Cloud Computing Module-2
Cloud Computing Module-2
Disadvantages of Virtualization:
1. Performance Degradation: The virtualization layer adds latency and reduces system performance.
2. Resource Contention: Virtual machines compete with other applications for host resources.
3. Limited Hardware Access: Some host features, like advanced device drivers, may be inaccessible.
4. Security Risks: Virtual environments can be exploited by malware to extract sensitive data.
5. Overhead Costs: Managing and running the virtualization software adds processing demands.
6. Dependency on Technology: Poorly optimized virtualization solutions may lead to inefficiencies.
7. Complex Troubleshooting: Debugging issues in virtualized environments can be more challenging.
Virtualization can be categorized based on the area it emulates: execution environments, storage, and networks.
Execution virtualization is the most developed and popular, enabling multiple systems or applications to run on
the same hardware. It is further divided into process-level (runs on an existing OS) and system-level (runs directly
on hardware) techniques. These techniques provide different types of virtual environments, such as bare hardware,
operating system resources, programming language platforms, or application libraries. This classification helps
us understand how virtualization creates flexible and efficient computing resources.
Hardware-level virtualization
1. Definition
a. Hardware-level virtualization creates an abstract hardware environment that allows a guest
operating system to run on top of it.
b. The abstraction is managed by a hypervisor, which emulates the physical hardware.
2. Key Components
a. Guest: The operating system running on the virtual environment.
b. Host: The physical hardware on which the virtual environment is created.
c. Virtual Machine (VM): The emulated environment that mimics hardware for the guest OS.
d. Hypervisor (Virtual Machine Manager-VMM): Software (or hardware-software combination)
responsible for creating and managing virtual machines.
3. Role of the Hypervisor
a. The hypervisor abstracts the underlying hardware, allowing multiple virtual machines to operate
independently.
b. It ensures efficient resource allocation and isolates the VMs for security and stability.
4. Types of Hypervisors
a. Type I (Native Hypervisor): Runs directly on physical hardware, replacing the host operating
system. Examples: VMware ESXi, Microsoft Hyper-V.
b. Type II (Hosted Hypervisor): Runs on top of an existing operating system. Examples: VMware
Workstation, VirtualBox.
Key Differences
Feature Type I Hypervisor Type II Hypervisor
Underlying Layer Directly on hardware (no OS) Runs on top of an existing OS
Performance High (direct hardware access) Lower (overhead from host OS)
Complexity More complex to install/manage Easier to install/manage
Use Cases Enterprise servers, data centers Development, testing environments
5. XEN
Xen is an open-source virtualization platform primarily based on paravirtualization but also supports full
virtualization through hardware-assisted technologies. It was initially developed at the University of Cambridge
and now has significant contributions from the open-source community and commercial vendors like Citrix.
Key Features of Xen
1. Paravirtualization:
a. Allows high-performance execution by modifying the guest operating system for efficient
handling of privileged instructions.
b. Reduces performance loss compared to full virtualization.
c. Requires guest OS modifications to replace sensitive system calls with hypercalls.
2. Hardware-Assisted Virtualization:
a. Supports full virtualization on hardware with virtualization extensions like Intel VT-x or AMD-V.
b. Eliminates the need for guest OS modifications by running the hypervisor in a higher privilege
level (Ring -1).
3. Open Source and Commercial Use:
a. The core technology is free and open source.
b. Commercial solutions like XenSource and Xen Cloud Platform (XCP) are built on Xen
technology.
4. Use Cases:
a. Desktop and server virtualization.
b. Cloud computing infrastructure (e.g., IaaS solutions).
Xen Architecture
Xen implements virtualization using a hierarchical privilege model derived from x86 architectures. The system
divides resources and functionalities across different domains: