Xen , Linux Vserver , Planet Lab

Slides:



Advertisements
Similar presentations
PlanetLab: An Overlay Testbed for Broad-Coverage Services Bavier, Bowman, Chun, Culler, Peterson, Roscoe, Wawrzoniak Presented by Jason Waddle.
Advertisements

Virtualization Dr. Michael L. Collard
Virtual Machine Technology Dr. Gregor von Laszewski Dr. Lizhe Wang.
Virtualisation From the Bottom Up From storage to application.
PlanetLab Architecture Larry Peterson Princeton University.
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Bart Miller. Outline Definition and goals Paravirtualization System Architecture The Virtual Machine Interface Memory Management CPU Device I/O Network,
PlanetLab Operating System support* *a work in progress.
PlanetLab: Present and Future Steve Muir 3rd August, 2005 (slides taken from Larry Peterson)
Virtualization in HPC Minesh Joshi CSC 469 Dr. Box Feb 1, 2012.
CS-3013 & CS-502, Summer 2006 Virtual Machine Systems1 CS-502 Operating Systems Slides excerpted from Silbershatz, Ch. 2.
Virtualization for Cloud Computing
An Overview of Virtual Machine Architectures by J.E. Smith and Ravi Nair presented by Sebastian Burckhardt University of Pennsylvania CIS 700 – Virtualization.
Container-based OS Virtualization A Scalable, High-performance Alternative to Hypervisors Stephen Soltesz, Herbert Pötzl, Marc Fiuczynski, Andy Bavier.
Virtualization 101.
Tanenbaum 8.3 See references
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Paper on Best implemented scientific concept for E-Governance projects Virtual Machine By Nitin V. Choudhari, DIO,NIC,Akola.
Zen and the Art of Virtualization Paul Barham, et al. University of Cambridge, Microsoft Research Cambridge Published by ACM SOSP’03 Presented by Tina.
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
ICT Day Term 4,  Virtualisation is growing in usage.  Current CPU’s are designed to support Virtualisation.  Businesses are looking at virtualisation.
A Cloud is a type of parallel and distributed system consisting of a collection of inter- connected and virtualized computers that are dynamically provisioned.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Operating System Support for Virtual Machines Samuel T. King, George W. Dunlap,Peter M.Chen Presented By, Rajesh 1 References [1] Virtual Machines: Supporting.
Virtualization Concepts Presented by: Mariano Diaz.
Xen Overview for Campus Grids Andrew Warfield University of Cambridge Computer Laboratory.
Eric Keller, Evan Green Princeton University PRESTO /22/08 Virtualizing the Data Plane Through Source Code Merging.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Virtual Machine Monitors: Technology and Trends Jonathan Kaldor CS614 / F07.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
Intel IT Overlay Jeff Sedayao PlanetLab Workshop at HPLABS May 11, 2006.
An Overview of the PlanetLab SeungHo Lee.
CS533 Concepts of Operating Systems Jonathan Walpole.
High Performance Computing on Virtualized Environments Ganesh Thiagarajan Fall 2014 Instructor: Yuzhe(Richard) Tang Syracuse University.
Issues Autonomic operation (fault tolerance) Minimize interference to applications Hardware support for new operating systems Resource management (global.
Marc Fiuczynski Princeton University Marco Yuen University of Victoria PlanetLab & Clusters.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
VMware vSphere Configuration and Management v6
Virtual Machines Created within the Virtualization layer, such as a hypervisor Shares the physical computer's CPU, hard disk, memory, and network interfaces.
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
Full and Para Virtualization
Virtualization One computer can do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Turning hardware.
Operating-System Structures
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
Virtual Machines. A virtual machine takes the layered approach to its logical conclusion. It treats hardware and the operating system kernel as though.
Cloud Computing – UNIT - II. VIRTUALIZATION Virtualization Hiding the reality The mantra of smart computing is to intelligently hide the reality Binary->
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
01/27/10 What is PlanetLab? A planet-wide testbed for the R & D of network applications and distributed computing Over 1068 nodes at 493 sites, primarily.
Open Source Virtualization Andrey Meganov RHCA, RHCX Consultant / VDEL
1 Virtualization "Virtualization software makes it possible to run multiple operating systems and multiple applications on the same server at the same.
Virtualization Dr. Michael L. Collard
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
Container-based Operating System Virtualization: A scalable, High-performance Alternative to Hypervisors Stephen Soltesz, Herbert Potzl, Marc E. Fiuczynski,
Building a Virtual Infrastructure
Xen: The Art of Virtualization
Virtual Servers.
Oracle Solaris Zones Study Purpose Only
1. 2 VIRTUAL MACHINES By: Satya Prasanna Mallick Reg.No
CIT 480: Securing Computer Systems
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
Virtualization Layer Virtual Hardware Virtual Networking
Virtualization 101.
Virtualization Techniques
LAB 01 Installation of VIRTUAL MACHINE and LINUX
Xen and the Art of Virtualization
A Virtual Machine Monitor for Utilizing Non-dedicated Clusters
Presentation transcript:

Xen , Linux Vserver , Planet Lab Virtualization Xen , Linux Vserver , Planet Lab

Paper Container-based Operating System Virtualization: A Scalable, High-performance Alternative to Hyper visors Stephen Soltesz, Herbert P¨otzl, Marc E. Fiuczynski, Andy Bavier, and Larry Peterson Princeton University PlanetLab Architecture: An Overview Larry Peterson*, Steve Muir*, Timothy Roscoey, Aaron Klingaman* * Princeton University , Intel Research – Berkeley

What is virtualization ? Virtualization is a broad term which refers to many different aspects of computing. In essence has to be some sort of abstraction of resources. These resources could be computing power or storage.

Why is virtualization important ? The one server one application idea can be avoided. Multiple servers can coexist on the same physical machine bringing IT costs down. Also makes administration easier.

Why is virtualization important ? Data Recovery Other areas include research areas such as Planet Lab , High Performance Clustering etc. http://news.zdnet.com/2036-2_22-6058678.html

Basic Concepts Host – The physical computer on which the virtual machine is loaded. Virtual Machine – It’s a software environment which appears to a guest OS as hardware. It consists of some computing power (CPU), Memory, NIC, and hard drive. Virtualization Layer – This is what is available as resources to the virtual machines. Also know as virtual machine monitor.

Different Virtualization Models Vmware Model Xen Model Linux Vserver Model

VMware model Reference: Virtualization with VMware ESX Server By Al Muller, Seburn Wilson Publisher: Syngress

Full Virtualization It provides total abstraction of the underlying physical system and creates a complete virtual system in which the guest operating system can execute. No modification is required in the guest OS or application. Example VMware ESX server

Drawbacks of Full Virtualization X86 architecture is not meant for virtualization. This reduces performance and increases complexity.

Xen Model Reference : http://www.dell.com/downloads/global/power/ps3q05-20050191-Abels.pdf

Para virtualization This provides each VM with an abstraction of the hardware that is similar but not identical to the hardware. It requires modification to the guest OS that are run on the VM. No changes to the ABI are to be made, so applications remain the same.

Issues in Virtualization Efficiency Vs Isolation The paper argues that isolation is dependant on the usage scenario. It sacrifices isolation partially in favour of performance.

Motivation for Container based OS Organizations run many copies of the same server software, operating system distribution and kernels in their mix of VMs. If this is the case then the same shared virtualized OS image can be used for all virtual machines.

Container Based OS VMM

Container Based OS VMM Hosting platform consists of the shared OS image and the privileged host (VMHost). VMHost – This is the VM that the system admin uses to manage other VMs.

How does this differ from Xen ? Fault Isolation : Container based VMM cant provide fault isolation as they use a single shared kernel. So if the kernel fails, all the VMs are affected. Resource Isolation : VMM should be able to isolate one VM from accessing resources of another VM. Security Isolation: VMM should isolate access to logical objects such as files, memory addresses, user id’s and so on.

How does this differ from Xen ? Key Difference : Hypervisors can run multiple kernels while container based OS VMM cant do that. On the other hypervisor based systems cant have live update.

Security Isolation in container based VMM Contexts : Separation of namespaces Filters : Access Control Lists Hardware virtualization

Resource Isolation CPU Isolation Token bucket filter runs on top of O(1) scheduler. Each VM has a bucket where it collects tokens at a specified rate. Tokens are charged on the basis of running processes per VM.

Resource Isolation Network Isolation Hierarchical Token bucket is used to provide bandwidth reservations. Each VM has a specified reservation and a share. Each packet has a context id tagged to it to map it to the VM.

Security Isolation Processes belonging to different VMs are not allowed to interact with each other.

Comparison

Planet Lab Overview Planet Lab is a geographically distributed platform for deploying, evaluating, and accessing planetary-scale net-work services. The internet has been a success and as a result has become ossified – that is it is resistant to change. Its difficult to introduce new ideas without trying them out. Reference : http://www.planet-lab.org/Talks/2004-01-30-APAN.pdf Planet Lab is a sort of a test bed or deployment platform of 1000 servers spread across more than 35 countries.

Planet Lab Features Distributed Virtualization : The need is for a global platform that supports broad coverage services at multiple points of presence. Each service runs as a slice of Planet Lab’s global resources. What is a slice ? A slice is a network of virtual machines.

Virtual Machine Monitor (VMM) Planet Lab Features Node : A physical machine capable of one or more virtual machines. It must have at least one non-shared IP address. Each unique node has a unique node Id. Node Mgr Local Admin VM1 VM2 VMn … Virtual Machine Monitor (VMM)

Planet lab Features Node Manager : It is a program running on each node that creates VMs on that node and controls the allocation of resources to those VMs.

Slices

Slices

Slices The individual VM’s that make up a slice contain no information about the other VMs in the set. The slice state is maintained by the Slice Authority. This task is done by the PLC for system wide slices. Creating a slice is a multistage process involving the node owner, slice creation service and a slice authority.