100% found this document useful (1 vote)
52 views19 pages

Cloud Visualization

Uploaded by

niti gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
52 views19 pages

Cloud Visualization

Uploaded by

niti gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

CLOUD

V I RT U A L I Z AT I O N

S U B J E C T T E A C H E R : S H AV E T A K A L S I , A S S I S T A N T P R O F E S S O R ( C S E )

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR


WHAT IS VIRTUALIZATION
• Virtualization is a technique of splitting a physical resource into as many as logical resource as
we want. eg. CPU, Memory, storage. It is the process of creating a virtual version of something
like computer hardware. It involves using specialized software to create a virtual or software-
created version of a computing resource rather than the actual version of the same resource.
With the help of Virtualization, multiple operating systems and applications can run on same
machine and its same hardware at the same time, increasing the utilization and flexibility of
hardware.
• In other words, Virtualization allows to share a single physical instance of a resource or an
application among multiple users and organizations at one time. It does this by assigning a
logical name to a physical storage and providing a pointer to that physical resource on demand.
Moreover, virtualization technologies provide a virtual environment for not only executing
applications but also for storage, memory, and networking.
• Physical servers consume electricity, take up storage space, and need maintenance. You are
often limited by physical proximity and network design if you want to access them.
Virtualization removes all these limitations by abstracting physical hardware functionality into
software.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
• Over an existing OS & hardware, we generally create a virtual machine; and above it, we run
other operating systems or applications.
• Host Machine: The machine on which the virtual machine is going to be built is known as Host
Machine.
• Guest Machine: The virtual machine is referred to as a Guest Machine.
• This virtual environment is managed by firmware, which is termed as a hypervisor. Hypervisor
is also known as VMM (Virtual Machine Manager).
• In cloud computing, users store data in the cloud, but with the help of Virtualization, users have
the extra benefit of sharing the infrastructure. Cloud Vendors take care of the required physical
resources, but these cloud providers charge a huge amount for these services which impacts
every user or organization.
• Virtualization helps users or Organizations in maintaining those services which are required by
a company through external (third-party) people, which helps in reducing costs to the company.
This is the way through which Virtualization works in Cloud Computing.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
The machine on which the Virtual Machine is going to be build is known as Host
Machine and that Virtual Machine is referred as a Guest Machine.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
FEATURES OF VIRTUALIZATION
1. Increased Security: It increases the hosts ability to control the execution of guest programs in
a transparent manner which helps open up new possibilities to allow the delivery of a secure and
controlled execution environment. All the operations of the guest programs are generally
performed against the virtual machine, which then translates and applies them to the host
programs. A virtual machine manager can control and filter the activity of the guest programs,
thus preventing some harmful operations from being performed. Resources exposed by the host
can then be hidden or simply protected from the guest. Increased security is a requirement when
dealing with untrusted code.
2. Sharing: It is a key feature of virtualization as through this process one can create a separate
computing environment within the same host. This allows them to reduce the number of active
serves and minimizes power consumption.
3. Aggregation: Not only it is possible to share physical resource among several guests, but
virtualization also allows aggregation, which is the opposite process. A group of separate hosts
can be tied together and represented to guests as a single virtual host. This functionality is
implemented with cluster management software, which harnesses the physical resources of a
homogeneous group of machines and represents them as a single resource.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
4. Availability: Virtualization platforms assure the continuous uptime by balancing load
automatically that runs an excessive number of servers across multiple host machines in order to
prevent interruption services.
5. Isolation: Virtualization allows providing guest programs with completely separated and
isolated environments for them to be executed in, be it an operating system, application etc. The
program performs its activity by interaction with an abstraction layer that provides access to the
underlying resources. The virtual machine filters the activity of the guest and prevents harmful
operations against the host. It also enables tuning. Tuning helps finely tune the properties of the
resources exposed through the virtual environment, making it easier to control the performance of
the guest program. This online environment not only defends sensitive knowledge but also allows
guest users to remain-connected.
6. Emulation: Guest programs are executed within an environment that is controlled by the
virtualization layer, which ultimately is a program. Also, a completely different environment with
respect to the host can be emulated, thus allowing the execution of guest programs requiring
specific characteristics that are not present in the physical host.
7. Resource Distribution: Either be a single computer or a network of connected servers,
virtualization allows users to make a unique computer environment from one host machine that
lets users to restrict the participants as active users, scale down power consumption and easy
control.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
BENEFITS OF VIRTUALIZATION
1. Security: The security is served through firewalls that prevent from any unreliable access and
preserve the data safe and confidential. In addition to that, the firewalls provide extra security
from any sort of cyber threats and virus attacks, the protocols consist of end to end encryption,
saving data automatically from other risky threads, and users can virtualize their data and make
backups of the same data on another server when needed.
2. Flexible Operations: With the deployment of virtualization, users can work efficiently as the
working process is very streamlined and agile. Presently, the employed network switch is easy to
use, flexible and saves time. Virtualization is also helpful in troubleshooting technical errors,
occurring in any of the connected devices. It eradicates the issues of retaining or recovering lost
data due to corrupted or crashed devices.
3. Economical: This is the most prime reason to choose virtualization rapidly as with this
technique companies can manage additional expenditure on physical devices and servers. Being
active with a virtual environment, data can be gathered on virtual servers. It also reduces the
rigorous use of electricity (that has been a concern if several physical devices and services are
being used at the same time), lowering bills while executing the numerous components of an
operating system and applications over the users and company’s network.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
4. Flexible data transfer: The data can be transferred to virtual servers anytime and also be
retrieved due to this users or cloud providers need not to waste time in finding out hard drives to
discover data. With the implementation of virtualization, it has become easy to allocate the
required data and transfer them to the appropriate authorities. Moreover, there is no limitation of
data transfer and can be transferred to a far distance with minimal charges.
5. Remove system failure risks: While performing any function, it often happens that the system
might malfunction in critical timing such that this system failure could be adverse for a company’s
resources and also deteriorate its reputation. This system failure can be protected with
virtualization as users could perform the same task simultaneously over multiple devices, and the
accumulated data can also be retrieved anytime with any device. Along with it, the server has the
two working sides that makes data accessible at any point of time, if one primary server goes
down, the secondary server is there to deliver access to the users when they demand to retrieve
data for their use
6. Enhance development productivity. i.e., if one VM is not working, it will not affect other VM’s.
7. Remote access and rapid scalability.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
TYPES OF VIRTUALIZATION

Operating Application/
Hardware Data
System Software
Virtualization Virtualization
Virtualization Virtualization

Memory Storage Network Desktop


Virtualization Virtualization Virtualization Virtualization

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Hardware Virtualization: When the virtual machine software or virtual machine
manager (VMM) is directly installed on the hardware system is known as hardware
virtualization. The main job of hypervisor is to control and monitoring the processor,
memory and other hardware resources. After virtualization of hardware system, different
operating systems are installed on it which run different applications on those OS.
Hardware virtualization is mainly done for the server platforms, because controlling
virtual machines is much easier than controlling a physical server. It is sometimes also
called as Server Virtualization.
Operating System Virtualization: When the virtual machine software or virtual
machine manager (VMM) is installed on the Host operating system instead of directly on
the hardware system is known as operating system virtualization. It is mainly used for
testing the applications on different platforms of OS.
Memory Virtualization: Memory Virtualization separates memory and servers. It
decouples volatile RAM resources from individual systems in the data center & it
aggregates those resources into a virtualized memory pool accessible by any computer in
the cluster. eg. 16 GB RAM (memory card) + 32 GB (Internal Memory)= 40GB file
(movie) can be copied. Or 16GB RAM= 8GB+ 8GB

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Hardware Virtualization
Operating System Virtualization

Memory Virtualization

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Storage Virtualization: It is the process of grouping the physical storage from multiple
network storage devices so that it looks like a single storage device. The servers aren’t
aware of exactly where their data is stored. It makes managing storage from multiple
sources to be managed and utilized as a single repository. It is mainly done for back-up
and recovery purposes. It gives the user an ability to pool the hardware storage space
from several interconnected storage devices into a simulated single storage device that is
managed from one single command console or vice-versa. eg. 2 TB HDD= 1TB + 1TB.
Application Virtualization: Application virtualization pulls out the functions of
applications to run on operating systems other than the operating systems for which they
were designed. For example, users can run a Microsoft Windows application on a Linux
machine without changing the machine configuration.
Data Virtualization: In this, the data is collected from various sources and managed
that at a single place without knowing more about the technical information like how
data is collected, stored & formatted and then arranged that data logically so that its
virtual view can be accessed by its interested users through the various cloud services
remotely. Many big companies are providing their services like Oracle, IBM, At scale,
Cdata etc.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Application Virtualization

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Network Virtualization: It is a method of combining the available resources in a
network. Any Computer Network has hardware elements such as switches, routers, and
firewalls. An organization with offices in multiple geographic locations can have several
different network technologies working together to create its enterprise network.
Network virtualization is a process that combines all of these network resources to
centralize administrative tasks. Administrators can adjust and control these elements
virtually without touching the physical components, which greatly simplifies network
management. It combines the functions of network appliances, such as firewalls, load
balancers, and traffic analyzers that work together, to improve network performance.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Desktop Virtualization: This model enables you to emulate a workstation load. It allows the
user to access the desktop remotely. Since the workstation is essentially running in a data
center server, access to it can be more secure and portable. Most organizations have
nontechnical staff that use desktop operating systems to run common business applications.
For instance, you might have the following staff:
A customer service team that requires a desktop computer with Windows 10 and customer-
relationship management software. A marketing team that requires Windows Vista for sales
applications. You can use desktop virtualization to run these different desktop operating
systems on virtual machines, which your teams can access remotely.
Types of Desktop Virtualization:
Virtual desktop infrastructure: It runs virtual
desktops on a remote server. Your users can access
them by using client devices.
Local desktop virtualization: In this, you run the
hypervisor on a local computer and create a virtual
computer with a different operating system. You can
switch between your local and virtual environment in
the same way you can switch between applications.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Types of Hypervisors
• A Hypervisor is also called a
Virtual Machine Monitor (VMM).
The hardware on which it is
installed is labeled as the host
machine. The virtual resources,
created and managed by the
hypervisor, are known as virtual or
guest machines.
• There are two types of
Hypervisors:
• 1. Type 1 Hypervisor (also called
bare metal or native)
• 2. Type 2 Hypervisor (also known
as hosted or embedded
hypervisors)

Shaveta Kalsi,
DAV
DAV INSTITUTE OFINSTITUTE OF ENGINEERING
ENGINEERING & TECHNOLOGY,
& TECHNOLOGY, JALANDHAR JALANDHAR Shaveta Kalsi, CSE Deptt
CSE Deptt
• Type 1 or Bare-Metal Hypervisors are installed directly on the
physical hardware of the host machine, providing a layer TYPE 1
between the hardware and an OS. On top of this layer, you can HYPERVISOR
install many virtual machines. The machines are not connected in
any way and can have different instances of operating systems
and act as different application servers.
• System administrators and advanced users control the hypervisor
remotely through an interface called a management console.
• With it, you can connect to and manage instances of operating
systems. You can also turn servers on and off, transfer operating
systems from one server to another (in case of downtime or
malfunction) and perform many other operations.
• A type 1 hypervisor is highly secure since it doesn’t have an
attack surface of an underlying operating system (host). Also, it
controls and assigns the resources allocated to each virtual
machine based on its usage to avoid wasting resources.
• Examples of type 1 hypervisors include VMware ESXi, KVM,
Oracle VM, Citrix XenServer, Microsoft Hyper-V etc.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSEKalsi,


Shaveta DepttCSE Deptt
• Unlike type 1, a type 2 hypervisor is installed on top of an existing
Operating System. This allows users to utilize their personal TYPE 2
computer or server as a host for virtual machines. Therefore, you
have the underlying hardware, an operating system serving as a host,
HYPERVISOR
a hypervisor and a guest operating system.
• The guest machine is not aware of its part of a larger system and all
actions you run on it are isolated from the host. Although a VM is
isolated, the primary OS is still directly connected to the hardware.
This makes it less secure than type 1 hypervisors.
• In environments where security is paramount, this type of
hypervisor may not suit your needs. However, end-users & clients
with small businesses may find this type of environment more
fitting.
• Having a hosted hypervisor allows more than one instance of an
operating system to be installed. However, you should be careful
with resource allocation. Over-allocation may result in your host
machine crashing.
• Examples of type 2 hypervisors include VMware Workstation,
KVM, Oracle VM VirtualBox, Microsoft Virtual PC, Red Hat
Enterprise Virtualization etc.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY,


DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR JALANDHAR Shaveta Kalsi, CSEKalsi,
Shaveta DepttCSE Deptt
THANK YOU!!

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt

You might also like