306 20 8 KiB Start a VM terminal and enter ftp ip address of ftp server Then enter root root password or user user password that you create or anonymous so that you own another VM ftp client Use get filename command to download file Use bye command to quit Detailed introduction of vsftpd can be found http linux vbird org linux_server 0410vsftpd php server_vsftpd conf rn Bibliography University of Cambridge User s Manual Xen v3 0 2002 EB OL http www cl cam ac uk research srg netos xen readmes user Paul Barham Boris Dragovic Keir Fraser Xen and Art of virtualization Proceeding of the nineteenth ACM symposium on Operating system principles 2003 164 177 R P Goldberg Survey of Virtual Machine Research J IEEE C
3. A Could not detect which operating system is in this disc image You will need to specify which operating system will be installed O FORTE LUBE 5 Gli eI ERR T Step 3 Select installation image iso n the browser select the downloaded installation disk file M New Virtual Machine Wizard 0 n X Select a Guest Operating System Which operating system will be installed on this virtual machine EPIHA C Microsoft Windows Linux Novell NetWare C Sun Solaris C VMware ESX O HHC has V Step 4 Select a guest operating system Select Windows Windows 2000 xp Select Linux Fedora Ubuntu OpenSUSE RHEL OpenSUSE sofi OpenSUSE 64 bit amp Oracle Enterprise Linux Orade Enterprise Linux 64 bit Red Hat Enterprise Linux 5 TC Red Hat Enterprise Linux 5 64 bit Red Hat Enterprise Linux 4 Um Red Hat Enterprise Linux 4 64 bit Red Hat Enterprise Linux 3 J TPriRedHat Enterprise Linux 3 64 bit F Red Hat Ente Linux 2 Metin n Step 5 Select a Sun Java Desktop System SUSE Linux Enterprise 11 specific type of SUSE Linux Enterprise 11 64 bit N SUSE Linux Enterprise 10 operating system SUSE Linux Enterprise 10 64 bit SUSE Li Enterprise 7 8 9 isa Entre 7 8 9 64 bit Choose other linux SUSE Linux N SUSE Linux 64bit 2 6 x kernel in case it Turbolinux pt is Fedora Other lin 2 6 x keme rr Choos
4. Introduction to Virtualization Dr Oingni Shen Peking University Intel UPO Supported Main Points Status and trends in data center O Definition of virtualization Common types of virtualization Key technologies of sever virtualization Mainstream virtualization softwares and the practice of virtualization technology c c x x N e e e e N I I I I N N N v AM 5 i Ou 9 d JT v i e L ac O lllllQ1lllllll ll l I m Pd Data network and storage network Infrastructure Department B pets of traditional chimney data center 100 ervers of lack 80 of processing large amount NH ability 60 of processing P ability which 40 1 is fail to use All servers Defect 1 According to the statistics the average server utilization in data center is below 30 but there is still a considerable number of servers can not meet their service level objects Defect 2 The deployment of a new application needs budget procurement installation and tests product launching and other processes and the cycle will be over a period of weeks to months so it is difficult to response to the business needs timely Defect 3 The number of servers and management costs have afi x Ni ar relatiopshi with the number of applications so there is e
5. 3 CPU needs to provide an additional ring for Hypervisor only calling ring 1 Guest OS still runs in ring 0 but when OS calls privileged instructions they will be turned to Hypervisor in the ring 1 through hardware mechanism and the Hypervisor manages the hardware Disadvantages Need hardware support such E Classification of VMM Hosted Need to run on Host OS which provides the driver and hardware communication vUMLinux User Mode Linux O Independent monitoring Run directly on hardware layer v VMware s ESX Server v Xen Hybrid v VMWare Workstation Disks PC Hardware Memory CPU VMware Workstation Architecture ag x El VMM Es a The implementation technology of VMM CPU Virtualization 9 Memory Virtualization I O Virtualization OPU Virtual ization Traditional CPU level classification OS kernel Service SS Application Level 3 The x86 processor responses to 4 different priority called ring 0 to ring 3 Ring O has the highest priority and ring 3 has the lowest priority Ring 0 is used for OS kernel ring 1 and ring 2 are used for OS services and ring 3 is used for applications i traps interrupts and exce user code b text and stack Te regions system code text and stack reglons 3 System mode he privilege level Q i eu t nu a i Ec User mode A privilege level 3 Privileged an
6. Note that root is equivalent to the Windows administrator and you probably need to set a administrator password similar to the password of Windows administrator 2 Recommend gnome desktop for Fedora and Ubuntu KDE desktop for OpenSUSE IS Ie gT E rp If you need to get in depth knowledge please refer to Opensuse http linux chinaunix net techdoc beginner 2009 01 01 1055973 shtml Fedora http wenku baidu com view ce7083ce05087632311212cd html Ubuntu http server zol com cn 121 1218526 html Set up of FTP Server Optional Red Hat Enterprise Linux 5 EB Fedora12 lt NIINA EE LS te xu ox QU Internet b J ha 4 EE EEV GEP HEH T fe po bin boot PARLE a 6 Ex 2 Fre n Automatic Bug REGIE Tool Hy gt CD DVD aes LET gt yj HTTP o Ba SELinux Policy Generation Tool sd SELinux FEHH LE E7 v 11 a HARMIA O BATRANA m T H E Mita v ay lt S arena I ENEA 5 EIA start up the virtual machine Open a terminal in the virtual machine operating system Note In general the terminal program can be found in the application menu start ftp service Note that it is likely to be in normal user mode when you start the terminal at first We need to enter the root mode to start it The method is enter the command su then enter the password of root then enter the commands as shown you can start ftp service
7. on main mn gt Xen virtual machine which is also called Xen VMM is an open source project developed by computer laboratory of Cambridge University Xen virtual machine has two kinds of operation modes e Full virtualization Para virtualization m As aa a x P W i o Hardware support for virtualization INTEL VI series VT x Virtualization Technology for IA 32 Processor assisted virtualization VT d Virtualization Technology for Directed I O I O assisted virtualization direct I O VT c Virtualization Technology for Connectivity Network assisted virtualization TXT Trusted Execution Technology Pt RE eat S pi iotice of virtualization technology Tasks Choose one of the following topics VM name of each group should be unified as follows Group Number Crew initials VM Sequence number For example The second VM of group one should be name 1zslswwZzl2 while all the members are Zhang Shan Li Si Wang Wu and Zhao Liu Please screenshot the name 1 Install an operating system in virtual platform and create an account Degree of difficulty 1 2 people per group 2 Establish a ftp connection between two OSes in virtual platform Degree of difficulty99 2 5 people per group 3 Build virtual platform on the OS on virtual platform and install an OS on it Degree of difficulty999 5 7 people per group SF W g AR S N LA 2 Ke F T Experimental purposes 1 gt
8. system and the decline in the cost of hardware virtual machine technology could not develop its advantage people cooled down their study enthusiasm for it O PPS RE Ne CE 74 JA aK p ba Vir S JA NI e Now Based on the high performance of the computer hardware how to reduce system cost and improve system resource utilization rate how to reduce management cost how to enhance the safety and reliability how to improve portability and increase software development efficiency make the importance of virtual machine technology more obvious make virtual machine technology becom he research hotspot again KN N la Architecture of Virtualization Technology m D Disks PC Hardware Memory CPU 5 VMware ESH Hardware N H VMware Workstation Architecture Domo DomU PVGuest DomU HVM JA M DEG Native V ter Up zJ Xen VMM REM CH CPU BERL WEH bl Virtual machine system is realized by adding a virtual layer VMM virtual Machine Monitor or Hypervisor to an existing platform bare computer or operating system gt VMM A system software which can maintain multiple efficient and isolated program environment VMM manages the real resources of computer system and provides interface for virtual machines gt VM Virtual Machine A complete computer system with full functions of hardware system through software simulation and runs in a
9. Understand the concept of virtualization 2 gt Master how to set up and use virtual machine 3 gt Understand the way of establishing a network connection between VMs 2 4 gt Understand basic operations of Vmware and Xen and how to install OS on them 3 Experimental reguiremnt 1 gt Install a Virtual machine Monitor 2 gt Install OS on virtual platform 3 gt Establish a ftp connection between VMs 2 4 gt Build a virtual platform on the VM on virtual platform and install os on 1t 3 5 gt Write lab reports screenshots and proper interpretation of each step 1s required PARTI ra urta Resource Reauired o e wu r oc 7 LD Red Hat Enterprise Linux 5 VMware Workstation SR E SSV EHM SEM EUM BH M e Gam 05646008 58 X Red Hat Enterprise Linux 5 x RIC Red Hat Enterprise Linux 5 qos piii ZAREE Red Hat Enterprise Linux 5 wat F RHEL Red Hat Enterprise Linux 5 vmx mk Workstation 6 5 7 0 virtual machine MF D hE ea Memory lj Geese amp Processors Hard Disk SCSI S Ace THESE 2 o IDE E Floppy E Network Adapter uss Controller Sound Card Display 20 GB Using file H 2 iso Auto detect NAT Present Auto detect Auto detect Vmware Workstation http www xdowns com sott softdown asp softid 64236 24 5 b T Resource Required I 1 out of 3 Ubuntu http cdimage ubuntu com dvd current ma verick
10. d non privileged instructions The instruction set is usually divided into two kinds of instructions which are non privileged and privileged instructions Non privileged does not change the value or state of shared resources Shared resources include processor memory timer and registers of special purposes Non privileged instructions include arithmetic instructions logic instructions and so on Privileged instructions are all used to access the value or state of shared resources including shutdown set the timer set the program counter change the value of the relocation register and instructions associated with I O Non privileged instructions can be directly executed by VMM while the privileged instructions require simulation exec B ee ba PA ek Bg Cr Difficulties of the CPU classification in virtual system Generally speaking Host OS should run in Ring 0 but in order to avoid the destruction to Host OS by Guest OS Guest OS must run under Ring O such as Ring 1 The problem is that in order to realize the full system functions of Guest OS the thread must be in Ring 0 So virtual software needs to coordinate with Guest OS and Host OS of the thread priority and this kind of transformation will inevitably increase system complexity which leads to poor performance of software virtual technology and the processing ability of CPU and memory will be largely spent during this process Data shows that this kind of d
11. dvd 1386 iso Fedora http download fedoraproject org pub fed ora linux releases 14 Fedora 1386 1so Fedo ra 14 1386 DVD iso fedora Opensuse http ftp jaist ac jp pub Linux openSUSE distribution 11 3 iso openSUSE 11 3 DVD 1586 1s0 T openSUSE Creation of VM LD Red Hat Enterprise Linux 5 VMware Workstation W we EE SEM SHIM Sam SOW RH EN gt ESM Ctrl N FIFF O Ctrl O BA Ste T IEEE ACE SERRES FAC Ctrl W SEME SEN RESIS M MiP HOO n semina Step 1 Open Vmware Choose File gt New gt Virtual Machine E THON n S Processors Hard Disk SCSI 20GB G S Ace HF 8 2 CD DVD IDE Using file H 2 iso H Floppy Auto detect HS Network Adapter NAT pa Controller Present Sound Card Auto detect ER Display Auto detect RIPARTE He WAAL S Step 2 Select Typical configuration 88211 4332 tet ETA Create a Workstation 6 5 7 0 virtual machine in a few easy steps O BEX WO ei 17 UN PIIRN Fh SCSI ae VMware SARI AERA VMware Pg Beth ng Workstation 7 RARE 0 Guest Operating System Installation A virtual machine is like a physical computer it needs an operating system How will you install the guest operating system 372 M O BBO chi DVD RW Sizes 1 FRAME iso M H Tomato_XP_V1 21 iso v sea R
12. e directly if it is Other Li 2 4 x kernel i OA Ubuntu or opensuse n Other Linux 2 2 x kernel v k E New Virtual Machine Wizard Name the Virtual Machine What name would you like to use for this virtual machine ibus Ubuntu fas d Ubuntu BEN RAM gt SENNA SMR Bak Next gt Cancel Step 6 Select a name and folder for the virtual machine Name method again Group Number Crew initials VM Sequence number For example The second VM of group one should be name 1zslswwZzl2 while all the members are Zhang Shan Li Si Wang Wu and Zhao Liu Enter VM installation address Specify Disk Capacity How large do you want this disk to be The virtual machine s hard disk is stored as one or more files on the host computer s physical disk These file s start small and become larger as you add applications files and data to your virtual machine BABA GMS 20 0 Recommended size for Ubuntu 20 GB ITA RIO O Bir KIA 2 GB TERR RP Splitting the disk makes it easier to move the virtual machine to another computer Pocket ACE Fehi H Step 7 Specify the capacity of the virtual disk generally more than 10G Choose gt Store as a single file Step 8 Click Finish BEALE PSE RENE WITTREERSZIS SIS EAP Installation of the operating system is very friendly to the novice and it can be finished independently
13. egradation of system performance will be 5 to 40 Hardware CPU virtualization In order to improve the efficiency of CPU virtualization we need to use hardware to realize the switch of different levels In the field of server CPU can put VMM in ring 1 Thus Intel and AMD develop VT x and AMD V technology respectively realizing the isolation between VMM and Guest OS with the help of CPU x 4 a m A n m N k Memory Virtualization VMM must has the ultimate control of physical memory that is to sav it must control the operation of mapping guest physical address space to host address space In this way we can realize memory virtualization Host Harder Meer S Method of memory virtualization VMM maintains a virtual machine memory management data structure shadow page table VMM allocates memory pages to different virtual machines through shadow page table Like OS virtual memory VMM can map virtual machine memory pages to disk so virtual machine can apply for more memory than machine physical memory VMM is also able to allocate memory dynamically according to each virtual machine s requirements RE P TEE Freguent change to page tables by OS increases the overhead of updating the shadow page table operation so using hardware to manage shadow page table will be the future research direction 1 0 Virtualization Hosted 1 0 Virtualization With the structu
14. n absolutely isolated environment gt Host OS Classification of Virtualization implementation technologies Full Virtualization Ring 3 It uses a kind of technology called Binary Translation The core idea is Ring 2 EMEN that the hypervisor runs in ring 0 which is responsible for the management of the underlying hardware Guest OS runs in ring 1 Edi and when they call the privileged OS instructions VMM in the ring 0 will requests uses binary translation to stop these binary instructions and is responsible for the translation following work of the instructions Disadvantages Hardware software interception mechanism Para virtualization Guest OS can still run in ring 0 but we need to modify the OS kernel The call for the privileged instructions calls into the hypervisor which is called Hypercall A typical representative of para virtualization is Xen So when guest OS in the ring 0 calls privileged instructions it will Implementation turn into Hypercall but hypervisor of privileged operations by the Hypercall YESOUFCES MEET sadvantage still supervises the system hardware The need to modify OS kernel Non root mode A WEN OS s requests Root trap into mode Hypervisor P No binary Hardware translation inc J paravirtuali zation Hardware assisted Virtualization CPU needs to support virtualization technology Besides ring 0 to ring
15. normous pressi pe ma and cost gs ases of low resource utilization Over configure the servers to cope with a small amount of peak load 7 R AU TEL TNT e PLUMA PR DUC ALL Time Visible cost 30 of the budget will be used in new infrastructure and new application development Invisible cost 70 of the budget will be used in the maintenance of existing facilities and personnel expenses Server Data storage interconnection network network network ze LAN HPC WAN Storage cluster MAN network erid Intelligent information Network IIN Integration Centralization and Standardization to Lower Costs Improve Efficiency and Uptime Three stages Virtualization Management of Resources Independent of Underlying Physical Infrastructure to Increase Utilization Efficiency and Flexibility Fg a Computing Network Storage resources resource resource U IT infrastructure development in data center Automation Dynamic Provisioning and Information Lifecycle Management ILM to Enable Business Agility Business Policies On Demand Service Oriented AS N Computing resources Network resources Storage resources 378 E les 3 2 Isolated techno island Complex management system Resource are not shared
16. omputer Magazine 1974 34 45 Nanda S Chiueh T A survey on virtualization technologies 2005 http www ecsl cs sunysb edu tr TR179 pdf Michael Steil Inside VMware 2006 http events ccc de congress 2006 Fahrplan attachments 1132 InsideVMware pdf 058 MR PE Xen MEANA PONK S ERI 2009 Uhlig R Neiger G Rodgers D et al Intel virtualization technology Computer 2005 38 5 48 56 LUN DI TAKE N Li a P t pe T A Ei Intel UPO Supported
17. ove the utilization rate reduce cost focus on skills Purchase the needed only Simplify the environment Concentrate on core skills Improve the response speed of business change DNS server s average utilization rate is 10 File Print Server Web Server average utilization rate is 10 average utilization rate is 10 Email server Application Server average utilization rate is 10 average utilization rate is 20 gt gp Firewall average utilization rate is 10 Lower IT cost Higher utilization rate Less complexity More automatic management Higher guality of service Support dynamic migration Better fault tolerance With isolation better safety Container based management have encapsulation Flexible easy to expand Misa Exchange Server 2010 DIRACLE My H don Server n E 000 Virtual Infrastructure 000 Cloud Computing Platform LE LELE LELER CPU Pool Storage Pool K TO 8 Wena 2 Grn m AMA P a A S iim 27 Development of virtualization technology The virtual machine technology firstly appeared in the last 60 s in order to improve the utilization rate of precious computing resources impel the wide study and use of virtual machine technology E amp A O In the 80 s and 90 s with the popularization of multitask and multiuser operating
18. re of host and use drivers of hosted OS s I O device Disadvantages Y It greatly increases the performance overhead of virtualization Y Modern OSs such as Windows and Linux have no support for resources management to provide performance isolation and service assurance which are basic requirements of many server enwir Page 39 ni ke Hardware 1 0 Virtual ization The trend of I O subsystem is toward the direction of the development of hardware support It is possible to transmit I O device to software in virtual machines directly with enough hardware support This will effectively eliminates all I O virtual overhead To do this I O device needs to get hold of virtual machine and support multiple virtual interface so that VMM can safely map interface to virtual machine Intel V I d is the representative of hardware I O T e virtualization EI DE jV s Main Points Status and trends in data center ODefinition of virtualization Common types of virtual ization Key technologies of sever virtualization Mainstream virtualization softwares and the practice of virtualization technology m AT Ds Me n lt S 27 Mainstream virtualization softwares E vmware VMWare Not open source VMware ESX Server Can directly run on top of hardware without host OS In fact it is a modified Linux kernel VMware WorkStation VMware GSX Server Need host OS OXen Open source ve
19. tion Network Virtualization Integrate network hardware resources with software resources to provide users with virtualization technology of virtual network connection It can be divided into VLAN and VPN gt Storage Virtualization Provide an abstract logical view of physical storage device so the user can access the integrated storage resources through unified logical interface of this view It can be divided into storage device based storage virtualization eg RAID and network based storage virtualization eg NAS SAN Application Application Server Server Application Server SCSI FC FC Switch Ethemet Switches gt gt gt System Virtualization Core idea Create one or more virtual machines using virtualization software on physical machine PC Server Virtualization The maximum value of system virtualization Desktop Virtualization Solve the coupling relationship between PC desktop environment including applications and files etc and physical machines Virtualized desktop environment is stored on a remote server and when user has compatible device with sufficient display ability eg PC Smart Phones etc all the programs and data will eventually stored in the remote server ELSE SEG Sen Cemer e PS Pia e R RS F FERRA Citrix XenClient Citrix Essentials for CRE Hi creme EN Windows ti Microsoft Yet vet MIETIN EFE The Java Vir
20. tual Machine Java Bytecode Software Virtualization gt The High level language virtualization Solve the migration problem of executable programs between different architectures Programs which are written in high level language will be compiled into standard intermediate instructions and these instructions will be executed during interpretation or compiled environment such as Java virtual machine JVM Application Virtualization Decouple applications from operation systems and provide a virtual running environment for applications including application executable files and required runtime environment Application virtualization server can push user required program components to the client virtual running File Server Lowest Cost environment timely such as VMWare ThinApp JN A AUTAT ET a D je Es Peories of Virtualization LEE Ve nappe gt gt oO Application Par Program Library l System Calls Operating System AN ISA Instructiorr vet Hardware Computer System Application level Virtua ASM Una VM K m Programming language level Virtualization Program library level Virtualizatio Operating system level VMWare Xen Virtual PC O Hardware level M irtualization Main Points Key technologies of sever virtualization Ner virtualization technology Convenient to manage Impr
Download Pdf Manuals
Related Search
Related Contents
As informações e descrições dos equipamentos HP 6Gb User's Manual 55-027-001 r7 800_900 UG.qxd:55-027 Art.-No. 55294 Art.-No. 55295 Art.-No. 55296 BFC-E Manuel d`utilisation - DSI スポットエアコン 取扱説明書 I.C.T.C. Holdings Corporation Countertop User's Manual Copyright © All rights reserved.
Failed to retrieve file