Date post: | 19-Dec-2015 |
Category: |
Documents |
View: | 218 times |
Download: | 0 times |
© 2009 VMware Inc. All rights reserved
Confidential
Virtualization & Cloud Computing
Marianna Tessel
VP of R&D, VMware
3 Confidential
What is virtualization?
Virtual –
“Existing or resulting in essence or effect though not in actual fact, form, or name”
“That which is not real”
In the computer industry –
Abstraction of computer resources
Separation of a service request from the underlying physical delivery of that service (examples – Virtual Memory)
4 Confidential
Not a new concept
60’s-70’s - IBM implemented virtualization as a way to logically partition mainframe computers into separate virtual machines. “Multitasking”. Fully leverage investment.
MIT – Project ‘MAC’
5 Confidential
Before
7 Confidential
Types of virtualization
Hosted - A hosted architecture installs and runs the virtualization layer as an application on top of an operating system.
Bare-metal - a hypervisor (bare-metal) architecture installs the virtualization layer directly on the system.
9 Confidential
The difficulty of virtualization
OS runs in most privileged Ring 0
Running some sensitive and privileged instructions have different semantic when not
executed in Ring 0
Solution – binary translation
Virtualization takes over Ring 0
10 Confidential
Types of ‘Bare Metal’
Full virtualization - uses binary translation. Guest OS is fully abstracted and not aware.
Paravirtualization / OS assisted virtualization – OS modified and aware. Improved performance. Poor compatibility.
Hardware assisted virtualization – hardware adds a virtualization layer below Ring 0, removing need for binary translation (Root Mode)
Full virtualization is the leading technology today. HW assisted is likely lead the future.
11
Benefits of virtualization
Key attributes – Abstraction & Encapsulation
Encapsulation
• VMs can be described in a file
• Make it possible to ‘snapshot’
• Make it possible to move
Usage
• Run multiple Operating Systems; Run a legacy version
• Consolidation & use of unused computation power
• Resource management
• Availability & Disaster Recovery
• Create “Base Environment”
• Development and TestSimplification, Flexibility & Efficiency
14
VMware Player
Create & Run Virtual Machines
Usage –
• Run multiple OSes
• Share a class exercise or a customer scenario
• Safely try new software
• What kind of virtualization is this?
16
VMotion – The ‘Killer feature’
2
1
4
3
6
5
8
7
1
3 4 5 61 2
PROC
2
PROC
1
POWERSUPPLY
2POWERSUPPLY
OVERTEMP
INTERLOCK
1 2
POWER CAP
FANS
DIMMS
ONLINESPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i 1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HPProLiantDL380G6
2
1
4
3
6
5
8
7
1
3 4 5 61 2
PROC
2
PROC
1
POWERSUPPLY
2POWERSUPPLY
OVERTEMP
INTERLOCK
1 2
POWER CAP
FANS
DIMMS
ONLINESPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i 1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HPProLiantDL380G6
17
2
1
4
3
6
5
8
7
1
3 4 5 61 2
PROC
2
PROC
1
POWERSUPPLY
2POWERSUPPLY
OVERTEMP
INTERLOCK
1 2
POWER CAP
FANS
DIMMS
ONLINESPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i 1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HPProLiantDL380G6
DRS: VMotion for Global Performance Optimization
2
1
4
3
6
5
8
7
1
3 4 5 61 2
PROC
2
PROC
1
POWERSUPPLY
2POWERSUPPLY
OVERTEMP
INTERLOCK
1 2
POWER CAP
FANS
DIMMS
ONLINESPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i 1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HPProLiantDL380G6
2
1
4
3
6
5
8
7
1
3 4 5 61 2
PROC
2
PROC
1
POWERSUPPLY
2POWERSUPPLY
OVERTEMP
INTERLOCK
1 2
POWER CAP
FANS
DIMMS
ONLINESPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i 1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HPProLiantDL380G6
2
1
4
3
6
5
8
7
1
3 4 5 61 2
PROC
2
PROC
1
POWERSUPPLY
2POWERSUPPLY
OVERTEMP
INTERLOCK
1 2
POWER CAP
FANS
DIMMS
ONLINESPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i 1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HPProLiantDL380G6
Heavy Load
Lighter Load
Imbalanced
Giant Computer
Balanced
Giant Computer
18
2
1
4
3
6
5
8
7
1
3 4 5 61 2
PROC
2
PROC
1
POWERSUPPLY
2POWERSUPPLY
OVERTEMP
INTERLOCK
1 2
POWER CAP
FANS
DIMMS
ONLINESPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i 1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HPProLiantDL380G6
2
1
4
3
6
5
8
7
1
3 4 5 61 2
PROC
2
PROC
1
POWERSUPPLY
2POWERSUPPLY
OVERTEMP
INTERLOCK
1 2
POWER CAP
FANS
DIMMS
ONLINESPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i 1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HPProLiantDL380G6
PWRPWR
DPM: VMotion for Global Power Optimization
2
1
4
3
6
5
8
7
1
3 4 5 61 2
PROC
2
PROC
1
POWERSUPPLY
2POWERSUPPLY
OVERTEMP
INTERLOCK
1 2
POWER CAP
FANS
DIMMS
ONLINESPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i 1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HPProLiantDL380G6
2
1
4
3
6
5
8
7
1
3 4 5 61 2
PROC
2
PROC
1
POWERSUPPLY
2POWERSUPPLY
OVERTEMP
INTERLOCK
1 2
POWER CAP
FANS
DIMMS
ONLINESPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i 1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HPProLiantDL380G6
2
1
4
3
6
5
8
7
1
3 4 5 61 2
PROC
2
PROC
1
POWERSUPPLY
2POWERSUPPLY
OVERTEMP
INTERLOCK
1 2
POWER CAP
FANS
DIMMS
ONLINESPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i 1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HPProLiantDL380G6
APPsAPPsAPPsPWR
20% Average Power Savings
20
vSphere
Virtualize – Simplify the Datacenter
The Datacenter
Virtualize everything – Servers, Storage, Network
Free apps from infrastructure
Dynamic optimization of resources
21
Cloud
Abstract the technology infrastructure
The user doesn’t have to know
There is a compute power out there available for use
Flexible * Dynamic * On Demand * Efficient
22
The Datacenter – Internal Cloud External Cloud(s)
vCloud: Bridging the Datacenter to the Cloud
vSphere
25 Confidential
Building the giant Computer/Grid/Cloud/SW Mainframe
32 hosts
2,048 processor cores
32TB of RAM
3 Million IOPs
1,280 virtual machines
16PB of storage
26 Confidential
Security: VMsafe APIs
VMware ESX with VMsafe™
SecurityvService
App
OS
App
OS
App
OS
ALTORNETWORKS
27 Confidential
The Datacenter The Desktop
Desktop as a service
vSphere
ThinClients
Remote Display Protocol
Client Hypervisor ThickClients
ThinClients
ThickClients
Provision to people, not devices Centralized management
Benefit from vSphere DR, Security, Consolidation, …
30 Confidential
Conclusion
vClient
Desktop as a
Service
vCloud
Choice & Cloud
Federation
vSphere
Foundationfor the Cloud
HPC?
Virtual Super-
computer