skip to main | skip to sidebar

Linux Tutorial for Beginners

Pages

  • Home
 
  • RSS
  • Twitter
Showing posts with label Virtualization. Show all posts
Showing posts with label Virtualization. Show all posts
Monday, January 23, 2012

Why use KVM?

Posted by Raju Gupta at 9:29 AM – 0 comments
 
  • Technical definition of KVM

“Kvm, the kernel-based Virtual machine, is modern hypervisor technology integrated directly into the Linux kernel. In short, it allows a Linux kernel running on bare metal to act directly as the hypervisor itself.”
  • Contrast KVM to Xen


  1. Kvm tightly integrates the hypervisor as part of the host operating system, making a single component. Xen is a more complex design, with two privileged components that are loosely integrated at best, the xen hypervisor and Dom0 host, both of which need to function for the node to function.
  2. The kvm project was started by Qumranet (now part of Red Hat) in October 2006: it was ready to be submitted to the upstream kernel developers by December 2006 and was accepted in the 2.6.20 kernel one month later, adding about 40000 lines of code to Linux kernels and kernel features as they are developed.
  3. One example of how this integration helps is in power management. This is a hard area to implement in operating systems; in KVM, a small amount of glue code allowed the hypervisor to be tied into automatic frequency scaling and suspend/resume support with running virtual machines with a small amount of glue code KVM also inherits real-time and SELinux features from the kernel, as another example.
  4. The main limitation of KVM compared to xen is that is does not support full guest paravirtualization; KVM requires modern processors with support for native virtualization. However, KVM does support paravirtualized devices which can be used to speed up disk or network I/O if the guest operating system has appropriate device drivers installed and configured. As with xen sufficient physical RAM and disk space for each guest must be provided.
  5. KVM and Memory management :-- One nice thing about KVM memory management is that the “physical” memory seen by the guest operating system in its virtual machine is just a chunk of virtual memory allocated to a qemu-kvm process on the host. The host
[ Read More ]
Read more...

Supported X86 hardware for Advanced Virtualization

Posted by Raju Gupta at 9:28 AM – 1 comments
 
Additional technologies continue to be developed to enhance x86 native virtualization performance.
Generation 2: MMU virtualization
    • Manage mapping of Vm memory to host memory in hardware (“nested page tables”)
    • Intel EPT / AMD RVI
Generation 3: I/O virtualization.
    • Secure PCI pass-through: assign PCI devices directly to virtual machines ( Intel VT-d, AMD IOMMU).
    • SR-IOV: Allow special PCI devices to be split into multiple virtual devices passed through to VMs.
“The enabling technology on the motherboard chipset is secure PCI pass-through; this allows physical PCI devices to be directly attached to virtual machines without exposing the hypervisor or other virtual machines to attacks through direct memory transfers or PCI bus snooping. This can deliver near-native I/O performance for virtual machines. On intel, this is called VT-d; on AMD, this is called IOMMU”
[ Read More ]
Read more...

What is native virtualization

Posted by Raju Gupta at 9:27 AM – 0 comments
 
Virtualization is faster than emulation.
    • Most code directly executes as native CPU instructions without changes (low over head)
    • “Sensitive” instructions must be intercepted and handled by the hypervisor.
Ideally, processor architecture supports native virtualization
    • This means all sensitive instructions used by a virtual machine can be intercepted and handled by the hypervisor on that architecture.
    • This allows Operating System to be run in a virtual machine without modification.
Early x86 processors did not support native virtualization.
[ Read More ]
Read more...

What is Paravirtualization

Posted by Raju Gupta at 9:25 AM – 0 comments
 
“Paravirtualization is a technique where the hypervisor provides the guest operating system with special interfaces so that it can communicate more efficiently with the hypervisor.”
A technique which allows guest operating systems to work with the hypervisor.
    • Requires modifications to the operating system and/or special drivers which are hypervisor-aware.
    • Also called cooperative virtualization.
Can be used to support guests running modified operating systems on machines without native virtualization support (Xen).
Can be used to improve performance of unmodified operating systems on machines with native virtualization support (Kvm and Xen).
[ Read More ]
Read more...

Technical defination of Virtualization Terminology

Posted by Raju Gupta at 9:25 AM – 0 comments
 
Virtualization
"Virtualization divids a computer into multiple execution environments running separate operating system."
" Virtualization is a process that breaks the hard connection between the physical hardware and the operating system and applications running on it.After being virtualized in a vSphere virtual machine, the operating system and applications are no longer constrained by the limits imposed by residing on a single physical machine. Virtual equivalents of physical elements such as switches and storage operate within a virtual infrastructure that can span the enterprise."
"System virtualization allows a single computer to be partitioned or divided into multiple virtual computers which may each run its own operating system simultaneously.These virtual machines are isolated from each other . From the perspective of each operating system, it is running on its own private hardware. They may have their own network interfaces and IP addresses, file system and other peripherals. Different virtual machiness need not run the same operating system or version of the operating system"
Hypervisor
"A hypervisor is the software that manages and supports the virtualization environment."
It runs the virtual machines for each virtualized operating system, providing access to virtual CPUs, memory, disks, networking and other peripherals while restricting the virtual machines from having direct access to the real hardware and each other. The physical machine or operating system providing the hypervisor is called the HOST.
[ Read More ]
Read more...
Older Posts
Subscribe to: Posts (Atom)

Our Blogs

  • Java Programs with Output
  • C Programming Tutorial
  • Language Tutorial
  • Android Development Tutorial
  • Web Development Tutorial
  • Popular
  • Recent
  • Archives

Popular Posts

  • Apache Configuration File Security Option
    you’ll examine the security options available in the main Apache configuration file, httpd.conf. That file can be modified to secure the e...
  • AWS VPC Overview
    What is VPC ? A virtual private cloud (VPC) is a virtual network dedicated to your AWS account. It is logically isolated from other vir...
  • Advantages & Disadvantages of Kerberos
    Advantages of Kerberos Most conventional network services use password-based authentication schemes. Such schemes require a user to au...
  • SSH login without password
    The following steps can be used to ssh from one system to another without specifying a password: 1. On the client run the following com...
  • Apache Installation and Configuration through source code
    In this example we extract the source code to a directory under /usr/local/src/ cp httpd-2.0.46.tar.gz /usr/local/src cd /usr/local/src...
  • How to automatically chroot jail selected ssh user logins
    1. Creating basic chroot environment First we need to create a simple chroot environment. Our chroot environment will consist of a bash she...
  • How to Create the Kerberos database
    Create the database with the following command.  [root@coma ~] kdb5_util create -s This will prompt you for a password. You will ...
  • Kerberos and PAM
    Kerberos-aware services do not currently make use of Pluggable Authentication Modules (PAM) — these services bypass PAM completely. However...
  • Apache and SELinux File Labels
    Take a look at the SELinux settings associated with Apache. To review, SELinux settings, as they relate to a service, mostly fall into tw...
  • History of MINIX 3
    MINIX has a long history. It goes back to 1987 when the first edition of the book Operating Systems: Design and Implementation by Andrew S...
Powered by Blogger.

Archives

  • ▼  2014 (1)
    • ▼  May (1)
      • AWS VPC Overview
  • ►  2013 (4)
    • ►  February (4)
  • ►  2012 (89)
    • ►  November (1)
    • ►  March (4)
    • ►  February (36)
    • ►  January (48)
 

Followers

Labels

  • Apache (8)
  • aws (1)
  • Bridge (1)
  • cloud computing (1)
  • Configuration (1)
  • dhcp server (7)
  • DNS (8)
  • File system (11)
  • Fping (1)
  • Iptable basic (3)
  • KDC slave server (1)
  • Kerberos (14)
  • kerberos configuration (5)
  • kerberos database (1)
  • LaTeX (1)
  • Ldap basic (2)
  • Linux aliases (1)
  • Linux Commands (4)
  • Linux History (2)
  • Linux Installation (3)
  • Linux kernel (3)
  • Linux shell (2)
  • Linux software (2)
  • Lvm (1)
  • Mail Server (3)
  • Network Script (1)
  • PHP (1)
  • Raid (6)
  • SELinux (1)
  • Sendmail (3)
  • ssh (2)
  • Tcpdump example (1)
  • Virtualization (5)
  • Webmin (1)
  • Yum (2)
 
 
© 2011 Linux Tutorial for Beginners | Designs by Web2feel & Fab Themes

Bloggerized by DheTemplate.com - Main Blogger