TwoOStwo virtual machine NetSys GmbH. Product and technology.

Презентация:



Advertisements
Похожие презентации
ManyOSany conception NetSys GmbH Basic ideas and system architecture.
Advertisements

© 2002 IBM Corporation Confidential | Date | Other Information, if necessary November 4, 2014 Copyright © 2006 Eclipse Foundation, Inc., Made available.
Designing Network Management Services © 2004 Cisco Systems, Inc. All rights reserved. Designing the Network Management Architecture ARCH v
CJ International 1 CJ International Welcomes you to the Soft Logic Open World.
Lecture # Computer Architecture Computer Architecture = ISA + MO ISA stands for instruction set architecture is a logical view of computer system.
Kurochkin I.I., Prun A.I. Institute for systems analysis of RAS Centre for grid-technologies and distributed computing GRID-2012, Dubna, Russia july.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Enterprise Campus and Data Center Design Review Analyze organizational requirements: –Type.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA Lesson 3 Cisco PIX Firewall Technology and Features.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Remote Connectivity Design Review Analyze network requirements: –Type of applications, the.
The new generation of Supervisory System Main Features: MONITORING is based on reading and saving the values from the field and then using these values.
Copyright 2003 CCNA 4 Chapter 22 Developing Network Security and Network Management Strategies By Your Name.
Topic:V-Shaped Model Aigerim Arstanova Malika Gumarova Malika Yersainova.
Designing Network Management Services © 2004 Cisco Systems, Inc. All rights reserved. Developing an Enterprise Network Management Strategy ARCH v
OPERATING SYSTEMS. An operating system (OS) is an interface between hardware and user which is responsible for the management and coordination of activities.
© 2003, Cisco Systems, Inc. All rights reserved. CSPFA Chapter 3 Cisco PIX Firewall Technology and Features.
© 2002 IBM Corporation Confidential | Date | Other Information, if necessary © Wind River Systems, released under EPL 1.0. All logos are TM of their respective.
Introducing Cisco Network Service Architectures © 2004 Cisco Systems, Inc. All rights reserved. Introducing the Network Design Methodology ARCH v
Copyright CCNA 2 Chapter 13 Learning About Other Devices By Your Name.
Workshop on Integrated Machine Tool Simulation & Verification April 9-10, 2002 Cypress, California.
Copyright © 2006 Intel Corporation, released under EPL version /20061 Eclipse DSDP-TM Target Connection Adapters Peter Lachner WW0806 rev 1.0.
Транксрипт:

twoOStwo virtual machine NetSys GmbH. Product and technology

Presentation plan Virtual Machine technology overview twoOStwo solution twoOStwo technology details OS/2 specific optimizations

Virtual Machine technology overview What is the Virtual Machine? Who needs it and what for? 3 ways to design Virtual Machine Strategy N1: API emulation Strategy N2: pure emulation Strategy N3: quasi-emulation

What is the Virtual Machine? Virtual machine Real PC Virtual machine... Host operating system Guest operating system

Legacy software users for migration Who needs it and what for? Developers for distributed systems development and testing Students in computer training centers Sales people for sales activities and demonstration IT people for systems support optimization

3 ways to design Virtual Machine Pure emulation OS independent and reliable, but very slow API emulation Fast, but OS dependent and not reliable Quasi-emulation Fast, reliable and OS independent

Strategy N1: API emulation Devices Guest OS application Call API 1 Call API 2... Call API N... Guest OS API emulator Host OS API Host OS

Strategy N2: pure emulation Devices Emulator Guest OS Instruction 1 Instruction 2... Instruction N... Emulated PC Host OS API Host OS

Strategy N3: quasi-emulation Devices Exceptionhandler Guest OS Instruction 1 Instruction 2... Instruction N... Emulated PC Host OS API Host OS

twoOStwo solution What is the 2os2 product? Quasi-emulation VM technology Processor emulation Devices emulation Networking emulation

What is the 2os2 product? Quasi-emulation VM technology based solution OS/2 v3, OS/2 v4 (FixPack 12, 15), OS/2 v4.5 runs under WinNT/2000 Strongly OS/2 focused solution IDE HDD, CD-ROM, COM, LPT, DESKO-keyboard support VESA 2.0 SVGA support Full networking support Very fast and reliable Open for any non-standart devices integration

Quasi-emulation VM technology Monitor Guest OS Host OS Application API call OS API Guest OS code... Exception Native execution Emulation section Real hardware

Processor emulation CPU Segment model GDT LDT IDT Interrupts exeption IRQ int n Paging model PDE PTE Command system Instruction emulation Protection & privelege Ring 0Ring 3

Devices emulation Emulation schema Guest OS code Host OS API Passthrough schema Guest OS code Redirect module... Real devices Real Devices Emulation devices

Networking emulation Filter Internal buffer Special driver Real network card Virtual network card VM Protocols PC

twoOStwo technology details General system architecture Multy-VM architecture Multy-thread architecture Code-under-control technique Code-scanning technique Breakpoints types Host/guest OSes layout GDT/LDT/IDT emulation Multitasking support Paging emulation

General system architecture Driver interface NT device driver VM monitor Interrupt redirection Exception emulation x86 emulation NT binary resource VGA emulation... Other devices emulation VM interface NT application ioctl() User interface IOHooks NT DLL

Multy-VM architecture Driver Host OS Guest OS Monitor Application Monitor Application Monitor Application

Multy-thread architecture MFC SDI application GUI thread VGA emulation DriverMonitor Hooks VGA thread VM thread

Code-under-control technique Exception handler Ring 0 Ring 3 Ring 1 Ring 2 Host OS kernel Guest OS general instruction priviledge instruction Application of emulation «bad» instruction

Scanning technique Code scanner Guest code … «bad» instruction 1 … «bad» instruction N … branch(call)... Interrupt handler Emulator scanning

Breakpoints types Software breakpoints Hardware breakpoints xor ax,ax smsw push ax xor ax,ax int 3 dw ? push ax xor ax,ax smsw push ax DR0 = ADDR (smsw) DR1 DR2 DR3

Host/guest OSes layout DriverMonitor Host OS (Ring 0) Guest OS (Ring 0) Host OS (Ring 3) Guest OS (Ring 3) Application Guest OS kernel Guest OS applications Host OS kernel

GDT/LDT/IDT emulation Host OS context Monitor context GDT LDT IDT GDT LDT IDT Guest OS context GDT LDT IDT Save context lgdt,lldt,lidt emulation

Multitasking support Host OS context Monitor context Monitor Guest OS context Task 1 Task N Emulator... Task manager Task 1 Task N... Task manager

Paging emulation Host OS context Monitor and guest OS context page transformation Page catalogue CROSS PAGE Page catalogue CROSS PAGE Page manager Page manager

OS/2 specific optimizations Native kernel calls technique Emulated kernel calls technique

... call sys1 … call sys1... Native kernel calls technique... instr1 … instrN emulated ret Guest code sys1 Context saving Exception analyzing Instruction decoding Instruction emulating Async events check Timer adjusting Code pointer calculating Context restoring Exception handler... call sys1_fast … call sys1_fast... instr1 … instrN native ret Guest code sys1_fast

... call sys1 … call sys1... Emulated kernel calls technique... emulated instr1 … emulated instrN emulated ret Guest code sys1 Context saving Exception analyzing Instruction decoding Instruction emulating Async events check Timer adjusting Code pointer calculating Context restoring Exception handler... call sys1_fast … call sys1_fast... set of instr1 … set of instrN native ret Guest code sys1_fast