快好知 kuaihz


Hypervisor造句
1 In every node controller, there is a hypervisor running. 2 Relieving the hypervisor of packet filtering and sorting improves overall CPU usage and throughput levels. 3 Para-virtualization is similar, but the hypervisor operates in a more cooperative fashion. 4 Once the team identified the technology roadmap and hypervisor model,[www.] it built a target architecture solution. 5 Regardless, the basic outcome of any kind of hypervisor is the same. 6 The job of the hypervisor is to efficiently dole out access to the server's physical resources to the multiple guests. 7 Depending on the hypervisor and the IT skill available, the establishment of a virtualization platform to execute virtual appliances could be a significant obstacle. 8 The packets are then sent to the hypervisor, which directs them to their respective virtual machines. 9 Like a hypervisor, a separation (or partitioning) kernel securely isolates environments for upper-level guests. 10 The role of the hypervisor includes resource allocation, partition management, processor dispatching, and virtual memory management. 11 After obtaining the system-wide physical address (PMB), the hypervisor translates this to the corresponding valid logical address (LMB) for the partition. 12 Pushing the device emulation from the hypervisor to user space has some distinct advantages. The most important advantage relates to what's called the trusted computing base (TCB). 13 With less code in the hypervisor (pushing the device emulation into the less privileged user space), the less chance of leaking privileges to untrusted users. 14 GameOS is really a hypervisor that also manages the second OS boot and install and provides fail-safe options along with kboot to restore your PS3 back to its shipped configuration. 15 In cases where stealing idle cycles is not sufficient for hypervisor work, it can also borrow cycles when processor is in busy state. 16 To fully initialize your private cloud, create an IP group and a group of IP addresses that can be utilized by your hypervisor. 17 With systems A and B virtualized on the same hardware, the hypervisor can provide more processing capacity and memory to the application that is being used more heavily Figure 2). 18 A hacker can become a highly privileged user with administrative controls and get out of a virtual machine and then execute malicious programs on the hypervisor. 19 It was necessary to limit Job processing to 7 processors in order to leave enough CPU for HyperVisor. 20 With a single kernel loadable module, a Linux kernel running on virtualization-capable hardware is able to act as a hypervisor and support unmodified Linux and Windows guest operating systems. 21 It provides the "last mile" of management, interfacing directly with the platform hypervisor and extending APIs out to larger infrastructure-management solutions. 22 This model is advantageous, because the device emulation is independent of the hypervisor and can therefore be shared between hypervisors. 23 The virtual image also contains virtual disk definition and virtual network connection units that represent the virtual resources that the hypervisor provides to the virtual system. 24 All the non-deterministic events occurred in the virtual machine are recorded at the hypervisor layer, and the system execution stream recurs during replay by event emulation. 25 The IBM Image Construction and Composition Tool can be used to create custom built Hypervisor Edition Images. 26 However, to register and start the new VM, the server installed VDM should have some VM hypervisor utilities installed. 27 The VPA is a two-way communication zone between the operating system and the hypervisor on information required about the virtual processor. 28 Finally, a high-level scheduler is necessary to transfer control between the hypervisor and guest operating systems (and back). 29 In case the virtual processor gets new work in the same cycle, the hypervisor gives the unused cycles back. 30 When a virtual processor or SMT thread becomes idle, it is able to cede processor cycle to Hypervisor, and then the Hypervisor can dispatch unused processor cycles for other work.