Module 3 Virtualization, Its Types and Levels
Module 3 Virtualization, Its Types and Levels
The process of separating the physical delivery of any service and creating a
virtual version is called Virtualization in Cloud Computing.
Using this technique, you can easily switch between different digital
environments to access hardware resources such as an operating system,
storage device, memory, network resources, etc.
1
and organizations. It does by assigning a logical name to a physical storage and
providing a pointer to that physical resource when demanded.
The machine on which the virtual machine is going to create is known as Host
Machine and that virtual machine is referred as a Guest Machine.
In more practical terms, imagine you have 3 physical servers with individual
dedicated purposes. One is a mail server, another is a web server, and the last
one runs internal legacy applications. Each server is being used at about 30%
capacity—just a fraction of their running potential. But since the legacy apps
remain important to your internal operations, you have to keep them and the
third server that hosts them, right?
Traditionally, yes. It was often easier and more reliable to run individual tasks
on individual servers: 1 server, 1 operating system, 1 task. It wasn’t easy to
give 1 server multiple brains. But with virtualization, you can split the mail
server into 2 unique ones that can handle independent tasks so the legacy
apps can be migrated. It’s the same hardware, you’re just using more of it
more efficiently.
Keeping security in mind, you could split the first server again so it could
handle another task—increasing its use from 30%, to 60%, to 90%. Once you
do that, the now empty servers could be reused for other tasks or retired
altogether to reduce cooling and maintenance costs.
2
How does virtualization work in cloud computing?
Software called hypervisors separate the physical resources from the virtual
environments—the things that need those resources. Hypervisors can sit on
top of an operating system (like on a laptop) or be installed directly onto
hardware (like a server), which is how most enterprises virtualize. Hypervisors
take your physical resources and divide them up so that virtual environments
can use them.
3
When the virtual environment is running and a user or program issues an
instruction that requires additional resources from the physical environment,
the hypervisor relays the request to the physical system and caches the
changes—which all happens at close to native speed (particularly if the request
is sent through an open source hypervisor based on KVM, the Kernel-based
Virtual Machine).
Conclusion
What is a hypervisor
In other words, this implies that they can be quickly switched between servers.
Since a hypervisor with the help of its special feature, it allows several virtual
machines to operate on a single physical server. So, it helps us to reduce:
4
Kinds of hypervisors
There are two types of hypervisors: "Type 1" (also known as "bare metal") and
"Type 2" (also known as "hosted"). A type 1 hypervisor functions as a light
operating system that operates directly on the host's hardware, while a type 2
hypervisor functions as a software layer on top of an operating system, similar
to other computer programs.
Since they are isolated from the attack-prone operating system, bare-metal
hypervisors are extremely stable.
Furthermore, they are usually faster and more powerful than hosted
hypervisors. For these purposes, the majority of enterprise businesses opt for
bare-metal hypervisors for their data centre computing requirements.
While hosted hypervisors run inside the OS, they can be topped with additional
(and different) operating systems.
The hosted hypervisors have longer latency than bare-metal hypervisors which
is a very major disadvantage of the it. This is due to the fact that contact
between the hardware and the hypervisor must go through the OS's extra
layer.
The native or bare metal hypervisor, the Type 1 hypervisor is known by both
names.
5
The type 1 hypervisor is very much commonly used in the enterprise data
centre or other server-based environments.
It operates by separating the guest and host operating systems. The host
operating system schedules VM services, which are then executed on the
hardware.
This type of hypervisor also includes the virtual machines with it.
6
Increased emphasis on creative applications is being driven by digital
transformation and increasing consumer expectations. As a result, many
businesses are transferring their virtual computers to the cloud.
Having to rewrite any existing application for the cloud, on the other hand, will
eat up valuable IT resources and create infrastructure silos.
Benefits of hypervisors
1. Hardware Virtualization
7
Hardware virtualization involves partitioning a physical server into multiple
virtual servers, each running its own operating system and applications.
Application
Examples
VirtualBox,
OpenVZ,
VMware Workstation, etc.
Is of three types
Full Virtualization: All resources (such as CPU, memory, and storage) are
consolidated to provide a unified view of the system, making it appear as a
single resource pool to users and applications.
Partial Virtualization: Some system resources are virtualized, while others run
directly on the physical hardware. This improves performance but may require
software modifications to function properly.
How It Works
8
The guest OS is modified to communicate with the hypervisor, reducing
the need for complex hardware emulation.
This leads to faster performance and lower overhead compared to full
virtualization.
Example
2. Network Virtualization
It enables the
Network virtualization
enhances scalability,
agility,
resource optimization in data centres.
Can be
Internal
External
9
Internal vs. External Network Virtualization
3. Storage Virtualization
It allows for
Storage virtualization
10
making storage systems more efficient and
resilient.
Some simple examples of this type are LUN’s (Logical unit number), RAID
groups, Logical volume (LV), etc.
Can be
Block type
File Type
Definition: Virtualizes the physical storage into blocks, where each block
acts like a separate disk. The data is stored in fixed-size chunks (blocks),
and the storage is managed as if it’s a single large disk.
Example: Storage Area Networks (SANs), where disks are presented to
the system as individual blocks of storage.
Benefits: Provides high performance and flexibility, as it allows for
precise control of storage allocation.
Definition: Virtualizes storage at the file level, meaning files are treated
as units and can be accessed without worrying about the underlying
storage details.
Example: Network Attached Storage (NAS), where files are stored and
accessed over a network, without needing to know where the physical
storage is located.
Benefits: Easier to manage and access files remotely, and it simplifies
sharing files across different systems.
4. Memory Virtualization
11
Memory virtualization is commonly implemented in virtualized environments
such as cloud computing, data centres, and enterprise IT infrastructures.
1. Cloud Computing
o Public and private cloud providers use memory virtualization to
optimize memory usage across multiple tenants.
2. Enterprise IT Environments
o Large organizations use it to maximize memory efficiency in
virtualized data centres.
3. High-Performance Computing (HPC)
o Enhances performance in scientific simulations and AI workloads
by optimizing memory distribution.
4. Virtual Desktop Infrastructure (VDI)
o Helps multiple virtual desktops share physical memory while
maintaining performance.
12
5. Embedded Systems & IoT
o Used in resource-constrained devices to manage memory
efficiently.
6. Disaster Recovery & High Availability Systems
o Enables seamless VM migration in case of hardware failures.
5. Software Virtualization
13
Application Virtualization – Running applications in isolated
environments without installation (e.g., VMware ThinApp, Microsoft
App-V).
Cloud Computing – Enabling cloud services like AWS, Google Cloud, and
Microsoft Azure to run multiple virtualized workloads.
Software Testing & Development – Creating virtual environments for
testing software without affecting the production system.
6. Data Virtualization
Data virtualization abstracts data from its physical location, format, and
structure, making it appear as a single, unified data source.
It allows organizations to access and analyze data from diverse sources without
the need for complex data movement and transformation.
Data virtualization
Some examples are Data Warehouses, Data Lakes, Packaged apps, etc.
14
7. Desktop Virtualization
Users can access their virtual desktops from various devices, including PCs,
laptops, and thin clients.
Desktop virtualization
8. Application Virtualization
Application virtualization
15
Applications
Background
1. Hardware Virtualization
2. Desktop Virtualization
Employees were provided with virtual desktops via Citrix Virtual Apps
and Desktops.
Result: Secure remote access, centralized management, and reduced
hardware dependency.
3. Storage Virtualization
4. Network Virtualization
16
Used SDN (Software-Defined Networking) to create virtual networks for
better traffic management.
Result: Improved network security, flexibility, and reduced reliance on
physical hardware.
5. Application Virtualization
6. Data Virtualization
7. Software Virtualization
8. Memory Virtualization
17
compliance.
Efficiency: Improved resource utilization, reduced downtime, and better
overall performance.
Flexibility: Seamless access to applications, data, and software across
devices.
Performance Boost: Memory virtualization prevented bottlenecks and
improved speed.
Thus, running different operating system types using the same hardware
proves to be difficult.
For this, we need a hypervisor that acts as the bridge between your hardware
and virtual operating system, allowing smoother functioning.
But, for implementation levels you need to undergo five levels of virtualization
in cloud computing. Let’s look at them:
1. Instruction Set
2. Emulator
18
Definition: A software tool that mimics the behavior of hardware (or
another computer system), enabling software to run on platforms it
wasn’t designed for.
Example: QEMU and Bochs are emulators that can simulate a different
CPU architecture for running software that isn't compatible with the
host machine.
3. Mapping of Instructions
Privileged Instructions:
Non-Privileged Instructions:
19
These instructions can be executed by user-level applications without
risking system security or stability.
II. HAL serves as a bridge between the OS and the hardware and ensures that
privileged instructions can only be executed by trusted software (like the OS
kernel) while user applications are restricted to non-privileged instructions.
HAL Mechanism:
Example:
Instead, HAL ensures that only the OS can interact with these resources,
maintaining system integrity.
In Summary:
OS-Level Virtualization
Problems of HAL
20
HAL abstracts the hardware for the OS, but each OS still has to be
compatible with specific hardware. OS-level virtualization solves this by
allowing the same OS to run multiple virtual environments without
needing to worry about hardware differences between each
environment.
Full virtualization requires emulating the entire hardware for each virtual
machine, which adds significant overhead. OS-level virtualization (e.g.,
containers) avoids this by sharing the OS kernel, making it more
lightweight and efficient.
Unlike traditional virtualization, where each virtual machine runs its own OS,
OS-level virtualization uses the same OS for all environments, but each
environment behaves as if it has its own separate system.
Key Points:
Example:
Library-level virtualization uses APIs to abstract OS-level functions (like file I/O,
memory management, etc.) and provides an environment for applications to
run without needing a full OS.
22
multiple OSes without modification. This bypasses OS-specific differences by
relying on a common set of APIs, similar to how Java provides platform
independence through the JVM.
Examples:
5. Application Level
23
Case Study: Virtualization in a Multi-Tier Web Application
2. Library-Level Virtualization:
3. Application-Level Virtualization:
24
Solution: The company combines all levels of virtualization:
o Hardware level virtualization: VMs for isolated environments.
o Library-level virtualization: Docker for managing dependencies.
o Application-level virtualization: Containerized frontend for
portability.
Result: The entire multi-tier web application is isolated, flexible, and
portable across different systems and environments.
Conclusion:
2. Library-Level Virtualization:
25
Challenge: The backend uses a specific version of a database client
library, but the OS has a different version installed.
Solution: The developer uses a library-level virtualization tool (e.g.,
Docker) to package the backend service along with its required database
client libraries, ensuring it works as expected without conflicts.
Result: The backend service runs with the correct version of the library,
and the developer doesn't have to worry about global library conflicts.
3. Application-Level Virtualization:
Most of them stem from the features of virtualization. Research shows that
adopting virtualization can lead to a reduction of 70% and 30% in capital and
operational expenditure respectively.
26
Let’s explore some key advantages:
27
It differs from the traditional network security based on hardware and is
static as well as runs on devices such as traditional firewalls, routers, and
switches.
Virtualized security is flexible, dynamic, deployable from anywhere, and
cloud-based.
It allows security services and functions to move around from
dynamically created workloads.
The flexibility of virtualized security is important for securing hybrid and
multi-cloud environments.
According to Allied market research, global virtualization security market
size is projected to reach $6.29 billion by 2030.
Multi-Tenant Architecture
Tenants are given the ability to customize parts of the application such as the
colour of the UI or business rules without changing its code.
This approach is highly efficient, as evidenced by the fact that the multi-tenant
data centre market is expected to grow by 11.36% by 2028.
28