0% found this document useful (0 votes)
13 views43 pages

CC Unit 3

The document provides an overview of virtualization in cloud computing, detailing its definition, types, architecture, and applications. It discusses the benefits of virtualization, such as improved resource utilization and cost reduction, as well as various types including server, network, and storage virtualization. Additionally, it highlights the significance of virtualization in enhancing scalability and efficiency in IT environments.

Uploaded by

jagtaprajdeep53
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views43 pages

CC Unit 3

The document provides an overview of virtualization in cloud computing, detailing its definition, types, architecture, and applications. It discusses the benefits of virtualization, such as improved resource utilization and cost reduction, as well as various types including server, network, and storage virtualization. Additionally, it highlights the significance of virtualization in enhancing scalability and efficiency in IT environments.

Uploaded by

jagtaprajdeep53
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

Unit 3

Virtualization In Cloud Computing


Introduction: Definition of Virtualization,
Adopting Virtualization, Types of Virtualization,
Virtualization Architecture and Software, Virtual
Clustering, Virtualization Application, Pitfalls of
Virtualization.
Grid, Cloud and Virtualization: Virtualization
in Grid, Virtualization in Cloud, Virtualization and
Cloud Security.
Introduction To Virtualization
Definition:
⚫ Virtualization is a method for dividing the computer resources to
more than one execution environment by applying more concepts
like partitioning , time sharing, machine simulation and
emulation.
⚫ Virtualization reduces the burden of workloads of users by
centralizing the administrative task and improving the
scalability and workloads.
⚫ Virtualization is a method in which multiple independent
operating systems run on a physical computer.
⚫ It maximizes the usage of available physical resources.
⚫ It increases total computing power and also decreases the
overload.
⚫ Following fig. Shows the illustration of the concept of
virtualization.
⚫ It contains Three layers:
Layer 1: comprising of
Network.
Layer 2: comprising of
Virtual infrastructures
Layer 3: contains virtual
machines where different
operating system and
applications are deployed.
⚫ A single virtual
infrastructure can support
More than one virtual
machine, i.e. More than one OS and application can be deployed.
⚫ Physical resources of multiple machines of entire infrastructure
are shared in virtual environment.
⚫ Resources of a single computer are shared across many virtual
machines fro maximum efficiency.
⚫ By optimizing resources, flexibility and reduced costs in capita and
operations are achieved.
⚫ A virtual infrastructure consists of the following components:
i) Hypervisor
ii) Virtual infrastructure services
iii) Automated solutions to optimized IT process.
⚫ We can exploit this new trend to increase the number of logical
operating system in a single host, which in turn reduces the
hardware acquisition and maintenance cost for an organization.
Following are some Reasons for virtualization
⚫ Virtual Machine(VM) consolidate the workloads of under utilized
servers . Because of this , one can save on hardware ,environmental
costs and management.
⚫ To run legacy application ,VM is used.
⚫ VM provides a secured sandbox for running an untrusted
application.
⚫ VM helps in building secured computing platform.
⚫ VM provides an illusion of hardware.
⚫ VM stimulates networks of independent networks.
⚫ VM supports to run distinct OS with different version.
⚫ VMs are uses for performance monitoring.
⚫ VM provides error and fault containment
⚫ VM tools are good for research and academic experiments.
⚫ VM can encapsulate the entire state of a system by saving,
examining , modifying and reloading.
⚫ VM makes the job easier for the admin in migration, backup and
recovery.
Adopting Virtualization
⚫ The current study aimed at investigating the adoption of
virtualization in cloud computing as a means through which the
green computing can be achieved. According to the
virtualization among its many process helps in curtailing
equipment required through cloud computing resources to
facilitate adequate use of resources to make use of energy and
assets.
⚫ Virtualization is the perfect solution for small to medium scales
enterprises. This is critical in cloud computing as it enhances
scalability since every server is allocated enough storage and
computing power needed by a client. The increased demand for
user capacity requires more power and capacity ,then avoid
using VM
⚫ Virtualization is changing the IT environment where most
companies have been able to adopt it as a measure that allows
for better utilization of hardware and reduction of costs.
Types Of Virtualization
Following Fig. shows the types of Virtualization.

Management
Virtualization
⚫ Sever Virtualization : Is a kind of virtualization, used for masking
of server resources, which includes number of physical servers
,processors and operating systems. The intention of using this
method is to spare the complicated server resources and hence
increase the sharing, utilization and maintaining the capacity of
servers.
⚫ Network Virtualization : Is a method where network resources
are combined based on available bandwidth. Each channel is
assigned to a particular server. By adopting this method of
virtualization, a true complexity of network is hidden and managed
like partitioning the hard drive.
⚫ Storage Virtualization : Is a type of virtualization, where a pool of
physical storage from different network of storage devices appears
as single storage device. Usually this kind of virtualization adopted
in SAN. It is advantageous in disaster recovery, business continuity,
higher return of investment, dynamic computing, security testing
and development.
⚫ Desktop Virtualization : Supports various computing such as
utility and dynamism ,testing , development and security.
⚫ Application Virtualization : Allows server consolidation
,application and desktop deployment and business continuity.
⚫ Management Virtualization : Allows variety of features which
are as follows: server consolidation, centralized policy-based
management, business continuity and disaster recovery, lower
TCO with higher ROI, utility and dynamic computing, testing
and development and security.
Server Virtualization
⚫ Server virtualization is the process of dividing a physical server into
multiple unique and isolated virtual servers by means of a software
application. Each virtual server can run its own operating systems
independently.
⚫ Server virtualization is a cost-effective way to provide web hosting
services and effectively utilize existing resources in IT infrastructure.
Without server virtualization, servers only use a small part of their
processing power. This results in servers sitting idle because the
workload is distributed to only a portion of the network’s servers. Data
centers become overcrowded with underutilized servers, causing a
waste of resources and power.
⚫ By having each physical server divided into multiple virtual servers,
server virtualization allows each virtual server to act as a unique
physical device. Each virtual server can run its own applications and
operating system. This process increases the utilization of resources by
making each virtual server act as a physical server and increases the
capacity of each physical machine.
Server Virtualization Diagram
⚫ Three types of Server There are three methods to virtualize the
server : Full virtualization (Hardware
Emulation)Para-virtualization and Operating System (OS)
virtualization. While all the three modes have one physical
server acting as host and the virtual servers as guests, each of the
methods allocates server resources differently to the virtual
space.

Full virtualization:
⚫ Full virtualization uses a special kind of software called an
hypervisor . The hypervisor interacts directly with the physical
server's CPU and disk space . It serves as a platform for the
virtual servers' Oss . The hypervisor keeps each virtual server
completely independent and unaware of the other virtual servers
running on the physical machine . Each guest server runs on its
own OS .
⚫ 2. Para-virtualization: The para-virtualization approach is a little
different. Unlike the full virtualization technique, the guest
servers in a para-virtualization system are aware of one another .
A para-virtualization hypervisor doesn't need as much
processing power to manage the guest OSs, because each OS is
already aware of the demands the other Os are placing on the
physical server . The entire system works together as a cohesive
unit.
⚫ Operating System (OS) virtualization : An OS-level
virtualization approach doesn't use an hypervisor at all .Instead,
the virtualization capability is part of the host OS, which
performs all the functions of a fully virtualized hypervisor . The
biggest limitation of this approach is that all the guest servers
must run the same OS. Because all the guest operating systems
must be the same, this is called a homogeneous environment.
OS Virtualization
Cont...
⚫ Working Of O.S Virtualization
Working Of OS Virtualization
⚫ OS Virtualization somewhat differs from server virtualization ,here the host
runs a single OS kernel and exports different operating system functionalities
to every visitors.
⚫ In this model common binaries and libraries are shared on the same physical
machine which permits an OS level virtual servers. The installation of
virtualization software also refers to Operating system-based virtualization. It
is installed over a pre-existing operating system and that operating system is
called the host operating system.
⚫ Everything runs from network using a virtual; simulation & that virtual disk is
a disk-image (file) that remotely stored on a server i.e. Storage Area Network
(SAN) or Non-Volatile Attached Storage (NAS).
⚫ Two types of virtual disk in most implementations are private virtual and
shared virtual disks.
⚫ It is also called OS-level virtualization is a type of virtualization technology
which work on OS layer. Here the kernel of an OS allows more than one
isolated user-space instances to exist. Such instances are called
containers/software containers or virtualization engines. In other words, OS
kernel will run a single operating system & provide that operating system's
functionality to replicate on each of the isolated partitions.
⚫ The client will be connected via the network to the virtual disk &
will boot the OS installed on virtual disk. Two types of virtual
disks are there for implementation.
⚫ These are:
⚫ Private Virtual Disk: is used by one client only like that of a local
hard disk. Users can save information on the virtual disk based
on the rights assigned. So as the client restart the system, the
settings are retained just like working with physical local hard
disk.
⚫ Shared/Common Virtual Disk: It is used by multiple clients at
the same time. The changes are saved in a special cache & these
caches gets cleaned as the user restarts or shutdowns the system.
In other words, when a client is booting up, it will use the default
configuration available on the virtual disk.
Uses Of OS Virtualization
⚫ Used for virtual hosting environment.
⚫ Used for securely allocation of finite hardware resources among
a large number of distrusting users.
⚫ System administrator uses it to integrate server hardware by
moving services on separate hosts.
⚫ To improvised security by separating several applications to
several containers.
⚫ These forms of virtualization don't require hardware to work
efficiently.
Working of OS Virtualization
⚫ The steps for how these virtualization works are listed below:
⚫ Step1:Connect to OS Virtualization Server
⚫ Step2:Connect to virtual disk
⚫ Step3:Then connect this virtual disk to the client
⚫ Step 4:OS is streamed to the client
⚫ Step 5:If further additional streaming is required, it is done

Types of OS Virtualization:
⚫ Kernel/Linux Virtualization.
⚫ Windows Virtualization.
Cont..
Pros :
⚫ Flexible provisioning.
⚫ Rapid Software deployment.
⚫ Easy and Efficient implanting updates and hot fixes of the.
operating system and applications.
⚫ Easy roll back scenarios.
Cons
⚫ No work off line capability.
⚫ High speed LAN recommended.
⚫ Limited numbers of operating systems are supported.
⚫ Imaging disadvantages appl to this technique.
Storage Virtualization
⚫ Storage system use virtualization for better functionality.
⚫ The other name for storage system are storage array ,disk array or filer.
⚫ Storage system is virtualized
Two primary types:
⚫ Block Virtualization
⚫ File Virtualization
⚫ Virtualization is the pools multiple physical storage device that can be
managed from a central console.
⚫ Structure of storage virtualization will be in the form of what are
created , where the virtualisation is done and how it is implemented.
⚫ Mainly storage virtualization is structured in three ways:
⚫ Host based :Traditional device handles physical drives.
⚫ Storage Device : Pooling and managing metadata
⚫ Network based: Device which uses fibre channel
.
Network Virtualization
⚫ Network Virtualization is a process of logically grouping physical networks and making
them operate as single or multiple independent networks called Virtual Networks

Traditional IT infrastructures are based on physical hardware like servers to deliver


needed processing power, storage space, and other resources; however, virtualization lets
administrators create those resources independently of hardware (i.e., abstraction)
through software. When applied to one or many networks, virtual networks can
consolidate and combine the resources of several physical networks, set aside networks
for specific workloads, and organize and connect virtual machines (VMs).
⚫ A virtual network is made through a software known as a virtual switch (vSwitch), which
controls the communication and traffic between a physical infrastructure and its virtual
counterpart. A virtual network adapter (or hypervisor) lets machines and VMs connect to
a network, particularly as part of a local area network (LAN) or virtual local area network
(VLAN), where resources and applications are shared by multiple users.

⚫ Virtualization Solutions
⚫ Why adopt network virtualization?
⚫ Network virtualization is a key building block for cloud-based solutions that offer
enterprises less management-heavy IT, with optimized resources, higher quality user
experiences, greater flexibility and agility, and improved reliability—all at lower costs
than traditional hardware-based networks. By turning to an alternative to legacy
hardware, enterprises can accelerate and support innovation, meet the ever-changing
needs of customers and technological requirements, and secure a competitive edge.
Types of Network Virtualization
⚫ Virtualization is categorized as either internal or external based on the
implementation given by vendors that support the technology.
⚫ There are two kinds of network virtualization: external virtualization and
internal virtualization. External network virtualization can combine systems
physically attached to the same local area network (LAN) into separate virtual
local area networks (VLANs), or conversely divide separate LANs into the
same VLAN. This allows service providers to improve a large network’s
efficiency.
⚫ Unlike external network virtualization—which acts on systems outside of a
single server—internal network virtualization acts within 1 server to emulate a
physical network. This is typically done to improve a server’s efficiency, and
involves configuring a server with software containers. With containers,
individual applications can be isolated or different operating systems can be
run on the same server.
Virtualization Architecture and Software
A virtualization architecture is a conceptual model of a virtual
infrastructure that is most frequently applied in cloud
computing. Virtualization itself is the process of creating and
delivering a virtual rather than a physical version of something.
This could be a desktop, an operating system (OS), a server,
a Storage device or network resources.
The architecture clearly specifies the arrangement and
interrelationships among the particular components in the virtual
environment.
Multinet Protocol Driver (MPD) shown in fig. is used to implement
virtualization of wireless adapter and placed as an intermediate
layer between MAC and IP.
The fig explains how
MPD can be used to
share a wireless
network adaptor and
its MAC.
MPD sits between IP
layer and Physical layer
(MAC).
⚫ When an application wants to use more than one network
than using TCP/IP , the path is sent to MPD which is
responsible for switching and allocating the network and
appropriate MAC address.
⚫ MPD exposes the wireless LAN media adapter as always
active.
⚫ IP stacks checks the adapters, whether they are active
always even though only one is connected at a given time.
⚫ Switching and buffering of packets across networks is done
by MPD.
⚫ The figure depicts the virtualization of a WLAN card,
where a user needs to connect to three networks.
⚫ Virtualization tools are available from Microsoft and
Vmware and they are from open source community,
e.g:-QEMU, Vmware server, Open VZ.
Virtual Clustering
⚫ Definition: Cluster is defined as ‘a type of parallel or distributed
system that consists of a collection of interconnected computers
and is used as a single, unified computing resource’.
⚫ Benefits of clustering are:
i) Scientific applications: Applications running on super computers
can be migrated to Linux cluster(which is more cost effective).
ii) Large ISPs and E-commerce enterprise with large database:
Internet service providers or e-commerce web site that requires
high availability and load balancing and scalability.
iii) Graphics rendering and animation: Film industry is benefited
because of clustering, in particular for rendering quality graphics
and animation scenes. E.g. include Titanic
iv) Fail-over clusters: Using clusters, network services are increased
in terms of availability and serviceability and when a server fails,
its services are migrated to another system. For e.g. failover
servers are database severs, mail servers and file servers.
v) High availability load balancing clusters: Application can run on
all computers and can host multiple applications. Individual
computers are hidden to the outside world as they interact only
with the clusters. This kind of clustering produces best results
with stateless application and when executed concurrently.
Virtualization Application
⚫ Application virtualization is a term , which describes a new
software technology has a technical edge over improving
portability, compatibility and manageability of various
application by encapsulating them from its base OS ,on which
they are executed.
⚫ Here the virtualization refers to ‘encapsulated application’,
whereas in hardware virtualization is referred as ‘abstracted
hardware’.
⚫ The Types of technology used in Application Virtualization are:
Application Streaming.
Desktop Virtualization.
Benefits & Limitations of Application Virtualization
⚫ Non-native applications can be executed(i.e., windows application in Linux)
⚫ Protection for the operating system
⚫ Lesser resources are used
⚫ Able to run applications with bugs.
⚫ Incompatible applications can be executed with lesser regression testing.
⚫ Migration of various operating system is simplified.
⚫ Faster application deployment and on demand application streaming.
⚫ Security is improved as applications are isolated from operating systems.
⚫ Enterprise can easily track license usage.
⚫ Tracking license usage is done easily for applications.
⚫ No need to install the applications, as it can be imported from portable media to
client computers.

⚫ Limitations:-
⚫ All software's cannot be virtualized.
⚫ Anti-virus packages require direct OS integration, these packages cannot be
virtualized.
⚫ For legacy applications, file and registry level compatibility issues can be
resolved using virtualization in newer operating systems.
Pitfalls in Virtualization
⚫ Using Virtualization organization are able to cut cost, utilize assets
and reduce time for implementation and complexity, which are more
important for now a day environment.
⚫ Introduction of virtualization has brought additional complexity into
compliance and security efforts.
⚫ Some pitfalls of virtualization adoption and strategies are given
below:
Religious battles: Choosing platforms based on requirements and
standards that can be created.
⚫ Procurement and business changes: As a first step, adopt and train
the business people only by using resources such as memory, CPU,
network and storage . Do not use by server. Then virtualize it.
⚫ Myopic virtualization strategy: Virtualization begins in server
consolidation. Server, desktop, application, presentation and
management are the five facets of virtualization.
⚫ Physical cost recovery models: Practice real numbers and resource
based cost recovery. Practice a base building block as a cost unit
drive from that point.
⚫ Physical asset based security: Virtualization unlocks some new
security challenges. At the same time, it also provides solution to
some challenges.
⚫ Over Virtualization: Virtualizing everything is wrong. It is not
everything must be virtualized.
Grid, Cloud and Virtualization
Virtualization in Grid
⚫ The main focal point in grid computing lies in secure resource
sharing in accessing computers, software and data in a dynamic
atmosphere.
⚫ Sharing of those resources has to be fine-tuned and handled in a
highly controlled manner.
⚫ Like grid, virtualization is also a trend. Instead of having more
hardware's to meet peak demands, organizations can use
virtualization approach to get better utilization out of the existing
hardware's which are not fully utilized.
⚫ Also virtualization is possibly becoming a mainstream approach in
managing network resources.
⚫ Virtualization helps to run multiple workloads in a single
machine with clear distinction between them.
⚫ Virtualization integration and grid computing can be
encouraged at various levels:
1) Grid Computing Level 2) LRMS Level
1) Grid Computing Level:
● The gLite Middleware has strong dependencies to Scientific
Linux as operating system which is used by the LHC (Large
Hadron Collider) Computing Grid High Energy Physics
Virtual Organizations (VO).
● Resource providers can support the VOs with minimal effort by
encapsulating the Grid Middleware into a virtual appliance.
● Grid Middlewares can be packaged as virtual appliances similar
to the gLite Middleware.
2) LRMS Level:
● The key research work in grid computing is to use virtualization
in resource management system locally. When virtualization is
adopted locally, it supports job managements and migration
for virtual machines instead of jobs.
● Merging the above mentioned LRMS features (suspension, check
pointing) with migration, helps the LRMS in varying the
current resource allocation dynamically.
● Alteration of resources (e.g. number of CPUs, RAM) allocated to
a virtual machine is possible .
Virtual Machines:
Virtual machine can check the execution of applications and
also they are useful tool grid system administrators.
VM can easily manage the system in terms of isolating and
partitioning the amount of resources needed.
Figure 9.1 shows the
architecture developed for
dynamic provisioning of
computational services in grid.
It explains, how
computational services can
be deployed virtually in grid.
The architecture consists of physical machines, worker nodes,
infrastructure manager, GridWay, Virtual Workspace Service
(VWS) and grid middleware component such as Monitoring and
Discovery of Services (MDS), grid resource Allocation Manager
(GRAM) and GridFTP.
User’s requests are submitted to GridWay (meta-scheduler).
Depending on the policies, SLAs and the grid load, an
infrastructure manager deploys it in worker nodes (VO-specific).
The deployment of the VMs supporting the worker node is done
through the virtual workspace service (VWS).
When worker node is up, it registers the information stored in
information service (MDS).
Now GridWay can detect the slot and jobs are submitted
through GRAM.
Virtualization in Cloud
⚫ Cloud computing and virtualization will modernize IT
organizations.
⚫ By combining them, companies can run their applications
without the need of running updates and backups, as they all
will be done by the provider.
⚫ Virtualization and cloud computing can go hand in hand.
Virtualizing everything started a year ago when processing
power, software and servers are virtualized. Now-a-days
virtualization means cloud computing.
⚫ Cloud was implemented as out source model first and then
gradually was implemented within the enterprise firewall as an
architecture.
⚫ Virtualization was started within the limitations of enterprise
firewall and then was operated in hosted environments.
⚫ Cloud computing and virtualization are two different
technologies that work independently.
Need of Virtualization in Cloud Computing or Benefits of
Virtualization and Cloud Computing:
⚫ Cloud computing has the ability to deliver resources on demand.
Users can choose and pay for the services consumed.
⚫ A cloud service can act as an infrastructure for applications, data
storage and as a development platform which can be received on
demand from the provider.
⚫ The primary technology in cloud is virtualization.
⚫ Virtualization has the ability to save cost in infrastructure,
isolates OS and application from the hardware, which can be
delivered as an on demand cloud services.
⚫ Virtualization can play a vital role in cloud computing.
Virtualization and Cloud Security.
⚫ Security in the cloud is achieved due to virtualization.
⚫ Since virtualization combines all physical components as a single
unit, the complexity of monitoring these components is made easier.
⚫ Trust zones are created and personalized by the IT administrator.
These zones watch workloads in terms of information, application
and endpoints.
⚫ Zones created are watched through the cloud by means of
infrastructure virtualization.

You might also like