SlideShare a Scribd company logo
1 of 19
Introduction
 XenServer was developed by Linux foundation and
supported by Intel
 It is a hypervisor using a Microkernal design,providing
services that allow multiple computer operating system
to execute on the same computer hardware concurrently.
Setting up of xenserver
Xenserver Architecture
Hardware layer
Hypervisor layer
Virtual machine layers
Architecture of Xenserver
Architecture:
 The architectural implementation of the
hypervisor: this includes discussions like “my
hypervisor is thinner than yours” etc. The hardware
assists (Intel-VT, AMD-V) dilemma: “my hypervisor
uses cpu hardware extensions to do what you do in
software so it’s faster than yours” or viceversa. The
paravirtualization dilemma: “my hypervisor can
support this modified guest hence it’s (or it will be)
faster than yours” etc
SIMPLE XENSERVER ARCHITECTURE
Hardware layer:
The hardware layer is the sphere that contains a
hypervisor and its underlying physical hardware.
 The hardware layer participates in the Xen App
infrastructure by running the OS resources and
keeping VM workloads highly available.
Hardware:
Hypervisor:
 Very large system support
 4 TB; >255 CPUs
 Reliability, Availability, Scalability enhancements
 CPU Pools for system partitioning
 Page sharing enhancements
 Hypervisor emergency paging / compression
 New “xl” lightweight control stack
 Memory Introspection API
 Enhanced SR-IOV support
 Software-implemented Hardware Fault Tolerance
Hypervisor layer:
 On top of the hardware layer, it is responsible for both
sharing of hardware resource and the enforcement of
mandatory access control rules based on the available
hardware resources.
Hypervisor layers:
The Multi-Server
Approach
Microkernels are
minimalistic
operating system
kernels providing only
elementary services
like process
management, inter-
process
communication, and
memory resp.
exception support
VIRTUALIZATION:
 Virtualization is an approach that was developed by
the pioneers of computing systems. It involved using
unused computing resources to create an artificial, but
useful, view of system capabilities.
VIRTUAL MACHINE:
Virtual Machine Hardware
 Virtuozzo virtual machine works like a usual standalone
computer.
By default, virtual machines are created with the following
virtual hardware:
1 VirtIO SCSI HDD, expanding,
1 CD-ROM (IDE for Windows and Debian guests, VirtIO
SCSI for Linux guests except Debian),
1 VirtIO network adapter, bridged,
32MB video card.
Virtual layers:
Layers:
Layer 1:
Allows applications to
work with remote client
devices without change,
even though those remote
devices were never been
thought of or available
when the application was
written. This is
called access
virtualization. Xen
Desktop from Citrix is an
example of products that
work in this layer of
virtualization.
Layer 2:
Allows applications written
for one OS version or OS to
happily execute in another
environment; this
environment can be a new
OS version or an entirely
different OS. This is
called application
virtualization.
Layer 3:
Allows one system to
support workloads as if it
was many systems, or
allows one workload to run
across many systems as if it
was a single computing
resource. This is
called processing
virtualization .
Layer 4:
Allows workloads to access
storage without having to
know where the data is
stored, what type of device
is storing the data, or
whether the storage is
attached directly to the
system hosting the
workload, to a storage
server just down the LAN,
or to storage in the cloud.
This is called storage
virtualization.
Layer 5:
Allows systems to work
with other systems safely
and securely, without
having to care too much
about the details of the
underlying network. This
is called network
virtualization .
Layer 6:
Allows IT administrators
and operators to easily
monitor and manage
virtual environments
across boundaries. The
boundaries can include
the physical location of
systems; OSes in use;
applications or workloads
in use; network topology;
storage implementation;
and how client systems
connect to the
applications. This is
called management of
virtualized environments .
Layer 7:
Monitors and protects all of the other layers of
virtualization so that only authorized use can be made
of the resources. Yes, this is called security for
virtualized environments in the model.
Presented by,
N .Ramya
THANK YOU

More Related Content

Similar to xen.pptx

Operating system Definition Structures
Operating  system Definition  StructuresOperating  system Definition  Structures
Operating system Definition Structuresanair23
 
Walter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompWalter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompDigicomp Academy AG
 
open source virtualization
open source virtualizationopen source virtualization
open source virtualizationKris Buytaert
 
High availability virtualization with proxmox
High availability virtualization with proxmoxHigh availability virtualization with proxmox
High availability virtualization with proxmoxOriol Izquierdo Vibalda
 
Using openQRM to Manage Virtual Machines
Using openQRM to Manage Virtual MachinesUsing openQRM to Manage Virtual Machines
Using openQRM to Manage Virtual MachinesKris Buytaert
 
An overview of OpenVZ virtualization technology
An overview of OpenVZ virtualization technologyAn overview of OpenVZ virtualization technology
An overview of OpenVZ virtualization technologyOpenVZ
 
An overview of OpenVZ virtualization technology
An overview of OpenVZ virtualization technologyAn overview of OpenVZ virtualization technology
An overview of OpenVZ virtualization technologyOpenVZ
 
Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingHitesh Mohapatra
 
Xen: Hypervisor for the Cloud from Frontier Meetup Mountain View CA 2013-10-14
Xen: Hypervisor for the Cloud from Frontier Meetup Mountain View CA 2013-10-14Xen: Hypervisor for the Cloud from Frontier Meetup Mountain View CA 2013-10-14
Xen: Hypervisor for the Cloud from Frontier Meetup Mountain View CA 2013-10-14The Linux Foundation
 
Linux virtualization in a nutshell
Linux virtualization in a nutshellLinux virtualization in a nutshell
Linux virtualization in a nutshellpv_narayanan
 
Tk2273 -teknologi_virtualisasi Cloud Computing
Tk2273  -teknologi_virtualisasi Cloud ComputingTk2273  -teknologi_virtualisasi Cloud Computing
Tk2273 -teknologi_virtualisasi Cloud ComputingSyarif Maula
 
Xen Hypervisor.pptx
Xen Hypervisor.pptxXen Hypervisor.pptx
Xen Hypervisor.pptxRiyaBatool
 

Similar to xen.pptx (20)

Operating system Definition Structures
Operating  system Definition  StructuresOperating  system Definition  Structures
Operating system Definition Structures
 
Unit II.ppt
Unit II.pptUnit II.ppt
Unit II.ppt
 
Walter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompWalter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicomp
 
Vitualisation
VitualisationVitualisation
Vitualisation
 
Virtualizaiton-3.pptx
Virtualizaiton-3.pptxVirtualizaiton-3.pptx
Virtualizaiton-3.pptx
 
open source virtualization
open source virtualizationopen source virtualization
open source virtualization
 
High availability virtualization with proxmox
High availability virtualization with proxmoxHigh availability virtualization with proxmox
High availability virtualization with proxmox
 
Using openQRM to Manage Virtual Machines
Using openQRM to Manage Virtual MachinesUsing openQRM to Manage Virtual Machines
Using openQRM to Manage Virtual Machines
 
A Xen Case Study
A Xen Case StudyA Xen Case Study
A Xen Case Study
 
OpenQrm
OpenQrmOpenQrm
OpenQrm
 
1 virtualization
1 virtualization1 virtualization
1 virtualization
 
An overview of OpenVZ virtualization technology
An overview of OpenVZ virtualization technologyAn overview of OpenVZ virtualization technology
An overview of OpenVZ virtualization technology
 
An overview of OpenVZ virtualization technology
An overview of OpenVZ virtualization technologyAn overview of OpenVZ virtualization technology
An overview of OpenVZ virtualization technology
 
incs775_lect6.ppt
incs775_lect6.pptincs775_lect6.ppt
incs775_lect6.ppt
 
Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud Computing
 
Xen: Hypervisor for the Cloud from Frontier Meetup Mountain View CA 2013-10-14
Xen: Hypervisor for the Cloud from Frontier Meetup Mountain View CA 2013-10-14Xen: Hypervisor for the Cloud from Frontier Meetup Mountain View CA 2013-10-14
Xen: Hypervisor for the Cloud from Frontier Meetup Mountain View CA 2013-10-14
 
Linux virtualization in a nutshell
Linux virtualization in a nutshellLinux virtualization in a nutshell
Linux virtualization in a nutshell
 
Tk2273 -teknologi_virtualisasi Cloud Computing
Tk2273  -teknologi_virtualisasi Cloud ComputingTk2273  -teknologi_virtualisasi Cloud Computing
Tk2273 -teknologi_virtualisasi Cloud Computing
 
Xen Hypervisor.pptx
Xen Hypervisor.pptxXen Hypervisor.pptx
Xen Hypervisor.pptx
 
OSSNA18: Xen Beginners Training
OSSNA18: Xen Beginners Training OSSNA18: Xen Beginners Training
OSSNA18: Xen Beginners Training
 

More from MsRAMYACSE

More from MsRAMYACSE (8)

plant ppt.pptx
plant ppt.pptxplant ppt.pptx
plant ppt.pptx
 
Unit 2-Design Patterns.ppt
Unit 2-Design Patterns.pptUnit 2-Design Patterns.ppt
Unit 2-Design Patterns.ppt
 
Unit 2.ppt
Unit 2.pptUnit 2.ppt
Unit 2.ppt
 
unit-4.ppt
unit-4.pptunit-4.ppt
unit-4.ppt
 
unit1.ppt
unit1.pptunit1.ppt
unit1.ppt
 
Unit 1.ppt
Unit 1.pptUnit 1.ppt
Unit 1.ppt
 
garden.pptx
garden.pptxgarden.pptx
garden.pptx
 
organ.pptx
organ.pptxorgan.pptx
organ.pptx
 

Recently uploaded

THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxNandakishor Bhaurao Deshmukh
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayupadhyaymani499
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxBerniceCayabyab1
 
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPirithiRaju
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPirithiRaju
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxmalonesandreagweneth
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPirithiRaju
 
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptxSulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptxnoordubaliya2003
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensorsonawaneprad
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologycaarthichand2003
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfWildaNurAmalia2
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPirithiRaju
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...lizamodels9
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingNetHelix
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxMurugaveni B
 
User Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationUser Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationColumbia Weather Systems
 
Pests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPirithiRaju
 

Recently uploaded (20)

THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyay
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
 
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
 
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptxSulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
Sulphur & Phosphrus Cycle PowerPoint Presentation (2) [Autosaved]-3-1.pptx
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensor
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technology
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
 
User Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationUser Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather Station
 
Pests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdf
 

xen.pptx

  • 1.
  • 2. Introduction  XenServer was developed by Linux foundation and supported by Intel  It is a hypervisor using a Microkernal design,providing services that allow multiple computer operating system to execute on the same computer hardware concurrently.
  • 3. Setting up of xenserver Xenserver Architecture Hardware layer Hypervisor layer Virtual machine layers
  • 5. Architecture:  The architectural implementation of the hypervisor: this includes discussions like “my hypervisor is thinner than yours” etc. The hardware assists (Intel-VT, AMD-V) dilemma: “my hypervisor uses cpu hardware extensions to do what you do in software so it’s faster than yours” or viceversa. The paravirtualization dilemma: “my hypervisor can support this modified guest hence it’s (or it will be) faster than yours” etc
  • 7. Hardware layer: The hardware layer is the sphere that contains a hypervisor and its underlying physical hardware.  The hardware layer participates in the Xen App infrastructure by running the OS resources and keeping VM workloads highly available.
  • 9. Hypervisor:  Very large system support  4 TB; >255 CPUs  Reliability, Availability, Scalability enhancements  CPU Pools for system partitioning  Page sharing enhancements  Hypervisor emergency paging / compression  New “xl” lightweight control stack  Memory Introspection API  Enhanced SR-IOV support  Software-implemented Hardware Fault Tolerance
  • 10. Hypervisor layer:  On top of the hardware layer, it is responsible for both sharing of hardware resource and the enforcement of mandatory access control rules based on the available hardware resources.
  • 11. Hypervisor layers: The Multi-Server Approach Microkernels are minimalistic operating system kernels providing only elementary services like process management, inter- process communication, and memory resp. exception support
  • 12. VIRTUALIZATION:  Virtualization is an approach that was developed by the pioneers of computing systems. It involved using unused computing resources to create an artificial, but useful, view of system capabilities.
  • 13. VIRTUAL MACHINE: Virtual Machine Hardware  Virtuozzo virtual machine works like a usual standalone computer. By default, virtual machines are created with the following virtual hardware: 1 VirtIO SCSI HDD, expanding, 1 CD-ROM (IDE for Windows and Debian guests, VirtIO SCSI for Linux guests except Debian), 1 VirtIO network adapter, bridged, 32MB video card.
  • 15. Layers: Layer 1: Allows applications to work with remote client devices without change, even though those remote devices were never been thought of or available when the application was written. This is called access virtualization. Xen Desktop from Citrix is an example of products that work in this layer of virtualization. Layer 2: Allows applications written for one OS version or OS to happily execute in another environment; this environment can be a new OS version or an entirely different OS. This is called application virtualization.
  • 16. Layer 3: Allows one system to support workloads as if it was many systems, or allows one workload to run across many systems as if it was a single computing resource. This is called processing virtualization . Layer 4: Allows workloads to access storage without having to know where the data is stored, what type of device is storing the data, or whether the storage is attached directly to the system hosting the workload, to a storage server just down the LAN, or to storage in the cloud. This is called storage virtualization.
  • 17. Layer 5: Allows systems to work with other systems safely and securely, without having to care too much about the details of the underlying network. This is called network virtualization . Layer 6: Allows IT administrators and operators to easily monitor and manage virtual environments across boundaries. The boundaries can include the physical location of systems; OSes in use; applications or workloads in use; network topology; storage implementation; and how client systems connect to the applications. This is called management of virtualized environments .
  • 18. Layer 7: Monitors and protects all of the other layers of virtualization so that only authorized use can be made of the resources. Yes, this is called security for virtualized environments in the model.

Editor's Notes

  1. Earlier this year, we released Xen 4.1 I just put up the feature list, but I wont go through it in detail. I did want to point out that the focus of this release was on Support for large systems and easier management of large systems with CPU poolks As well as on security And that is starting a trend to optimize the hypervisor for cloud use cases