Cloud Visualization
Cloud Visualization
V I RT U A L I Z AT I O N
S U B J E C T T E A C H E R : S H AV E T A K A L S I , A S S I S T A N T P R O F E S S O R ( C S E )
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
• Over an existing OS & hardware, we generally create a virtual machine; and above it, we run
other operating systems or applications.
• Host Machine: The machine on which the virtual machine is going to be built is known as Host
Machine.
• Guest Machine: The virtual machine is referred to as a Guest Machine.
• This virtual environment is managed by firmware, which is termed as a hypervisor. Hypervisor
is also known as VMM (Virtual Machine Manager).
• In cloud computing, users store data in the cloud, but with the help of Virtualization, users have
the extra benefit of sharing the infrastructure. Cloud Vendors take care of the required physical
resources, but these cloud providers charge a huge amount for these services which impacts
every user or organization.
• Virtualization helps users or Organizations in maintaining those services which are required by
a company through external (third-party) people, which helps in reducing costs to the company.
This is the way through which Virtualization works in Cloud Computing.
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
The machine on which the Virtual Machine is going to be build is known as Host
Machine and that Virtual Machine is referred as a Guest Machine.
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
FEATURES OF VIRTUALIZATION
1. Increased Security: It increases the hosts ability to control the execution of guest programs in
a transparent manner which helps open up new possibilities to allow the delivery of a secure and
controlled execution environment. All the operations of the guest programs are generally
performed against the virtual machine, which then translates and applies them to the host
programs. A virtual machine manager can control and filter the activity of the guest programs,
thus preventing some harmful operations from being performed. Resources exposed by the host
can then be hidden or simply protected from the guest. Increased security is a requirement when
dealing with untrusted code.
2. Sharing: It is a key feature of virtualization as through this process one can create a separate
computing environment within the same host. This allows them to reduce the number of active
serves and minimizes power consumption.
3. Aggregation: Not only it is possible to share physical resource among several guests, but
virtualization also allows aggregation, which is the opposite process. A group of separate hosts
can be tied together and represented to guests as a single virtual host. This functionality is
implemented with cluster management software, which harnesses the physical resources of a
homogeneous group of machines and represents them as a single resource.
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
4. Availability: Virtualization platforms assure the continuous uptime by balancing load
automatically that runs an excessive number of servers across multiple host machines in order to
prevent interruption services.
5. Isolation: Virtualization allows providing guest programs with completely separated and
isolated environments for them to be executed in, be it an operating system, application etc. The
program performs its activity by interaction with an abstraction layer that provides access to the
underlying resources. The virtual machine filters the activity of the guest and prevents harmful
operations against the host. It also enables tuning. Tuning helps finely tune the properties of the
resources exposed through the virtual environment, making it easier to control the performance of
the guest program. This online environment not only defends sensitive knowledge but also allows
guest users to remain-connected.
6. Emulation: Guest programs are executed within an environment that is controlled by the
virtualization layer, which ultimately is a program. Also, a completely different environment with
respect to the host can be emulated, thus allowing the execution of guest programs requiring
specific characteristics that are not present in the physical host.
7. Resource Distribution: Either be a single computer or a network of connected servers,
virtualization allows users to make a unique computer environment from one host machine that
lets users to restrict the participants as active users, scale down power consumption and easy
control.
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
BENEFITS OF VIRTUALIZATION
1. Security: The security is served through firewalls that prevent from any unreliable access and
preserve the data safe and confidential. In addition to that, the firewalls provide extra security
from any sort of cyber threats and virus attacks, the protocols consist of end to end encryption,
saving data automatically from other risky threads, and users can virtualize their data and make
backups of the same data on another server when needed.
2. Flexible Operations: With the deployment of virtualization, users can work efficiently as the
working process is very streamlined and agile. Presently, the employed network switch is easy to
use, flexible and saves time. Virtualization is also helpful in troubleshooting technical errors,
occurring in any of the connected devices. It eradicates the issues of retaining or recovering lost
data due to corrupted or crashed devices.
3. Economical: This is the most prime reason to choose virtualization rapidly as with this
technique companies can manage additional expenditure on physical devices and servers. Being
active with a virtual environment, data can be gathered on virtual servers. It also reduces the
rigorous use of electricity (that has been a concern if several physical devices and services are
being used at the same time), lowering bills while executing the numerous components of an
operating system and applications over the users and company’s network.
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
4. Flexible data transfer: The data can be transferred to virtual servers anytime and also be
retrieved due to this users or cloud providers need not to waste time in finding out hard drives to
discover data. With the implementation of virtualization, it has become easy to allocate the
required data and transfer them to the appropriate authorities. Moreover, there is no limitation of
data transfer and can be transferred to a far distance with minimal charges.
5. Remove system failure risks: While performing any function, it often happens that the system
might malfunction in critical timing such that this system failure could be adverse for a company’s
resources and also deteriorate its reputation. This system failure can be protected with
virtualization as users could perform the same task simultaneously over multiple devices, and the
accumulated data can also be retrieved anytime with any device. Along with it, the server has the
two working sides that makes data accessible at any point of time, if one primary server goes
down, the secondary server is there to deliver access to the users when they demand to retrieve
data for their use
6. Enhance development productivity. i.e., if one VM is not working, it will not affect other VM’s.
7. Remote access and rapid scalability.
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
TYPES OF VIRTUALIZATION
Operating Application/
Hardware Data
System Software
Virtualization Virtualization
Virtualization Virtualization
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Hardware Virtualization: When the virtual machine software or virtual machine
manager (VMM) is directly installed on the hardware system is known as hardware
virtualization. The main job of hypervisor is to control and monitoring the processor,
memory and other hardware resources. After virtualization of hardware system, different
operating systems are installed on it which run different applications on those OS.
Hardware virtualization is mainly done for the server platforms, because controlling
virtual machines is much easier than controlling a physical server. It is sometimes also
called as Server Virtualization.
Operating System Virtualization: When the virtual machine software or virtual
machine manager (VMM) is installed on the Host operating system instead of directly on
the hardware system is known as operating system virtualization. It is mainly used for
testing the applications on different platforms of OS.
Memory Virtualization: Memory Virtualization separates memory and servers. It
decouples volatile RAM resources from individual systems in the data center & it
aggregates those resources into a virtualized memory pool accessible by any computer in
the cluster. eg. 16 GB RAM (memory card) + 32 GB (Internal Memory)= 40GB file
(movie) can be copied. Or 16GB RAM= 8GB+ 8GB
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Hardware Virtualization
Operating System Virtualization
Memory Virtualization
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Storage Virtualization: It is the process of grouping the physical storage from multiple
network storage devices so that it looks like a single storage device. The servers aren’t
aware of exactly where their data is stored. It makes managing storage from multiple
sources to be managed and utilized as a single repository. It is mainly done for back-up
and recovery purposes. It gives the user an ability to pool the hardware storage space
from several interconnected storage devices into a simulated single storage device that is
managed from one single command console or vice-versa. eg. 2 TB HDD= 1TB + 1TB.
Application Virtualization: Application virtualization pulls out the functions of
applications to run on operating systems other than the operating systems for which they
were designed. For example, users can run a Microsoft Windows application on a Linux
machine without changing the machine configuration.
Data Virtualization: In this, the data is collected from various sources and managed
that at a single place without knowing more about the technical information like how
data is collected, stored & formatted and then arranged that data logically so that its
virtual view can be accessed by its interested users through the various cloud services
remotely. Many big companies are providing their services like Oracle, IBM, At scale,
Cdata etc.
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Application Virtualization
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Network Virtualization: It is a method of combining the available resources in a
network. Any Computer Network has hardware elements such as switches, routers, and
firewalls. An organization with offices in multiple geographic locations can have several
different network technologies working together to create its enterprise network.
Network virtualization is a process that combines all of these network resources to
centralize administrative tasks. Administrators can adjust and control these elements
virtually without touching the physical components, which greatly simplifies network
management. It combines the functions of network appliances, such as firewalls, load
balancers, and traffic analyzers that work together, to improve network performance.
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Desktop Virtualization: This model enables you to emulate a workstation load. It allows the
user to access the desktop remotely. Since the workstation is essentially running in a data
center server, access to it can be more secure and portable. Most organizations have
nontechnical staff that use desktop operating systems to run common business applications.
For instance, you might have the following staff:
A customer service team that requires a desktop computer with Windows 10 and customer-
relationship management software. A marketing team that requires Windows Vista for sales
applications. You can use desktop virtualization to run these different desktop operating
systems on virtual machines, which your teams can access remotely.
Types of Desktop Virtualization:
Virtual desktop infrastructure: It runs virtual
desktops on a remote server. Your users can access
them by using client devices.
Local desktop virtualization: In this, you run the
hypervisor on a local computer and create a virtual
computer with a different operating system. You can
switch between your local and virtual environment in
the same way you can switch between applications.
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Types of Hypervisors
• A Hypervisor is also called a
Virtual Machine Monitor (VMM).
The hardware on which it is
installed is labeled as the host
machine. The virtual resources,
created and managed by the
hypervisor, are known as virtual or
guest machines.
• There are two types of
Hypervisors:
• 1. Type 1 Hypervisor (also called
bare metal or native)
• 2. Type 2 Hypervisor (also known
as hosted or embedded
hypervisors)
Shaveta Kalsi,
DAV
DAV INSTITUTE OFINSTITUTE OF ENGINEERING
ENGINEERING & TECHNOLOGY,
& TECHNOLOGY, JALANDHAR JALANDHAR Shaveta Kalsi, CSE Deptt
CSE Deptt
• Type 1 or Bare-Metal Hypervisors are installed directly on the
physical hardware of the host machine, providing a layer TYPE 1
between the hardware and an OS. On top of this layer, you can HYPERVISOR
install many virtual machines. The machines are not connected in
any way and can have different instances of operating systems
and act as different application servers.
• System administrators and advanced users control the hypervisor
remotely through an interface called a management console.
• With it, you can connect to and manage instances of operating
systems. You can also turn servers on and off, transfer operating
systems from one server to another (in case of downtime or
malfunction) and perform many other operations.
• A type 1 hypervisor is highly secure since it doesn’t have an
attack surface of an underlying operating system (host). Also, it
controls and assigns the resources allocated to each virtual
machine based on its usage to avoid wasting resources.
• Examples of type 1 hypervisors include VMware ESXi, KVM,
Oracle VM, Citrix XenServer, Microsoft Hyper-V etc.
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt