Unit 3
Unit 3
CLOUD MANAGEMENT
AMIT PATEL
CLOUD MANAGEMENT
▪ Cloud management is maintaining and controlling the cloud services and resources be it
public, private or hybrid.
▪ Some of its aspects include access control, load balancing, performance, storage, backups,
capacity, deployment etc.
▪ To do so a cloud managing personnel needs full access to all the functionality of resources
in the cloud.
▪ A well-designed cloud management strategy can help IT pros control those dynamic and
scalable computing environments.
CLOUD MANAGEMENT
Cloud management can also help organizations achieve three goals:
❖ Self-service refers to the flexibility achieved when IT pros access cloud resources, create
new ones, monitor usage and cost, and adjust resource allocations.
▪ Without a competent IT staff, it's difficult for any cloud management strategy to succeed.
▪ These individuals must possess knowledge of the proper tools and best practices
WHY REQUIRE ?
▪ Cloud is nowadays preferred by huge organizations as their primary data storage.
▪ A small downtime or an error can cause a great deal of loss and inconvenience for the
organizations.
▪ So as to design, handle and maintain a cloud computing service specific members are
responsible who make sure things work out as supposed and all arising issues are
addressed.
TASK OF CLOUD MANAGEMENT
CLOUD MANAGEMENT TASK
Audit System Backups
▪ It is needed to audit backups timely to verify restoring of randomly selected files of different
users.
1. Backing up files by the company, from on-site computers to disks which occupy in the
cloud.
▪ The managers are responsible to develop a diagram to describe a detailed process flow.
▪ This process flow explains the movement of data belonging to an organization throughout the
cloud solution.
▪ The procedure to exit from services of a particular cloud provider must be known to the
managers.
▪ The procedures are defined to allow the cloud mangers to export data of an organization from
their system to another cloud provider.
CLOUD MANAGEMENT TASK
Knowing Provider's Security Procedures
▪ It is important to the security plans of the provider for the services like Multiuser use,
E-commerce processing, Employee screening, Encryption policy.
▪ The manager should know the capacity planning for checking whether the cloud provider
would be able to meet the future requirement of business or not.
▪ The managers should manage the scaling capabilities for ensuring services that can be scaled
up or down, according to the need.
CLOUD MANAGEMENT TASK
Monitor Audit Log Use
▪ To recognize the errors in the system, managers should audit the log on a regular basis.
▪ When a cloud provider offers a solution, it is necessary to test that solution and verify the
results and for error-free solution.
▪ The cloud storage is a computer data storage model in which the data that is digital in format is
stored.
▪ The provider securely stores, manages, and maintains the storage servers, infrastructure, and
network to ensure you have access to the data when you need it at virtually unlimited scale,
and with elastic capacity.
▪ Cloud storage removes the need to buy and manage your own data storage infrastructure,
giving you agility, scalability, and durability, with any time, anywhere data access.
CLOUD STORAGE
▪ Another advantage of cloud storage is that we can access data from anywhere, anytime on any
device.
▪ There are many cloud storage providers such as, Google Drive, Dropbox, OneDrive, iCloud,
etc.
▪ They provide free service for limited storage but if you want to store beyond the limit, you
have to pay.
CLOUD STORAGE
▪ This physical storage consists of multiple servers which can be in the different parts of the
country or may be in different parts of the world depends on many factors.
▪ The cloud storage services are also responsible for keeping the data available and accessible
24x7, and it also safeguard the data and run the physical environment.
▪ The main objective of the cloud, instead of saving data at local storage, the data of the user can be
collected at some data center so the user could retrieve his or her data from any device.
▪ Cloud storage is delivered by a cloud services provider that owns and operates data storage
capacity by maintaining large datacenters in multiple locations around the world.
▪ Cloud storage providers manage capacity, security, and durability to make data accessible to your
applications over the internet in a pay-as-you-go model.
HOW CLOUD STORAGE WORKS?
▪ Typically, you connect to the storage cloud either through the internet or through a dedicated
private connection, using a web portal, website, or a mobile app.
▪ When customers purchase cloud storage from a service provider, they turn over most aspects of
the data storage to the vendor, including capacity, security, data availability, storage servers and
computing resources, and network data delivery.
▪ Your applications access cloud storage through traditional storage protocols or directly using an
application programming interface (API). The cloud storage provider might also offer services
designed to help collect, manage, secure, and analyze data at a massive scale.
HOW CLOUD STORAGE WORKS?
▪ Typically, you connect to the storage cloud either through the internet or through a dedicated
private connection, using a web portal, website, or a mobile app.
▪ When customers purchase cloud storage from a service provider, they turn over most aspects of
the data storage to the vendor, including capacity, security, data availability, storage servers and
computing resources, and network data delivery.
▪ Your applications access cloud storage through traditional storage protocols or directly using an
application programming interface (API). The cloud storage provider might also offer services
designed to help collect, manage, secure, and analyze data at a massive scale.
HOW CLOUD STORAGE WORKS?
▪ Users upload data to servers via an internet connection, where it is saved on a virtual machine on a
physical server.
▪ To maintain availability and provide redundancy, cloud providers will often spread data to multiple
virtual machines in data centers located across the world.
CLOUD STORAGE ADVANAGES
▪ Elasticity : Cloud Storage is elastic and scalable, meaning that it can be scaled up (more storage
added) or down (less storage needed) depending on the organization’s needs.
▪ Flexibility : Cloud Storage offers organizations flexibility on how to store and access data, deploy
and budget resources, and architect their IT infrastructure.
▪ Security : Most cloud providers offer robust security, including physical security at data centers and
cutting edge security at the software and application levels.
▪ Sustainability : One of the greatest costs when operating on-premises data centers is the overhead
of energy consumption. The best cloud providers operate on sustainable energy through renewable
resources.
CLOUD STORAGE ADVANAGES
▪ Redundancy : Redundancy (replicating data on multiple servers in different locations) is an inherent
trait in public clouds, allowing organizations to recover from disasters while maintaining business
continuity.
CLOUD STORAGE DISADVANAGES
▪ Compliance : Certain industries such as finance and healthcare have stringent requirements about
how data is stored and accessed. Some public cloud providers offer tools to maintain compliance
with applicable rules and regulations.
▪ Latency: Traffic to and from the cloud can be delayed because of network traffic congestion or slow
internet connections.
▪ Control: Storing data in public clouds relinquishes some control over access and management of
that data, entrusting that the cloud service provider will always be able to make that data available
and maintain its systems and security.
▪ Outages: While public cloud providers aim to ensure continuous availability, outages sometimes do
occur, making stored data unavailable.
WHERE TO USE CLOUD STORAGE ?
▪ Backup: Data backup is one of the simplest and most prominent uses of Cloud Storage. Production
data can be separated from backup data, creating a gap between the two that protects
organizations in the case of a cyber threat such as ransomware.
▪ Archiving : To archive old data has become an important aspect of Cloud Storage, as organizations
move to digitize decades of old records, as well as hold on to records for governance and
compliance purposes.
▪ Disaster Recovering: A disaster—natural or otherwise— that wipes out a data center or old
physical records needs not be the business-crippling event that it was in the past. Cloud Storage
allows for disaster recovery so that organizations can continue with their business, even when
times are tough.
WHERE TO USE CLOUD STORAGE ?
▪ Data Processing: Cloud Storage makes digital data immediately available, data becomes much
more useful on an ongoing basis. Data processing, such as analyzing data for business intelligence
or applying machine learning and artificial intelligence to large datasets, is possible because of
Cloud Storage.
▪ Content Delivery: With the ability to save copies of media data, such as large audio and video files,
on servers dispersed across the globe, media and entertainment companies can serve their
audience low-latency, always available content from wherever they reside.
POPULAR CLOUD STORAGE DEVICE
▪ Google Drive
▪ DropBox
▪ iCloud
▪ OneDrive
▪ Mega
▪ Idrive
▪ Amazon Drive
▪ pCloud
CLOUD STORAGE DEVICE
▪ Cloud Storage is a service that allows to save data on offsite storage system managed by
third-party and is made accessible by a web services API.
▪ Also called file-level or file-based storage, this type is organized into files that are placed into
folders and subfolders, which are located in a directory
▪ If User ever created or organized folders on a PC, you’ve used file storage.
▪ It’s the type most often used to store information on a computer hard drive or on a device for
network-attached storage (NAS) and is best used for quick in-and-out data storage and access.
▪ To access a specific file of information, you simply need to know the path so you can drill down
through the directory, subdirectories, folders, and so on.
FILE STORAGE DEVICE
▪ File storage is best suited to unstructured data that is easy to categorize.
▪ As data volumes expand, scaling file storage requires the addition of new hardware devices, or
the replacement of existing ones with higher capacity devices. This can get expensive over
time.
FILE STORAGE DEVICE BENEFITS
▪ Simplicity – Familiar to computer users, straightforward, easy access to information provided you
know the path
▪ Shared files – Centralized storage on a local area network (LAN) makes it easy for anyone to access the
stored data
▪ Familiar protocols – File storage relies on common protocols used throughout computing, such as
Network File System (NFS), Common Internet File System (CIFS), and Server Message Block (SMB)
▪ Cost-efficient (to a point) – Using a NAS device, you can remove data from expensive servers and store
it on less costly LAN-connected devices
▪ Backup/recovery – Storing backup data on LAN devices allows you to recover quickly if your network
goes down
BLOCK STORAGE DEVICE
▪ Block storage chops data into blocks and stores them as separate pieces.
▪ Each block of data is given a unique identifier, which allows a storage system to place the smaller
pieces of data wherever is most convenient. That means that some data can be stored in a Linux
environment and some can be stored in a Windows unit.
▪ Block storage is technology that controls data storage and storage devices.
▪ It takes any data, like a file or database entry, and divides it into blocks of equal sizes.
▪ The block storage system then stores the data block on underlying physical storage in a manner that is
optimized for fast access and retrieval.
▪ Breaks up information and stores it in blocks that contain anywhere from 256 KB to 4 MB of data.
BLOCK STORAGE DEVICE
▪ The blocks aren’t organized hierarchically—in fact, they’re placed on the storage device in random
order. That doesn’t slow down access, however, because each block has a unique identifier to
distinguish it from every other block.
▪ When an application needs a file, it sends a request to the block storage system and the system
gathers up all the relevant blocks quickly and efficiently, then assembles them into the complete file.
▪ Part of what makes block storage so fast is that it doesn’t use any metadata except for the unique
identifier for each block. That makes block storage very efficient because data can take up almost the
entire capacity, instead of having to make room for storing metadata.
▪ Because of its speed, organizations use block storage when they need fast scale-up and speedy
read/write performance.
BLOCK STORAGE DEVICE
▪ Developers prefer block storage for applications that require efficient, fast, and reliable data
access. Think of block storage as a more direct pipeline to the data.
▪ Enterprise applications like databases or enterprise resource planning (ERP) systems often
require dedicated, low-latency storage for each host.
HOW BLOCK STORAGE DEVICE WORK?
▪ In a block storage system, you can break the data into independent fixed-size blocks or pieces.
Each block is an individual piece of data storage.
▪ A complete piece of information, such as a data file, is stored in multiple, nonsequential blocks.
▪ The block storage system does not maintain high-level metadata, such as file type, ownership,
and timestamp. Developers must design a data lookup table in the application system to
manage the storage of data into respective blocks.
▪ The application might store data in different operating environments to increase read/write
efficiency.
HOW BLOCK STORAGE DEVICE WORK?
Data write
▪ During a write sequence, the application splits data into several block-sized sections. It writes
the data into multiple blocks and records the block’s identifier in a data lookup table. The
lookup table allows the server to calculate the relative address of data stored in the block.
Data read
▪ When users request a specific file from the block storage system, the server uses the
data-lookup table to determine where pieces of the data are stored. Then, the application
retrieves the data from multiple blocks and merges them in the original sequence.
WHEN TO USE BLOCK AND FILE STORAGE ?
▪ Block storage offers high-speed data processing, low latency, and high-performance storage.
Any service that requires fast access to data works well with block storage. For example,
real-time analytics, high-performance computing, and systems with many rapid transactions all
benefit from block storage.
▪ Cloud file storage is best when users need concurrent access to a shared system of files.
Additionally, file-level access control allows you to set up permissions and access control lists
(ACLs) to increase security. For example, collaborative work environments that require sharing
files between remote teams use file storage.
CLOUD STORAGE CLASSES
▪ Cloud Storage consists of two classes
▪ The provider typically offers a set of high-level services and abstractions, allowing you to focus on
using the storage resources rather than managing the infrastructure.
▪ Managed services often include features like automated backups, data encryption, and seamless
scaling of storage capacity based on your needs.
▪ Example: Amazon S3 (Simple Storage Service), where Amazon Web Services (AWS) takes care of the
infrastructure, durability, and availability of your stored objects.
UNMANAGED CLOUD STORAGE
▪ In unmanaged cloud storage, you have more control and responsibility for the storage
infrastructure. This means that you need to handle tasks such as configuring, maintaining, and
securing the storage system. You have greater flexibility to customize the storage environment
according to your specific requirements.
▪ Unmanaged cloud storage is like renting raw storage space, and you are responsible for managing
the underlying components, installing software, and ensuring the security and performance of the
storage solution.
▪ For instance, if you rent virtual machines with attached storage disks in a cloud environment but
manage the storage configuration, security, and backups yourself, you are using unmanaged cloud
storage.
COMPARISION
▪ Managed: Offers convenience by handling infrastructure management tasks. Ideal for
users who want to focus on using storage services without dealing with operational
complexities.
▪ The choice between managed and unmanaged cloud storage depends on factors such as
the level of control you need, your technical expertise, and the specific requirements of
your applications and workloads. Many cloud users opt for a combination of managed and
unmanaged services based on their needs and preferences.
Control Provides complete control over Does not provide complete control
customising your Cloud , installing over server management or
applications, and taking care of configuration as its unmanaged
overall maintenance. counterpart.
Data Security It’s your responsibility to handle Ensures guaranteed data security as
and take care of data security and it’s handled by the technical
protect against malware and other professionals from your web
online attacks. hosting provider.
Flexibility Provides more flexibility for server Provides less flexibility compared
configuration and installing to Unmanaged Cloud Hosting but
third-party software and allows you to concentrate on other
applications. technical aspects of your
business.
VIRTUALIZATION
▪ “Virtualization” that refers to the process of making a “virtual version” of something like
hardware or Software.
▪ Consider an instance, a user can take a computer running on Windows as an operating system,
then make a virtual machine over that computer, and then run another operating system on
virtual machines like Linux.
VIRTUALIZATION
▪ Definition: Virtualization is a technique, which allows to share single physical instance of an
application or resource among multiple organizations or tenants (customers).
▪ It does so by assigning a logical name to a physical resource and providing a pointer to that
physical resource on demand.
▪ Virtualization allows you to run two or more OSs from one physical computer.
▪ This ensures that the physical delivery of the resource or an application is separated from the
actual resource itself.
▪ https://www.knowledgehut.com/blog/cloud-computing/virtualization-in-cloud-computing
VIRTUALIZATION
▪ Virtualization is a process that makes the use of physical computer hardware more effective
and forms the basis for cloud computing.
▪ This technique enables the end-user to run multiple desktop operating systems and
applications simultaneously on the same hardware and software.
▪ Virtualization allows cloud providers to service consumers with their own physical computing
hardware and allows cloud users to purchase only the computer resources they need when
they need it and scale them cost-effectively as their workloads increase.
▪ Virtualization involves the creation of something's virtual platform, including virtual computer
hardware, virtual storage devices and virtual computer networks.
VIRTUALIZATION
Let’s look at the scene before Virtualization came into the picture.
▪ Individual applications running on individual systems. There would be many servers. Talking
about the challenges:
▪ Only a limited capacity is used ( In case of minor workloads). Rest of the resources would go
waste.
▪ Applications perform in a different way in different Operating Systems. Suppose I want to run
my application in Windows as well as Linux. Then I would have to buy another server and on
top of that another OS.
▪ On the other hand, Virtualization enables us to have a single server and on top of that multiple
OS. There are various other kinds of Virtualization as well.
TERMINOLOGIES OF VIRTUALIZATION
Host Machine:
Virtual machine:
▪ A virtual machine can be defined as the computer of a virtual type that operates beneath a
hypervisor.
▪ A VM is like a physical computer in that it has components such as a processor and memory,
but these are virtual.
HYPERVISOR
▪ A hypervisor is a crucial piece of software that makes virtualization possible.
▪ A hypervisor, also known as a virtual machine monitor or VMM, is software that creates and
runs virtual machines (VMs).
▪ A hypervisor allows one host computer to support multiple guest VMs by virtually sharing its
resources, such as memory and processing.
▪ Hypervisors create a virtualization layer that separates CPU / Processors, RAM and other
physical resources from the virtual machines you create.
HYPERVISOR
▪ Hypervisors allocate hardware resources to virtual machines and ensure they remain
independent from one another, thereby maintaining the system.
▪ It manages virtual machines, allowing them to interact directly with the underlying hardware.
▪ The hypervisor is an operating platform which manages and executes the Guest VM
operating systems.
▪ The job of the hypervisor is to manage virtual machines created on the host computer. Virtual
machines will not have any connection with the host computer and all the jobs are done by
themselves with the help of hypervisors.
HYPERVISOR
Function of Hypervisor
▪ Hypervisors separate a system's operating system (OS) and resources from the physical
machine. They organize these separated resources into files called virtual machines (VMs).
Then, they assign computing power, data, and storage to each one.
▪ A hypervisor prohibits the files from interfering with one another, thereby maintaining the
system.
HYPERVISOR
▪ Because multiple virtual machines can run on one physical server with a hypervisor, a
hypervisor reduces:
– Space
– Energy
– Maintenance requirements
2. Type-2 ( Hosted ).
TYPE 1 HYPERVISOR
Type 1 Hypervisor: Bare Metal OR Embedded
Hypervisor
▪ The most commonly deployed type of hypervisor, where virtualization software is installed
directly on the hardware where the operating system is normally installed.
▪ Because bare-metal hypervisors are isolated from the attack-prone operating system, they are
extremely secure.
▪ In addition, they generally perform better and more efficiently than hosted hypervisors. For
these reasons, most enterprise companies choose bare-metal hypervisors for data center
computing needs.
HYPERVISOR
Type 1 Hypervisor:
▪ This type of hypervisor tends to be powerful and requires a great deal of expertise to function
it well.
1. A physical server/machine
❖ Oracle VM
❖ VMware ESXi
❖ Citrix XenServer.
TYPE 2 HYPERVISOR
Type 2 Hypervisor: Hosted Hypervisor
❖ A physical machine.
▪ Type 2 is not much efficient to handle complex virtual tasks. It can be used for basic
development testing and emulation purpose.
▪ If there is any security flaw found inside the host OS, it can potentially compromise all of virtual
machines running. That is why type 2 hypervisors cannot be used for Data Center computing.
▪ They are designed for end-user systems where security is less of a concern.
▪ For instance, developers could use type II Hypervisor to launch virtual machines in order to
test software product before their release.
TYPE 2 HYPERVISOR
▪ The downside of hosted hypervisors is that latency is higher than bare-metal hypervisors.
▪ This is because communication between the hardware and the hypervisor must pass through
the extra layer of the OS.
▪ Hosted hypervisors are sometimes known as client hypervisors because they are most often
used with end users and software testing, where higher latency is less of a concern.
TYPE 2 HYPERVISOR
▪ Type 2 hypervisor vendors are –
❖ Parallels Desktop
❖ Windows Virtual PC
❖ Oracle VM
❖ Virtual Box
❖ VMware Player.
ADVANTAGES OF HYPERVISOR
▪ Speed: The hypervisors allow virtual machines to be built instantly unlike bare-metal servers.
This makes provisioning resources for complex workloads much simpler.
▪ Efficiency: Hypervisors that run multiple virtual machines on the resources of a single physical
machine often allow for more effective use of a single physical server.
▪ Flexibility: Since the hypervisor distinguishes the OS from the underlying hardware, the
program no longer relies on particular hardware devices or drivers, bare-metal hypervisors
enable operating systems and their related applications to operate on a variety of hardware
types.
ADVANTAGES OF HYPERVISOR
▪ Portability: Multiple operating systems can run on the same physical server thanks to
hypervisors (host machine). The hypervisor's virtual machines are portable because they are
separate from the physical computer.
CONCLUSION ABOUT HYPERVISOR
▪ A hypervisor is a thin software layer that is also known as a virtual machine monitor (VMM).
▪ Before their existence, most computers could only run one operating system (OS) at a time.
With a hypervisor, you can run multiple operating systems using one host machine.
▪ Type-1 is used in companies and for all the heavy workloads. We don’t need to worry about
any OS, we just need hardware. Scaling becomes easier. Essential data is more secure because
there’s no scope of an OS getting crashed.
▪ On the other hand, Type-2 is mostly used for basic/personal needs such as learning and testing
as is it not good from a longer-run perspective
CATEGORY Type 1 hypervisor Type 2 hypervisor
Location Installed Directly installed on computer hardware Installed on top of the host OS
Virtualization
Hardware virtualization OS virtualization
Type
Guest OS and application on the
Operation As an application on OS
hypervisor
Type 1 hypervisors get their Type 2 hypervisors are used for smaller-scale
Suited Hardware performance from high processor core operations and convenience; better suited to
counts; server-rated hardware is ideal PC hardware
WHEN TO USE WHICH HYPERVISOR?
▪ Using a Type 1 hypervisor on a desktop PC isn't ideal since installing it prevents you from using
a host OS for your daily personal tasks (though Microsoft's Hyper-V somewhat skirts around
these issues). In contrast, using a Type 2 hypervisor on a dedicated server significantly reduces
performance, lowers security, and prevents you from connecting to other Type 1 hypervisors,
which are often critical for server functions such as load balancing.
▪ Type 1 hypervisors are better suited for dedicated servers since they can utilize all the Type 1
hypervisor functionalities to their fullest potential. On the other hand, Type 2 hypervisors are
really meant to be used on personal computers, as they are adequate for various testing and
development applications while maintaining a host OS for your general-purpose applications.
DIFFERENCE BETWEEN VIRTUAL MACHINE AND HYPERVISOR
▪ Virtual machines are files that recreate the computing environment of a physical computer. A
hypervisor is software that runs these files.
▪ Hypervisors allocate hardware resources to virtual machines and ensure they remain
independent from one another, thereby maintaining the system.
▪ A good way to conceptualize the relationship between the two is to imagine hypervisors as the
platform on which virtual machines must operate.
HARDWARE VIRTUALIZATION
▪ Virtualization is the process of abstracting resources from their underlying hardware to create
virtual versions of a network resource, such as a server, desktop, or storage device.
▪ When the Virtual machine software like VMM is directly installed on the hardware system is
known as Hardware Virtualization.
▪ Hardware virtualization is the method used to create virtual versions of physical desktops and
operating systems.
▪ It uses a virtual machine manager (VMM) called a hypervisor to provide abstracted hardware
to multiple guest operating systems, which can then share the physical hardware resources
more efficiently.
HARDWARE VIRTUALIZATION
▪ After virtualization of hardware system, we can install different OS on it and run different
application on those OS.
▪ Hardware virtualization offers many benefits, such as better performance and lower costs.
▪ Hardware virtualization is a type of virtualization that has made it possible for companies to
efficiently employ underused physical hardware.
▪ Full utilization of the physical resources available in powerful servers, for example, reduces the
total cost of ownership for server deployments.
WHY HARDWARE OR SERVER VIRTUALIZATION?
▪ Traditionally, each server in a data center requires dedicated hardware and is capable of
supporting a single operating system (OS). It means organizations need multiple dedicated
servers to host different applications and workloads to avoid compatibility issues.
▪ Server virtualization allows organizations and users to divide a single piece of hardware into
multiple virtual servers, each working as an independent machine with its own share of
resources.
▪ Each virtual server is capable of supporting its own OS, applications, and workloads. This way,
organizations can use a single physical server to host different operating systems and divide its
resources between several tasks.
WHY HARDWARE OR SERVER VIRTUALIZATION?
▪ Through server virtualization, enterprises can reduce the number of servers they need and
utilize their existing server infrastructure to its maximum capacity. This results in ease of
management and cost savings through efficient resource utilization and lower power
consumption.
NOTE : EXAMPLE OF SERVER VIRTUALIZATION
▪ As an example of server virtualization, consider an organization requiring several server roles,
such as a web server for hosting a website, a domain controller for authenticating internal
users, and a database server for storing and managing databases.
▪ Instead of installing multiple servers, the organization can use server virtualization to create
multiple virtual servers and consolidate all these server roles onto a single physical server.
▪ Additionally, there are several virtualization offerings available for organizations and
individuals. Some of the most popular products for server virtualization include VMware
vSphere, VMware Workstation, Microsoft Hyper-V, and Oracle VM Virtual Box.
COMPONENT OF HARDWARE VIRTUALIZATION
The hardware layer OR Virtualization host
▪ Contains the physical server components such as CPU, memory, network, and disk drives.
▪ It requires an x86-based system with one or more CPUs to run all supported guest operating
systems.
COMPONENT OF HARDWARE VIRTUALIZATION
The hypervisor
▪ Creates a virtualization layer that runs between the OS and the server hardware, allowing
many instances of an operating system or different operating systems to run in parallel on a
single machine.
▪ Hypervisors isolate operating systems and applications from the underlying computer
hardware, or the host machine, from the virtual machines that use its resources.
COMPONENT OF HARDWARE VIRTUALIZATION
Virtual machines
▪ Virtual machines themselves consist of virtual hardware, a guest operating system, and guest
software or applications.
HOW HARDWARE VIRTUALIZATION WORK?
▪ Enables a single physical machine to function as multiple machines by creating simulated
environments.
▪ The physical host uses software called a hypervisor that creates an abstraction layer between
the software and hardware and manages the shared physical hardware resources between the
guest and host operating systems.
▪ The hypervisor connects directly to the hardware and enables it to be split into multiple
distinct environments or virtual machines.
▪ These VMs use the resources of the physical host, including CPU, memory, and storage, which
are allocated to the guests as needed.
TYPES OF HARDWARE VIRTUALIZATION
▪ When done for server platforms, hardware virtualization is called server virtualization.
▪ Hardware virtualization makes it possible to use a physical machine’s full capacity and, by
isolating VMs from one another, to protect against malware.
❖ Full Virtualization
❖ Para Virtualization
❖ Emulation
FULL HARDWARE VIRTUALIZATION
▪ Full Virtualization use special kind of software called Hypervisor.
▪ The hypervisor directly interact with the physical hardware resource like CPU, Memory etc.
▪ It helps to keep each virtual machine completely independent and unaware of the other virtual
machine on the physical machine.
▪ Each virtual machine is able to run its own OS. This means one VM run on Linux and one virtual
machine run on Windows.
▪ These instructions typically perform operations that require direct access to hardware or other
privileged resources, such as setting up memory mappings or accessing I/O devices.
▪ Privileged instructions are executed in kernel mode, which provides unrestricted access to the
system resources.
FULL HARDWARE VIRTUALIZATION
▪ This approach, depicted in Figure, translates kernel code to
replace nonvirtualizable instructions with new sequences of
instructions that have the intended effect on the virtual
hardware.
▪ Full virtualization is the only option that requires no hardware assist or operating system
assist to virtualize sensitive and privileged instructions.
▪ This approach mostly gives more performance benefits over a full virtualization solution.
▪ This OS modification is required for the guest OS to communicate through calls to the API
provided by the hypervisor (known as hypercalls).
PARAVIRTUALIZATION
▪ In this scenario, the guest OS is aware that it is a guest OS in a virtual machine environment
and receives information on the other operating systems on the same physical hardware.
▪ A Para virtualized guest OS will not necessarily try to directly perform operations, which it
knows that they will fail. Instead, it will make explicit calls (hypercall) to the hypervisor to
request the desired behavior.
PARAVIRTUALIZATION
▪ In paravirtualization, the guest OS communicates
directly to the hypervisor, improving performance and
efficiency.
▪ When the hypervisor completes the operation, control will be pass back to the virtual machine,
to the guest, and any data, if appropriate, will be made available to it.
▪ As paravirtualization cannot support unmodified operating systems (e.g. Windows 2000/XP), its
compatibility and portability is poor.
▪ Here, the guest operating system does not require any other modification. In this
virtualizations, computer hardware as architectural support builds and manages a fully
virtualized VM.