Machine reference model of execution Virtualization


Machine reference model
Modern computing systems can be expressed in terms of the reference model described in below Figure At the bottom layer, the model for the hardware is expressed in terms of the Instruction Set Architecture (ISA), which defines the instruction set for the processor, registers, memory, and interrupt management. ISA is the interface between hardware and software, and it is important to the operating system (OS) developer (System ISA) and developers of applications that directly manage the underlying hardware (User ISA). The application binary interface (ABI) separates the operating system layer from the applications and libraries, which are managed by the OS. ABI covers details such as low-level data types, alignment, and call conventions and defines a format for executable programs.

The highest level of abstraction is represented by the application programming interface (API), which interfaces applications to libraries and/or the underlying operating system.

a possible implementation features a hierarchy of privileges (see Figure 3.5) in the form of ring-based security: Ring 0, Ring 1, Ring 2, and Ring 3; Ring 0 is in the most privileged level and Ring 3 in the least privileged level. Ring 0 is used by the kernel of the OS, rings 1 and 2 are used by the OS-level services, and Ring 3 is used by the user. Recent systems support only two levels, with Ring 0 for supervisor mode and Ring 3 for user mode.


Share to whatsapp

More Questions from Cloud Computing and Its Applications Module 1

Types of Cloud Computing
View
What Is Cloud Computing?
View
Microsoft Azure - Cloud Computing
View
Define Cloud computing
View
Characteristics and benefits of Cloud Computing
View
Pros and cons of virtualization
View
Characteristics and benefits
View