View
675
Download
0
Category
Tags:
Preview:
DESCRIPTION
Citation preview
Usages of Virtualization Technology
Argentina Software Pathfinding and Innovation
Intel® Corporation29 July 2008
INTEL CONFIDENTIAL
Virtualization Technology key takeways
• Requirements for HW Architecture Virtualization – Popek and Goldberg
• Evolution for virtualization: from mainframes to x86 architecture due to business reasons
• Challenges around x86 virtualization -> ISA doesn’t comply with P&G
• Server virtualization approaches– Full Virtualization– Paravirtualization– Hardware Assisted Virtualization
• Client virtualization approaches– Desktop virtualization– Server-side workspace virtualization– Client-side workspace virtualization
• Application virtualization– Application isolation– Application streaming
Prev. day revisit
INTEL CONFIDENTIAL
Agenda• Usages in Server platforms• Usages in Client platforms
INTEL CONFIDENTIAL
Virtualization In ServersServer Platforms
INTEL CONFIDENTIAL
Workload Consolidation description
• Too many servers: Hot and underutilized– Server virtualization consolidates many systems onto one physical
platform– Higher physical resource utilization
• Improved utilization: Several users with different OS requirements can more easily share a virtualized server– It allows to run legacy and new operating systems concurrently
HWn
…
HW0
VM1 VMn
OS
App
OS
App …
HW
VM1 VMn
VMM
OS
App
OS
App
Server Platforms
Hardware is more stressed:- More intense IO- More intense mem usage
Focus in Equivalence prop (P&G)
INTEL CONFIDENTIAL
Workload Consolidation pros/cons
• Pros:– Each application can run in a separate environment delivering true
isolation– Cost Savings: Power, space, cooling, hardware, software and
management– Ability to run legacy applications in legacy Oss– Ability to run through emulation legacy applications in legacy HW
• Cons:– Disk and memory footprint increase due to multiples OSs– Performance penalty caused by resource sharing management
Workload consolidation provides the basis most usages/benefits of virtualization
Server Platforms
INTEL CONFIDENTIAL
Workload Isolation
• Virtualization can improve overall system security and reliability by isolating multiple software stacks in their own VMs– Security: intrusions can be confined to the VM in which they occur– Reliability: software failures in one VM do not affect the other VMs– As a side effect, if the hypervisor or drivers are compromised, the
whole VMs can be compromised (equivalent to BIOS attack)
…
HW
VM1 VMn
VMM
OS
App
OS
App
HWn
…
OS
App App
Server Platforms
Focus in Efficiency
prop (P&G)
INTEL CONFIDENTIAL
Workload Migration
• Migrate (move) running VMs to a different platform– Resources can be adjusted dynamically
• VM migration can be triggered automatically by workload balancing or failure-prediction agents
– It facilitates hardware maintenance operations • Both at server and data-center level
…
HW0
VM1VM1 VMnVMn
VMM
OS
App
OS
App …
HWn
VM1VM1 VMnVMn
VMM
OS
App
OS
App
Server Platforms
What if these VMMs are different?
INTEL CONFIDENTIAL
Workload Migration for Dynamic Load balancing• If a given application needs more resources, it could be
easily moved to other physical host with more power• Several application replicas can be started in different
physical machines and split the workload among them– While the applications should be engineered for this
behavior, the deployment is simplified
…
HW0
VM1VM1 VMnVMn
VMM
OS
App
OS
App …
HWn
VM1VM1 VMnVMn
VMM
OS
App
OS
App
Server Platforms
What happens with the established connections, mem pages, disk?
INTEL CONFIDENTIAL
Workload Migration for Disaster Recovery
• High Availability: if an application goes down, it is not necessary to wait for the reboot of the operating system/application– Virtualization allows to immediately put another replica up– State-less applications can be immediately restored from
snapshots– Disk images should exist in external network storage (SAN, NAS)
HW0
VMM
VM1VM1
OS
App
HW0
VMM
VMn
OS
App
HW
VMM
VMn’
OS
App
VM1’VM1’
OS
App
Server Platforms
How often should the VMM store the VM’s status?
INTEL CONFIDENTIAL
Deployment of standard environments
HW0
VMM
VM1
OS
App
HW0
VMM
VM2
OS
App
OS
App
Gold ImageGold Image
OS
App
HW1
VMM
VMn
OS
App
VM3VM3
OS
App
OS
App
OS
App
OS
App
• Service providers usually offer some standard services– Standard images can be provided instantaneously– Simplifies deployment procedures: everything is stored in a
file that represents the VM– Easier backward compatibility (Gold Image 1, 2, 3, etc)
Server Platforms
INTEL CONFIDENTIAL
Test and Development
• Development and testing environments– A VM with standard tools is distributed amongst developers– Releasing new revisions of tools, patches, etc. is very simple
• Business Agility and Productivity– It allows to easily transform environments (Development to test, back
to development, etc)
• Deployment of Patches in controlled environments• Allows for testing in production hardware before formal
activation
HW
VMM
OS
App
OS
App
Server Platforms
INTEL CONFIDENTIAL
Virtual Appliances
• The convergence of virtual machine technology and a new initiative by several tool vendors is giving birth to this new form of software packaging called Virtual Appliance– Software appliance that includes necessary components to run in a
virtual computing environment (VMware, Xen, Virtual Iron, …)– Both, software and virtual appliances, are aimed to eliminate the
installation, configuration and maintenance costs associated with running complex stacks of software
Virtu
al A
pplia
nce
Virtual Machine
Soft
ware
Applia
nce
App.
Middleware
Fully pre-installed and pre-configured application
and operating system environmentVirtual Platform
OS
A software appliance is a software
application combined with a tailored
operating system
Server Platforms
INTEL CONFIDENTIAL
Windows games emulation in Mac
• Games are very dependant of the platform for which they were programmed– Creating games for each platform is too costly
• Minimal emulation is needed for minimal performance degradation
HW
VMMOS
App
Client Platforms
HW
OS
Game
INTEL CONFIDENTIAL
Test and Development – also for clients
• Development and testing environments– A VM with standard tools is distributed amongst developers– Releasing new revisions of tools, patches, etc. is very simple
• Business Agility and Productivity– It allows to easily transform environments (Development to test, back
to development, etc)
• Deployment of Patches in controlled environments• Simplifies testing of P2P applications
HW
VMM
OS
App
OS
App
Client Platforms
INTEL CONFIDENTIAL
Desktop infrastructure management
• Migration to new hardware due to OS compatibility is too costly– Windows Vista slow adoption is an example– Gradual upgrade can be implemented
• Desktops are underutilized (as opposed to previous)– Consolidate in the server, run remotely in the client
HW
OS
VM1’HW (new)
VMM
VM2
OS
App
VM1VM1
OS
App
Client Platforms
App
HW
OS
VM2’ App
Connectivity becomes the critical path
INTEL CONFIDENTIAL
HW (personal)
VMM
My corporate PC within my PC
• Users sharing their own PC with the corporate– A VM for own work– A VM for corporate usages– Can be extended to more profiles (secure, entertainment, etc)
• Temporary remote employees are given a VM with expiration date
HW (corporation)
VMM
VM2
OS
App
VM1VM1
OS
App
Client Platforms
HW (personal)
VMM
OS
Personal
OS
Corp
Connectivity becomes the critical path
OS
Personal
OS
Corp
INTEL CONFIDENTIAL
Common virtual machines format
• New specification created by Dell, HP, IBM, Microsoft, VMware, XenSource aims to become an industry standard– Will help ensure portability, integrity and automated
installation/configuration of virtual machines
• The proposed format, called the Open Virtual Machine Format (OVF), uses existing packaging tools to combine one or more virtual machines together with a standards-based XML wrapper, giving the virtualization platform a portable package containing all required installation and configuration parameters for the virtual machines– This allows any virtualization platform that implements the standard
to correctly install and run the virtual machines
• With OVF, an Independent Software Vendor (ISV) can potentially ship its solutions as a single virtual deployment package that is capable of running on any hypervisor
Any Platform
INTEL CONFIDENTIAL
Unit wrap-up• Server virtualization usages
– Consolidation is the root of usages for Server platforms– Migration allows for dynamic planning in data centers, but
require VMM compatibility– Server market is highly mature
• Client virtualization usages– Usages are emerging to simplify IT management– No single solution has dominated yet– Look for new products in this area in the near future
• DMTF Consortium working in cross VMM compatibility
INTEL CONFIDENTIAL
Questions?
Backup
INTEL CONFIDENTIAL
ContactsArgentina Software Pathfinding and Innovation team from Virtualization
Technology:• Guillermo Colsani: guillermo.e.colsani@intel.com• Gisela Giusti: gisela.giusti@intel.com• Pablo Pássera: pablo.r.passera@intel.com• Duilio Protti: duilio.j.protti@intel.com
Recommended