Cloudcomputing m1&2
Cloudcomputing m1&2
2. Non-privileged Instructions:
- These are safe to use without affecting other tasks since they don’t access
shared resources.
- Examples include instructions for math operations (floating-point, fixed-
point, arithmetic).
3. Privileged Instructions:
- These are restricted because they control sensitive system operations.
- Behavior-sensitive instructions handle input/output (I/O) operations.
- Control-sensitive instructions change the state of CPU registers.
4. Privilege Levels:
- Some systems have more than one level of privileged instructions,
using a hierarchy to control access.
- A common implementation uses rings of privilege:
- Ring 0: Most privileged, used by the OS kernel.
- Ring 1 and Ring 2: Used by OS services.
- Ring 3: Least privileged, used by regular user applications.
• This setup, called the Hosted Virtual Machine Architecture, keeps the
virtual system separate from the main one and ensures it runs smoothly.
• The VMware software only needs to get involved when something tricky
happens, like accessing hardware, but for normal tasks, the VMM controls
the CPU and memory directly.
• The virtual machines you create are saved as
files on your computer, and you can do things
like:
• Pause them
• Take snapshots to save their current state
• Roll back to an earlier point if something goes
wrong
Pros and cons of virtualization
• Virtualization offers several important benefits,
especially in managing and isolating tasks.
• By creating virtual environments, harmful
operations can be prevented from affecting the
main system.
• virtualization makes it easier to allocate and
share resources between virtual machines, which
is helpful in combining multiple servers into one.
• Portability, Virtual machines are like files you can easily move between
computers, and they don’t rely on anything other than the software that
runs them. This makes them easy to manage and transfer, just like how a
Java program can run anywhere if there’s a Java virtual machine installed.