Q

Multi core processor machines in a virtualized enviornment

Multi core processor machine performance in a virtualized environment depends on the operating system running.

How does the number of processors supported in a virtualized environment affect performance?
The answer to this question really depends on the Operating System (OS) and application stack that will be deployed as a virtual machine. Just like when dealing with physical machines, the OS and applications deployed must be able to take advantage of a multi core processor system to gain any benefit from the multiple processors. If the OS and applications running in the virtual machine support multiple processors, then a virtual machine can be assigned dedicated physical processors enabling it to achieve performance closer to a physical multi core processor machine. This is especially useful for high-end database or application servers that are virtualized.

Currently, VMware ESX 3.0 supports up to four processors dedicated to a single virtual machine, Microsoft Virtual...

Server 2005 R2 does not support multiple processors for a virtual machine, and XenEnterprise 3.1 supports up to 32 processors per Linux virtual machine guest. However, look for multi-processor support in Microsoft's upcoming hypervisor in Server Longhorn, codename "Viridian," and Windows guest multi-processor support in XenEnterprise 3.2.

This was first published in April 2007

Dig Deeper on Virtualization Technology and Services

PRO+

Content

Find more PRO+ content and other member only offers, here.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

MicroscopeUK

SearchCloudProvider

SearchSecurity

  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...

SearchStorage

SearchNetworking

SearchCloudComputing

SearchConsumerization

SearchDataManagement

SearchBusinessAnalytics

Close