0% found this document useful (0 votes)
20 views19 pages

Cloud Computing 3 Unit QB

Cloud computing
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views19 pages

Cloud Computing 3 Unit QB

Cloud computing
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Cloud Computing

Unit 3

Q1. What is Virtualization, and what are its benefits? 5Marks.

Ans :-

Virtualization : - Refers to the logical abstraction of physical resources, such as


compute, network, and storage that enables a single hardware resource to support
multiple concurrent instances of systems or multiple hardware resources to support
single instance of system.

Enables a resource to appear larger or smaller than it actually is


• Enables a multitenant environment improving utilization of physical resources
Virtualization refers to the logical abstraction of physical resources, such as compute, network, and storage
that enables a single hardware resource to support multiple concurrent instances of systems or multiple
hardware resources to support single instance of system. For example, a single disk drive can be partitioned
and presented as multiple disk drives to a compute system. Similarly, multiple disk drives can be concatenated
and presented as a single disk drive to a compute system. With virtualization, it is also possible to make a
resource appear larger or smaller than it actually is. Further, the abstraction of physical resources due to
virtualization enables multitenant environment, which improves utilization of the physical resources.

Benefits of Visualization :-

Optimizes utilization of IT resources

• Reduces cost and management complexity

• Reduces deployment time

• Increases flexibility

Virtualization when deployed offers several benefits to build a cloud infrastructure. It enables consolidation of
IT resources that helps service providers to optimize their utilization of infrastructure resource. Improving the
utilization of IT assets can help service providers to reduce the costs associated with the purchasing of a new
hardware. It also reduces space and energy costs associated with maintaining the resources. Moreover, less
people are required to administer these resources, which further lower the cost. Virtual resources are created
using software that enables service providers to deploy infrastructure faster as compared to deploying physical
resources. Virtualization increases flexibility by allowing to create and reclaim the logical resources that are
based on business requirements.

Q2. Write a note on the virtual layer. 5 Marks


Ans :-

Virtual Layer :- This module focuses on the entities of the virtual layer of the cloud
computing reference model. This module focuses on virtualization software, resource
pool, and virtual resources. Virtual layer is deployed on the physical layer. It specifies
the entities that operate at this layer, such as virtualization software, resource pools,
and virtual resources. The key function of this layer is to abstract physical resources,
such as compute, storage, and network, and making them appear as virtual resources.
Other key functions of this layer include executing the requests generated by control
and forwarding requests to the physical layer to get them executed. Examples of
requests generated by control layers include creating pools of resources and creating
virtual resources.

Virtualized compute, network, and storage forms the virtual layer

• Enables fulfilling two characteristics of cloud infrastructure

– Resource pooling

– Rapid elasticity

• Specifies the entities operating at this layer

– Virtualization software

– Resource pools

– Virtual resources

While building cloud infrastructure, virtual layer is deployed on physical layer. This layer
enables fulfilling two key characteristics of cloud infrastructure: resource pooling and
rapid elasticity. Virtual layer specifies the entities that operate at this layer, such as
virtualization software, resource pools, and virtual resources. Virtual layer is built by
deploying virtualization software on compute systems, network devices, and storage
devices.
Cloud Computing Reference Model

© Copyriight 2014 EMC Corporatiion. Allllriights reserved. Module: Virtual Layer

Q3. Explain in detail the common types of virtual networks. 10 Marks Ans

:-

Virtual Networks :-

A VM network is a logical network that provides Ethernet connectivity and enables


communication between the VMs running on a hypervisor within a compute system.
A VM network includes logical switches called virtual switches. Virtual switches
function similar to physical Ethernet switches, but may not have all the
functionalities of a physical Ethernet switch.

Consider the example of a web application that is running on a VM and needs to


communicate with a database server. The database server could be running on
another VM on the same compute system. The two VMs can be connected via a VM
network to enable them to communicate with each other. Because the traffic
between the VMs does not travel over a network external to the compute system,
the data transfer speed between the VMs is increased.
Types of Virtual Network :-
• Virtual LAN (VLAN)
• Private VLAN (PVLAN)
• Stretched VLAN
• Virtual extensible LAN (VXLAN)
• Virtual SAN (VSAN)
1. Virtual LAN (VLAN) :- A virtual network created on a LAN enabling communication
between a group of nodes with a common set of functional requirement , independent
of their physical location in the network.
• A VLAN is identified by a unique 12-bit VLAN ID
• Configuring a VLAN:
– Define VLAN on physical and virtual switches and assign VLAN ID
– Configure VLAN membership based on port, MAC address, protocol, IP subnet
address, or application
A virtual LAN (VLAN) is a virtual network consisting of virtual and/or physical switches,
which divides a LAN into smaller logical segments. A VLAN groups the nodes with a
common set of functional requirements, independent of the physical location of the
nodes. In a multi-tenant cloud environment, the provider typically creates and assigns
a separate VLAN to each consumer. This provides a private network and IP address
space to a consumer, and ensures isolation from the network traffic of other
consumers.

2. Private VLAN (PVLAN) : - A sub-VLAN that segregates the nodes within a


standard VLAN, called as primary VLAN. A PVLAN can be configured as either
isolated or community.

• Enables a provider to support larger number of


consumers
• Provides security betweennodes on the same VLAN
• Simplifies network management

A private VLAN (PVLAN) is an extension of the VLAN standard and further segregates
the nodes within a VLAN into sub-VLANs. A PVLAN is made up of a primary VLAN and
one or more secondary (or private) VLANs. The primary VLAN is the original VLAN
that is being segregated into smaller groups. Each secondary PVLAN exists only inside
the primary VLAN. It has a unique VLAN ID and isolates the OSI Layer 2 traffic from
the other PVLANs. Primary VLANs are promiscuous, which means that ports on the
PVLANs can communicate with ports configured as the primary VLAN. Routers are
typically attached to promiscuous ports.

There are two types of secondary PVLANs within a primary VLAN: Isolated and
Community.

• Isolated : A node attached to a port in an isolated secondary PVLAN can only


communicate with the promiscuous PVLAN.

• Community : A node attached to a port in a community secondary PVLAN can


communicate with the other ports in the same community PVLAN as well as with
the promiscuous PVLAN. Nodes in different community PVLANs cannot
communicate with each other.

To configure PVLANs, the PVLAN feature must be supported and enabled on a


physical switch or a distributed virtual switch. To create PVLANs, the administrator
first creates standard VLANs on a switch, and then configures the VLANs as primary
and secondary. The figure on the slide illustrates how different types of PVLANs
enable and restrict communications between VMs (nodes) that are connected to a
distributed virtual switch.

3. Stretched VLAN :- A VLAN that spans multiple sites and enables Layer 2
communication between a group of nodes over a Layer 3 WAN infrastructure,
independent of their physical location.

• Layer 2 WAN frames are encapsulated in Layer


3 WAN packets
• Enables movement of VMs across locations without changing their
network configuration
A stretched VLAN is a VLAN that spans across multiple sites over a WAN connection. In
a typical multi-site environment, two sites are connected over an OSI Layer 3 WAN
connection and all network traffic between them is routed. Because of the routing, it
is not possible to transmit OSI Layer 2 WAN traffic between the nodes in the two sites.
A stretched VLAN extends a VLAN across the sites and enables nodes in the two
different sites to communicate over a WAN as if they are connected to the same
network.

4. Virtual Extensible LAN (VXLAN) :- A logical Layer 2 overlay network built on a


Layer 3 network, which uses MAC-in-UDP encapsulation to enable communication
between a group of nodes, independent of their physical location.

• VXLAN header is added to a Layer 2 frame, which is placed in a UDP-IP packet and
tunnelled over a Layer 3 network
– Enables transparent Layer 2 communication between nodes over physical
networks spanning Layer 3 boundaries
– Encapsulation and decapsulation are performed by Virtual Tunnel Endpoints
(VTEPs)
• 24-bit VXLAN ID provides up to 16 million VXLANs
A VXLAN is a OSI Layer 2 overlay network built on a OSI Layer 3 network. An overlay
network is a virtual network that is built on top of existing network. VXLANs, unlike
stretched VLANs, are based on LAN technology. VXLANs use the MAC Address-
inUser Datagram Protocol (MAC- in-UDP) encapsulation technique. In this scheme, a
VXLAN header is added to the original Layer 2 (MAC) frame, which is then placed in
a UDP-IP packet and tunneled over a Layer 3 network. Communication is established
between two tunnel end points called Virtual Tunnel Endpoints (VTEPs). At the
transmitting node, a VTEP encapsulates the network traffic into a VXLAN header and
at the destination node, a VTEP removes the encapsulation before presenting the
original Layer 2 packet to the node. VXLANs enable the creation of a logical network
of nodes across different networks. In case of VM communication, the VTEP is built
into the hypervisor on the compute system hosting the VMs.

5. Virtual SAN (VSAN) :- A logical fabric, created on a physical FC or FCoE


SAN enabling communication between a group of nodes with a common set
of requirements, independent of their physical location in the fabric.
• A VSAN has its own fabric services, configuration, and set of FC addresses
• Traffic disruptions in one VSAN do not affect other VSANs
• A VSAN may be extended across sites similar to a stretched VLAN
• A virtual SAN (VSAN) or virtual fabric is a logical fabric created on a physical FC or
FCoE SAN. A VSAN enables communication between a group of nodes with a
common set of requirements, independent of their physical location in the fabric. A
VSAN functions conceptually in the same way as a VLAN. Each VSAN behaves and is
managed as an independent fabric. Each VSAN has its own fabric services,
configuration, and set of FC addresses. Fabric-related configurations in one VSAN do
not affect the traffic in another VSAN. Also, the events causing traffic disruptions in
one VSAN are contained within that VSAN and are not propagated to the other
VSANs.
Similar to a stretched VLAN, a VSAN may be extended across sites by using long
distance fiber, DWDM, CWDM, or FCIP links to carry the FC frames.

first assigns physical ports to VSANs and then configures independent zones for each
VSAN. A VSAN has its own independent fabric services, but the fabric services are
not available on a per-zone basis.
Q4. What is a Virtual Network? Enlist the common types of virtual networks. 5
Marks .
Ans :-

Virtual Networks :-

A VM network is a logical network that provides Ethernet connectivity and enables


communication between the VMs running on a hypervisor within a compute system.
A VM network includes logical switches called virtual switches. Virtual switches
function similar to physical Ethernet switches, but may not have all the
functionalities of a physical Ethernet switch.

Consider the example of a web application that is running on a VM and needs to


communicate with a database server. The database server could be running on
another VM on the same compute system. The two VMs can be connected via a VM
network to enable them to communicate with each other. Because the traffic
between the VMs does not travel over a network external to the compute system,
the data transfer speed between the VMs is increased.
In some cases, the VMs residing on different compute systems may need to
communicate either with each other, or with other physical compute systems, such as a
client machines. To transfer these types of network traffic, the VM network must be
connected to the network of physical compute systems. In this case, the VM traffic
travels over both the VM network and the network of physical compute systems. The
figure on the slide shows two physical compute systems, each with a VM network and
both the VM networks connected to a network of physical compute systems.
A Virtual network is a software-based logical network that is created from a unified pool of
network resources. A virtual network can be created by segmenting a single physical network
into multiple logical networks. For example, multiple virtual networks may be created on a
common network infrastructure for the use of the different departments in an organization.

Also, multiple physical networks can be consolidated into a single virtual network. A virtual
network utilizes the underlying physical network only for simple packet forwarding. It appears
as a physical network to the nodes connected to it, because existing network services are
reproduced in the logical space. Nodes with a common set of requirements can be functionally
grouped in a virtual network, regardless of the geographic location of the nodes.

Types of Virtual Network :-


• Virtual LAN (VLAN)
• Private VLAN (PVLAN)
• Stretched VLAN
• Virtual extensible LAN (VXLAN)
• Virtual SAN (VSAN)

1. Virtual LAN (VLAN) :- A virtual network created on a LAN enabling communication


between a group of nodes with a common set of functional requirement , independent
of their physical location in the network.
• A VLAN is identified by a unique 12-bit VLAN ID

• Configuring a VLAN:
– Define VLAN on physical and virtual switches and assign VLAN ID
– Configure VLAN membership based on port, MAC address, protocol, IP subnet
address, or application
A virtual LAN (VLAN) is a virtual network consisting of virtual and/or physical switches,
which divides a LAN into smaller logical segments. A VLAN groups the nodes with a
common set of functional requirements, independent of the physical location of the
nodes. In a multi-tenant cloud environment, the provider typically creates and assigns
a separate VLAN to each consumer. This provides a private network and IP address
space to a consumer, and ensures isolation from the network traffic of other
consumers.
2. Private VLAN (PVLAN) : - A sub-VLAN that segregates the nodes within a
standard VLAN, called as primary VLAN. A PVLAN can be configured as either
isolated or community.
• Enables a provider to support larger number of
consumers
• Provides security betweennodes on the same VLAN
• Simplifies network

A private VLAN (PVLAN) is an extension of the VLAN standard and further segregates
the nodes within a VLAN into sub-VLANs. A PVLAN is made up of a primary VLAN and
one or more secondary (or private) VLANs. The primary VLAN is the original VLAN
that is being segregated into smaller groups. Each secondary PVLAN exists only inside
the primary VLAN. It has a unique VLAN ID and isolates the OSI Layer 2 traffic from
the other PVLANs. Primary VLANs are promiscuous, which means that ports on the
PVLANs can communicate with ports configured as the primary VLAN. Routers are
typically attached to promiscuous ports.

There are two types of secondary PVLANs within a primary VLAN: Isolated and
Community.

• Isolated : A node attached to a port in an isolated secondary PVLAN can only


communicate with the promiscuous PVLAN.

• Community : A node attached to a port in a community secondary PVLAN can


communicate with the other ports in the same community PVLAN as well as with
the promiscuous PVLAN. Nodes in different community PVLANs cannot
communicate with each other.

To configure PVLANs, the PVLAN feature must be supported and enabled on a


physical switch or a distributed virtual switch. To create PVLANs, the administrator
first creates standard VLANs on a switch, and then configures the VLANs as primary
and secondary. The figure on the slide illustrates how different types of PVLANs
enable and restrict communications between VMs (nodes) that are connected to a
distributed virtual switch.

3. Stretched VLAN :- A VLAN that spans multiple sites and enables Layer 2
communication between a group of nodes over a Layer 3 WAN infrastructure,
independent of their physical location.

• Layer 2 WAN frames are encapsulated in Layer


3 WAN packets
• Enables movement of VMs across locations without changing their network
configuration

• A stretched VLAN is a VLAN that spans across multiple sites over a WAN connection.
In a typical multi-site environment, two sites are connected over an OSI Layer 3 WAN
connection and all network traffic between them is routed. Because of the routing, it
is not possible to transmit OSI Layer 2 WAN traffic between the nodes in the two
sites. A stretched VLAN extends a VLAN across the sites and enables nodes in the
two different sites to communicate over a WAN as if they are connected to the same
network.

Stretched VLANs also allow the movement of VMs between sites without having to
change their network configurations. This enables the creation of high-availability
clusters, VM migration, and application and workload mobility across sites. For
example, in the event of a disaster or during the maintenance of one site, a provider
typically moves VMs to an alternate site. Without a stretched VLAN, the IP addresses
of the VMs must be changed to match the addressing scheme at the other site.

4. Virtual Extensible LAN (VXLAN) :- A logical Layer 2 overlay network built on a


Layer 3 network, which uses MAC-in-UDP encapsulation to enable communication
between a group of nodes, independent of their physical location.

• VXLAN header is added to a Layer 2 frame, which is placed in a UDP-IP packet and
tunnelled over a Layer 3 network
– Enables transparent Layer 2 communication between nodes over physical
networks spanning Layer 3 boundaries
– Encapsulation and decapsulation are performed by Virtual Tunnel Endpoints
(VTEPs)
• 24-bit VXLAN ID provides up to 16 million VXLANs
A VXLAN is a OSI Layer 2 overlay network built on a OSI Layer 3 network. An overlay
network is a virtual network that is built on top of existing network. VXLANs, unlike
stretched VLANs, are based on LAN technology. VXLANs use the MAC Address-
inUser Datagram Protocol (MAC- in-UDP) encapsulation technique. In this scheme, a
VXLAN header is added to the original Layer 2 (MAC) frame, which is then placed in
a UDP-IP packet and tunneled over a Layer 3 network. Communication is established
between two tunnel end points called Virtual Tunnel Endpoints (VTEPs).

5. Virtual SAN (VSAN) :- A logical fabric, created on a physical FC or FCoE SAN


enabling communication between a group of nodes with a common set of
requirements, independent of their physical location in the fabric.
• A VSAN has its own fabric services, configuration, and set of FC addresses
• Traffic disruptions in one VSAN do not affect other VSANs
• A VSAN may be extended across sites similar to a stretched VLAN
• A virtual SAN (VSAN) or virtual fabric is a logical fabric created on a physical FC or
FCoE SAN. A VSAN enables communication between a group of nodes with a
common set of requirements, independent of their physical location in the fabric. A
VSAN functions conceptually in the same way as a VLAN. Each VSAN behaves and is
managed as an independent fabric. Each VSAN has its own fabric services,
configuration, and set of FC addresses. Fabric-related configurations in one VSAN do
not affect the traffic in another VSAN. Also, the events causing traffic disruptions in
one VSAN are contained within that VSAN and are not propagated to the other
VSANs.

Q5. Explain in detail compute virtualization software. 10 Marks Ans


:- Compute Virtualization Software

Hypervisor :- Software that is installed on a compute system and enables multiple OSs
to run concurrently on a physical compute system.

• Hypervisor kernel
– Provides functionality similar to an OS kernel

– Designed to run multiple VMs concurrently

• Virtual machine manager (VMM) – Abstracts hardware


– Each VM is assigned a VMM

– Each VMM gets a share of physical resources


The software used for compute virtualization is known as the hypervisor. The
hypervisor is a software that is installed on a compute system and enables multiple
operating systems to run concurrently on a physical compute system. The hypervisor
along with hypervisor management software (also known as control software, which
is discussed in ‘Control Layer’ module) is the fundamental component for deploying
software defined compute environment. The hypervisor abstracts the physical
compute hardware to create multiple virtual machine, which to the operating
systems look and behave like physical compute systems. The hypervisor provides
standardized hardware resources, such as processor, memory, network, and disk to
all the virtual machines.

A hypervisor has two key components: kernel and virtual machine manager (VMM).
A hypervisor kernel provides the same functionality like the kernel of any other
operating system, including process creation, file system management, and process
scheduling. It is designed and optimized to run multiple virtual machines
concurrently. A VMM abstracts hardware and appears as a physical compute system
with processor, memory, I/O devices, and other components that are essential for
operating systems and applications to run. Each virtual machine is assigned a VMM
that gets a share of the processor, memory, I/O devices, and storage from the
physical compute system to successfully run the virtual machine

Compute Virtualization Software (Cont'd)


Types of Hypervisor

Bare-metal Hypervisor

• It is an operating system
• Installed on a bare-metal hardware
• Requires certified hardware
• Suitable for enterprise data centers and cloud infrastructure

Hosted Hypervisor
• Installed as an application on an OS
• Relies on OS, running on physical machine for device support
• Suitable for development, testing, and training purposes

Q6. Write a brief note on resource pool with an example. 5Marks Ans
:-

Resource Pool :-
A logical abstraction of the aggregated computing resources, such as processing
power, memory capacity, storage, and network bandwidth that are managed
collectively.

• Cloud services obtain computing resources from resource pools –


Resources are dynamically allocated as per consumer demand

• Resource pools are sized according to service requirements.


A resource pool is a logical abstraction of the aggregated computing resources, such as
processing power, memory capacity, storage, and network bandwidth that is managed
collectively. Cloud services obtain computing resources from resource pools. Resources from
the resource pools are dynamically allocated according to consumer demand, up to a limit
defined for each cloud service. The allocated resources are returned to the pool when they are
released by consumers, making them available for reallocation. The figure on the slide shows
the allocation of resources from a resource pool to service A and service B that are assigned to
consumer A and consumer B respectively.

Resource pools are designed and sized according to the service requirements. A cloud
administrator can create, remove, expand, or contract a resource pool as needed. In a cloud
infrastructure, multiple pools of same or different resource types may be configured to provide
various cloud services. For example, two independent storage pools in a cloud having different
performance characteristics can provide resources to a high-end and a mid-range storage
service. Another example is an application service, which can obtain processing power from a
processor pool and network bandwidth from a network bandwidth pool.

Q7. Write a note on i) VM Network ii) VM Appliance. 10Marks

Ans :-

i) VM Network :- A logical network that provides Ethernet connectivity and enables


communication between VMs within a compute system.

A VM network is a logical network that provides Ethernet connectivity and enables


communication between the VMs running on a hypervisor within a compute system.
A VM network includes logical switches called virtual switches. Virtual switches
function similar to physical Ethernet switches, but may not have all the functionalities
of a physical Ethernet switch.

Consider the example of a web application that is running on a VM and needs to


communicate with a database server. The database server could be running on
another VM on the same compute system. The two VMs can be connected via a VM
network to enable them to communicate with each other. Because the traffic
between the VMs does not travel over a network external to the compute system,
the data transfer speed between the VMs is increased.

In some cases, the VMs residing on different compute systems may need to
communicate either with each other, or with other physical compute systems, such
as a client machines. To transfer these types of network traffic, the VM network must
be connected to the network of physical compute systems. In this case, the VM
traffic travels over both the VM network and the network of physical compute
systems. The figure on the slide shows two physical compute systems, each with a
VM network and both the VM networks connected to a network of physical compute
systems.

ii) VM Appliance :- Preconfigured virtual machine(s) preinstalled with a guest OS


and an application dedicated to a specific function.
• Used for functions, such as providing SaaS, routing packets, or deploying a firewall
• Simplifies the delivery and operation of an application
– Simplifies installation and eliminates configuration issues
– The application is protected from issues in other virtual appliances

• Typically created using Open Virtualization Format (OVF)


A virtual appliance is a preconfigured virtual machine preinstalled with a guest
operating system and an application dedicated to a specific function. In a cloud
environment, virtual appliances are used for different functions, such as to provide
Software as a Service, to run cloud management software, and to route packets.
They can also be used to provide security features, such as a firewall or network
intrusion detection.

Using a virtual appliance simplifies the delivery and operation of an application.


Typically, the process is time-consuming and error-prone, and involves setting up a
new VM, installing the guest OS and then the application. In contrast, a virtual
appliance deployment is faster because the VM is preconfigured and has
preinstalled software. This simplifies installation and eliminates configuration issues,
such as software or driver compatibility problems. Also, the application runs in
isolation within the virtual appliance, and it is protected against the crashes and the
security issues of the other virtual appliances. Virtual appliances are typically
created using the Open Virtualization Format (OVF) – an open
hypervisorindependent packaging and distribution format.

Q8 . Explain storage virtualization software in short. 5Marks Ans :-

Storage Virtualization Software


– Abstracts physical storage resources to create virtual resources:
– Virtual volumes
– Virtual disk files
– Virtual arrays
• Storage virtualization software can be:
– Built into the operating environment of a
storage device – Installed on an
independent compute system
• Fundamental component for deploying software defined
storage – Hypervisor’s capability

The storage virtualization software is either built into the operating environment of a storage
device, installed on an independent compute system (discussed in ‘Control Layer’ module), or
available as hypervisor’s capability. The storage virtualization software abstracts physical
storage resources to create virtual resources, such as virtual volumes or virtual arrays.

The storage virtualization software built into the array operating environment has the ability to
pool and abstract the physical storage devices and present it as a logical storage.

The storage virtualization software installed on an independent compute system is the


fundamental component for deploying software defined storage environment. The software has
the ability to pool and abstract the existing physical storage devices and present it as an open
storage platform. With the help of control software (discussed in ‘Control Layer’ module), the
storage virtualization software can perform tasks such as virtual volume creation apart from
creating virtual arrays. This software provide a single control point to the entire storage
infrastructure, enabling automated and policy based management.
Q9 . What is a Virtual Machine? 5Marks

Ans :- A logical compute system that, like a physical compute system, runs an OS
and applications.
• Created by a hypervisor installed on a physical compute system
• Comprises virtual hardware, such as virtual processor, memory, storage, and
network resources
– Appears as a physical compute system to the guest OS
– Hypervisor maps the virtual hardware to the physical hardware

• Provider provisions VMs to consumers for deploying applications VMs on the same
compute system or cluster run in isolation.

A virtual machine (VM) is a logical compute system that, like a physical compute
system, runs an operating system (OS) and applications. A VM is created by a hosted
or a bare-metal hypervisor installed on a physical compute system. A VM has a
selfcontained operating environment, comprising OS, applications, and virtual
hardware, such as a virtual processor, memory, storage, and network resources.

An OS, called— a ‘guest’ OS—is installed on a VM in the same way like it is installed on
a physical compute system. From the perspective of the guest OS, the VM appears as
a physical compute system. As discussed in lesson 1, a virtual machine monitor
(VMM) is responsible for the execution of a VM. Each VM has a dedicated VMM. Each
VM has its own configuration for hardware, software, network, security, and so on.
The VM behaves like a physical compute system, but does not have direct access
either to the underlying host OS (when a hosted hypervisor is used) or to the
hardware of the physical compute system on which it is created. The hypervisor
translates the VM’s resource requests and maps the virtual hardware of the VM to the
hardware of the physical compute system. For example, a VM’s I/O requests to a
virtual disk drive are translated by the hypervisor and mapped to a file on the physical
compute system’s disk drive.
20

You might also like