Virtualization & Cloud Computing

knowledgeextrasmallStorage

Dec 11, 2013 (3 years and 7 months ago)

220 views

© 2009 VMware Inc. All rights reserved

Confidential

Virtualization & Cloud Computing


Marianna Tessel


VP of R&D, VMware

2

Confidential

What is Virtualization?



3

Confidential

What is virtualization?


Virtual





“Existing or resulting in essence or effect though not in actual fact,
form, or name”




“That which is not real”



In the computer industry


Abstraction of computer resources

Separation of a service request from the underlying physical delivery
of that service (examples


Virtual Memory)



4

Confidential

Not a new concept




60’s
-
70’s
-

IBM implemented virtualization as a way to logically
partition mainframe computers into separate virtual machines.
“Multitasking”. Fully leverage investment.


MIT


Project ‘MAC’




5

Confidential

Before



6

Confidential

After

7

Confidential

Types of virtualization




Hosted

-

A hosted architecture installs and runs the virtualization
layer as an application on top of an operating system.




Bare
-
metal

-

a hypervisor (bare
-
metal) architecture installs the
virtualization layer directly on the system.







8

Confidential

Which kind was it?

Hypervisor

9

Confidential

The difficulty of virtualization

OS runs in most privileged Ring 0

Running some sensitive and
privileged instructions have
different semantic when not
executed in Ring 0

Solution


binary translation

Virtualization takes over Ring 0

10

Confidential

Types of ‘Bare Metal’


Full virtualization
-

uses binary translation. Guest OS is fully
abstracted and not aware.


Paravirtualization

/ OS assisted virtualization


OS modified and
aware. Improved performance. Poor compatibility.


Hardware assisted virtualization


hardware adds a virtualization
layer below Ring 0, removing need for binary translation (Root
Mode)






Full virtualization is the leading technology today. HW assisted is
likely lead the future.

11

Benefits of virtualization

Key attributes


Abstraction & Encapsulation


Encapsulation


VMs can be described in a file


Make it possible to ‘snapshot’


Make it possible to move

Usage


Run multiple Operating Systems; Run a legacy version


Consolidation & use of unused computation power


Resource management


Availability & Disaster Recovery


Create “Base Environment”


Development and Test









Simplification, Flexibility & Efficiency

12

Confidential

HW/SW Separation

13

Features & Usage

14

VMware Player


Create & Run Virtual Machines




Usage




Run multiple
OSes


Share a class exercise or a customer scenario


Safely try new software







What kind of virtualization is this?

15

Confidential

Virtualization solves a real problem

16

VMotion



The ‘Killer feature’

2
1
4
3
6
5
8
7
1
3
4
5
6
1
2
PROC
2
PROC
1
POWER
SUPPLY
2
POWER
SUPPLY
OVER
TEMP
INTER
LOCK
1
2
POWER
CAP
FANS
DIMMS
ONLINE
SPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i
1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HP
ProLiant
DL380G6
2
1
4
3
6
5
8
7
1
3
4
5
6
1
2
PROC
2
PROC
1
POWER
SUPPLY
2
POWER
SUPPLY
OVER
TEMP
INTER
LOCK
1
2
POWER
CAP
FANS
DIMMS
ONLINE
SPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i
1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HP
ProLiant
DL380G6
17

2
1
4
3
6
5
8
7
1
3
4
5
6
1
2
PROC
2
PROC
1
POWER
SUPPLY
2
POWER
SUPPLY
OVER
TEMP
INTER
LOCK
1
2
POWER
CAP
FANS
DIMMS
ONLINE
SPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i
1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HP
ProLiant
DL380G6
DRS:
VMotion

for Global Performance Optimization

2
1
4
3
6
5
8
7
1
3
4
5
6
1
2
PROC
2
PROC
1
POWER
SUPPLY
2
POWER
SUPPLY
OVER
TEMP
INTER
LOCK
1
2
POWER
CAP
FANS
DIMMS
ONLINE
SPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i
1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HP
ProLiant
DL380G6
2
1
4
3
6
5
8
7
1
3
4
5
6
1
2
PROC
2
PROC
1
POWER
SUPPLY
2
POWER
SUPPLY
OVER
TEMP
INTER
LOCK
1
2
POWER
CAP
FANS
DIMMS
ONLINE
SPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i
1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HP
ProLiant
DL380G6
2
1
4
3
6
5
8
7
1
3
4
5
6
1
2
PROC
2
PROC
1
POWER
SUPPLY
2
POWER
SUPPLY
OVER
TEMP
INTER
LOCK
1
2
POWER
CAP
FANS
DIMMS
ONLINE
SPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i
1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HP
ProLiant
DL380G6
Heavy Load

Lighter Load

Imbalanced

Giant Computer

Balanced

Giant Computer

18

2
1
4
3
6
5
8
7
1
3
4
5
6
1
2
PROC
2
PROC
1
POWER
SUPPLY
2
POWER
SUPPLY
OVER
TEMP
INTER
LOCK
1
2
POWER
CAP
FANS
DIMMS
ONLINE
SPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i
1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HP
ProLiant
DL380G6
2
1
4
3
6
5
8
7
1
3
4
5
6
1
2
PROC
2
PROC
1
POWER
SUPPLY
2
POWER
SUPPLY
OVER
TEMP
INTER
LOCK
1
2
POWER
CAP
FANS
DIMMS
ONLINE
SPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i
1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HP
ProLiant
DL380G6
PWR

PWR

DPM:
VMotion

for Global Power Optimization

2
1
4
3
6
5
8
7
1
3
4
5
6
1
2
PROC
2
PROC
1
POWER
SUPPLY
2
POWER
SUPPLY
OVER
TEMP
INTER
LOCK
1
2
POWER
CAP
FANS
DIMMS
ONLINE
SPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i
1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HP
ProLiant
DL380G6
2
1
4
3
6
5
8
7
1
3
4
5
6
1
2
PROC
2
PROC
1
POWER
SUPPLY
2
POWER
SUPPLY
OVER
TEMP
INTER
LOCK
1
2
POWER
CAP
FANS
DIMMS
ONLINE
SPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i
1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HP
ProLiant
DL380G6
2
1
4
3
6
5
8
7
1
3
4
5
6
1
2
PROC
2
PROC
1
POWER
SUPPLY
2
POWER
SUPPLY
OVER
TEMP
INTER
LOCK
1
2
POWER
CAP
FANS
DIMMS
ONLINE
SPARE
MIRROR
1A
2D
3G
4B
5E
6H
7C
8F
9i
1A
2D
3G
4B
5E
6H
7C
8F
9i
PLAYER
HP
ProLiant
DL380G6
APPs

APPs

APPs

PWR

20%

Average
Power Savings

19

Cloud



20

vSphere

Virtualize


Simplify the Datacenter

The Datacenter



Virtualize

everything




Servers, Storage, Network



Free apps from infrastructure



Dynamic
optimization
of
resources

21

Cloud


Abstract the technology infrastructure


The user doesn’t have to know


There is a compute power out there available for use


Flexible * Dynamic * On Demand * Efficient



22

The
Datacenter


Internal Cloud

External Cloud(s
)

vCloud
: Bridging the Datacenter to the Cloud

vSphere

23

Confidential

24

Confidential

What else?



25

Confidential

Building the giant Computer/Grid/Cloud/SW Mainframe

32 hosts

2,048 processor cores

32TB of RAM

3 Million IOPs

1,280 virtual machines

16PB of storage

26

Confidential

Security: VMsafe APIs

VMware ESX with
VMsafe


Security

vService

App

OS

App

OS

App

OS

ALTOR

NETWORKS

27

Confidential

The Datacenter

The Desktop

Desktop as a service

vSphere

Thin

Clients

Remote Display Protocol

Client Hypervisor

Thick

Clients

Thin

Clients

Thick

Clients



Provision to people, not devices



Centralized management


Benefit from vSphere DR, Security,
Consolidation, …

28

Confidential

Another Type of Client

to Mobile Personal Computer

with the Associated Challenges

29

Confidential

VMware Mobile Virtualization Platform (MVP)

30

Confidential

Conclusion

vClient

Desktop
as a
Service

vCloud

Choice &
Cloud

Federation

vSphere

Foundation

for the Cloud

HPC?

Virtual
Super
-
computer

31

Confidential

Thank You