0% found this document useful (0 votes)
8 views38 pages

VSS Lecture 4

The document discusses the evolution and impact of Microsoft Windows on server growth and data centers, highlighting the transition from paper-based systems to technology-driven operations. It explains the challenges faced by data centers, such as power limitations and management issues, as well as the emergence of virtualization techniques like hypervisors, full virtualization, and containerization. Additionally, it covers privileged and non-privileged instructions in operating systems and various virtualization projects related to Linux.

Uploaded by

jannatimtiaz288
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views38 pages

VSS Lecture 4

The document discusses the evolution and impact of Microsoft Windows on server growth and data centers, highlighting the transition from paper-based systems to technology-driven operations. It explains the challenges faced by data centers, such as power limitations and management issues, as well as the emergence of virtualization techniques like hypervisors, full virtualization, and containerization. Additionally, it covers privileged and non-privileged instructions in operating systems and various virtualization projects related to Linux.

Uploaded by

jannatimtiaz288
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 38

Microsoft Windows Drives Server Growth

• As you know Windows eventually dominated the market and


today it is still the primary operating system deployed on
PCs.
• During that same time frame, businesses were depending
more and more on computers for their operations.
• Companies moved from paper-based records to running their
accounting, human resources, and many other industry-
specific and custom-built applications on mainframes or
minicomputers.
• These computers usually ran vendor-specific operating
systems, making it difficult, if not impossible, for companies
and IT professionals to easily transfer information among
incompatible systems.
Microsoft Windows Drives Server Growth
• As companies depended more and more on technology to
drive their business
• They add more servers to support that need. Eventually, this
expansion created data centers.
•A data center could be anything from a larger computer
room, to an entire floor in a building, to a separate
building constructed and dedicated to the health and well-
being of a company’s computing infrastructure.
• Entire buildings existed solely to support servers, and then
at the end of twentieth century, the Internet blossomed into
existence.
Microsoft Windows Drives Server Growth
• “E-business or out of business” was the cry that went up
as businesses tried to stake out their territories in this new
online world.
• To keep up with their competition, existing companies
deployed even more servers as they web enabled old
applications to be more customer facing and customer
serving.
• Innovative companies, such as Amazon and Google, appeared
from nowhere, creating disruptive business models that
depended on large farms of servers to rapidly deliver
millions of web pages populated with petabytes of
information.
Byte Sizes
Microsoft Windows Drives Server Growth

• Often the building that housed a data center could not get
more electrical power or additional cooling capacity.
• Building larger or additional data centers was and still is
an expensive proposition.
• In addition to running out of room, the data centers often
had grown faster than the people managing them could
maintain them.
• It was common to hear tales of lost servers. A lost server is
a server that is running, but no one actually knows
which line of business owns it or what it is doing.
Microsoft Windows Drives Server
Growth
• These lost servers couldn’t be interrupted for fear of
inadvertently disrupting some crucial part of the
business.
• In some data centers, cabling was so thick and
intertwined that when nonfunctioning cables needed to be
replaced, or old cables were no longer needed, it was easier
to just leave them where they were, rather than try to
unthread them from the mass.
Virtual Resources
Hypervisor
A hypervisor is a software that you can use to
run multiple virtual machines on a single
physical machine.
Hypercall and Syscall
•A hypercall is a software trap from a domain to the
hypervisor.
• A syscall is a software trap from an application to the kernel.
• Domains will use hypercalls to request privileged operations
like updating page tables.
• In computing, a system call (commonly abbreviated
to syscall) is the programmatic way in which a computer
program requests a service from the kernel of the
operating system on which it is executed.
Privileged and Non-Privileged Instructions in Operating System

• In any Operating System, it is necessary to have a


Dual Mode Operation
• To ensure the protection and security of the System from
unauthorized or errant users.
• This Dual Mode separates the User Mode from the System
Mode or Kernel Mode.
What are Privileged Instructions?

The Instructions that can run only in Kernel Mode are called Privileged Instructions .
Privileged Instructions possess the following characteristics :
• If any attempt is made to execute a Privileged Instruction in User Mode, then it will not
be executed and treated as an illegal instruction. The Hardware traps it in the Operating
System.
• Before transferring the control to any User Program, it is the responsibility of the Operating
System to ensure that the Timer is set to interrupt. Thus, if the timer interrupts then the
Operating System regains the control.
Thus, any instruction which can modify the contents of the Timer is Privileged
Instruction.
• Privileged Instructions are used by the Operating System in order to achieve correct
operation.
• Various examples of Privileged Instructions include:
 I/O instructions and Halt instructions
 Turn off all Interrupts
 Set the Timer
 Context Switching (resume)
 Clear the Memory or Remove a process from the Memory
 Modify entries in the Device-status table
What are Non-Privileged Instructions?

The Instructions that can run only in User Mode are


called Non-Privileged Instructions.
Various examples of Non-Privileged Instructions include:
Reading the status of Processor
Reading the System Time
Generate any Trap Instruction
Sending the final printout of Printer
Also, it is important to note that in order to change the
mode from Privileged to Non-Privileged, we require a
Non-privileged Instruction that does not generate any
interrupt.
Virtualization…
S im u la tio n a n d E m u la tio n
Simulation and Emulation
Full Virtualization

Full virtualization requires that every salient feature of the


hardware be reflected into one of several virtual machines
Hardware Assisted Full Virtualization

Hardware-Assisted Full Virtualization is a virtualization technique where the


CPU and hardware provide direct support for virtualization, reducing
the overhead of traditional full virtualization. It improves performance by
allowing virtual machines (VMs) to execute privileged instructions
directly on the hardware without relying entirely on software emulation.
Software Assisted Full Virtualization

Software-Assisted Full Virtualization is a virtualization approach where the


hypervisor emulates the entire hardware environment without
relying on hardware-based virtualization extensions (like Intel VT-x or
AMD-V). The hypervisor translates or modifies the guest OS’s privileged
instructions to ensure they run safely in a virtualized environment.
Para-Virtualization
Para-virtualization is a virtualization technique that presents a
software interface to the virtual machines which is similar, yet
not identical to the underlying hardware–software interface.
Full Virtualization Paravirtualization

In Full virtualization, virtual In paravirtualization, virtual machine


machine permit the execution of does not implement full isolation of OS
the instructions with running of but rather provides a different API which
unmodified OS in an entire isolated is utilized when OS is subjected to
way. alteration.

Full Virtualization is less secure. While the Paravirtualization is more


secure than the Full Virtualization.

Full Virtualization uses binary While Paravirtualization uses hypercalls


translation and direct approach as at compile time for operations.
a technique for operations.

Full Virtualization is slow than Paravirtualization is faster in operation


paravirtualization in operation. as compared to full virtualization.

Full Virtualization is more portable Paravirtualization is less portable and


and compatible. compatible.

Examples of full virtualization are Examples of paravirtualization are


Microsoft and Parallels systems. VMware and Xen.
Hybrid Virtualization
Hybrid Virtualization is a combination of software-assisted and
hardware-assisted virtualization techniques to improve
performance, compatibility, and efficiency. It allows legacy systems
without hardware virtualization support to benefit from some
optimizations while leveraging hardware-assisted features when available.
Containerization
Containerization is a virtualization technique where
applications and their dependencies are packaged into
lightweight, portable containers that run in isolated
environments. Unlike traditional virtualization, containers share the
host OS kernel but keep applications isolated from each other.

Popular Containerization Technologies:


Docker, Kubernetes, Podman, LXC (Linux Containers), OpenShift

Applications:
DevOps, cloud computing, and microservices
OS-Level Virtualization
OS-Level Virtualization is a type of virtualization where multiple
isolated user-space environments (containers) share the same
operating system kernel instead of creating full virtual machines.
Unlike hardware virtualization, it does not require a hypervisor.
Techniques for Virtualizing CPU on x86
C h a le n g e s o fx 8 6 C P U V irtu a liz a tio n
Linux-Related Virtualization Projects
Linux-Related Virtualization Projects: QEMU
Linux-Related Virtualization Projects: QEMU
MIPS Processor Architecture
Linux-Related Virtualization Projects: VMware
Linux-Related Virtualization Projects: VMware
Linux-Related Virtualization Projects: Xen
Linux-Related Virtualization Projects: Xen
Vanderpool Technology – The BIOS
Optimization Guide
• Vanderpool is the development code name for the Intel
Virtualization Technology (IVT).
• It is a extension of the Intel x86 architecture
• It allows multiple operating systems to run
simultaneously on the same computer.
• It does this by creating virtual machines, each running its own
x86 operating system.
• A translation lookaside buffer is a memory cache that is
used to reduce the time taken to access a user memory
location. It is a part of the chip's memory-management unit.
• The TLB stores the recent translations of virtual memory to
physical memory and can be called an address-translation
cache.
Xen
Xen Network Architecture
Linux-Related Virtualization Projects: Linux-V Server

You might also like