SlideShare a Scribd company logo
Yogesh Kumar
Introduction to Virtualization
Terminologies of Virtualization
Basic Concepts & Types
Introduction to Hypervisors
Bare metal
KVM as a use case
The idea behind VMs originates in the concept of virtual memory and time sharing.
All of which are concepts that were introduced in the early 60s, and pioneered at
the Massachusetts Institute of Technology and the Cambridge Scientific Center.
The most popular open-source virtualization suites, Xen, KVM, Libvirt and
VirtualBox.
 Benefits are as:
Server consolidation, hardware cost and performance.
Isolation and Ease of Management - Allowing users to have concurrent operating
systems on one computer, have potentially hazardous applications run in a
sandbox, all of which can be managed from a single terminal.
Virtualization tools like Qemu and KVM are widely used by Linux developers
during their development cycle and testing.
Virtual testbeds for Education.
Demerits are:
Single Point of Failure
Chances of Performance hit
Application Support
 Virtual Machine (VM) :
A virtual machine is the machine that is being run itself. It is a machine that is ”fooled”
into thinking that it is being run on real hardware, when in fact the machine is running
its software or operating system on an abstraction layer that sits between the VM and the
hardware.
 Virtual Machine Monitor/Hypervisor(VMM):
The VMM is what sits between the VM and the hardware. There are two types of VMMs.
Type-1 and Type-2. Type-1 Native sits directly on top of the hardware. Mostly used in
traditional virtualization systems from the 1960s from IBM and the modern virtualization
suite Xen. Type-2 Hypervisor sits on top of an existing operating system. The most
prominent in modern virtualization systems like KVM, Virtual Box, VMware Workstation
etc. The abbreviation VMM can be both virtual machine manager and virtual machine
monitor.
Virtualization concept slideshare
 Type-1 Virtualization
Figure: Type-1 or bare-metal Hypervisor sits directly on host hardware
 Type-2 Virtualization:
Figure: Type-2 hypervisor runs as an application on host operating system
 Operating System level Virtualization:
 Open Source Solution
 KVM technology is a kernel device driver for the Linux kernel, which takes full usage of
the hardware extensions to the X86 architecture.
 KVM allowed for guests to run unmodified, thus making full virtualization of guests
possible on X86 processors.
 Uses existing Intel VT-x and AMD-V technology, to allow for virtualization: A goal of
KVM was to not reinvent the wheel. The Linux kernel already has among the best
hardware support and a plethora of drivers available, in addition to being a fully blown
operating system. So the KVM developers decided to take use of the facilities already
present in the Linux kernel and let Linux be the hypervisor. KVM virtualization solution
for the Linux kernel on the x86 platform.
KVM developers uses the facilities already present in the Linux kernel(having a
plethora of drivers available, in addition to being a fully blown operating system)
and Linux acts as the hypervisor.
KVM allows the guests to be scheduled on the host Linux system as a regular
process, in fact a KVM guest is simply run as a process, with a thread for each
virtual processor core on the guest.
Accepted on the Linux kernel since version 2.6.20. Red hat had “Xen” as
foundation for virtualization solution, shifted to KVM with OS version 6.
Virtualization concept slideshare
 All guests has to be initialized from a user-space tool, this
usually is a version of Qemu with KVM support.
 Each guest processor is run in its own thread that is spawned
from the user space tool, which then gets scheduled by the
hypervisor.
 Each guest process and processor thread gets scheduled as any
other user process alongside other processes by the Linux
kernel. Each of these threads can be pinned to a specific
processor core on a multi-core processors, to allow some manual
load balancing.
 The memory of a guest is allocated by the user-space tool,
which maps the memory from the guests physical memory to
the hosts virtual memory.
 I/O and storage are handled by the user-space tools
Virtualization concept slideshare
 Process Emulator and Virtualizer : Qemu in itself is only a emulator, when put
together with virtualization tools like KVM, it becomes a powerful virtualization
tool.
 Supports a mix of binary translation and native execution, running directly on
hardware.
 Access to low-level serial and parallel ports to be able to communicate with the
desired hardware.
Thank You 
Ad

More Related Content

What's hot (20)

Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
Gaurav Marwaha
 
Virtualization
VirtualizationVirtualization
Virtualization
Birju Tank
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
Ahmad Hafeezi
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
elliando dias
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
aleyeldean
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
Mangesh Gunjal
 
Virtualization
VirtualizationVirtualization
Virtualization
Kingston Smiler
 
Virtualization
VirtualizationVirtualization
Virtualization
Utkarsh Soni
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
hktripathy
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
Kingston Smiler
 
Virtualization
VirtualizationVirtualization
Virtualization
Kumar Harsha
 
Virtualization
VirtualizationVirtualization
Virtualization
Chandan Varadaraj
 
Virtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMwareVirtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMware
Datapath Consulting
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
ofsorganizer
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
Dr.Neeraj Kumar Pandey
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
HTS Hosting
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
Ayaz Shahid
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
Ashok Kumar
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
vishal choudhary
 
Hypervisor
HypervisorHypervisor
Hypervisor
kalpita surve
 
Virtualization
VirtualizationVirtualization
Virtualization
Birju Tank
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
Ahmad Hafeezi
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
elliando dias
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
aleyeldean
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
Mangesh Gunjal
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
hktripathy
 
Virtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMwareVirtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMware
Datapath Consulting
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
ofsorganizer
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
HTS Hosting
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
Ayaz Shahid
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
Ashok Kumar
 

Similar to Virtualization concept slideshare (20)

Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloud
Chetna Purohit
 
open source virtualization
open source virtualizationopen source virtualization
open source virtualization
Kris Buytaert
 
Linux virtualization
Linux virtualizationLinux virtualization
Linux virtualization
Google
 
Virtualization with KVM
Virtualization with KVMVirtualization with KVM
Virtualization with KVM
Danishka Navin
 
Virtualization-Presentation-with-History
Virtualization-Presentation-with-HistoryVirtualization-Presentation-with-History
Virtualization-Presentation-with-History
Sachin Darekar
 
KVM Linux-based Virtualization Explained Details
KVM Linux-based  Virtualization Explained DetailsKVM Linux-based  Virtualization Explained Details
KVM Linux-based Virtualization Explained Details
CartigayaneKeingadar
 
Live VM Migration
Live VM MigrationLive VM Migration
Live VM Migration
Shivam Singh
 
Virtualization concepts in cloud computing
Virtualization concepts in cloud computingVirtualization concepts in cloud computing
Virtualization concepts in cloud computing
Integral university, India
 
Virtualization technology and an application of building vm ware
Virtualization technology and an application of building vm wareVirtualization technology and an application of building vm ware
Virtualization technology and an application of building vm ware
Yeditepe University
 
Proxmox for DevOps
Proxmox for DevOpsProxmox for DevOps
Proxmox for DevOps
Jorge Moratilla Porras
 
Virtual Computing Questions-- Answer both questions in 500-600 words W.docx
Virtual Computing Questions-- Answer both questions in 500-600 words W.docxVirtual Computing Questions-- Answer both questions in 500-600 words W.docx
Virtual Computing Questions-- Answer both questions in 500-600 words W.docx
mtruman1
 
SYSAD323 Virtualization Basics
SYSAD323 Virtualization BasicsSYSAD323 Virtualization Basics
SYSAD323 Virtualization Basics
Don Bosco BSIT
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
IGZ Software house
 
virtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfvirtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdf
KowsalyaJayakumar2
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
Mehul Boghra
 
Virtual machines and containers
Virtual machines and containersVirtual machines and containers
Virtual machines and containers
Patrick Pierson
 
Virtualization.pdf
Virtualization.pdfVirtualization.pdf
Virtualization.pdf
aimarcarillo
 
06_Hypervisors.pdf
06_Hypervisors.pdf06_Hypervisors.pdf
06_Hypervisors.pdf
HossainOrnob
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
Nikunj Dhameliya
 
Xen Project Update LinuxCon Brazil
Xen Project Update LinuxCon BrazilXen Project Update LinuxCon Brazil
Xen Project Update LinuxCon Brazil
The Linux Foundation
 
Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloud
Chetna Purohit
 
open source virtualization
open source virtualizationopen source virtualization
open source virtualization
Kris Buytaert
 
Linux virtualization
Linux virtualizationLinux virtualization
Linux virtualization
Google
 
Virtualization with KVM
Virtualization with KVMVirtualization with KVM
Virtualization with KVM
Danishka Navin
 
Virtualization-Presentation-with-History
Virtualization-Presentation-with-HistoryVirtualization-Presentation-with-History
Virtualization-Presentation-with-History
Sachin Darekar
 
KVM Linux-based Virtualization Explained Details
KVM Linux-based  Virtualization Explained DetailsKVM Linux-based  Virtualization Explained Details
KVM Linux-based Virtualization Explained Details
CartigayaneKeingadar
 
Virtualization technology and an application of building vm ware
Virtualization technology and an application of building vm wareVirtualization technology and an application of building vm ware
Virtualization technology and an application of building vm ware
Yeditepe University
 
Virtual Computing Questions-- Answer both questions in 500-600 words W.docx
Virtual Computing Questions-- Answer both questions in 500-600 words W.docxVirtual Computing Questions-- Answer both questions in 500-600 words W.docx
Virtual Computing Questions-- Answer both questions in 500-600 words W.docx
mtruman1
 
SYSAD323 Virtualization Basics
SYSAD323 Virtualization BasicsSYSAD323 Virtualization Basics
SYSAD323 Virtualization Basics
Don Bosco BSIT
 
virtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfvirtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdf
KowsalyaJayakumar2
 
Virtual machines and containers
Virtual machines and containersVirtual machines and containers
Virtual machines and containers
Patrick Pierson
 
Virtualization.pdf
Virtualization.pdfVirtualization.pdf
Virtualization.pdf
aimarcarillo
 
06_Hypervisors.pdf
06_Hypervisors.pdf06_Hypervisors.pdf
06_Hypervisors.pdf
HossainOrnob
 
Xen Project Update LinuxCon Brazil
Xen Project Update LinuxCon BrazilXen Project Update LinuxCon Brazil
Xen Project Update LinuxCon Brazil
The Linux Foundation
 
Ad

Recently uploaded (20)

Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Alan Dix
 
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdfICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
Eryk Budi Pratama
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
accessibility Considerations during Design by Rick Blair, Schneider Electric
accessibility Considerations during Design by Rick Blair, Schneider Electricaccessibility Considerations during Design by Rick Blair, Schneider Electric
accessibility Considerations during Design by Rick Blair, Schneider Electric
UXPA Boston
 
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdfKit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Wonjun Hwang
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
Toru Tamaki
 
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
ICT Frame Magazine Pvt. Ltd.
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
Master Data Management - Enterprise Application Integration
Master Data Management - Enterprise Application IntegrationMaster Data Management - Enterprise Application Integration
Master Data Management - Enterprise Application Integration
Sherif Rasmy
 
DNF 2.0 Implementations Challenges in Nepal
DNF 2.0 Implementations Challenges in NepalDNF 2.0 Implementations Challenges in Nepal
DNF 2.0 Implementations Challenges in Nepal
ICT Frame Magazine Pvt. Ltd.
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Secondary Storage for a microcontroller system
Secondary Storage for a microcontroller systemSecondary Storage for a microcontroller system
Secondary Storage for a microcontroller system
fizarcse
 
Building a research repository that works by Clare Cady
Building a research repository that works by Clare CadyBuilding a research repository that works by Clare Cady
Building a research repository that works by Clare Cady
UXPA Boston
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Agentic Automation - Delhi UiPath Community Meetup
Agentic Automation - Delhi UiPath Community MeetupAgentic Automation - Delhi UiPath Community Meetup
Agentic Automation - Delhi UiPath Community Meetup
Manoj Batra (1600 + Connections)
 
Build With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdfBuild With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdf
Google Developer Group - Harare
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
Computer Systems Quiz Presentation in Purple Bold Style (4).pdf
Computer Systems Quiz Presentation in Purple Bold Style (4).pdfComputer Systems Quiz Presentation in Purple Bold Style (4).pdf
Computer Systems Quiz Presentation in Purple Bold Style (4).pdf
fizarcse
 
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Alan Dix
 
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdfICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
Eryk Budi Pratama
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
accessibility Considerations during Design by Rick Blair, Schneider Electric
accessibility Considerations during Design by Rick Blair, Schneider Electricaccessibility Considerations during Design by Rick Blair, Schneider Electric
accessibility Considerations during Design by Rick Blair, Schneider Electric
UXPA Boston
 
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdfKit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Wonjun Hwang
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
Toru Tamaki
 
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
ICT Frame Magazine Pvt. Ltd.
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
Master Data Management - Enterprise Application Integration
Master Data Management - Enterprise Application IntegrationMaster Data Management - Enterprise Application Integration
Master Data Management - Enterprise Application Integration
Sherif Rasmy
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Secondary Storage for a microcontroller system
Secondary Storage for a microcontroller systemSecondary Storage for a microcontroller system
Secondary Storage for a microcontroller system
fizarcse
 
Building a research repository that works by Clare Cady
Building a research repository that works by Clare CadyBuilding a research repository that works by Clare Cady
Building a research repository that works by Clare Cady
UXPA Boston
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
Computer Systems Quiz Presentation in Purple Bold Style (4).pdf
Computer Systems Quiz Presentation in Purple Bold Style (4).pdfComputer Systems Quiz Presentation in Purple Bold Style (4).pdf
Computer Systems Quiz Presentation in Purple Bold Style (4).pdf
fizarcse
 
Ad

Virtualization concept slideshare

  • 2. Introduction to Virtualization Terminologies of Virtualization Basic Concepts & Types Introduction to Hypervisors Bare metal KVM as a use case
  • 3. The idea behind VMs originates in the concept of virtual memory and time sharing. All of which are concepts that were introduced in the early 60s, and pioneered at the Massachusetts Institute of Technology and the Cambridge Scientific Center. The most popular open-source virtualization suites, Xen, KVM, Libvirt and VirtualBox.
  • 4.  Benefits are as: Server consolidation, hardware cost and performance. Isolation and Ease of Management - Allowing users to have concurrent operating systems on one computer, have potentially hazardous applications run in a sandbox, all of which can be managed from a single terminal. Virtualization tools like Qemu and KVM are widely used by Linux developers during their development cycle and testing. Virtual testbeds for Education.
  • 5. Demerits are: Single Point of Failure Chances of Performance hit Application Support
  • 6.  Virtual Machine (VM) : A virtual machine is the machine that is being run itself. It is a machine that is ”fooled” into thinking that it is being run on real hardware, when in fact the machine is running its software or operating system on an abstraction layer that sits between the VM and the hardware.  Virtual Machine Monitor/Hypervisor(VMM): The VMM is what sits between the VM and the hardware. There are two types of VMMs. Type-1 and Type-2. Type-1 Native sits directly on top of the hardware. Mostly used in traditional virtualization systems from the 1960s from IBM and the modern virtualization suite Xen. Type-2 Hypervisor sits on top of an existing operating system. The most prominent in modern virtualization systems like KVM, Virtual Box, VMware Workstation etc. The abbreviation VMM can be both virtual machine manager and virtual machine monitor.
  • 8.  Type-1 Virtualization Figure: Type-1 or bare-metal Hypervisor sits directly on host hardware
  • 9.  Type-2 Virtualization: Figure: Type-2 hypervisor runs as an application on host operating system
  • 10.  Operating System level Virtualization:
  • 11.  Open Source Solution  KVM technology is a kernel device driver for the Linux kernel, which takes full usage of the hardware extensions to the X86 architecture.  KVM allowed for guests to run unmodified, thus making full virtualization of guests possible on X86 processors.  Uses existing Intel VT-x and AMD-V technology, to allow for virtualization: A goal of KVM was to not reinvent the wheel. The Linux kernel already has among the best hardware support and a plethora of drivers available, in addition to being a fully blown operating system. So the KVM developers decided to take use of the facilities already present in the Linux kernel and let Linux be the hypervisor. KVM virtualization solution for the Linux kernel on the x86 platform.
  • 12. KVM developers uses the facilities already present in the Linux kernel(having a plethora of drivers available, in addition to being a fully blown operating system) and Linux acts as the hypervisor. KVM allows the guests to be scheduled on the host Linux system as a regular process, in fact a KVM guest is simply run as a process, with a thread for each virtual processor core on the guest. Accepted on the Linux kernel since version 2.6.20. Red hat had “Xen” as foundation for virtualization solution, shifted to KVM with OS version 6.
  • 14.  All guests has to be initialized from a user-space tool, this usually is a version of Qemu with KVM support.  Each guest processor is run in its own thread that is spawned from the user space tool, which then gets scheduled by the hypervisor.  Each guest process and processor thread gets scheduled as any other user process alongside other processes by the Linux kernel. Each of these threads can be pinned to a specific processor core on a multi-core processors, to allow some manual load balancing.  The memory of a guest is allocated by the user-space tool, which maps the memory from the guests physical memory to the hosts virtual memory.  I/O and storage are handled by the user-space tools
  • 16.  Process Emulator and Virtualizer : Qemu in itself is only a emulator, when put together with virtualization tools like KVM, it becomes a powerful virtualization tool.  Supports a mix of binary translation and native execution, running directly on hardware.  Access to low-level serial and parallel ports to be able to communicate with the desired hardware.
  翻译: