Top Banner
Usages of Virtualization Technology Argentina Software Pathfinding and Innovation Intel® Corporation 29 July 2008
22
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ppt

Usages of Virtualization Technology

Argentina Software Pathfinding and Innovation

Intel® Corporation29 July 2008

Page 2: ppt

INTEL CONFIDENTIAL

Virtualization Technology key takeways

• Requirements for HW Architecture Virtualization – Popek and Goldberg

• Evolution for virtualization: from mainframes to x86 architecture due to business reasons

• Challenges around x86 virtualization -> ISA doesn’t comply with P&G

• Server virtualization approaches– Full Virtualization– Paravirtualization– Hardware Assisted Virtualization

• Client virtualization approaches– Desktop virtualization– Server-side workspace virtualization– Client-side workspace virtualization

• Application virtualization– Application isolation– Application streaming

Prev. day revisit

Page 3: ppt

INTEL CONFIDENTIAL

Agenda• Usages in Server platforms• Usages in Client platforms

Page 4: ppt

INTEL CONFIDENTIAL

Virtualization In ServersServer Platforms

Page 5: ppt

INTEL CONFIDENTIAL

Workload Consolidation description

• Too many servers: Hot and underutilized– Server virtualization consolidates many systems onto one physical

platform– Higher physical resource utilization

• Improved utilization: Several users with different OS requirements can more easily share a virtualized server– It allows to run legacy and new operating systems concurrently

HWn

HW0

VM1 VMn

OS

App

OS

App …

HW

VM1 VMn

VMM

OS

App

OS

App

Server Platforms

Hardware is more stressed:- More intense IO- More intense mem usage

Focus in Equivalence prop (P&G)

Page 6: ppt

INTEL CONFIDENTIAL

Workload Consolidation pros/cons

• Pros:– Each application can run in a separate environment delivering true

isolation– Cost Savings: Power, space, cooling, hardware, software and

management– Ability to run legacy applications in legacy Oss– Ability to run through emulation legacy applications in legacy HW

• Cons:– Disk and memory footprint increase due to multiples OSs– Performance penalty caused by resource sharing management

Workload consolidation provides the basis most usages/benefits of virtualization

Server Platforms

Page 7: ppt

INTEL CONFIDENTIAL

Workload Isolation

• Virtualization can improve overall system security and reliability by isolating multiple software stacks in their own VMs– Security: intrusions can be confined to the VM in which they occur– Reliability: software failures in one VM do not affect the other VMs– As a side effect, if the hypervisor or drivers are compromised, the

whole VMs can be compromised (equivalent to BIOS attack)

HW

VM1 VMn

VMM

OS

App

OS

App

HWn

OS

App App

Server Platforms

Focus in Efficiency

prop (P&G)

Page 8: ppt

INTEL CONFIDENTIAL

Workload Migration

• Migrate (move) running VMs to a different platform– Resources can be adjusted dynamically

• VM migration can be triggered automatically by workload balancing or failure-prediction agents

– It facilitates hardware maintenance operations • Both at server and data-center level

HW0

VM1VM1 VMnVMn

VMM

OS

App

OS

App …

HWn

VM1VM1 VMnVMn

VMM

OS

App

OS

App

Server Platforms

What if these VMMs are different?

Page 9: ppt

INTEL CONFIDENTIAL

Workload Migration for Dynamic Load balancing• If a given application needs more resources, it could be

easily moved to other physical host with more power• Several application replicas can be started in different

physical machines and split the workload among them– While the applications should be engineered for this

behavior, the deployment is simplified

HW0

VM1VM1 VMnVMn

VMM

OS

App

OS

App …

HWn

VM1VM1 VMnVMn

VMM

OS

App

OS

App

Server Platforms

What happens with the established connections, mem pages, disk?

Page 10: ppt

INTEL CONFIDENTIAL

Workload Migration for Disaster Recovery

• High Availability: if an application goes down, it is not necessary to wait for the reboot of the operating system/application– Virtualization allows to immediately put another replica up– State-less applications can be immediately restored from

snapshots– Disk images should exist in external network storage (SAN, NAS)

HW0

VMM

VM1VM1

OS

App

HW0

VMM

VMn

OS

App

HW

VMM

VMn’

OS

App

VM1’VM1’

OS

App

Server Platforms

How often should the VMM store the VM’s status?

Page 11: ppt

INTEL CONFIDENTIAL

Deployment of standard environments

HW0

VMM

VM1

OS

App

HW0

VMM

VM2

OS

App

OS

App

Gold ImageGold Image

OS

App

HW1

VMM

VMn

OS

App

VM3VM3

OS

App

OS

App

OS

App

OS

App

• Service providers usually offer some standard services– Standard images can be provided instantaneously– Simplifies deployment procedures: everything is stored in a

file that represents the VM– Easier backward compatibility (Gold Image 1, 2, 3, etc)

Server Platforms

Page 12: ppt

INTEL CONFIDENTIAL

Test and Development

• Development and testing environments– A VM with standard tools is distributed amongst developers– Releasing new revisions of tools, patches, etc. is very simple

• Business Agility and Productivity– It allows to easily transform environments (Development to test, back

to development, etc)

• Deployment of Patches in controlled environments• Allows for testing in production hardware before formal

activation

HW

VMM

OS

App

OS

App

Server Platforms

Page 13: ppt

INTEL CONFIDENTIAL

Virtual Appliances

• The convergence of virtual machine technology and a new initiative by several tool vendors is giving birth to this new form of software packaging called Virtual Appliance– Software appliance that includes necessary components to run in a

virtual computing environment (VMware, Xen, Virtual Iron, …)– Both, software and virtual appliances, are aimed to eliminate the

installation, configuration and maintenance costs associated with running complex stacks of software

Virtu

al A

pplia

nce

Virtual Machine

Soft

ware

Applia

nce

App.

Middleware

Fully pre-installed and pre-configured application

and operating system environmentVirtual Platform

OS

A software appliance is a software

application combined with a tailored

operating system

Server Platforms

Page 14: ppt

INTEL CONFIDENTIAL

Windows games emulation in Mac

• Games are very dependant of the platform for which they were programmed– Creating games for each platform is too costly

• Minimal emulation is needed for minimal performance degradation

HW

VMMOS

App

Client Platforms

HW

OS

Game

Page 15: ppt

INTEL CONFIDENTIAL

Test and Development – also for clients

• Development and testing environments– A VM with standard tools is distributed amongst developers– Releasing new revisions of tools, patches, etc. is very simple

• Business Agility and Productivity– It allows to easily transform environments (Development to test, back

to development, etc)

• Deployment of Patches in controlled environments• Simplifies testing of P2P applications

HW

VMM

OS

App

OS

App

Client Platforms

Page 16: ppt

INTEL CONFIDENTIAL

Desktop infrastructure management

• Migration to new hardware due to OS compatibility is too costly– Windows Vista slow adoption is an example– Gradual upgrade can be implemented

• Desktops are underutilized (as opposed to previous)– Consolidate in the server, run remotely in the client

HW

OS

VM1’HW (new)

VMM

VM2

OS

App

VM1VM1

OS

App

Client Platforms

App

HW

OS

VM2’ App

Connectivity becomes the critical path

Page 17: ppt

INTEL CONFIDENTIAL

HW (personal)

VMM

My corporate PC within my PC

• Users sharing their own PC with the corporate– A VM for own work– A VM for corporate usages– Can be extended to more profiles (secure, entertainment, etc)

• Temporary remote employees are given a VM with expiration date

HW (corporation)

VMM

VM2

OS

App

VM1VM1

OS

App

Client Platforms

HW (personal)

VMM

OS

Personal

OS

Corp

Connectivity becomes the critical path

OS

Personal

OS

Corp

Page 18: ppt

INTEL CONFIDENTIAL

Common virtual machines format

• New specification created by Dell, HP, IBM, Microsoft, VMware, XenSource aims to become an industry standard– Will help ensure portability, integrity and automated

installation/configuration of virtual machines

• The proposed format, called the Open Virtual Machine Format (OVF), uses existing packaging tools to combine one or more virtual machines together with a standards-based XML wrapper, giving the virtualization platform a portable package containing all required installation and configuration parameters for the virtual machines– This allows any virtualization platform that implements the standard

to correctly install and run the virtual machines

• With OVF, an Independent Software Vendor (ISV) can potentially ship its solutions as a single virtual deployment package that is capable of running on any hypervisor

Any Platform

Page 19: ppt

INTEL CONFIDENTIAL

Unit wrap-up• Server virtualization usages

– Consolidation is the root of usages for Server platforms– Migration allows for dynamic planning in data centers, but

require VMM compatibility– Server market is highly mature

• Client virtualization usages– Usages are emerging to simplify IT management– No single solution has dominated yet– Look for new products in this area in the near future

• DMTF Consortium working in cross VMM compatibility

Page 20: ppt

INTEL CONFIDENTIAL

Questions?

Page 21: ppt

Backup

Page 22: ppt

INTEL CONFIDENTIAL

ContactsArgentina Software Pathfinding and Innovation team from Virtualization

Technology:• Guillermo Colsani: [email protected]• Gisela Giusti: [email protected]• Pablo Pássera: [email protected]• Duilio Protti: [email protected]