SlideShare a Scribd company logo
1 of 19
Introduction
 XenServer was developed by Linux foundation and
supported by Intel
 It is a hypervisor using a Microkernal design,providing
services that allow multiple computer operating system
to execute on the same computer hardware concurrently.
Setting up of xenserver
Xenserver Architecture
Hardware layer
Hypervisor layer
Virtual machine layers
Architecture of Xenserver
Architecture:
 The architectural implementation of the
hypervisor: this includes discussions like “my
hypervisor is thinner than yours” etc. The hardware
assists (Intel-VT, AMD-V) dilemma: “my hypervisor
uses cpu hardware extensions to do what you do in
software so it’s faster than yours” or viceversa. The
paravirtualization dilemma: “my hypervisor can
support this modified guest hence it’s (or it will be)
faster than yours” etc
SIMPLE XENSERVER ARCHITECTURE
Hardware layer:
The hardware layer is the sphere that contains a
hypervisor and its underlying physical hardware.
 The hardware layer participates in the Xen App
infrastructure by running the OS resources and
keeping VM workloads highly available.
Hardware:
Hypervisor:
 Very large system support
 4 TB; >255 CPUs
 Reliability, Availability, Scalability enhancements
 CPU Pools for system partitioning
 Page sharing enhancements
 Hypervisor emergency paging / compression
 New “xl” lightweight control stack
 Memory Introspection API
 Enhanced SR-IOV support
 Software-implemented Hardware Fault Tolerance
Hypervisor layer:
 On top of the hardware layer, it is responsible for both
sharing of hardware resource and the enforcement of
mandatory access control rules based on the available
hardware resources.
Hypervisor layers:
The Multi-Server
Approach
Microkernels are
minimalistic
operating system
kernels providing only
elementary services
like process
management, inter-
process
communication, and
memory resp.
exception support
VIRTUALIZATION:
 Virtualization is an approach that was developed by
the pioneers of computing systems. It involved using
unused computing resources to create an artificial, but
useful, view of system capabilities.
VIRTUAL MACHINE:
Virtual Machine Hardware
 Virtuozzo virtual machine works like a usual standalone
computer.
By default, virtual machines are created with the following
virtual hardware:
1 VirtIO SCSI HDD, expanding,
1 CD-ROM (IDE for Windows and Debian guests, VirtIO
SCSI for Linux guests except Debian),
1 VirtIO network adapter, bridged,
32MB video card.
Virtual layers:
Layers:
Layer 1:
Allows applications to
work with remote client
devices without change,
even though those remote
devices were never been
thought of or available
when the application was
written. This is
called access
virtualization. Xen
Desktop from Citrix is an
example of products that
work in this layer of
virtualization.
Layer 2:
Allows applications written
for one OS version or OS to
happily execute in another
environment; this
environment can be a new
OS version or an entirely
different OS. This is
called application
virtualization.
Layer 3:
Allows one system to
support workloads as if it
was many systems, or
allows one workload to run
across many systems as if it
was a single computing
resource. This is
called processing
virtualization .
Layer 4:
Allows workloads to access
storage without having to
know where the data is
stored, what type of device
is storing the data, or
whether the storage is
attached directly to the
system hosting the
workload, to a storage
server just down the LAN,
or to storage in the cloud.
This is called storage
virtualization.
Layer 5:
Allows systems to work
with other systems safely
and securely, without
having to care too much
about the details of the
underlying network. This
is called network
virtualization .
Layer 6:
Allows IT administrators
and operators to easily
monitor and manage
virtual environments
across boundaries. The
boundaries can include
the physical location of
systems; OSes in use;
applications or workloads
in use; network topology;
storage implementation;
and how client systems
connect to the
applications. This is
called management of
virtualized environments .
Layer 7:
Monitors and protects all of the other layers of
virtualization so that only authorized use can be made
of the resources. Yes, this is called security for
virtualized environments in the model.
Presented by,
N .Ramya
THANK YOU

More Related Content

Similar to xen.pptx

Walter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompWalter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicomp
Digicomp Academy AG
 
An overview of OpenVZ virtualization technology
An overview of OpenVZ virtualization technologyAn overview of OpenVZ virtualization technology
An overview of OpenVZ virtualization technology
OpenVZ
 
An overview of OpenVZ virtualization technology
An overview of OpenVZ virtualization technologyAn overview of OpenVZ virtualization technology
An overview of OpenVZ virtualization technology
OpenVZ
 

Similar to xen.pptx (20)

Operating system Definition Structures
Operating  system Definition  StructuresOperating  system Definition  Structures
Operating system Definition Structures
 
Unit II.ppt
Unit II.pptUnit II.ppt
Unit II.ppt
 
Walter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompWalter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicomp
 
Vitualisation
VitualisationVitualisation
Vitualisation
 
Virtualizaiton-3.pptx
Virtualizaiton-3.pptxVirtualizaiton-3.pptx
Virtualizaiton-3.pptx
 
open source virtualization
open source virtualizationopen source virtualization
open source virtualization
 
High availability virtualization with proxmox
High availability virtualization with proxmoxHigh availability virtualization with proxmox
High availability virtualization with proxmox
 
Using openQRM to Manage Virtual Machines
Using openQRM to Manage Virtual MachinesUsing openQRM to Manage Virtual Machines
Using openQRM to Manage Virtual Machines
 
A Xen Case Study
A Xen Case StudyA Xen Case Study
A Xen Case Study
 
OpenQrm
OpenQrmOpenQrm
OpenQrm
 
1 virtualization
1 virtualization1 virtualization
1 virtualization
 
An overview of OpenVZ virtualization technology
An overview of OpenVZ virtualization technologyAn overview of OpenVZ virtualization technology
An overview of OpenVZ virtualization technology
 
An overview of OpenVZ virtualization technology
An overview of OpenVZ virtualization technologyAn overview of OpenVZ virtualization technology
An overview of OpenVZ virtualization technology
 
incs775_lect6.ppt
incs775_lect6.pptincs775_lect6.ppt
incs775_lect6.ppt
 
Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud Computing
 
Xen: Hypervisor for the Cloud from Frontier Meetup Mountain View CA 2013-10-14
Xen: Hypervisor for the Cloud from Frontier Meetup Mountain View CA 2013-10-14Xen: Hypervisor for the Cloud from Frontier Meetup Mountain View CA 2013-10-14
Xen: Hypervisor for the Cloud from Frontier Meetup Mountain View CA 2013-10-14
 
Linux virtualization in a nutshell
Linux virtualization in a nutshellLinux virtualization in a nutshell
Linux virtualization in a nutshell
 
Tk2273 -teknologi_virtualisasi Cloud Computing
Tk2273  -teknologi_virtualisasi Cloud ComputingTk2273  -teknologi_virtualisasi Cloud Computing
Tk2273 -teknologi_virtualisasi Cloud Computing
 
Xen Hypervisor.pptx
Xen Hypervisor.pptxXen Hypervisor.pptx
Xen Hypervisor.pptx
 
OSSNA18: Xen Beginners Training
OSSNA18: Xen Beginners Training OSSNA18: Xen Beginners Training
OSSNA18: Xen Beginners Training
 

More from MsRAMYACSE (8)

plant ppt.pptx
plant ppt.pptxplant ppt.pptx
plant ppt.pptx
 
Unit 2-Design Patterns.ppt
Unit 2-Design Patterns.pptUnit 2-Design Patterns.ppt
Unit 2-Design Patterns.ppt
 
Unit 2.ppt
Unit 2.pptUnit 2.ppt
Unit 2.ppt
 
unit-4.ppt
unit-4.pptunit-4.ppt
unit-4.ppt
 
unit1.ppt
unit1.pptunit1.ppt
unit1.ppt
 
Unit 1.ppt
Unit 1.pptUnit 1.ppt
Unit 1.ppt
 
garden.pptx
garden.pptxgarden.pptx
garden.pptx
 
organ.pptx
organ.pptxorgan.pptx
organ.pptx
 

Recently uploaded

Chemistry Data Delivery from the US-EPA Center for Computational Toxicology a...
Chemistry Data Delivery from the US-EPA Center for Computational Toxicology a...Chemistry Data Delivery from the US-EPA Center for Computational Toxicology a...
Chemistry Data Delivery from the US-EPA Center for Computational Toxicology a...
US Environmental Protection Agency (EPA), Center for Computational Toxicology and Exposure
 
Electricity and Circuits for Grade 9 students
Electricity and Circuits for Grade 9 studentsElectricity and Circuits for Grade 9 students
Electricity and Circuits for Grade 9 students
levieagacer
 
Heat Units in plant physiology and the importance of Growing Degree days
Heat Units in plant physiology and the importance of Growing Degree daysHeat Units in plant physiology and the importance of Growing Degree days
Heat Units in plant physiology and the importance of Growing Degree days
Brahmesh Reddy B R
 
Warming the earth and the atmosphere.pptx
Warming the earth and the atmosphere.pptxWarming the earth and the atmosphere.pptx
Warming the earth and the atmosphere.pptx
GlendelCaroz
 

Recently uploaded (20)

Chemistry Data Delivery from the US-EPA Center for Computational Toxicology a...
Chemistry Data Delivery from the US-EPA Center for Computational Toxicology a...Chemistry Data Delivery from the US-EPA Center for Computational Toxicology a...
Chemistry Data Delivery from the US-EPA Center for Computational Toxicology a...
 
Taphonomy and Quality of the Fossil Record
Taphonomy and Quality of the  Fossil RecordTaphonomy and Quality of the  Fossil Record
Taphonomy and Quality of the Fossil Record
 
GBSN - Microbiology (Unit 5) Concept of isolation
GBSN - Microbiology (Unit 5) Concept of isolationGBSN - Microbiology (Unit 5) Concept of isolation
GBSN - Microbiology (Unit 5) Concept of isolation
 
MSC IV_Forensic medicine - Mechanical injuries.pdf
MSC IV_Forensic medicine - Mechanical injuries.pdfMSC IV_Forensic medicine - Mechanical injuries.pdf
MSC IV_Forensic medicine - Mechanical injuries.pdf
 
SaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptx
SaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptxSaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptx
SaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptx
 
Adaptive Restore algorithm & importance Monte Carlo
Adaptive Restore algorithm & importance Monte CarloAdaptive Restore algorithm & importance Monte Carlo
Adaptive Restore algorithm & importance Monte Carlo
 
Soil and Water Conservation Engineering (SWCE) is a specialized field of stud...
Soil and Water Conservation Engineering (SWCE) is a specialized field of stud...Soil and Water Conservation Engineering (SWCE) is a specialized field of stud...
Soil and Water Conservation Engineering (SWCE) is a specialized field of stud...
 
Molecular and Cellular Mechanism of Action of Hormones such as Growth Hormone...
Molecular and Cellular Mechanism of Action of Hormones such as Growth Hormone...Molecular and Cellular Mechanism of Action of Hormones such as Growth Hormone...
Molecular and Cellular Mechanism of Action of Hormones such as Growth Hormone...
 
RACEMIzATION AND ISOMERISATION completed.pptx
RACEMIzATION AND ISOMERISATION completed.pptxRACEMIzATION AND ISOMERISATION completed.pptx
RACEMIzATION AND ISOMERISATION completed.pptx
 
Electricity and Circuits for Grade 9 students
Electricity and Circuits for Grade 9 studentsElectricity and Circuits for Grade 9 students
Electricity and Circuits for Grade 9 students
 
dkNET Webinar: The 4DN Data Portal - Data, Resources and Tools to Help Elucid...
dkNET Webinar: The 4DN Data Portal - Data, Resources and Tools to Help Elucid...dkNET Webinar: The 4DN Data Portal - Data, Resources and Tools to Help Elucid...
dkNET Webinar: The 4DN Data Portal - Data, Resources and Tools to Help Elucid...
 
Film Coated Tablet and Film Coating raw materials.pdf
Film Coated Tablet and Film Coating raw materials.pdfFilm Coated Tablet and Film Coating raw materials.pdf
Film Coated Tablet and Film Coating raw materials.pdf
 
GBSN - Microbiology (Unit 4) Concept of Asepsis
GBSN - Microbiology (Unit 4) Concept of AsepsisGBSN - Microbiology (Unit 4) Concept of Asepsis
GBSN - Microbiology (Unit 4) Concept of Asepsis
 
NuGOweek 2024 programme final FLYER short.pdf
NuGOweek 2024 programme final FLYER short.pdfNuGOweek 2024 programme final FLYER short.pdf
NuGOweek 2024 programme final FLYER short.pdf
 
Harry Coumnas Thinks That Human Teleportation is Possible in Quantum Mechanic...
Harry Coumnas Thinks That Human Teleportation is Possible in Quantum Mechanic...Harry Coumnas Thinks That Human Teleportation is Possible in Quantum Mechanic...
Harry Coumnas Thinks That Human Teleportation is Possible in Quantum Mechanic...
 
Heads-Up Multitasker: CHI 2024 Presentation.pdf
Heads-Up Multitasker: CHI 2024 Presentation.pdfHeads-Up Multitasker: CHI 2024 Presentation.pdf
Heads-Up Multitasker: CHI 2024 Presentation.pdf
 
Heat Units in plant physiology and the importance of Growing Degree days
Heat Units in plant physiology and the importance of Growing Degree daysHeat Units in plant physiology and the importance of Growing Degree days
Heat Units in plant physiology and the importance of Growing Degree days
 
FORENSIC CHEMISTRY ARSON INVESTIGATION.pdf
FORENSIC CHEMISTRY ARSON INVESTIGATION.pdfFORENSIC CHEMISTRY ARSON INVESTIGATION.pdf
FORENSIC CHEMISTRY ARSON INVESTIGATION.pdf
 
Warming the earth and the atmosphere.pptx
Warming the earth and the atmosphere.pptxWarming the earth and the atmosphere.pptx
Warming the earth and the atmosphere.pptx
 
Information science research with large language models: between science and ...
Information science research with large language models: between science and ...Information science research with large language models: between science and ...
Information science research with large language models: between science and ...
 

xen.pptx

  • 1.
  • 2. Introduction  XenServer was developed by Linux foundation and supported by Intel  It is a hypervisor using a Microkernal design,providing services that allow multiple computer operating system to execute on the same computer hardware concurrently.
  • 3. Setting up of xenserver Xenserver Architecture Hardware layer Hypervisor layer Virtual machine layers
  • 5. Architecture:  The architectural implementation of the hypervisor: this includes discussions like “my hypervisor is thinner than yours” etc. The hardware assists (Intel-VT, AMD-V) dilemma: “my hypervisor uses cpu hardware extensions to do what you do in software so it’s faster than yours” or viceversa. The paravirtualization dilemma: “my hypervisor can support this modified guest hence it’s (or it will be) faster than yours” etc
  • 7. Hardware layer: The hardware layer is the sphere that contains a hypervisor and its underlying physical hardware.  The hardware layer participates in the Xen App infrastructure by running the OS resources and keeping VM workloads highly available.
  • 9. Hypervisor:  Very large system support  4 TB; >255 CPUs  Reliability, Availability, Scalability enhancements  CPU Pools for system partitioning  Page sharing enhancements  Hypervisor emergency paging / compression  New “xl” lightweight control stack  Memory Introspection API  Enhanced SR-IOV support  Software-implemented Hardware Fault Tolerance
  • 10. Hypervisor layer:  On top of the hardware layer, it is responsible for both sharing of hardware resource and the enforcement of mandatory access control rules based on the available hardware resources.
  • 11. Hypervisor layers: The Multi-Server Approach Microkernels are minimalistic operating system kernels providing only elementary services like process management, inter- process communication, and memory resp. exception support
  • 12. VIRTUALIZATION:  Virtualization is an approach that was developed by the pioneers of computing systems. It involved using unused computing resources to create an artificial, but useful, view of system capabilities.
  • 13. VIRTUAL MACHINE: Virtual Machine Hardware  Virtuozzo virtual machine works like a usual standalone computer. By default, virtual machines are created with the following virtual hardware: 1 VirtIO SCSI HDD, expanding, 1 CD-ROM (IDE for Windows and Debian guests, VirtIO SCSI for Linux guests except Debian), 1 VirtIO network adapter, bridged, 32MB video card.
  • 15. Layers: Layer 1: Allows applications to work with remote client devices without change, even though those remote devices were never been thought of or available when the application was written. This is called access virtualization. Xen Desktop from Citrix is an example of products that work in this layer of virtualization. Layer 2: Allows applications written for one OS version or OS to happily execute in another environment; this environment can be a new OS version or an entirely different OS. This is called application virtualization.
  • 16. Layer 3: Allows one system to support workloads as if it was many systems, or allows one workload to run across many systems as if it was a single computing resource. This is called processing virtualization . Layer 4: Allows workloads to access storage without having to know where the data is stored, what type of device is storing the data, or whether the storage is attached directly to the system hosting the workload, to a storage server just down the LAN, or to storage in the cloud. This is called storage virtualization.
  • 17. Layer 5: Allows systems to work with other systems safely and securely, without having to care too much about the details of the underlying network. This is called network virtualization . Layer 6: Allows IT administrators and operators to easily monitor and manage virtual environments across boundaries. The boundaries can include the physical location of systems; OSes in use; applications or workloads in use; network topology; storage implementation; and how client systems connect to the applications. This is called management of virtualized environments .
  • 18. Layer 7: Monitors and protects all of the other layers of virtualization so that only authorized use can be made of the resources. Yes, this is called security for virtualized environments in the model.

Editor's Notes

  1. Earlier this year, we released Xen 4.1 I just put up the feature list, but I wont go through it in detail. I did want to point out that the focus of this release was on Support for large systems and easier management of large systems with CPU poolks As well as on security And that is starting a trend to optimize the hypervisor for cloud use cases