Hardware virtualization explained

Hardware virtualization is the virtualization of computers as complete hardware platforms, certain logical abstractions of their componentry, or only the functionality required to run various operating systems. Virtualization emulates the hardware environment of its host architecture, allowing multiple OSes to run unmodified and in isolation. At its origins, the software that controlled virtualization was called a "control program", but the terms "hypervisor" or "virtual machine monitor" became preferred over time.[1]

Concept

The term "virtualization" was coined in the 1960s to refer to a virtual machine (sometimes called "pseudo machine"), a term which itself dates from the experimental IBM M44/44X system. The creation and management of virtual machines has also been called "platform virtualization", or "server virtualization", more recently.[2] [3]

Platform virtualization is performed on a given hardware platform by host software (a control program), which creates a simulated computer environment, a virtual machine (VM), for its guest software. The guest software is not limited to user applications; many hosts allow the execution of complete operating systems. The guest software executes as if it were running directly on the physical hardware, with several notable caveats. Access to physical system resources (such as the network access, display, keyboard, and disk storage) is generally managed at a more restrictive level than the host processor and system-memory. Guests are often restricted from accessing specific peripheral devices, or may be limited to a subset of the device's native capabilities, depending on the hardware access policy implemented by the virtualization host.[4]

Virtualization often exacts performance penalties, both in resources required to run the hypervisor, and as well as in reduced performance on the virtual machine compared to running native on the physical machine.

Reasons for virtualization

However, when multiple VMs are concurrently running on the same physical host, each VM may exhibit varying and unstable performance which highly depends on the workload imposed on the system by other VMs. This issue can be addressed by appropriate installation techniques for temporal isolation among virtual machines.

There are several approaches to platform virtualization.

Examples of virtualization use cases:

Full virtualization

In full virtualization, the virtual machine simulates enough hardware to allow an unmodified "guest" OS designed for the same instruction set to be run in isolation. This approach was pioneered in 1966 with the IBM CP-40 and CP-67, predecessors of the VM family.

Paravirtualization

In paravirtualization, the virtual machine does not necessarily simulate hardware, but instead (or in addition) offers a special API that can only be used by modifying the "guest" OS. For this to be possible, the "guest" OS's source code must be available. If the source code is available, it is sufficient to replace sensitive instructions with calls to VMM APIs (e.g.: "cli" with "vm_handle_cli"), then re-compile the OS and use the new binaries. This system call to the hypervisor is called a "hypercall" in TRANGO and Xen; it is implemented via a DIAG ("diagnose") hardware instruction in IBM's CMS under VM (which was the origin of the term hypervisor)..

Hardware-assisted virtualization

In hardware-assisted virtualization, the hardware provides architectural support that facilitates building a virtual machine monitor and allows guest OSs to be run in isolation.[9] This can be used to assist either full virtualization or paravirtualization. Hardware-assisted virtualization was first introduced on the IBM 308X processors in 1980, with the Start Interpretive Execution (SIE) instruction.[10]

In 2005 and 2006, Intel and AMD developed additional hardware to support virtualization ran on their platforms. Sun Microsystems (now Oracle Corporation) added similar features in their UltraSPARC T-Series processors in 2005.

In 2006, first-generation 32- and 64-bit x86 hardware support was found to rarely offer performance advantages over software virtualization.[11]

Operating-system-level virtualization

See main article: OS-level virtualization.

In operating-system-level virtualization, a physical server is virtualized at the operating system level, enabling multiple isolated and secure virtualized servers to run on a single physical server. The "guest" operating system environments share the same running instance of the operating system as the host system. Thus, the same operating system kernel is also used to implement the "guest" environments, and applications running in a given "guest" environment view it as a stand-alone system.

Hardware virtualization disaster recovery

A disaster recovery (DR) plan is often considered good practice for a hardware virtualization platform. DR of a virtualization environment can ensure high rate of availability during a wide range of situations that disrupt normal business operations. In situations where continued operations of hardware virtualization platforms is important, a disaster recovery plan can ensure hardware performance and maintenance requirements are met. A hardware virtualization disaster recovery plan involves both hardware and software protection by various methods, including those described below.[12] [13]

Tape backup for software data long-term archival needs
  • This common method can be used to store data offsite, but data recovery can be a difficult and lengthy process. Tape backup data is only as good as the latest copy stored. Tape backup methods will require a backup device and ongoing storage material.
    Whole-file and application replication
  • The implementation of this method will require control software and storage capacity for application and data file storage replication typically on the same site. The data is replicated on a different disk partition or separate disk device and can be a scheduled activity for most servers and is implemented more for database-type applications.
    Hardware and software redundancy
  • This method ensures the highest level of disaster recovery protection for a hardware virtualization solution, by providing duplicate hardware and software replication in two distinct geographic areas.[14]

    See also

    External links

    Notes and References

    1. Web site: R.J. . Creasy . 1981 . The Origin of the VM/370 Time-sharing System . . 26 February 2013.
    2. Web site: Thomson . Julian . 2018-05-23 . Virtual Machines: An Introduction to Platform Virtualization . 2023-07-08 . Performance Software . en-US.
    3. Web site: What is Server Virtualization? .
    4. Book: Bugnion . Edouard . Nieh . Jason . Tsafrir . Dan . Hardware and software support for virtualization . 2017 . Morgan & Claypool Publishers . San Rafael, CA . 9781627056939.
    5. Web site: Chip Aging Accelerates . 14 February 2018 .
    6. Web site: Profiling Energy Usage for Efficient Consumption . Rajesh Chheda . Dan Shookowsky . Steve Stefanovich . Joe Toscano. 14 January 2009 .
    7. Web site: VMware server consolidation overview . https://web.archive.org/web/20220108130221/https://www.vmware.com/solutions/consolidation.html . 2022-01-08 . dead.
    8. Examining VMware . . August 2000 . Jason Nieh . Jason Nieh . Ozgur Can Leonard . https://web.archive.org/web/20191122083847/http://systems.cs.columbia.edu/archive/pub/2000/08/examining-vmware/ . 22 November 2019 . dead.
    9. L. . Smith . A. . Kägi . F. M. . Martins . G. . Neiger . F. H. . Leung . D. . Rodgers . A. L. . Santoni . S. M. . Bennett . R. . Uhlig . A. V. . Anderson . Intel virtualization technology . . 38 . 5 . 48–56 . May 2005 . 10.1109/MC.2005.163.
    10. IBM System/370 Extended Architecture Interpretive Execution . SA22-7095-0 . January 1984 . First . IBM . October 27, 2022 .
    11. A Comparison of Software and Hardware Techniques for x86 Virtualization . Keith Adams . Ole Agesen . ASPLOS’06 . 21–25 October 2006 . San Jose, California, USA . Surprisingly, we find that the first-generation hardware support rarely offers performance advantages over existing software techniques. We ascribe this situation to high VMM/guest transition costs and a rigid programming model that leaves little room for software flexibility in managing either the frequency or cost of these transitions. . https://web.archive.org/web/20220108130207/https://www.vmware.com/pdf/asplos235_adams.pdf . 2022-01-08 . dead.
    12. Web site: 2010 . The One Essential Guide to Disaster Recovery: How to Ensure IT and Business Continuity . Vision Solutions, Inc. . dead . https://web.archive.org/web/20110516030950/http://www.visionsolutions.com/downloads/whitepapers/EssentialDR.pdf . 16 May 2011 . dmy-all .
    13. Web site: Wold . G . 2008 . Disaster Recovery Planning Process . dead . https://web.archive.org/web/20120815054111/http://www.drj.com/new2dr/w2_002.htm . 15 August 2012 . dmy-all .
    14. Web site: 2010 . Disaster Recovery Virtualization Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take . VMware . dead . https://web.archive.org/web/20100923021435/http://www.vmware.com/files/pdf/DR_VMware_DoubleTake.pdf . 23 September 2010 . dmy-all .