0% found this document useful (0 votes)
18 views10 pages

Survey of Server Virtualization: Radhwan Y Ameen Asmaa Y. Hamo

Uploaded by

ivadunxx
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views10 pages

Survey of Server Virtualization: Radhwan Y Ameen Asmaa Y. Hamo

Uploaded by

ivadunxx
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

(IJCSIS) International Journal of Computer Science and Information Security,

Vol.11, No. 3, 2013

Survey of Server Virtualization

Radhwan Y Ameen Asmaa Y. Hamo


Department of Comp. Engineering Dept. of Software Engineering
College of Engineering, Mosul University College of Computer Sc. and Mathematics, Mosul
Mosul, Iraq University
radeeameen@gmail.com Mosul, Iraq
asmahammo@yahoo.com

Abstract— Virtualization is a term that refers to the abstraction into several logical instances and to run on single physical
of computer resources. The purpose of virtual computing mainframe hardware as the host. This feature was invented
environment is to improve resource utilization by providing a because maintaining the larger mainframe computers became
unified integrated operating platform for users and applications cumbersome. The scientist realized that this capability of
based on aggregation of heterogeneous and autonomous partitioning allows multiple processes and applications to run at
resources. More recently, virtualization at all levels (system, the same time, thus increasing the efficiency of the
storage, and network) became important again as a way to environment and decreasing the maintenance overhead[15].
improve system security, reliability and availability, reduce
costs, and provide greater flexibility. Virtualization has rapidly II. VIRTUAL MACHINE
become a go-to technology for increasing efficiency in the
data center. With virtualization technologies providing A. Virtual Machine History
tremendous flexibility, even disparate architectures may be Virtual machines have been in the computing community
deployed on a single machine without interference This paper since 1960s, systems engineers and programmers at
explains the basics of server virtualization and addresses pros Massachusetts Institute of Technology (MIT ) recognized
and cons of virtualization . the need for virtual machines. In her authoritative discourse
Melinda Varian [15] introduces virtual machine technology,
Keywords- virtualization ,server ,hypervisor ,Virtual starting with the ccompatible Time-Sharing System (CTSS).
Machine Manager, VMM , para virtualization , full IBM engineers had worked with MIT programmers to
virtualization, OS level server. develop a time-sharing system to allow project teams to use
part of the mainframe computers. Varian goes on to describe
I. INTRODUCTION the creation, development, and use of virtual machines on the
IBM OS/360 Model 67 to the VM/370 and the OS/390 [15].
Virtualization is a technique for hiding the physical
Varian’s paper covers virtual machine history, emerging
characteristics of computing resources from the way in which
virtual machine designs, important milestones and meetings,
other systems, applications, or end users interact with those
resources. It introduces a software abstraction layer between and influential engineers in the virtual computing community.
the hardware and the operating system and applications In 1973, Srodowa and Bates [14] demonstrated how to
running on top of it [9] [ l ].This abstraction layer is called create virtual machines on IBM OS/360s. They describe the
virtual machine monitor (VMM) or hypervisor and basically use of IBM’s Virtual Machine Monitor, a hypervisor, to build
hides the physical resources of the computing system from the virtual machines and allocate memory, storage, and I/O
operating system (OS). Since the hardware resources are effectively. Srodowa and Bates touch on virtual machine
directly controlled by the VMM and not by the OS, it is topics still debated today: performance degradation, capacity,
possible to run multiple (possibly different) OSs in parallel on CPU allocation, and storage security.
the same hardware. As a result, the hardware platform is Goldberg concludes “the majority of today’s computer
partitioned into one or more logical units called virtual systems do not and cannot support virtual machines. The few
machines (VMs). ”Virtuality” differs from ”reality” only in the virtual machine systems currently operational, e.g., CP-67,
formal world, while possessing a similar essence or effect. In utilize awkward and inadequate techniques because of
the computer world, a virtual environment is perceived the unsuitable architectures“ [16].
same as that of a real environment by application programs and Goldberg proposes the “Hardware Virtualizer,” in which a
the rest of the world, though the underlying mechanisms are virtual machine would communicate directly with hardware
formally different. instead of going through the host software. Nearly 30 years
Virtualization was first developed in 1960’s by IBM later, industry analysts are excited about the announcement of
Corporation, originally to partition large mainframe computer hardware architectures capable of supporting virtual machines
(IJCSIS) International Journal of Computer Science and Information Security,
Vol.11, No. 3, 2013
efficiently. AMD and Intel have revealed specifications for many virtual machines and shares system hardware
Pacifica and Vanderpool chip technologies with special components such as CPUs, controllers, disk, memory, and I/O
virtualization support features. among virtual servers" [18].
The 1980s and early 1990s brought distributing computing
C. Virtual Machine Types
to data centers. Centralized computing and virtual machine
interest was replaced by standalone servers with dedicated Virtual machines are implemented in various forms.
functions: email, database ,Web, applications. Mainframe, open source, para virtualization, and custom
After significant investments in distributed architectures, approaches to virtual machines have been designed over the
renewed focus on virtual machines as a complimentary years. Complexity in chip technology and approaches to
solution for server consolidation projects and data center solving the x86 limitations of virtualization have led to three
management initiatives has resurfaced [17]. different variants of virtual machines:
Recent developments in virtual machines on the Windows 1. software virtual machines (see Figure 2), which manage
x86 platform merit a new chapter in virtual machine history. interactions between the host operating system and guest
Virtual machine software from Virtuozzo, Microsoft, Xen, and operating system (e.g., Microsoft Virtual Server 2005);
EMC (VMWare) has spurred creative virtual machine
solutions. Grid computing,computing on demand, and utility
computing technologies seek to maximize computing power in
VM VM VM
an efficient, manageable way.
The virtual machine was created on the mainframe. It has Hypervisor
only recently been introduced on the mid-range, distributed,
x86 platform. Technological advancements in hardware and Host Operating System
software make virtual machines stable, affordable, and offer
tremendous value, given the right implementation.
Host Hardware
B. Virtual Machine Concepts Fig. 2 Software virtual machines
Goldberg R. P defined Virtual machines as :"A 2. hardware virtual machines (see Figure 3), in which
system...which...is a hardware-software duplicate of a real virtualization technology sits directly on host hardware (bare
existing machine, in which a non-trivial subset of the virtual metal) using hypervisors, modified code, or APIs to facilitate
machine's instructions execute directly on the host machine..." faster transactions with hardware devices (e.g., VMWare
[22,23].While Goldberg R, June defined Virtual machines as: ESX);
"A virtual machine is taken to be an efficient, isolated
duplicate of the real machine. We explain these notions
through the idea of a virtual machine monitor” (VMM). VM VM VM
See Figure 1.

VMM
Hypervisor
Hardware Host Hardware
Fig. 3 Hardware virtual machines.

VM 3. virtual OS/containers (see Figure 4), in which the host


operating system is partitioned into containers or zones (e.g.,
Solaris Zones, BSD Jail).
Fig. 1 The virtual machine monitor
As a piece of software a VMM has three essential
characteristics. VM VM VM
First, the VMM provides an environment for programs
which is essentially identical with the original machine;
second, programs run in this environment show at worst CHROOT, Jail, Container
only minor decreases in speed; and last, the VMM is in
complete control of system resources".[ 20] and Kreuter, D Host Operating System
defined it as:
A virtual machine (VM) is an abstraction layer or
environment between hardware components and the end- user.
Host Hardware
Virtual machines run operating systems and are sometimes
Figure 4: Virtual OS/containers virtual machines.
referred to as virtual servers. A host operating system can run
(IJCSIS) International Journal of Computer Science and Information Security,
Vol.11, No. 3, 2013
A simple UNIX implementation called chroot allows an Chaudhary V.,Minsuk Cha.,Walters J.P.,Guercio S.,Gallo
alternate directory path for the root file system. This creates a S, defined it as :"Virtualization is a common strategy for
“jail,” or sandbox, for new applications or unknown improving the utilization of existing computing resources,
applications. Isolated processes in chroot are best suited for particularly within data centers."[3]
testing and applications prototyping. They have direct access Amit Singh defined it as: "Virtualization is framework or
to physical devices, unlike emulators. Sun Microsystems’ methodology of dividing the resources of a computer into
“Solaris Zones” technology is an implementation of chroot, multiple execution environments, by applying one or more
similar to the FreeBSD jail design, with additional features. concepts or technologies such as hardware and software
Zones allow multiple applications to run in isolated partitions portioning, time-sharing, partial or complete machine
on a single operating system [19]. simulation, emulation, quality of service, and many others."[2]
Each zone has its own unique process table and Joshua S. White,Adam W. Pilbeam defined it as:
management tools that allow each partition to be patched, "Virtualization is a mechanism permitting a single physical
rebooted, upgraded, and configured separately. Distinct oot computer to run sets of code independently and in isolation
privileges and file systems are assigned to each zone. [20]. from other sets". [6]
Sahoo J., Mohapatra S., Lath R. defined it as:
"Virtualization is a technology that introduces a software
III. VIRTUALIZATION
abstraction layer between the hardware and the operating
A. Definitions of Virtualization system and applications running on top of it."[l]
TBD Networks defined it as: "Virtualization is a
There are many definitions of term virtualization as shown technology that enables running two or more operating
below: systems simultaneously on a single computer."[5]’
Rune Johan Andresen defined it as : “Virtualization is a And Lawrence C. Miller, CISSP defined it as:
framework of dividing the resources of a computer into “Virtualization is technology emulates real or physical
multiple execution environments. More specific it is a layer of computing resources, such as desktop computers and servers,
software that provides the illusion of a real machine to processors and memory, storage systems, networking, and
multiple instances of virtual machines.” [4] [11] individual applications.”[25]
While Susanta Nanda , Tzi-cker Chiueh defined it as : We define it as: “virtualization is a technology to divided
”Virtualization is a technology that combines or divides or combined the resources of computer system between
computing resources to present one or many operating multiple operating systems or applications, to make illusion
environments using methodologies like hardware and software that each one access the real resources”.
partitioning or aggregation, partial or complete machine
simulation, emulation, time-sharing, and many others”. . [7] B. Benefits of virtualization
IBM defined it as: “Virtualization is the creation of There can be innumerous reasons how virtualization can be
substitutes for real resources, that is substitutes that have the useful in practical scenarios, a few of which are the following:
same functions and external interfaces as their counterparts,
but that differ in attributes, such as size, performance, and  Server Consolidation. [9] [23] [ 8] [25] [29] [40]
cost.” [29]
Andi Mann defined it as : "Virtualization is, at its  Application consolidation. [ 8] [25] [40]
foundation, a technique for hiding the physical characteristics  Sandboxing[ 8,].
of computing resources from the way in which other systems,
applications, or end users interact with those resources. This  Multiple execution environments[ 8] [40]
includes making a single physical resource (such as a server,  Virtual hardware. [ 8]
an operating system, an application, or storage device) appear
to function as multiple logical resources; or it can include  Multiple simultaneous OS[13]. [ 8, [40].
making multiple physical resources (such as storage devices or  Debugging. [ 8]
servers) appear as a single logical resource." . [9]
G. Heiser defined it as:“virtualization allows a single  Software Migration. [ 8]
computer to host multiple virtual boards (or virtual machines),
 Appliances[23] [ 8].
each isolated from one another, with the possibility of running
different operating systems. The main advantage is that, if a  Testing[23] [40].
virtual board fails, the other ones are kept safe at a reasonable
 Better Use of Existing Hardware[ 9].
cost “[10].
William von H defined it as : "Virtualization is simply the  Reduction in New Hardware Costs[9] [8][23][28] [36]
logical separation of the request for some service from the
physical resources that actually provide that service". . [8]  Reduction in IT Infrastructure Costs[ 9] [23] [36]
 Reduced downtime[9] [28] [36].
 Simplified System Administration[ 9].
(IJCSIS) International Journal of Computer Science and Information Security,
Vol.11, No. 3, 2013
 Increased Uptime and Faster Failure Recovery[ 9]
 Simplified Capacity Expansion[ 9]
 Simpler Support for Legacy Systems and applications
[12] [ 9] [23] [40].
 Simplified System - Level Development[ 9] [40].
 Simplified System Installation and Deployment[ 9].
 Simplified System and Application Testing Business
Continuity and Disaster Recovery[9] [ 9] [23] [25] [28]
[29].
 Business Agility[9].
 Resource sharing .
 Isolation [13]. [12].
 Increase Flexibility. [9] [13]. [40]
 Increase Availability[23] [26] [36].
 Increase Scalability[23] [26] [36] .
 Increase Hardware utilization[12]. [26] Fig. 5 Types of virtualization

 Increase Security[12]. [26] [. 2) Data Virtualization


 Load Balancing[36] Data virtualization from Andi Mann: "Data virtualization
abstracts the source of individual data items including entire
 brings hardware independence[13] [26]. files, database contents, document metadata, messaging
information, and more and provides a common data access
C. Disadvantage of virtualization layer for different data access methods such as SQL, XML,
 SPOF Single Point of Failure Problem. JDBC, File access, MQ, JMS, etc. This common data access
layer interprets calls from any application using a single
 Overhead causing decreased performance has been the protocol, and translates the application request to the specific
biggest con with virtualization. protocols required to store and retrieve data from any
 The management interface This can be a problem as supported data storage method. This allows applications to
it encumbers consolidation of several platforms into access data with a single methodology, regardless of how or
the same environment. where the data is actually stored." [9]
 Increase in Networking Complexity and Debugging
3) Memory Virtualization
Time. [1][8][9].
Carl A. Waldspurger ,Palo Alto define it as:
A guest operating system that executes within a virtual
D. Types of virtualization
machine expects a zero-based physical address space, as
There are so many different types of virtualization, Mobile, provided by real hardware. ESX Server gives each VM this
Data, Memory, Desktop, Storage, Server, Network, illusion, virtualizing physical memory by adding an extra level
Application, Grid, and Clustering as shown in fig 5. of address translation. Borrowing terminology from Disco
1) Mobile Virtualization [34], a machine address refers to actual hardware memory,
VMware defined it as : Mobile Virtualization(MVP) is a while a physical address is a software abstraction used to
thin layer of software that is embedded on a mobile phone to provide the illusion of hard-ware memory to a virtual machine.
decouple the applications and data from the underlying We will often use “physical” in quotes to highlight this
hardware. It is optimized to run efficiently on low power deviation from its usual meaning.[33]
consuming and memory constrained mobile phones. The MVP
currently supports a wide range of real-time and rich operating 4) Desktop Virtualization
systems including Windows CE 5.0 and 6.0, Linux 2.6.x, William von H defined it as: The term “desktop
Symbian 9.x, eCos, µITRON NORTi and µC/OS-II. virtualization” describes the ability to display a graphical desktop
from one computer system on another computer system or smart
display device.
Many window managers, particularly those based on the X
Window System, also provide internal support for multiple, virtual
desktops that the user can switch between and use to display the
(IJCSIS) International Journal of Computer Science and Information Security,
Vol.11, No. 3, 2013
output of specific applications. The X Window System also supports clustering is to group a number of identical physical servers to
desktop virtualization at the screen or display level, enabling window provide distributed processing power for high-volume
managers to use a display region that is larger than the physical size applications, or as a “Web farm”, which is a collection of Web
of your monitor.[8] servers that can all handle load for a Web-based application."
[9]
5) Storage Virtualization
Li Bignag, Shu Jiwu, Zheng Weimin defined it as :
10) Server Virtualization( machine , cpu )
"Storage Virtualization is the emerging technology that creates
The terms “ server virtualization ” , “ machine virtualization
logical abstractions of physical storage systems. Storage ”and “cpu virtualization” describe the ability to run an entire
Virtualization has tremendous potential for simplifying storage virtual machine, including its own operating system, on another
administration and reducing costs for managing diverse operating system. The most common virtualization known in
storage assets."[21] general is Server Virtualization.

6) Network Virtualization a) Server Virtualization definitions:


Naga Dinesh define it as: “Network Virtualization :would Lawrence C. Miller defined it as: “Server virtualization
provide abstraction layer that can decouple the physical creates “virtual environments” that allow multiple applications
network equipment from the delivered business services over or server workloads to run on one computer, as if each has its
the network to produce a more responsive and well-organized own private computer”.[25]
communications"[22] While Naga Dinesh define it as: "The technique of
masking of server resources, which includes the identity and
7) Application Virtualization number of every existing servers, processors, and OS users is
Naga Dinesh Defined it as: "This type of virtualization termed as server virtualization".[22]
allows the user to run the application using local resources HP define it as: “server virtualization refers to abstracting,
without installing the application in his system or masking, a physical server resource to make it appear
completely".[22] different logically to what it is physically. In addition, server
While Joshua S. White, Adam W. Pilbeam define it as : virtualization includes the ability for an administrator to
"provides smaller single application virtual machines that relocate and adjust the machine workload.”[26]
allow for emulation of a specific environment on a client VMware define it as: “virtualization enables one computer
system. For example a Java Virtual Machine allows disparate to perform the job of multiple computers, by sharing the
operating systems such as Windows and Linux to run the same resources of a single computer across multiple
Java program as long as they have the Java VM installed. This environments”.[30]
form of virtualization is limited in that it only provides single Citrix system define it as: “the ability to decouple software
program isolation from the host, but is useful when testing from the hardware layer, allowing server workloads to be
programs out without installing them". [6] streamed onto any platform in any direction.” [32]
And Darla Sligh define it as: “Server virtualization is a
8) Grid Computing software-based tool enabling the division of computer
Andi Mann defined it as: "Like a cluster, a grid provides a resources and the sharing of multiple environments
way to abstract multiple physical servers from the application simultaneously.” [31]
they are running. The major difference is that the computing We define it as: “server virtualization is the ability to run
resources are normally spread out over a wide network, many operating systems with isolation and independences on
potentially across the Internet, and the physical servers that other operating system”
comprise a grid do not have to be identical. Unlike a cluster,
where each server is locally connected, is likely to be b) Server Virtualization types
identical, and can handle the same processing requirements, a Figure 6 show the traditional computer system without
grid is made up of heterogeneous systems, in diverse virtualization.
locations, each of which may specialize in a particular In x86 environments, there are several variations within
processing capability. Much greater coordination is needed to software-layer abstraction of the server hardware, including
allocate the resources to appropriate workloads." [9] these general categories:
9) Clustering
Andi Mann define it as: "A cluster is a form of
virtualization that makes several locally-attached physical
systems appear to the application and end users as a single
processing resource. This differs significantly from other
virtualization technologies, which normally do the opposite,
i.e. making a single physical system appear as multiple
independent operating environments. A typical use case for Fig. 6 x86 privileged level architecture without virtualization.
(IJCSIS) International Journal of Computer Science and Information Security,
Vol.11, No. 3, 2013
i. Emulation
Emulation is a virtualization method in which a complete
hardware architecture may be created in software. This
software is able to replicate the functionality of a designated
hardware processor and associated hardware systems. This
method provides tremendous flexibility in that the guest OS
may not have to be modified to run on what would otherwise
be an incompatible architecture. Emulation features
tremendous drawbacks in performance penalties as each
instruction on the guest system must be translated to be Fig. 7 The binary translation approach
understood by the host system. This translation process is
extremely slow compared to the native speed of the host, and iii. Hosted OS, application-layer abstraction
therefore emulation is really only suitable in cases where virtualization
speed is not critical, or when no other virtualization technique With Hosted OS, application-layer abstraction
will serve the purpose. Examples of this approach are QEUM, virtualization as shown in figure 8,another software-only
Bochs , crusoe , and BIRD. [6] [7][8] approach uses a hypervisor layer that is hosted by an
underlying OS. Because it resides as an application on top of
Advantages: the host OS, this type of abstraction inherits its hardware
 tremendous flexibility in that the guest OS may not support and device compatibility from the host OS. This
have to be modified. provides an advantage for customers who want to run an older,
Disadvantages: legacy OS on newer server hardware. However, the tradeoff
 performance penalties as each instruction on the guest for this hardware compatibility is the performance overhead
system must be translated to be understood by the host required by the hypervisor layer. Typically, such hosted
system. solutions are used in smaller, departmental environments
rather than in large data center deployments because the
ii. Binary translation hosted solutions often lack capabilities such as dynamic load
With binary translation technology as shown in figure 7, balancing or clustering. Examples of this approach are
the guest OS is not aware it is operating on virtualized Microsoft Virtual Server 2005 R2and VMware Server
hardware. The hypervisor manages the access of each guest (formerly VMware GSX)[26][31] [35][8] [ 37] [38].
OS to the physical hardware resources by masking the
hardware from the guest OS. It emulates portions of the Advantages:
system hardware and provides the guest OS with the illusion  Virtualization product is installed onto the host desktop
of a standard physical server with well-defined hardware just as any other application
devices. The hypervisor ensures that any instructions from the  The host desktop OS can continue to be used
guest OS that affect system parameters—such as privileged
instructions to the CPU—are handled in a way that does not  Uses the host OS’s device drivers - the virtualization
affect the operation of other guest operating systems or cause product supports whatever hardware the host does
OS kernel faults. The hypervisor traps the instruction and Disadvantages:
performs necessary translations that make the guest OS think  Slow performance. [36]
it has complete control over the server hardware. The critical
issue of dynamical binary translation is its low performance
efficiency and design complexity due to the incapability of
classical trap-and-emulate virtualization with previous
generation of x86 architecture. Examples of this approach is
VMWare ESX [26][31][8][39] [38]

Advantages:
 provides the guest OS with the illusion of a standard
physical server with well-defined hardware devices.
Fig 8 Hosted OS, application-layer abstraction virtualization
 No need to modified guest OS.
Disadvantages: iv. Hardware- assisted virtualization (full virtualization,
 low performance efficiency bare-metal virtualization)
With hardware-assisted virtualization (sometimes referred
 design complexity due to the incapability of classical
to as full virtualization) as shown in figure 9, the hypervisor is
trap-and-emulate virtualization
assisted by the processor hardware such as AMD-V or Intel
VT-x processor virtualization technologies. In this scenario,
(IJCSIS) International Journal of Computer Science and Information Security,
Vol.11, No. 3, 2013
when the guest OS makes a privileged instruction call, the is that it does not simulate hardware resources but instead
processor (CPU) traps the instruction and returns it to the offers a special Application Programming Interface (API) to
hypervisor to be emulated. Once the operation is serviced by hosted virtual machines. Examples of this approach are Xen,
means of the hypervisor, the modified instruction is returned Denali and User-Mode Linux (UML) [36] [26][31][1][6]
back to the CPU for continued execution. Hardware assistance [3][7] [35] [ 37] [38].
reduces the software overhead required by the hypervisor.
Hardware assistance from AMD-V and Intel VT-x Advantages:
technologies extends the x86 instruction set with new  significant performance improvements over other
instructions that affect the processor, memory, and local I/O virtualization solutions
address translations. The new instructions enable guest
Disadvantages:
operating systems to run in the standard Ring-0 architectural
 The VM OS must be modified.
layer, as they were designed to do, removing the need for ring
compression. Examples of this approach are Microsoft Hyper-
v, Citrix Xen , Parallels Workstation, Virtual Iron and
VMWare ESX Server [26][31][1][7][8][35] [ 37] [38]

Advantages:
 Performance .
 Products are distributed as appliances or server OSes.
Disadvantages
 Vendor publishes a hardware compatibility list (HCL)
that dictates what hardware can be used with their Fig. 10 The Paravirtualization approach
virtualization product. [36]
vi. Hosted OS, kernel-layer abstraction (OS Containers
virtualization, Single Kernel Image (SKI))
Kernel-layer abstraction as shown in figure 11, refers to a
technique in which the abstraction technology is built directly
into the OS kernel rather than having a separate hypervisor
layer. System - level virtualization is based on the change root
(CHROOT) concept that is available on all modern UNIX -
like systems.. The direct access to hardware could potentially
provide greater performance than using a binary translation
technology; however, because there is no separation between
Fig. 9 The hardware assist approach the hypervisor and the operating system, there is the
possibility that resource conflicts may occur between multiple
v. Paravirtualization virtual machines. Virtual OS containers do not use hypervisors
Paravirtualization as shown in figure 10, refers to a (or VMM), which is a software application that works to
technique in which the guest OS includes modified manage the logical separate of physical resource [40]. They
(paravirtualized) I/O drivers for the hardware. Unlike a binary use containers, or sandboxes, called chroot, to partition the
translation approach, the hypervisor does not need to trap and host operating system into containers or zones (e.g., Solaris
translate all privileged layer instructions between the guest OS Zones, BSD Jail), so multiple applications can run in isolated
and the actual server hardware. Instead, the modified guest OS partitions on a single operating system. [26][31] [35] [ 37]
makes calls directly to the virtualized I/O services and other this concept implements virtualization by running more
privileged operations. Therefore, paravirtualization techniques instances of the same OS in parallel. This means that not the
have the potential to exhibit faster raw I/O performance than hardware but the host OS is the one being virtualized[1] OS-
binary translation techniques. Some of the hypervisor layer virtualization tends to be more efficient and fails only by
implementations that use this method (Citrix XenServer, Red little to provide the same isolation [41]. Examples of this
Hat Enterprise Linux 5, and SUSE Linux Enterprise) are approach are FreeBSD ’ s chroot jails, FreeVPS, Linux
unique in that they support paravirtualization when using a VServer, OpenVZ, Solaris Zones and Containers, and
modified guest OS and hardware-assisted virtualization when Virtuozzo. [8] [38].
the guest OS is not virtualization-aware. Device interaction in Advantages:
paravirtualized environment is very similar to the device
interaction in full virtualized environment; the virtual devices  Performance
in paravirtualized environment also rely on physical device  Reduced disk space requirements, containers can use
drivers of the underlying host. Where paravirtualization differs the same files
(IJCSIS) International Journal of Computer Science and Information Security,
Vol.11, No. 3, 2013
Disadvantages: Type 1 and Type 2 (see Figure 13,14). A Type 1
 The VM OS must be the same OS as the host OS. [36] hypervisor, also known as a native or bare metal hypervisor,
type 1 hypervisors run directly on the system hardware. The
following figure shows one physical system with a type 1
hypervisor running directly on the system hardware, and three
virtual systems using virtual resources provided by the
hypervisor.
A Type 2 hypervisor, also known as a hosted hypervisor, it
run on a host operating system that provides virtualization
services, such as I/O device support and memory management.
The following figure shows one physical system with a type 2
hypervisor running on a host operating system and three
virtual systems using the virtual resources provided by the
hypervisor.[25][29]
Fig.11 Containers virtualization

vii. Native virtualization, Hybrid


virtualization, a hybrid
virtualization as shown in figure 12, is the newest form. It
is a combination of full virtualization and paravirtualization
and uses input/output (I/O) acceleration techniques. This
compromise allows for an increase in speed (and indeed with
hardware acceleration it can be very fast), but potential
performance degradation can exist in an environment where
the instructions are relying more heavily on the emulated
actions rather than the direct hardware access portions of the Fig. 13 Type 1 hypervisors.
hypervisor It adds overhead and complexity. Examples of this
approach are VMware and Microsoft Virtual PC [31] [6][35]
[38]
Advantages:
 Performance
Disadvantages:
 Requires the underlying processor have virtualization
extensions (examples: Intel-VT, AMD-V) to function.
 Older hardware that could otherwise be utilized by
other virtualization architectures cannot be used. . [36]
Fig.14 Type 2 hypervisors
c) Advantages of server virtualization
many researchers note the following benefits for
virtualizing servers within data centers
 enabling automated data center operations[24]
 improving the speed of service delivery[24]
 supporting application configuration and availability.
[29]
Fig. 12 The Hybrid Virtualization  Consolidation to reduce hardware cost
IV. TYPES OF HARDWARE VIRTUALIZATION  reducing the need for physical servers[24].
1) Type 1(native or bare metal ).  reducing server operational maintenance[28].
2) Type2(hosted ).
The kernel was known as the supervisor in mainframes;  reducing the operating expense][26].
hence the term hypervisor was coined for the software  reducing provisioning and the deploying of new
operating above the supervisor. services[28]
Two types of hypervisors are defined for server
virtualization:  reducing disaster recovery times[24] ][26]
 improving network and application security[27]
(IJCSIS) International Journal of Computer Science and Information Security,
Vol.11, No. 3, 2013
 reducing costs associated with the test and [8] William von H,2008,” Professional Xen Virtualization”,Wiley
Publishing, Inc.
development of in-house applications[27] [29]
[9] Andi Mann,2006,” Virtualization 101: Technologies, Benefits, and
 enabling simple, responsive, utility-style „cloud challenges”, Enterprise Management Associates, Inc.
computing‟ infrastructure[27] [10] G. Heiser, 2008,”The role of virtualization in embedded systems”,In
IIES ’08: Proceedings of the 1st workshop on Isolation and integration
 reducing various testing and migration issues][26]. in embedded systems, pages 11–16, New York, NY, USA,. ACM.
[11] Rosenblum M. and Garfinkel T. , May 2005 ,"Virtual machine monitors:
 Reducing (TCO) Total Cost of Ownership[27] [29] current technology and future trends". Computer, 38(5):39–47.
 Improving Flexibility, High Availability and [12] Renato J. Figueiredo, Peter A. Dinda, and J. Fortes, 2003. "A case for
grid computing on virtual machines". In ICDCS ’03: Proceedings of the
Performance[27] [29] 23rd International Conference on Distributed Computing Systems, page
550,Washington, DC, USA. IEEE Computer Society
d) Pitfalls of server virtualization [13] Alexandra Aguiar, Fabiano Hessel ,2010 ,”Embedded Systems’
Researchers indicate that improper employment of server Virtualization: The Next Challenge”,IEEE.
virtualization can result in the following pitfalls [14] Srodawa, R. J. and Bates, L. E. 1973. "An efficient virtual machine
implementation".In Proceedings of ACM SIGARCH-SIGOPS
 overloading the server utilization infrastructure, which Workshop on Virtual Computer Systems.
can introduce application latency; [31] [15] Varian, M. 1997. "VM and the VM community: Past, present, and
future. Office of Computing and Information Technology", Princeton
 increasing IT operational costs because of additional University, Princeton, NJ.
time and resources required for extensive research [16] Goldberg, R. P. 1973." Architecture of virtual machines". Honeywell
efforts; [31] Information Systems, Inc., Billerica, MA.
[17] Serjeant, A. 2005. "Building a case for server consolidation".
 magnifying failures because a hardware failure could VMWorld.Presentation (Oct. 20).
impact multiple virtual servers and the applications [18] Kreuter, D. 2004. “Where server virtualization was born”, Virtual
they host;[31] Strategy Magazine (July 21).
 introducing virtual machine sprawl, which may [19] Tucker A, Comay, D, 2004," Solaris zones:Operating system upport
substantially increase the overall number of server for server consolidation". Sun Microsystems, Inc.
operating images that need to managed by system [20] Jeff Daniels ,2009, "Server Virtualization Architecture and
Implementation", www.acm.org/crossroads, Vol. 16, No.1
administrators; [31]
[21] Li Bignag, Shu Jiwu, Zheng Weimin, February 2005, "Design and
 enabling improper security processes because within Implementation of a Storage Virtualization System Based on SCSI
the virtual server, the server administrator with access Target Simulator in SAN", Tsinghua Scienceand Technology, Vol. 10,
Issue 1, pp 122-127.
to the root ID can alter or disable security settings;
[22] Naga Dinesh,2011,"An approach to storage virtualization", Master of
thereby , exposing servers to security science, Texas A&M University-Kingsville
vulnerabilities;[31] [23] Jeanna N, Eli M, Todd D, Wenjin H, Jeremy B, Patrick F, Brendan
 exposing IT operations to network (traffic) J,2008,” Running Xen: A Hands-On Guide to the Art of Virtualization”,
Prentice Hall.
uncertainties][31]
[24] Wolf, C., & Halter, E., (2005).," Virtualization from the desktop to the
 requiring enhanced IT skill sets to manage more enterprise"., New York: Apress.
environments at once.[31] [25] Lawrence C. Miller, CISSP,2012,”Server Virtualization For
Dummies®, Oracle Special Edition”,John Wiley & Sons, Inc
[26] HP,2009, “Server virtualization technologies for x86-based HP Blade
System and HP ProLiant servers technology brief, 3rd edition”, Hewlett-
REFERENCES Packard Development Company, L.P.
[1] Sahoo J., Mohapatra S., Lath R., 2010 ,"Virtualization: A Survey On [27] Ravi G Singh, (2007).," Server Virtualization and Consolidation - A
Concepts, Taxonomy And Associated Security Issues", Second case study"., IBM Corp..
International Conference on Computer and Network Technology, pp. [28] VMware, (2006).," Reducing Server Total Cost of Ownershipwith
222 - 226. VMware Virtualization Software” , VMware, Inc.
[2] Amit Singh, 2004, "An Introduction to Virtualization", kernelthread.com [29] IBM, (2005).," IBM SystemsVirtualization Version 2 Release
[3] Chaudhary V., Minsuk Cha., Walters J.P., Guercio S., Gallo S., "A 1”International Business Machines Corporation 2005
Comparison of Virtualization Technologies for HPC ", 22nd [30] VMware,2009" Transform your business with virtualization", VMware
International Conference on Advanced Information Networking and inc
Applications, 2008, pp. 861 - 868. [31] Darla Sligh. ,2010. "PERSPECTIVES OF IT PROFESSIONALS ON
[4] Rune Johan Andresen,2004,” Virtual Machine Monitors”, Enterprise EMPLOYING SERVER VIRTUALIZATION TECHNOLOGIES"
Management Associates, Inc ,,Ph.D. , Robert Morris University
[5] TBD Networks," Network Virtualization", www.tbdnetworks.com, [32] Citrix system,,2007" A pragmatic approach to server and data center
accessed on 02/02/2011. consolidation",. PlateSpin Ltd.PlateSpin Ltd
[6] Joshua S. White,Adam W. Pilbeam,2010,“ A Survey of Virtualization [33] Carl A. Waldspurger ,Palo Alto , 2002, "Memory Resource Management
Technologies With Performance Testing”, eprint arXiv:1010.3233 in VMware ESX Server",The USENIX Association.
[7] Susanta Nanda , Tzi-cker Chiueh, “A Survey on Virtualization [34] Edouard Bugnion, Scott Devine, Kinshuk Govil, and Mendel
Technologies”, Department of Computer Science SUNY at Stony Brook Rosenblum., November 1997, “Disco: Running Commodity Operating
Systems on Scalable Multiprocessors,” ACM Trans-actions on
Computer Systems.
(IJCSIS) International Journal of Computer Science and Information Security,
Vol.11, No. 3, 2013
[35] Yang Yu,2007,” OS-level Virtualization and Its Applications”,Ph.D, [39] Marshall, D., Reynolds, W., & McCory, D. ,2006. " Advanced server
Stony Brook University virtualization" , Auerbach Publishing, Inc
[36] Jean S. Bozman, Gary P. Chen, 2009,"Optimizi ng Hardware for x86 [40] Qian Lin, Zhengwei Qi, Jiewei Wu, Yaozu Dong, Haibing Guan,2012"
Server Virtualization",IDC. Optimizing virtual machines using hybrid virtualization", Elsevier Inc.
[37] Greg Shields,2008,” Selecting theRight Virtualization Solution”, [41] Soltesz, Stephen; Poetzl, Herbert; Fiuczynski, Marc E.; Bavier, Andy;
Realtimepublishers.com, Inc. Peterson, Larry, 2007,” Container-based operating system virtualization:
[38] VMware,2007" Understanding Full Virtualization, Paravirtualization, a scalable, high-performance alternative to hypervisors”, Proceedings of
and Hardware Assist", VMware inc the 2007 conference on EuroSys. ACM Press.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy