Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

3 1 4 Se

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Software Engineering

ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, 2012, pp.-21-24.


Available online at http://www.bioinfo.in/contents.php?id=76

A ROLE OF VIRTUAL MACHINE IN OPERATING SYSTEM

KAWADE M.G.* AND BALLAL A.S.


Department of Information Technology, Jawaharlal Darda Institute of Engineering & Technology, Yavatmal, MS, India.
*Corresponding Author: Email- mkawade17@gmail.com, ameyb15@yahoo.com

Received: February 21, 2012; Accepted: March 15, 2012

Abstract- In this paper, we are concentrating about the role of Virtual Machine with Enviroment. virtual machine helps us to operate multiple
OS on the same hardware. At the same time.Virtual machine can support individual processes or complete system.Depending on the ab-
straction level where virtualization occurs. The Operating System actually running on the hardware is called host operating system and the
operating system running in the simulated enviroment is called guest operating system.
In this paper, we find that a few simple extension to a host os can make it a much faster platform for running a VM taking advantage of this
extension reduce virtualization overhead for a virtual machine to 14-35% overhead even for workloads that exercise the virtual machine
intensively.
Keywords- Virtual machine, Host OS, Guest OS.

Citation: Kawade M.G. and Ballal A.S.(2012) A Role of virtual machine in operating system. Software Engineering, ISSN: 2229-4007 &
ISSN: 2229-4015, Volume 3, Issue 1, pp.-21-24.

Copyright: Copyright©2012 Kawade M.G.and Ballal A.S. This is an open-access article distributed under the terms of the Creative Com-
mons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and
source are credited.

Introduction of Operating System data stored on disks, tape drives, CD-ROMS, and external drives.
The software that controls the computer and how it uses its re-
sources is called the Operating System. This software manages Detects Problems and Equipment Failure-The operating sys-
and controls what happens in the computer operating system. The tem also is the maintenance mechanic of the system. It checks
operating system provides two main functions. The first function is the system for failures that will cause problems in processing.
managing the basic hardware operations. The control of input and Messages will appear on the screen when there is a problem.
output, storage space, detecting equipment failure, and manage- Sometimes operating systems will have built in messages for
ment of storage are just some of the responsibilities of the O/S or quick fixes to the problem, or will refer you to a resource to get
Operating System. The second function is managing and interact- more information. A typical message that one would see is
ing with the applications software. It takes over the tasks of print- “System Failure, or "Your computer has performed an illegal oper-
ing and saving data. To provide an environment for a computer ation". When the computer is turned on, the computer checks all
user to execute programs. of the storage devices. You can see the system being checked by
the lights going off and on at the various drive locations. If the
Basic Functions of Operating System computer cannot do a self fix, it will not let you continue working.

Manage Storage Space-The operating system stores data at Traffic Controller-The operating system is also in charge of the
some location on disk. It knows where to go to retrieve data when data that is coming into the computer and going out of the com-
it is needed. It uses the filing cabinet system to keep track of the puter. It directs the flow of data to and from the external devices

Software Engineering
ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, 2012
Bioinfo Publications 21
A Role of virtual machine in operating system

and also takes care of control routing information along the bus to (OS).Multiple OS environments can co-exist on the same comput-
be processed by the processor. er, in strong isolation from each other. The virtual machine can
provide (ISA) that is somewhat different from that of the real ma-
System Resource Manager- What is the system resource? Well chine. Application provisioning, maintenance, high availability and
any hardware or part of the computer used by the computer pro- disaster recovery.
gram is considered a system resource. (Talk about using some-
one.) The memory, disk drive, external devices, etc. are all Process virtual machines
"mothered" by the operating system. The O/S "allocates" or makes A process virtual machine is designed to run a single program,
sure that enough space is there for the computer program to oper- which means that it supports a single process. Its purpose is to
ate, allocates, time for each program to work, and also keeps the provide a platform-independent programming environment that
processor going after each instruction. Almost like a teacher abstracts away details of the underlying hardware or operating
standing over you to make sure you finish a problem. system, and allows a program to execute in the same way on any
platform.
Multitasking- Multitasking is the ability to run more than one pro-
gram at a time. (You will find this feature in the Windows Operat-
ing System.) Multitasking will allow either the individual to work on
more than one program at a time, or allow more than one user to
share information and processing of the information. The O/S
manages this operation.

Security Cop- Security on the system is also managed by the


operating system. The O/S can give you the option to set up pass-
words or ID logons in order to use the computer. This provides
security of data, and for those of us that don't want our parents to Fig.1- Process and system VMs. (a) In a process VM, virtualizing
read what we have written. software translates a set of OS and user-level instructions com-
posing one platform to those of another. (b) In a system VM, virtu-
Introduction to Virtual Operating System alizing software translates the ISA used by one hardware platform
The idea of a virtual operating system is to provide standard ver- to that of another.
sions of the following-
1. Operating system primitives accessible through programming Working Of Virtual Machine OS
languages
2. The utility programs such as compilers, linkers and editors
3. The command language or means by which users access
system resources from a terminal based on organizational
requirements.

Virtual Memory
A Virtual Memory has the advantage of allowing more processes
to run than the allowed memory size. This is achieved by only
including parts of processes that are necessary to run in memory
and the rest on disk. The absolute minimum part of a process that Fig.2- Virtual-machine structures.
must always be in memory is called its working set. Usually, a
program doesn't need to have its entire binary file in memory to A virtual-machine monitor is a software layer that runs on a host
run when it is performing a task that only uses part of its file. What platform and provides an abstraction of a complete computer sys-
this means is that, say, a 16MB program could happily run on a tem to higher-level software. The software running above the virtu-
machine with only 4MB of memory. al-machine abstraction is called guest software (operating system
and applications).
Virtual Machine
A virtual machine is a completely isolated guest operating system Our goal for this paper is to examine and reduce the performance
installation within a normal host operating system. Virtual Machine overhead associated with running a VMM on a host operating
Operating System creates illusion of multiple processors each system. Building it on a standard Linux host operating system
capable of executing independently. Virtual machines are separat- leads to an order of magnitude performance degradation com-
ed into two major categories, based on their use and degree of pared to running outside a virtual machine (a standalone system).
correspondence to any real machine. However, we find that a few simple extensions to the host operat-
ing system reduces virtualization overhead to 14-35% overhead,
System virtual machines which is comparable to the speed of virtual machines that run
A system virtual machine provides a complete system platform directly on the hardware.
which supports the execution of a complete operating system

Software Engineering
ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, 2012
Bioinfo Publications 22
Kawade M.G. and Ballal A.S.

disk is converted to a file write (and therefore to a real disk write).


Note that the level of detail provided at the virtual disk interface—
the sector/track addressing— is no different from that for a real

Fig. 3- Guest application system call.


This picture shows the steps UMLinux takes to transfer control to
the guest operating system when a guest application process is-
sues a system call. The mmap call in the SIGUSR1 handler must
reside in guest user space. For security, the rest of the SIGUSR1 disk; no abstraction takes place.
handler should reside in guest kernel space. The current UMLinux Fig.4- Abstraction and virtualization applied to disk storage.(a)
implementation includes an extra section of trampoline code to Abstraction provides a simplified interface to underlying resources.
issue the mmap; this trampoline code is started by manipulating the (b) Virtualization provides a different interface or different resources
guest machine process’s context and finishes by causing a break- at the same abstraction level.
point to the VMM process; the VMM process then transfers control
back to the guest-machine process by sending a SIGUSR1. Architected interfaces-
Fig. 5 shows some important interfaces and implementation layers
1. Guest application issues system call; intercepted by VMM pro- in a typical computer system. Three of these interfaces at or near
cess via ptrace the HW/SW boundary—the instruction set architecture, the applica-
2. VMM process changes system call to no-op (getpid) tion binary interface, and the application programming interface—
3. Getpid returns; intercepted by VMM process
4. VMM process sends SIGUSR1 signal to guest SIGUSR1 han-
dler
5. Guest SIGUSR1 handler calls mmap to allow access to guest
kernel data; intercepted by VMM process
6. VMM process allows mmap to pass through
7. mmap returns to VMM process
8. VMM process returns to guest SIGUSR1 handler, which hadles
the guest application’s system call.

Architecture of Virtual Machine are especially important for VM construction.


Fig.5- Computer system architecture. Key implementation layers
Abstraction and Virtualization communicate vertically via the instruction set architecture (ISA),
Despite their incredible complexity, computer systems exist and application binary interface (ABI), and application programming
continue to evolve because they are designed as hierarchies with interface (API).
well-defined interfaces that separate levels of abstraction. Using
well-defined interfaces facilitates independent subsystem develop- Instruction set architecture
ment by both hardware and software design teams. The simplifying The ISA marks the division between hardware and software, and
abstractions hide lower-level implementation details, thereby reduc- consists of interfaces 3 and 4 in Fig. 2 Interface 4 represents the
ing the complexity of the design process. Figure 1a, shows an ex- user ISA and includes those aspects visible to an application pro-
ample of abstraction applied to disk storage. The operating system gram. Interface 3, the system ISA, is a superset of the user ISA and
abstracts hard-disk addressing details—for example, that it is com- includes those aspects visible only to operating system software
prised of sectors and tracks—so that the disk appears to applica- responsible for managing hardware resources.
tion software as a set of variable-sized files. Application program-
mer scan then create, write, and read files without knowing the Application binary interface
hard disk’s construction and physical organization. The ABI gives a program access to the hardware resources and
services available in a system through the user ISA (interface 4)
Unlike abstraction, virtualization does not necessarily aim to simpli- and the system call interface (interface 2). The ABI does not in-
fy or hide details. For example, in Figure1b, virtualization trans- clude system instructions; rather, all application programs interact
forms a single large disk into two smaller virtual disks, each of with the hardware resources indirectly by invoking the operating
which appears to have its own tracks and sectors. Virtualization system’s services via the system call interface. System calls pro-
software uses the file abstraction as an intermediate step to provide vide a way for an operating system to perform operations on behalf
a mapping between the virtual and real disks. A write to a virtual of a user program after validating their authenticity and safety.

Software Engineering
ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, 2012
Bioinfo Publications 23
A Role of virtual machine in operating system

Application programming interface and have a copy of the VM on both. This would give you even
The API gives a program access to the hardware resources and more business continuity, should something happen to the server.
services available in a system through the user ISA (interface 4)
supplemented with high-level language (HLL) library calls Save Legacy Systems- Offices and data centers often have an
(interface 1). Any system calls are usually performed through old box around that just can’t be mucked with. There’s additional
libraries. Using an API enables application software to be ported software you can use to do what’s called a P2V switch, a physical-
easily, through recompilation, to other systems that support the to-virtual conversion, where the old box’s “image” gets copied
same API. onto the virtual machine files, and thus, gives you a hopefully-
operational clone of the old grandpa box in the corner.
Advantages
1. Multiple OS environments can exist simultaneously on the Conclusion and Future Work
same machine, isolated from each other. In the future, there can be reduction in the size of the host operat-
2. Virtual machine can offer an instruction set architecture that ing system used to support a VMM. Much of the code in the host
differs from real computer's. OS can be eliminated, because the VMM uses only a small num-
3. Easy maintenance, application provisioning, availability and- ber of system calls and abstractions in the host OS. Reducing the
convenient recovery. code size of the host OS will help make VM a fast and trusted
base for future virtual-machine services.
Disadvantages In this presentation we examine Virtual Machine on the basis of
1. Virtual machine is not that efficient as a real one when ac- operating system. We study how there is actual working between
cessing the hardware. Operating system and virtual machine and how we can access
2. When multiple virtual machines are simultaneously running on multiple operating system on same hardware.
a host computer, each virtual machine may introduce an un-
stable performance, which depends on the workload on the References
system by other running virtual machines. [1] The Bell Syst. Tech. J. (1978) 57, 6.
3. The host OS required a separate host user process to control [2] Bourne S.R. (1978) The Bell Syst. Tech. J. 57(6), 1971-1990.
the main guest-machine process, and this generated a large [3] Hall D., Scherrer D. and Sventek J., The software tools pro-
number of host context switches. grammers manual.
[4] Brinch Hansen P. (1973) Operating System Principles.
Applications [5] Kernighan. Software Practice and Experience, 5 (4), 395-406.
Try new operating systems- If you want to try a new OS on [6] Kernighan B., and Plauger P. (1976) Software Tools.
same hardware. Put together a VM and build Ubuntu on it. Sud- [7] Scherrer D. Instructions for implementing the LBL software
denly, you can launch and try dozens of operating systems with- tools package.
out much hassle. [8] Richards. (1971) Software-Practice and Experience, 1 (2), 135
-146.
Test your software- When we create new software like web ap-
plication, application program etc. we can test that software on
different OS by using the VMware. Weather the software run effi-
ciently on different OS or not.

Small Biz disaster recovery- This isn’t highly recommended, but


it’d work if you’re bootstrapping. Say you’re hosting a few web
servers with your amazing app on them. Your house gets hit by
lightning. Your site is off the air. Now, imagine that scenario but
you’ve got virtual backups of the latest build and configuration
ready to install and deploy wherever else you’ve got a point of
presence. Poof. You’re online again.

Build kid boxes- Build Edubuntu (a kid flavored Ubuntu) on a


virtual machine for the kids (the specs I mention above are for
heavy users, but you could get away with a lot less if you only ran
ONE VM). If (when) things go sour from one too many “tweaks,”
just drop the VM and restore from your pristine copy. Talk about
easy. You can get them back on the net in less than 10 minutes.

Backup your system- When you get ready to move from XP to


Vista, you can use VMware to make a backup of your old system.
If things go horribly sour, you could have the VM version up and
running in short order. By the way, you can have TWO servers,

Software Engineering
ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, 2012
Bioinfo Publications 24

You might also like