VSS Lecture 4
VSS Lecture 4
• Often the building that housed a data center could not get
more electrical power or additional cooling capacity.
• Building larger or additional data centers was and still is
an expensive proposition.
• In addition to running out of room, the data centers often
had grown faster than the people managing them could
maintain them.
• It was common to hear tales of lost servers. A lost server is
a server that is running, but no one actually knows
which line of business owns it or what it is doing.
Microsoft Windows Drives Server
Growth
• These lost servers couldn’t be interrupted for fear of
inadvertently disrupting some crucial part of the
business.
• In some data centers, cabling was so thick and
intertwined that when nonfunctioning cables needed to be
replaced, or old cables were no longer needed, it was easier
to just leave them where they were, rather than try to
unthread them from the mass.
Virtual Resources
Hypervisor
A hypervisor is a software that you can use to
run multiple virtual machines on a single
physical machine.
Hypercall and Syscall
•A hypercall is a software trap from a domain to the
hypervisor.
• A syscall is a software trap from an application to the kernel.
• Domains will use hypercalls to request privileged operations
like updating page tables.
• In computing, a system call (commonly abbreviated
to syscall) is the programmatic way in which a computer
program requests a service from the kernel of the
operating system on which it is executed.
Privileged and Non-Privileged Instructions in Operating System
The Instructions that can run only in Kernel Mode are called Privileged Instructions .
Privileged Instructions possess the following characteristics :
• If any attempt is made to execute a Privileged Instruction in User Mode, then it will not
be executed and treated as an illegal instruction. The Hardware traps it in the Operating
System.
• Before transferring the control to any User Program, it is the responsibility of the Operating
System to ensure that the Timer is set to interrupt. Thus, if the timer interrupts then the
Operating System regains the control.
Thus, any instruction which can modify the contents of the Timer is Privileged
Instruction.
• Privileged Instructions are used by the Operating System in order to achieve correct
operation.
• Various examples of Privileged Instructions include:
I/O instructions and Halt instructions
Turn off all Interrupts
Set the Timer
Context Switching (resume)
Clear the Memory or Remove a process from the Memory
Modify entries in the Device-status table
What are Non-Privileged Instructions?
Applications:
DevOps, cloud computing, and microservices
OS-Level Virtualization
OS-Level Virtualization is a type of virtualization where multiple
isolated user-space environments (containers) share the same
operating system kernel instead of creating full virtual machines.
Unlike hardware virtualization, it does not require a hypervisor.
Techniques for Virtualizing CPU on x86
C h a le n g e s o fx 8 6 C P U V irtu a liz a tio n
Linux-Related Virtualization Projects
Linux-Related Virtualization Projects: QEMU
Linux-Related Virtualization Projects: QEMU
MIPS Processor Architecture
Linux-Related Virtualization Projects: VMware
Linux-Related Virtualization Projects: VMware
Linux-Related Virtualization Projects: Xen
Linux-Related Virtualization Projects: Xen
Vanderpool Technology – The BIOS
Optimization Guide
• Vanderpool is the development code name for the Intel
Virtualization Technology (IVT).
• It is a extension of the Intel x86 architecture
• It allows multiple operating systems to run
simultaneously on the same computer.
• It does this by creating virtual machines, each running its own
x86 operating system.
• A translation lookaside buffer is a memory cache that is
used to reduce the time taken to access a user memory
location. It is a part of the chip's memory-management unit.
• The TLB stores the recent translations of virtual memory to
physical memory and can be called an address-translation
cache.
Xen
Xen Network Architecture
Linux-Related Virtualization Projects: Linux-V Server