Cloud Computing || Quiz 1

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/115

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

116 Terms

1
New cards

Interpreters/processors

Memory

Communications links

Three fundamental abstractions are necessary to describe the operation of a computing systems:

2
New cards

provision for peak demands → overprovisioning

heterogeneity of hardware and software

machine failures

Resource Management Issues

3
New cards

Virtualization; Cloud Computing

is a basic enabler of __________, it simplifies the management of physical resources for the three abstractions

4
New cards

Virtualization

in computing, refers to the act of creating a virtual (rather than actual) version of something, including but not limited to a virtual computer hardware platform, operating system (OS), storage device, or computer network resources.” from Wikipedia

5
New cards

Virtualization

abstracts the underlying resources; simplifies their use; isolates users from one another; and supports replication which increases the elasticity of a system

6
New cards

Performance Isolation
System Security
Performance and Reliability
The development and management of services offered by a provider.

Cloud Resource virtualization is important for:

7
New cards

Performance isolation

as we can dynamically assign and account for resources across different applications

8
New cards

System security

as it allows isolation of services running on the same hardware

9
New cards

Performance and reliability

as it allows applications to migrate from one platform to another

10
New cards

Multiplexing
Aggregation
Emulation
Multiplexing and emulation.

Virtualization simulates the interface to a physical object by

11
New cards

Multiplexing:

creates multiple virtual objects from one instance of a physical object. Many virtual objects to one physical.

12
New cards

Aggregation

creates one virtual object from multiple physical objects. One virtual object to many physical objects.

13
New cards

Emulation

constructs a virtual object of a certain type from a different type of a physical object.

14
New cards

Layering

a common approach to manage system complexity

15
New cards

Layering

Simplifies the description of the subsystems; each subsystem is abstracted through its interfaces with the other subsystems

16
New cards

Layering

Minimises the interactions among the subsystems of a complex system

17
New cards

Layering

we are able to design, implement, and modify the individual subsystems independently.

18
New cards

Hardware

Software

  • Operating system

  • Libraries

  • Applications

Layering in a computer system:

19
New cards

Instruction Set Architecture (ISA)

at the boundary between hardware and software.

20
New cards

Application Binary Interface (ABI)

allows the ensemble consisting of the application and the library modules to access the hardware

21
New cards

Application Binary Interface (ABI)

does not include privileged system instructions, instead it invokes system calls.

22
New cards

Application Program Interface

defines the set of instructions the hardware was designed to execute and gives the application access to the ISA

23
New cards

Application Program Interface

it includes high-level language (HLL) library calls which often invoke system calls.

24
New cards

Binaries; Portable

_________ created by a compiler for a specific ISA and a specific operating system are not _______

25
New cards

HLL program; portable code

It is possible, though, to compile a ________ for a virtual machine(VM) environment where ______ is produced and distributed and then converted by binary translators to the ISA of the host system

26
New cards

dynamic binary translation

A __________ converts blocks of guest instructions from the portable code to the host instruction and leads to a significant performance improvement, as such blocks are cached and reused.

27
New cards

1960’s, IBM

CP/CMS control program: a virtual machine operating system for the IBM System/360 Model 67

28
New cards

2000, IBM

z-series with 64-bit virtual address spaces and backward compatible with the System/360

29
New cards

Popek; Golberg

______ and ______ from UCLA published“ Formal Requirements for Virtualizable Third Generation Architectures” where they listed the conditions a computer architecture should satisfy to support virtualization

30
New cards

Formal Requirements for Virtualizable Third Generation Architectures

Popek and Golberg from UCLA published “_________________” where they listed the conditions a computer architecture should satisfy to support virtualization

31
New cards

1974

Popek and Golberg from UCLA published“ Formal Requirements for Virtualizable Third Generation Architectures” where they listed the conditions a computer architecture should satisfy to support virtualization.

32
New cards

1990’s; 1999

Stanford researchers, VMware: Researchers developed a new hypervisor and founded VMware, the biggest virtualization company of today’s. First virtualization solution was _________ for x86.

33
New cards

IBM

was the first to produce and sell virtualization for the mainframe.But, VMware popularised virtualization for the masses.

34
New cards

virtual machine monitor

partitions the resources of a computer system into one or more virtual machines(VMs).

35
New cards

virtual machine monitor

Allows several operating systems to run concurrently on a single hardware platform

36
New cards

Virtual Machine (VM)

is an execution environment that runs an OS

37
New cards

Virtual Machine (VM)

an isolated environment that appears to be a whole computer, but actually only has access to a portion of the computer resources.

38
New cards

Multiple services to share the same platform
Live Migration
System modification while maintaining backward compatibility with the original system
Enforces isolation among the systems, thus security

A VMM allows

39
New cards

guest operating system

is an OS that runs in a VM under the control of the VMM.

40
New cards

shadow page table

points to the actual page frame and it is used by the Memory Management Unit (MMU) for dynamic address translation.

41
New cards

cache, main memory, disk and network access

The run-time behavior of an application is affected by other applications running concurrently on the same platform and competing for CPUcycles

42
New cards

Performance isolation

a critical condition for QoS guarantees in shared computing environments

43
New cards

VMM

is a much simpler and better specified system than a traditional operating system

44
New cards

28; 100s

Xen VMM has ______ hypercalls while Linux has ______ of system calls.

45
New cards

A program running under the VMM should exhibit a behavior essentially identical to that demonstrated when running on an equivalent machine directly.

The VMM should be in complete control of the virtualized resources.

A statistically significant fraction of machine instructions must be executed without the intervention of the VMM. (Why?)

Conditions for Efficient Virtualization

46
New cards

Dual-mode

allows OS to protect itself and other system components

47
New cards

Kernel-code; kernel mode

_________ (in particular, interrupt handlers) runs in __________

48
New cards

Kernel-mode

the hardware allows all machine instructions to be executed and allows unrestricted access to memory and I/O ports

49
New cards

user mode

Everything else runs in ________

50
New cards

User applications run in ring 3

OS runs in ring 0

Four layers of privilege execution → rings

51
New cards

In ring 0, then, same privileges as an OS → wrong

In rings 1,2,3, then OS has higher privileges → wrong

Move the OS to ring 1 and the VMM in ring 0 → OK

In which ring should the VMM run?

52
New cards

Full virtualization with binary translation

OS-assisted virtualization or paravirtualization

Hardware assisted virtualization

Techniques for Virtualizing CPU on x86

53
New cards

kernel mode

privileged instructions can be executed in ____________.

54
New cards

kernel mode

When attempted to be executed in user mode, they cause a strap and so are executed in ______________

55
New cards

user mode

nonprivileged instructions the ones that can be executed in __________

56
New cards

sensitive instructions; kernel'; user

________ can be executed in either ______ or _______but they behave differently

57
New cards

sensitive instructions

require special precautions at execution time.

58
New cards

sensitive; nonprivileged

_________ and _____________ are hard to virtualize

59
New cards

Full virtualization

a guest OS can run unchanged under the VMM as if it was running directly on the hardware platform. Each VM runs an exact copy of the actual hardware.

60
New cards

Binary Translation

rewrites parts of the code on the fly to replace sensitive but not privileged instructions with safe code to emulate the original instruction

61
New cards

hypervisor

translates all operating system instructions on the fly and caches the results for future use

62
New cards

user level

while ______ instructions run unmodified at native speed.

63
New cards

No hardware assistance,

No modifications of the guest OS

Isolation, Security

advantages of full virtualization

64
New cards

speed of execution

disadvantages of full virtualization

65
New cards

Paravirtualization

involves modifying the OS kernel to replace non-virtualizable instructions with hypercalls that communicate directly with the virtualization layer hypervisor

66
New cards

hypervisor

also provides hypercall interfaces for other critical kernel operations such as memory management, interrupt handling and time keeping.

67
New cards

faster execution, lower virtualization overhead

advantage of paravirtualization

68
New cards

poor portability

disadvantage of paravirtualization

69
New cards

Hardware Assisted Virtualization

a new CPU execution mode feature that allows the VMM to run in a new root mode below ring 0. As depicted inFigure 7, privileged and sensitive calls are set to automatically trap to the hypervisor, removing the need for either binary translation or paravirtualization

70
New cards

even faster execution

advantage hardware assisted virtualization

71
New cards

2005

In _______ Intel released two Pentium 4 models supporting VT-x.

72
New cards

VMX root
VMX non-root

VT-x supports two modes of operations

73
New cards

VMX root

for VMM operations.

74
New cards

VMX non-root

support a VM.

75
New cards

Virtual Machine Control Structure

And a new data structure called the ______________ including host-state and guest-state areas

76
New cards

VM entry

the processor state is loaded from the guest-state of the VM scheduled to run; then the control is transferred from VMM to the VM.

77
New cards

VM exit

saves the processor state in the guest-state area of the running VM; then it loads the processor state from the host-state area, finally transfers control to the VMM.

78
New cards

Linux, Minix, NetBSD, FreeBSD and others

can operate as paravirtualized

79
New cards

Xen domain

ensemble of address spaces hosting a guest OS and applications running under the guest OS. Runs on a virtual CPU.

80
New cards

Dom0

dedicated to execution of Xen control functions and privileged instructions

81
New cards

DomU

a user domain

82
New cards

XenStore

a Dom0 process.

83
New cards

Dom0privileges

Communicates with guest VMs via shared memory using __________________.

84
New cards

Toolstack

responsible for creating, destroying, and managing the resources and privileges of VMs.

85
New cards

Toolstack

parses this file and writes this information in XenStore.

86
New cards

Linux Container

is a Linux process (or processes) that is a virtual environment with its own process network space. (lightweight process virtualization)

87
New cards

Containers; kernel

________ share portions of the host _________

88
New cards

Namespaces

per-process isolation of OS resources (filesystem, network and user ids)

89
New cards

Cgroups

resource management and accounting per process

90
New cards

Xen

runs at privilege Level 0, the guest OS at Level 1, and applications at Level 3.

91
New cards

x86

does not support either the tagging of TLB entries or the software management of the TLB. Thus, address spaceswitching, when the VMM activates a different OS, requires a completeTLB flush; this has a negative impact on the performance

92
New cards

Solution

load Xen in a 64 MB segment at the top of each address space and delegate the management of hardware page tables to the guest OS with minimal intervention from Xen. This region is not accessible or re-mappable by the guest OS.

93
New cards

guest OS

must register with Xen a description table with the addresses of exception handlers for validation.

94
New cards

Virtual Network Interfaces (VIFs); network interface card

Each domain has one or more __________ which support the functionality of a _____________

95
New cards

DomU; Dom0; ring

Split drivers have a front-end in the ___________ and the back-end in __________;the two communicate via a _______ in shared memory.

96
New cards

Ring

a circular queue of descriptors allocated by a domain and accessible within Xen

97
New cards

Descriptors

do not contain data, the data buffers are allocated off-band by the guest OS.

98
New cards

packet sending; packet receiving

Two rings of buffer descriptors, one for _________ and one for _________, are supported.

99
New cards

XEN I/O

zero-copy semantics for data transfer using I/Orings.

100
New cards

Xen 2.0

Optimization of virtual interface, I/O channel, virtual memory