Free Essay

Xen Memory Management Study

In:

Submitted By mudit
Words 2176
Pages 9
Xen – Memory Management
(Part II)

Virtual Execution Environments – Group 009 Department of Computer Science and Engineering at IST

Daniel Andrade

Mudit Verma 2011/2012

Andr´ Amado e

Abstract
This paper presents an overview of Xen’s memory management system. Keywords: Xen, memory management, virtual machine, ballooning, migration

1

Introduction

Xen is an x86 virtual machine monitor that allows several operating systems to run in a managed manner on commodity hardware, with a minor impact on performance [1]. It provides a virtual machine abstraction, similar to the underlying hardware, to which operating systems can be ported. In this paper we detail Xen’s memory management model focusing on the ubiquitous x86. We first make a small introduction to some memory management fundamentals, proceed to talk about Xen’s memory management and conclude with an explanation of how it deals with memory during live migration.

ory and after the instruction is executed, results may be stored back in memory. Memory management is a central piece of an operating system. To understand Xen’s memory management model we must first be aware of how it is done in a regular operating system. Several approaches exist from a bare-machine approach to paging or segmentation [4]. Paging consists in dividing physical memory into fixed-sized blocks called frames and dividing logical memory into blocks of the same size called pages. When a process is near execution its pages are loaded into available memory frames. A page table is used to map logical memory addresses into physical memory addresses. This technique allows for the physical address space of a process to be noncontiguous solving the fragmentation problem present in other memory allocation strategies. In the segmentation approach memory is viewed as variable-sized segments instead of a linear array of bytes. The logical address space is composed by a collection of segments and external memory is subject to fragmentation. A segment table is used to translate between logical addresses and physical addresses.

2

Memory management overview 3 Xen’s memory management
Xen is responsible for managing memory allocation to guests and paging and segmentation hardware. It ensures that an unprivileged guest cannot access 11

The CPU can only access main memory and its own registers. It fetches instructions from memory and decodes those instructions. Once decoded more operands might have to be fetched from mem-

another domain’s share of memory, thus guaranteeing isolation among them. Guests running in HVM mode believe they are running in a regular system and as such can perform memory management as if they were not virtualized. These guests might detect that they are running in a Xen HVM domain and switch to using paravirtualized memory management for performance reasons. While in full virtualization guest OSes believe they are running on top of a real machine, in paravirtualization the guest OS understands that it is running inside a virtual machine allowing some optimizations to be made. The latter approach requires an explicit port of the operating system. Xen has two types of domains: domainO and domainU. DomainO start automatically on boot and is an OS with high privileges and direct access to physical hardware. It can be used to manage domainU OSes. DomainU is usually a modified version of a commodity operating systems though Xen also supports unmodified OSes. Ported OSes do, however, have access to Xen’s enhanced features and will be more efficient than their unmodified counterparts.

Xen takes advantage of this and places itself in ring 0 giving the guest OS kernel ring 1 access and its applications keep the ring 3 access. This way way the kernel and the applications do not have to be in the same protection ring. When two guest OS processes want to switch context they use page table and segmentation hypercalls and invoke Xen to switch the kernel stack pointer using the instruction stack switch(unsigned long ss, unsigned long esp) where ss is the new stack segment and esp is the new stack pointer.

3.3

Memory allocation

3.1

Page tables

Having read-only access to their page tables, guest OSes must invoke Xen through hypercalls when performing updates. To update a domain’s page table the instruction mmu update(mmu update t *req, int count, int *success count) can be used. This instruction allows hypercalls to be batched with count being the number of updates submitted for processing and successful_count the number of updates done successfully. Each element of req contains a value and an address with the lest significat two bits of the latter being used to identify the type of update.

3.2

Context switching

x86 is composed by four rings with privileges from 0 to 3 but usually only 0, the ring with the highest privilege, and 3 are used by the operating system. 12

The amount of memory allocated to each domain is decided on their creation. A maximum amount of allocatable memory, past that limit, can also be defined. Guest OSes can claim it from Xen when required and release it once it is not needed in order to save resources. To do this Xen uses a balloon driver module. The ballooning technique [5] seen in Fig. 1 induces the guest OS to cooperate in memory management. A small module is loaded into the guest OS as a device driver or kernel service. Inflating the balloon increases memory pressure causing the guest OS to invoke its own memory management algorithms. If memory is sufficiently low it will release memory in order to satisfy the fake module request. Deflating the balloon frees up memory to be used by the guest OS. The maximum memory value of the domain cannot be changed but the current memory amount can be grown or reduced using dom mem op(unsigned int op, unsigned long *extent list, unsigned long nr extents, unsigned int extent order) where op is the amount of memory to increase or decrease. Most OSes assume memory to be a continuous segment but Xen cannot guarantee the allocation of contigous regions of memory to guests. Typically guests themselves create the illusion of contiguous physical memory on top of dispersed hardware memory. It is their responsability to map from physical addresses to hardware addresses. Xen provides a read-only shared translation array to all

Figure 1: Ballooning: inflating the balloon increases memory pressure, forcing the guest OS to invoke its memory management algorithms; deflating the balloon decreases memory pressure freeing memory. domains to support an efficient hardware to physical addresses translation and needs only to validate updates to make sure guests do not modify others’ hardware page frames.

Figure 2: Shadow-mode is used by Xen for HVM domains. Since full virtualization of their page tables is needed, shadow page tables must be used but they are quite expensive to maintain.

3.4

Virtual address translation

Two possible approaches can be used for virtual address translation: shadow-mode shown in Fig. 2 and direct-mode shown in Fig. 3. While the first approach has a higher overhead it is still used for cases where the guest OS’s memory operations cannot be paravirtualized such as in Microsoft Windows [3]. Full virtualization uses shadow page tables. Each guest OS is given its own virtual page table with each access causing a trap. The hypervisor catches this trap, validates the update and propagates it to the MMU-visible shadow page table. In Xen this can done by intercepting only the updates to the virtual page table to reduce the overall cost of translation. Guest OS’ page tables are directly registered with the MMU. Guests are given 13

Figure 3: In direct-mode the guest OS has a copy of the page table in a set of read-only pages. When the guest tries to update these a fault occurs and control is transferred to the hypervisor, which then validates and translates them from pseudo-physical to machine.

read-only permissions to the page table and Xen receives update requests via a hypercall and validates them to ensure safity. Validation is aided by a type and a reference count associated with each machine page frame. A frame can be in one of the following states: page directory (PD), page table (PT), local descriptor table (LDT), global descriptor table (GDT), or writable (RW). A frame’s state can only be changed once its reference count reaches zero and it is unpinned, otherwise this could compromise safety. A guest OS indicates when a frame is allocated for page-table use requiring Xen to validate every entry in the frame. This frame’s type is then pinned to PD or PT until a request to unpin is made by the guest OS. This way there is no need to validate the page table when the page table base pointer changes. The number of hypercalls can be minimized by the Guest OSes’ by batching requests though this must be done in time to maintain the correct state of the system. A TLB flush is usually done by guests before using a mapping – ensuring cach translations are invalidated – so committing updates before flushing is sufficient to guarantee correctness. Some guests wait until no stale entries exist in the TLB, before flushing, which may cause a fault. The guest OS fault handler then as to check for outstanding updates flushing them if found and retries the instruction. A portion of RAM is always allocated by Xen on the top of the address space for its own private use. This is done to avoid a TLB flush when switching between hypervisor mode since it is a region inaccessible to guests. 3.4.1 Alternative mode

see the changes until Xen validates and reconnects the page.

4

Live migration

Xen virtual machines can be migrated in real-time beetween physical machines in a local-area network without loss of availability. This allows for a clear separation between software and hardware and brings several other advantages such as load balancing in a cluster, maintenance of the host machine without service interruption and avoidance of residual dependencies. The migration of a virtual machine from one physical host to another requires not only that its memory be transferred but also its local resources. These resources include disks and network interfaces but how live migration is achieved for devices is out of the scope of this paper. When moving a virtual machine’s memory from one host to another both downtime and total migration time must be minimized. Three approaches exist to transfer memory: push, stop-and-copy, and pull. Although the three of them could be mixed it does not usually happen in practice. Push Pages are pushed accross the network to the destination while the machine continues running. Modified pages are re-sent to ensure consistency. Stop-and-copy The source VM is stopped, pages are copied across the network to the destination and the new VM is started. This simple approach has the disadvantage that both downtime and total migration time are proportional to the amount of physical memory allocated to the VM. Pull The new VM executes once essential pages are copied to the new machine and pulls the remaining pages across the network when a page fault occurs. The downtime is smaller than in stop-and-copy but the total migration time increases as well as page faults until the transfer is complete. 14

There is an alternative mode – in between directand shadow-modes – of operation where guests have the illusion of having directly writable page tables. For security reasons this is not the case. What happens is that a page table update will cause a trap which in turn causes the page to be disconnected from its page table. At this point the guest can write to the page but the MMU will not

Xen’s approach to live migration – pre-copy migration – consists of a push phase, where modified pages are transferred in rounds, and a typically very short final stop-and-copy phase, with downtimes as low as 60ms [2].

5

Conclusion

As seen in this study, Xen employs interesting and clever memory management mechanisms. It provides a stable virtualization platform for several different uses while keeping the system security and virtual machine isolation.

References
[1] Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., and Warfield, A. Xen and the art of virtualization. SIGOPS Oper. Syst. Rev. 37, 5 (Oct. 2003), 164–177. [2] Clark, C., Fraser, K., Hand, S., Hansen, J. G., Jul, E., Limpach, C., Pratt, I., and Warfield, A. Live migration of virtual machines. In Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2 (Berkeley, CA, USA, 2005), NSDI’05, USENIX Association, pp. 273–286. [3] Dittner, R., and Rule, D. The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server. Syngress Publishing, 2007. [4] Silberschatz, A., Galvin, P. B., and Gagne, G. Operating System Concepts, 8th ed. Wiley Publishing, 2008. [5] Waldspurger, C. A. Memory resource management in vmware esx server. SIGOPS Oper. Syst. Rev. 36, SI (Dec. 2002), 181–194.

15

Similar Documents

Premium Essay

Litegreen: Saving Energy in Networked Desktops Using Virtualization

...LiteGreen: Saving Energy in Networked Desktops Using Virtualization Tathagata Das tathadas@microsof t.com Microsoft Research India Pradeep Padala∗ Venkata N. Padmanabhan ppadala@docomolabs-usa.com padmanab@microsof t.com DOCOMO USA Labs Microsoft Research India Kang G. Shin kgshin@eecs.umich.edu The University of Michigan U.S. Of this, 65 TWh/year is consumed by PCs in enterprises, which constitutes 5% of the commercial building electricity consumption in the U.S. Moreover, market projections suggest that PCs will continue to be the dominant desktop computing platform, with over 125 million units shipping each year from 2009 through 2013 [15]. The usual approach to reducing PC energy wastage is to put computers to sleep when they are idle. However, the presence of the user makes this particularly challenging in a desktop computing environment. Users care about preserving long-running network connections (e.g., login sessions, IM presence, file sharing), background computation (e.g., syncing and automatic filing of new emails), and keeping their machine reachable even while it is idle. Putting a desktop PC to sleep is likely to cause disruption (e.g., broken connections), thereby having a negative impact on the user, who might then choose to disable the energy savings mechanism altogether. To reduce user disruption while still allowing machines to sleep, one approach has been to have a proxy on the network for a machine that is asleep [33]. However, this approach suffers from...

Words: 12387 - Pages: 50

Free Essay

Virualization and Business

...Running Head: Virtualization How will virtualization change the way government agencies do business in the future? Virtualization Abstract: Server and application virtualization is a hot topic among many government information technology program managers. Today’s government agencies are focusing on reducing expenses while improving the capabilities that information technology provides its customers. This is a difficult task to accomplish with shrinking budgets. A key technology that can help reduce costs in multiple ways is virtualization. Virtualization is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources. There are many advantages and disadvantages associated with virtualization. Each government agency that is considering virtualization needs to investigate both aspects and make the informed decision according to their business needs and their customers. Depending on the environment that some agencies operate in, virtualization may not be a logical or realistic choice for many of its information technology needs due to security policies that may be in effect. This is especially true within the intelligence community (IC) and Department of Defense (DoD) where they are required to keep different security classifications of data physically separated. Even though system security classification and policy effect government IT environments, the emergence...

Words: 3778 - Pages: 16

Premium Essay

Cloud Computing

...Even though cloud computing is not a critical breakthrough with respect to technology (most technologies used in this paradigm were already accessible); it has changed the usability of technology in most virtual environments (Pfleeger and Pfleeger, 2007). Another business model has surfaced whereby each resource or application is given as a service, accessible on-demand and payable on a per-usage basis on the internet. Another concept in cloud computing is virtualization; a major technology for implementing cloud computing settings (Velte, Velte, and Elsenpeter, 2010). The main objective of virtualization involves polling together various material resources into one virtualized setting through detailed virtualization software, such as Xen and Vmware. The other goal involves creating a sequence of logical or virtual machines using an active selection of resources. Additionally, virtualization allows effective use of obtainable resources. Certainly, this expertise has ensured that the computing reserves allocated to virtual machines are indirectly associated with the fundamental physical infrastructure, although they are instead allocated according to the real requirements of that moment (Subashini and Kavitha, 2011). Virtualization is an insufficient characteristic...

Words: 3697 - Pages: 15

Free Essay

Software

...-II Digital Systems Design Fault Tolerant Systems Advanced Computer Networks 3 0 3 Lab Micro Processors and Programming Languages Lab 0 3 2 Seminar - - 2 Total Credits (6 Theory + 1 Lab.) 22 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD MASTER OF TECHNOLOGY (REAL TIME SYSTEMS) I SEMESTER ADVANCED COMPUTER ARCHITECTURE UNIT I Concept of instruction format and instruction set of a computer, types of operands and operations; addressing modes; processor organization, register organization and stack organization; instruction cycle; basic details of Pentium processor and power PC processor, RISC and CISC instruction set. UNIT II Memory devices; Semiconductor and ferrite core memory, main memory, cache memory, associative memory organization; concept of virtual memory; memory organization and mapping; partitioning, demand paging, segmentation; magnetic disk organization, introduction to magnetic tape and CDROM. UNIT III IO Devices, Programmed IO, interrupt driver IO, DMA IO modules, IO addressing; IO channel, IO Processor, DOT matrix printer, ink jet printer, laser printer. Advanced concepts; Horizontal and vertical instruction format, microprogramming, microinstruction sequencing and control; instruction pipeline; parallel processing; problems in parallel processing; data hazard, control hazard. UNIT IV ILP software approach-complier techniques-static branch protection-VLIW approach-H.W...

Words: 3183 - Pages: 13

Premium Essay

Virtualization

...utilization, greener IT with less power consumption, better management through central environment control, more availability, reduced project timelines by eliminating hardware procurement, improved disaster recovery capability, more central control of the desktop, and improved outsourcing services. With these benefits, it is no wonder that virtualization has had a meteoric rise to the 2008 Top 10 IT Projects! This white paper presents a brief look at virtualization, its benefits and weaknesses, and today’s “best practices” regarding virtualization. The Association of Information Technology Professionals (AITP) recommends these “best practices” to obtain the benefits that virtualization offers. Copyright 2008, Association of Information Technology Professionals. Permission to copy for personal non-commercial use granted. When the paper is referenced or quoted, direct the reader to www.aitp.org. Special thanks to the following editor: Mike Hinton, Southwestern Illinois College AITP Research and Strategy Advisory Group October 14, 2008 Page 1 of 40 Virtualization and Its Benefits Executive Summary Virtualization has quickly evolved from concept to reality. The technologies that are used for servers, clients, storage, and networks are being virtualized to create flexible and cost effective IT infrastructures. The focus of this paper is the use of virtual technology for data center systems with management best practices. Given today‘s emphasis on Total Cost of Ownership...

Words: 16382 - Pages: 66

Premium Essay

Cloud Hooks: Security and Privacy Issues in Cloud Computing

...deployed. It can reduce the cost and complexity of buying, housing, and managing hardware and software components of the platform. Infrastructure-as-a-Service (IaaS) enables a software deployment model in which the basic computing infrastructure of servers, software, and network equipment is provided as an on-demand service upon which a platform to develop and execute applications can be founded. It can be used to avoid buying, housing, and managing the basic hardware and software infrastructure components. 1. Introduction Cloud computing has been defined by NIST as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction [45]. Cloud computing can be considered a new computing paradigm with implications for greater flexibility and availability at lower cost. Because of this, cloud computing has been receiving a good deal of...

Words: 7808 - Pages: 32

Premium Essay

Techniques of Load Balancing in Green Clouds

...Techniques of Load Balancing in Green Clouds Gaganjot Kaur* *M.Tech,IITT College of Engineering & Technology, Pojewal, Punjab Abstract — Cloud Computing can be defined as dynamically scalable shared resources that are completely accessed over a network and the users have to only pay for what they use and can share internally or with other customers as well. The majority of cloud computing infrastructure currently consists of reliable services delivered through data centers that are built on computer and storage virtualization technologies. The goal of a cloud-based architecture is to provide some form of elasticity, the ability to expand and contract capacity on-demand. The implication is that at some point additional instances of an application will be needed in order for the architecture to scale and meet demand. That means there needs to be some mechanism in place to balance requests between two or more instances of that application. The mechanism most likely to be successful in performing such a task is a load balancer. The aim of this paper is to discuss the existing techniques of load balancing and elaborate the main points of the techniques that are helpful in reduction of power consumption leading a step towards green clouds. Green Cloud is an Internet Data Center architecture which aims to reduce data center power consumption, and at the same time guarantee the performance from users’ perspective, leveraging live virtual machine migration technology. ...

Words: 2730 - Pages: 11

Premium Essay

Mr.Abed

...various aspects of cloud computing and its impact on information technology. Any comments and thoughts on this thesis are highly appreciated and you can drop me a line at: tvaruzek@mail.muni.cz Keywords: Cloud computing, Virtualization, Innova.sk, Infrastructure as a Service, Platform as a Service, Amazon Web Services, Google Apps 3 Acknowledgments I would like to thank my supervisor Radek Ošlejšek for providing me the necessary help and guidance. I would like to express many thanks to my friends who helped me and supported me, especially to Rani for her support as well as Evka for saving me in the very last hours of writing of this thesis. And the very last, my thanks go to my parents who have been supporting me during my studies, my brother and my family. 4 Table of Contents 1 Acronyms and Abbreviations...........................................................................................................7...

Words: 14788 - Pages: 60

Premium Essay

Windows Linux Security

...International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:12 No:04 25 Studying Main Differences Between Linux & Windows Operating Systems Lecturer/ Hadeel Tariq Al-Rayes  Abstract—Comparisons between the Microsoft Windows and Linux computer operating systems are a long-running discussion topic within the personal computer industry. Throughout the entire period of the Windows 9x systems through the introduction of Windows 7, Windows has retained an extremely large retail sales majority among operating systems for personal desktop use, while Linux has sustained its status as the most prominent Free Software and Open Source operating system. After their initial clash, both operating systems moved beyond the user base of the personal computer market and share a rivalry on a variety of other devices, with offerings for the server and embedded systems markets, and mobile internet access. Linux and Microsoft Windows differ in philosophy, cost, versatility and stability, with each seeking to improve in their perceived weaker areas. Comparisons of the two operating systems tend to reflect their origins, historic user bases and distribution models. Index Term— Kernel, Linux, Operating Systems, Windows II. THE ESSENTIAL DIFFERENCES BETWEEN LINUX & WINDOWS (BEGINNERS LEVEL) 1- Drives don’t have letters, they have mountpoints The first thing that usually trips up people who come from Windows to Linux is that filesystems aren’t assigned letters the way they...

Words: 5726 - Pages: 23

Free Essay

Distance Learning Computer-Based Hands-on Workshop: Experiences on Virtual and Physical Lab Environments

...Distance Learning and the Internet Conference 2008 5-2 Distance Learning Computer-based Hands-on Workshop: Experiences on Virtual and Physical Lab Environments Patcharee Basu, Shoko Mikawa, Achmad Basuki, Achmad Husni Thamrin, Keiko Okawa, Jun Murai Keio University Plenary Sessions Waseda University Presentations {yoo, funya, abazh, husni, keiko, jun}@sfc.wide.ad.jp Abstract In response to the educational demands of computer-skilled human resources, distance learning with ability to support hands-on computer lesson is needed. In this paper, a platform for region-wide distance learning computer-based hands-on workshop is presented through the actual developments. The proposed platform supports 1) teaching/learning activities in a hands-on computer workshop 2) efficient large-scale remote computer laboratory. Computer virtualization and StarBED large-scale computing testbed were utilized to create a distance learning computer laboratory, virtual and physical. This paper discusses various aspects of deploying virtual and physical lab environments for region-wide learners in a synchronous-style distance learning workshop. Keywords Hands-on computer workshop, remote laboratory, distance learning, educational technology 1 Introduction With digital and telecommunication technologies, distance education has been developed to extend boundary of knowledge sharing to be more location and time independent. It has been widely deployed in academic or training programs...

Words: 4133 - Pages: 17

Premium Essay

Cloud Computing

...CLOUD COMPUTING: PAST, PRESENT, AND FUTURE John P. Sahlin (sahlinj@gwu.edu) The George Washington University, United States of America ABSTRACT Defining cloud computing can be difficult, as each organization often has its own spin on the definition. Despite being hard to define, Gartner Research named cloud computing as one of the top technologies to watch in 2010, 2011, and 2012. At its core, cloud computing is a technical architecture that meets a specific business need. This chapter traces the roots of cloud computing from its origins in mainframe distributed computing, discusses the basics of the cloud computing model today, and offers insights for future directions that are likely to be pursued in the cloud computing arena. A number of challenges to cloud computing are identified, including concerns of security and how to deal with the rise of mobile computing. The chapter ends with recommendations on how to choose which cloud model is most appropriate to meet your organization’s needs and how to establish a successful cloud strategy. INTRODUCTION: DEFINING THE CLOUD I shall not today attempt further to define the kinds of material I understand to be embraced within that shorthand description; and perhaps I could never succeed in intelligibly doing so. But I know it when I see it. ~ Hon. Potter Stewart (U.S. Supreme Court Justice) Why did Gartner Research place cloud computing at the top of the list of most important technology focus areas for the past three years...

Words: 13736 - Pages: 55

Premium Essay

Test Paper

...g Easier! Making Everythin ™ mputing Cloud Co Learn to: • Recognize the benefits and risks of cloud services • Understand the business impact and the economics of the cloud • Govern and manage your cloud environment • Develop your cloud services strategy Judith Hurwitz Robin Bloor Marcia Kaufman Fern Halper Get More and Do More at Dummies.com ® Start with FREE Cheat Sheets Cheat Sheets include • Checklists • Charts • Common Instructions • And Other Good Stuff! To access the Cheat Sheet created specifically for this book, go to www.dummies.com/cheatsheet/cloudcomputing Get Smart at Dummies.com Dummies.com makes your life easier with 1,000s of answers on everything from removing wallpaper to using the latest version of Windows. Check out our • Videos • Illustrated Articles • Step-by-Step Instructions Plus, each month you can win valuable prizes by entering our Dummies.com sweepstakes. * Want a weekly dose of Dummies? Sign up for Newsletters on • Digital Photography • Microsoft Windows & Office • Personal Finance & Investing • Health & Wellness • Computing, iPods & Cell Phones • eBay • Internet • Food, Home & Garden Find out “HOW” at Dummies.com *Sweepstakes not currently available in all countries; visit Dummies.com for official rules. Cloud Computing FOR DUMmIES ‰ Cloud Computing FOR DUMmIES ‰ by Judith Hurwitz, Robin Bloor, Marcia Kaufman, and Dr. Fern Halper Cloud Computing For Dummies® Published by Wiley Publishing...

Words: 96278 - Pages: 386

Free Essay

Business Organization

...Science at EPFL Jacob Leverich Hewlett-Packard Kevin Lim Hewlett-Packard John Nickolls NVIDIA John Oliver Cal Poly, San Luis Obispo Milos Prvulovic Georgia Tech Partha Ranganathan Hewlett-Packard Table of Contents Cover image Title page In Praise of Computer Organization and Design: The Hardware/Software Interface, Fifth Edition Front-matter Copyright Dedication Acknowledgments Preface About This Book About the Other Book Changes for the Fifth Edition Changes for the Fifth Edition Concluding Remarks Acknowledgments for the Fifth Edition 1. Computer Abstractions and Technology 1.1 Introduction 1.2 Eight Great Ideas in Computer Architecture 1.3 Below Your Program 1.4 Under the Covers 1.5 Technologies for Building Processors and Memory 1.6 Performance 1.7 The Power Wall 1.8 The Sea Change: The Switch from Uniprocessors to Multiprocessors 1.9 Real Stuff: Benchmarking the Intel Core i7 1.10 Fallacies and Pitfalls 1.11 Concluding Remarks 1.12 Historical Perspective and Further Reading 1.13 Exercises 2. Instructions: Language of the Computer 2.1 Introduction 2.2 Operations of the Computer Hardware 2.3 Operands of the Computer Hardware 2.4 Signed and Unsigned Numbers 2.5 Representing Instructions in the Computer 2.6 Logical Operations 2.7...

Words: 79060 - Pages: 317

Premium Essay

Green Cloud

...A Framework for assessing solutions to green cloud computing Thi Hong Nhung Huynh MSc Computing and Management 2010/2011 The candidate confirms that the work submitted is their own and the appropriate credit has been given where reference has been made to the work of others. I understand that failure to attribute material which is obtained from another source may be considered as plagiarism. (Signature of student) Abstract Cloud computing is a breakthrough innovation in information technology industry. It brings new efficiencies and advantages to business. There is much hype about environmental impacts of cloud computing on green issues. Some favour of cloud computing as solution to green issues while others blame cloud computing as burden to environmental problems. Cloud computing, nevertheless, like other technology, is neutral. It can be either cause or solution to environmental issues. There is growing pressure on cloud computing industry to reduce the environmental impacts of their data centres. The current trend focuses on developing green cloud computing. However, the evaluation of solutions to green cloud computing bases on certain standards, metrics and benchmarks, which assess only parts of the environmental issues with cloud computing. This report will concentrate on green issues with cloud computing. Significant positive and negative impacts of cloud computing on the environment issues will be investigated. Next, a classification of green issues...

Words: 25393 - Pages: 102

Premium Essay

Doing Things

...Openflow Virtual Networking: A FlowBased Network Virtualization Architecture Georgia Kontesidou Kyriakos Zarifis Master of Science Thesis Stockholm, Sweden 2009 TRITA-ICT-EX-2009:205 Openflow Virtual Networking: A Flow-Based Network Virtualization Architecture Master Thesis Report November 2009 Students Kyriakos Zarifis Georgia Kontesidou Examiner Markus Hidell Supervisor Peter Sjödin Telecommunication Systems Laboratory (TSLab) School of Information and Communication Technology (ICT) Royal Institute of Technology Stockholm, Sweden 2 Abstract Network virtualization is becoming increasingly significant as other forms of virtualization constantly evolve. The cost of deploying experimental network topologies, the strict enterprise traffic isolation requirements as well as the increasing processing power requirements for virtualized servers make virtualization a key factor in both the research sector as well as the industry, the enterprise network and the datacenter. The definition of network virtualization as well as its manifestations vary widely and depend on the requirements of the environment in which it is deployed. This works sets the foundation towards a network virtualization framework based on a flow-based controlled network protocol like Openflow. 3 Abstract Så småningom, har nätverk virtualization blivit signifikant. Hög kostnaden för att utveckla experimentella nätverk topologier, noggranna kraven för en effektiv trafik isolering...

Words: 21351 - Pages: 86