Академический Документы
Профессиональный Документы
Культура Документы
Email:er9.pooja@gmail.com
Charnaksh Jain
IV yr (I.T) PCE, Jaipur
charnaksh@gmail.com
As the capabilities of virtual environments continue Regardless of the specific needs of your enterprise,
to grow, we’re likely to see increasing use of you should be investigating virtualization as part of
virtualization to enable portable environments your system and application portfolio as the
tailored to the needs of a specific user. These technology is likely to become pervasive. We expect
environments can be moved dynamically to an operating system vendors to include virtualization as
accessible or local processing environment, a standard component, hardware vendors to build
regardless of where the user is located. The user’s virtual capabilities into their platforms, and
virtual environments can be stored on the network or virtualization vendors to expand the scope of their
carried on a portable memory device. A related offerings.
concept is the Appliance Operating System, an
application package oriented operating system 2. System Architecture
designed to run in a virtual environment. The
package approach can yield lower development and A functional Red Hat Virtualization system is multi-
support costs as well as insuring the application runs layered and is driven by the privileged RedHat
in a known, secure environment. An Appliance Virtualization component. Red Hat Virtualization can
Operating System solution provides benefits to both host multiple guest operating systems.
application developers and the consumers of those
Each guest operating system runs in its own domain,
applications.
Red Hat Virtualization schedules virtual CPUs within
Virtualization can also be used to lower costs. One the virtual machines to make the best use of the
obvious benefit comes from the consolidation of available physical CPUs. Each guest operating
servers into a smaller set of more powerful hardware systems handles its own applications. These guest
platforms running a collection of virtual operating systems schedule each application
environments. Not only can costs be reduced by accordingly.
reducing the amount of hardware and reducing the
amount of unused capacity, but application
performance can actually be improved since the
virtual guests execute on more powerful hardware.
With Red Hat Virtualization, each guest memory Guests can be identified in any of three identities:
comes from a slice of the host's physical memory. For domain name (domain-name), identity (domain-id),
Para-virtualized guests, you can set both the initial or UUID. The domain-name is a text string that
memory and the maximum size of the virtual corresponds to a guest configuration file. The
machine. You can add (or remove) physical memory domain-name is used to launch the guests, and when
to the virtual machine at runtime without exceeding the guest runs the same name is used to identify and
the maximum size you specify. This process is called control it. The domain-id is a unique, non-persistent
ballooning. number that gets assigned to an active domain and is
used to identify and control it. The UUID is a Previously codenamed "Vanderpool", VT-x is Intel's
persistent, unique identifier that is controlled from technology for virtualization on the x-86 platforms.
the guest's configuration file and ensures that the Intel plans to add Extended Page Tables (EPT), a
technology for page table virtualization, in the
guest is identified over time by system management
upcoming Nehalem architecture.
tools. It is visible to the guest when it runs. A new
UUID is automatically assigned to each guest by the
The following modern Intel processors include
system tools when the guest first installs. support for VT-x:
Flexibility