Virtualization
Virtualization
Virtualization
Concepts
What is Virtualization
1
20/01/2024
What is Virtualization
What is Virtualization
2
20/01/2024
Virtualization Concept
Virtual Resources
IXlSubstitutes for real resources: same interfaces/functions, different attributes.
IXlOften of part of the underlying resource, but may span multiple resources.
Virtualization how
Virtualization… How?
By adding a layer
between execution
stack layers.
Types of Virtualization
3
20/01/2024
Virtualization how
Hardware-level Applications
virtualization
VMM* is placed between the
hardware and the OS.
Could provide a different ISA.
e.g. Emulators.
Tasks:
Maps virtual resources to real
ones.
Translate virtual instructions to
real one
* VMM = Virtual Machine
Monitor
Virtualization how
System-level AppI.icaliODS
virtualization
placed between the OS
and other OS e.g. VMware
Wks and UML
Enable several OS to run
on single hardware.
Terminology
Host OS
Guest OS
Guest OS and VM run in
Application privilege ring.
4
20/01/2024
Virtualization how
Application- Applications
level
virtualization
VM is placed between the OS and
the applications.
e.g. Java Virtual Machine (JVM)
Provide same interface to all
Application, irrespective of OS.
Provide Application Sand-boxing.
Tasks:
Translate Application byte code
to
OS-specific executable.
Memory virtualization
10
5
20/01/2024
11
Network Functions
Virtualization
Network functions virtualization (NFV) (also known as virtual network
function (VNF)) offers a new way to design, deploy and manage networking
services.
NFV decouples the network functions, such as network address translation
(NAT), firewalling, intrusion detection, domain name service (DNS), and
caching, to name a few, from proprietary hardware appliances so they can
run in software.
It’s designed to consolidate and deliver the networking components needed
to support a fully virtualized infrastructure – including virtual servers,
storage, and even other networks.
It utilizes standard IT virtualization technologies that run on high-volume
service, switch and storage hardware to virtualize network functions.
It is applicable to any data plane processing or control plane function in
both wired and wireless network infrastructures
12
6
20/01/2024
Network Functions
Virtualization
True Network Virtualization
Logical Topology
7
20/01/2024
When a guest OS attempts to execute a privileged instruction, the VMM traps the
operation and enforces the correctness and safety of the operation.
The VMM guarantees the isolation of the individual VMs, and thus ensures
security and encapsulation, a major concern in cloud computing.
15
A VMM virtualizes the CPU and memory. For example, the VMM traps interrupts
and dispatches them to the individual guest operating systems.
If a guest OS disables interrupts, the VMM buffers such interrupts until the guest
OS enables them.
The VMM maintains a shadow page table for each guest OS and replicates any
modification made by the guest OS in its own shadow page table.
This shadow page table points to the actual page frame and is used by the
hardware component called the memory management unit (MMU) for dynamic
address translation. 16
8
20/01/2024
Type 1 hypervisors
17
Type 1 hypervisors
Type 1 hypervisor
Hypervisor
Hardware
Figure 2. AType 1 01' bare-metal hypervisor sits directly 011 the host
hardware,
18
9
20/01/2024
Type2 Hypervisors
Type 2 hypervisor
Type 2 is more of an application installed on an operating
system and not directly on the bare-metal.
EX. VirtualBox and Vmware Workstation
Advantages:
Run on a greater array of HW because the underlying Host OS
is controlling HW access,
Easy user interface, Data can be secured on the desktop
Disadvantages:
Decreased security, Loss of Centralized Management, Lower
VM Density,
Cannot support as many VMs are the first type.
19
Type2 Hypervisors
Type 2 hypervisor
-
Operating system 2 (guest)
20
10
20/01/2024
Virtual Machines
21
W32I W32
Java JIIVa
App Aw
Native Netive
:.a:;e l\;:e f-:-:--+-7-:-:--1 App App \\rindows
VM VM VMM
Linux Linux
x86 186
Process VM System VM
22
11
20/01/2024
VM Taxonomy
different II ~di".:~ent
same/SA /SA same/s~ ~
23
Challenges of virtualization
Performance degradation -
As it interposes and abstraction layer between guest &
host.
Inefficiency and degraded user experience
Some of specific features of the host is unexposed.
Security holes and new threats
Case 1 – emulating a host in a completely transparent
manner.
Case 2 - H/w virtualization , malicious programs can
preload themselves before the OS and act as a thin VMM.
24
12
20/01/2024
~KVM OpenVZ
EMU Microsoft
Hyper-V
. AenServer
CiTRlX'V
Container -
LC~:''..·...,,-; r"
'._./
~
"';; // (.O.(J)~i)(tllf
,.,j\_.,\,:::~~\.:)
Technology
26
13
20/01/2024
Docker containers
27
Docker containers
LIGHTWEIGHT
Containers running on a single machine share the same
operating system kernel; they start instantly and use less RAM.
Images are constructed from layered file systems and share
common files, making disk usage and image downloads much
more efficient.
OPEN
Docker containers are based on open standards, enabling
containers to run on all major Linux distributions and on
Microsoft Windows -- and on top of any infrastructure.
SECURE BY DEFAULT
Containers isolate applications from one another and the
underlying infrastructure, while providing an added layer of
protection for the application.
28
14
20/01/2024
Docker containers
ACCELERATE DEVELOPERS
Stop wasting hours setting up developer environments,
spinning up new instances, and making copies of production
code to run locally. With Docker, you simply take copies of
your live environment and run them on any new endpoint
running a Docker engine.
EMPOWER CREATIVITY
The isolation capabilities of Docker containers free developers
from constraints: they can use the best language and tools for
their application services without worrying about causing
internal tooling conflicts.
DISTRIBUTE & SHARE CONTENT
Store, distribute, and manage Docker images in Docker Hub
with your team. Image updates, changes, and history are
automatically shared across your organization.
29
15
20/01/2024
31
32
16
20/01/2024
,,~~~
EMc'
!®:c_ln-" Oeore
•
e ,_
_.- oocter
~!. --- -
Infoblox.' @ OJoyent liII
IUSMATIC
,
tiiIIKyup
Pivotal
~
MESOSPHERE
;:;OLYVERSE
DMIaosoft
",edhat
~
aQIIIlr.JIoo
resm.io
! ~U5E Osysdig 8 'ock
~
IE Verizonlabs -.:I,rtuozzovmware- l!>- m:::I:;::-
33
17