Virtulization
Virtulization
Unit No. : IV
2
Assessment Structure
3
Course Outcomes
4
Course Contents
5
Course Contents
6
Resources
7
Content – Unit 4
Type of Virtualization
Virtual Machine
VM monitoring services
Hypervisors
8
Cloud Computing Enabling Technologies
Cloud Computing can be possible only when we use some technologies that make it
compatible for end user and service provider.
9
Basics of Virtualization
• Virtualization is the "creation of a virtual (rather than actual) version of something, such
as a server, a desktop, a storage device, an operating system or network resources".
• A virtual machine (VM) is created on a physical host device. The VM behaves exactly like
a physical device would and can run different OSs from the host.
• VMs are also named guest machines. Multiple guest VMs can run on a host device and
each VM behave like independent device.
Basics of Virtualization
• Host machine: The machine on which the virtual machine is going to be built
is known as Host Machine.
Enhance Performance
Access to more resources
Shortage of space
Eco-friendly initiatives
How does Virtualization work?
• Virtualization works by partitioning the host device's resources between VMs. This
partitioning is performed by software known as a hypervisor. There are two kinds of
hypervisors: bare-metal ones that are installed directly on the host hardware and hosted ones
that need some kind of OS to run on the host.
• A hypervisor acts as the intermediary between the VMs and the host device. When a VM is
created, the hypervisor allocates some host resources, like the CPU and memory, to it. If the
VM needs more resources while operating, the hypervisor allocates more host resources.
• Similarly, the disk storage of the host device is simulated as virtual storage on the VM.
When the VM tries to locate any files in its virtual storage, the hypervisor translates this
request to locate the files in the actual physical storage of the host.
Type of Virtualization
Type of Virtualization
• Type 2 hypervisor: Also known as a hosted hypervisor, the type 2 hypervisor is installed
on an operating system. Type 2 hypervisors are suitable for end-user computing.
• The hypervisor pulls resources from the layers below and partitions them into virtual
instances. For this reason, the hypervisor is also known as the virtualization layer. Guest
OSs operate on top of the hypervisor. Often, the guest OSs aren't aware of themselves and
behave like independent devices. Applications are hosted on each guest OS on a VM. This
layer is known as the application layer.
Benefits of Virtualization
• High Initial Investment: Clouds have a very high initial investment, but it is also
true that it will help in reducing the cost of companies.
• Risk of Data: Hosting data on third-party resources can lead to putting the data at
risk, it has the chance of getting attacked by any hacker or cracker very easily.
Types of Virtualization
Full virtualization
• Full virtualization refers to the ability to
run a program, most likely an operating
system, directly on top of a virtual
machine and without any modification, as
though it were run on the raw hardware.
• To make this possible, virtual machine
managers are required to provide a
complete emulation of the entire
underlying hardware.
Types of Virtualization
Full virtualization
• The principal advantage of full
virtualization is complete isolation - leads
to enhanced security, ease of emulation of
different architectures, and coexistence of
different systems on the same platform.
• Whereas it is a desired goal for many
virtualization solutions, full virtualization
poses important concerns related to
performance and technical implementation.
Types of Virtualization
Full virtualization
• A physical host server’s resources are divided up to create multiple virtual
machines that are completely separated from each other and act independently
without any knowledge of the other VMs on the host.
• The hypervisor for this type is often called a bare-metal hypervisor because it is
installed directly onto the physical hardware and acts as a layer between the
hardware and the VMs and their unique operating systems.
• The only possible downside to this type is that the all-important hypervisor comes
with its own resource needs and can sometimes cause a slowdown in performance.
• With full virtualization, the host server does not need to have an operating system.
Types of Virtualization
Types of Virtualization
Para-virtualization
• In this type, VMs aren’t completely unaware
of each other on the host server. While the
VMs are isolated to a degree, they still work
together across the network.
• Because the VMs do some of the work of
allocating resources themselves, the
hypervisor requires less processing power to
manage the entire system.
Types of Virtualization
Para-virtualization
• Para-virtualization requires the host server to
have an operating system and it must work
together with the hypervisor through hypercall
commands, which then allows the hypervisor
to create and manage the VMs.
• This type emerged in response to the
performance issues experienced by early bare-
metal hypervisors. Instead of being installed
directly onto the bare physical hardware of the
host server, the hypervisor becomes a layer
between the host server’s OS and the VMs.
Today, para-virtualization is less commonly
used because modern servers are now being
designed to more effectively support and work
with bare-metal hypervisors.
Types of Virtualization
Types of Virtualization
Partial virtualization
Partial virtualization provides a partial emulation of the underlying hardware, thus
not allowing the complete execution of the guest operating system i.e. incomplete
isolation.
Partial virtualization allows many applications to run transparently, but not all the
features of the operating system can be supported, as happens with full virtualization.
Types of Virtualization
Virtualization comes in various forms, each designed to address specific challenges and requirements in modern IT
environments.
Server virtualization: Server virtualization is a process that partitions a physical server into multiple virtual servers. It is
an efficient and cost-effective way to use server resources and deploy IT services in an organization. Without server
virtualization, physical servers use only a small amount of their processing capacities, which leave devices idle.
Consider a company that needs servers for three functions: (1) Store business email securely (2) Run a customer-facing
application (3) Run internal business applications
Each of these functions has different configuration requirements: (1) The email application requires more storage capacity
and a Windows operating system. (2) The customer-facing application requires a Linux operating system and high
processing power to handle large volumes of website traffic. (3) The internal business application requires iOS and more
internal memory (RAM).
To meet these requirements, the company sets up three different dedicated physical servers for each application. The
company must make a high initial investment and perform ongoing maintenance and upgrades for one machine at a time.
The company also cannot optimize its computing capacity. It pays 100% of the servers’ maintenance costs but uses only a
fraction of their storage and processing capacities.
Server Virtualization
Advantages:
Server Virtualization
Disadvantages:
Types of Virtualization
Storage virtualization :
Storage virtualization uses all your physical data storage and creates a large unit of virtual storage that you can assign
and control by using management software.
Storage virtualization combines the functions of physical storage devices such as network attached storage (NAS) and
storage area network (SAN).
You can pool the storage hardware in your data center, even if it is from different vendors or of different types.
IT administrators can streamline storage activities, such as archiving, backup, and recovery, because they can combine
multiple network storage devices virtually into a single storage device.
Types of Virtualization
A Storage Area Network (SAN) is a high-speed network that connects servers to storage devices, enabling efficient data
transfer and centralized management. SANs are ideal for large enterprises with demanding storage needs. They use
protocols like Fibre Channel or iSCSI for fast data transfer and operate separately from regular networks to avoid traffic
congestion
Key Components of SAN: Node ports, Cables, Interconnect devices (Hubs, switches, directors), Storage arrays & SAN
management software
How SAN Works: SANs link servers to storage devices, allowing multiple servers to share and access storage resources
efficiently. This setup offers improved performance, scalability, and centralized management of storage, making it suitable
for demanding applications and extensive storage needs.
Network Attached Storage (NAS) is a simpler system that connects to your network, allowing multiple devices to
easily share and access files. NAS is more affordable and user-friendly, making it a great choice for smaller businesses
and home setups
Key Components of NAS: Head unit(CPU, Memory), Network Interface Card (NIC), Optimized operating system, Storage
protocols (ATA, SCSI, FC).
How NAS Works: NAS devices house storage drives and connect to the network via an Ethernet port. They operate with
their own system designed to handle file management and network connections, supporting various file-sharing protocols
like SMB, NFS, or AFP
Types of Virtualization
Key Principles and Functions: Network virtualization involves logically grouping physical networks to operate as single
or multiple independent networks called virtual networks. The primary functions include:
Resource Sharing: Virtual networks can share network resources, enhancing utilization and performance. Resources can
be pooled together and allocated more efficiently. This allows for better utilization of hardware, reducing the need for
physical devices and lowering costs.
Isolation: Each virtual network operates separately, ensuring privacy and security. Virtual networks can be isolated and
segmented to prevent unauthorized access, reducing the risk of data breaches.
Centralized Management: Configuration and management of virtual networks can be done from a centralized workstation
using management software.
Types of Virtualization
The following are two approaches to network virtualization-
Software-defined networking: Software-defined networking (SDN) controls traffic routing by taking over routing
management from data routing in the physical environment. For example, you can program your system to prioritize your
video call traffic over application traffic to ensure consistent call quality in all online meetings.
Network function virtualization : Network function virtualization technology combines the functions of network
appliances, such as firewalls, load balancers, and traffic analyzers that work together, to improve network performance.
Data virtualization:
Modern organizations collect data from several sources and store it in
different formats. They might also store data in different places, such as
in a cloud infrastructure and an on-premises data center.
Data virtualization is a data management technique in cloud computing
that integrates data from different sources into a single virtual layer. It
creates a single, logical, and virtual view of data.
The virtual view of data can be access by applications such as web
portals, dashboards, e-commerce, mobile apps, etc.
Data virtualization allows users to retrieve and manipulate data without
knowing how and where it is stored.
Data virtualization creates a software layer between this data and the
applications that need it.
Data virtualization tools process an application’s data request and return
results in a suitable format. Thus, organizations use data virtualization
solutions to increase flexibility for data integration and support cross-
functional data analysis.
Types of Virtualization
The data virtualization works in the following manner:
1. Data Abstraction: The process starts by pulling data from different sources—like databases, cloud storage or APIs—and
combining it into a single virtual layer. This layer makes everything look unified and easy to access without worrying about
where the data stores.
2. Data Integration: Instead of copying or moving data, the platform integrates it. It combines data from various systems into
a single view, so you can work with it all in one place, even if it’s coming from completely different sources.
3. Querying and Transformation: Users can query the data using familiar tools like SQL or APIs. The platform handles any
transformations or joins in real time, pulling everything together seamlessly—even if the data comes from multiple systems.
Layers of Data Virtualization: Following are the working layers in data virtualization architecture-
1. Connection Layer: This layer is all about connecting the virtualization platform to the different data sources you need.
Whether the data is structured, like databases, or unstructured, like files or APIs, this layer handles it.
2. Abstraction Layer: This is where the magic happens. The abstraction layer creates a virtual version of your data, making
it look clean and unified, no matter how messy or complex the sources are.
3. Consumption Layer: This is the user-facing layer that provides access to the unified data. It’s designed to make it easy
for tools, applications and people to work with the data.
Types of Virtualization
Advantages of Data Virtualization: There are different benefits and advantages of the data virtualization, some are
discussed as follows –
Data virtualization integrates all your data sources and creates a single view and allows real-time access.
It provides applications with real-time access to multiple data sources in a single view regardless of data source and
format.
It provides best resource utilization by running multiple virtual instances on a single physical server.
Data virtualization solutions increase flexibility for data integration and support cross-functional data analysis.
It reduces costs by creating multiple virtual instances onto fewer physical servers.
It provided user friendly interface to analyze and manipulate data.
It reduces latency as it eliminates the complex data movement.
It used metadata and advance data query optimization to retrieve data from sources. It reduces the data integration cost.
Disadvantages of Data Virtualization: With several advantages, the data virtualization come with some drawbacks or
disadvantages also. We have discussed some of them ass follows-
It creates flexibility and portability issue as organizations may become dependent on third party providers.
It requires high implementation cost.
It causes issues with availability and scalability as it depends on third-party providers.
It may introduce new security risks.
Types of Virtualization
Industries using Data Virtualization: The data virtualization is used in many industries. The following is a list of industries
where data virtualization ins used −
Healthcare
Finance
Telecommunications
Government
Manufacturing
Retail
Data Virtualization Tools: The following are some data virtualization tools used by different organizations −
Examples:
• ThinApp: Developed by VMware, ThinApp
encapsulates application files and registries into a
single packet that can be easily deployed, managed,
and updated independent of the underlying OS. With
this approach, applications can be run on a physical
PC, a shared network drive, a virtual desktop without
installing them on the local machine. This technique
provides several features, including portability,
reduced help desk costs, ease of updating, stronger
endpoint security, and the ability to run multiple
versions of the application on the same machine.
This capability is now offered by a number of
vendors and provides considerable cost savings,
along with improved management and control.
Types of Virtualization – Application Virtualization
Examples:
Remote Desktop Services:
• RDS (formerly Terminal Services) is the
most commonly used method of application
virtualization. This method presents
applications to connected users. The
application actually runs in a session on the
server in the data center while it appears to
be running on the local desktop. This is a
cost effective and reliable method of
deploying applications to an enterprise.
Types of Virtualization – Application Virtualization
Benefits:
• Simple installation and deployment – An application is only installed once on the host server and
then deployed remotely through the distribution of an .exe file to user devices.
• Easy, centralized management – IT can oversee many applications for thousands of users from a
single centralized location.
• Increased flexibility and scalability – Eliminate the time and effort spent installing applications
many times to hundreds or thousands of end devices. As new employees are onboarded, they
simply need to be given remote access to already installed apps.
• Mobility support – Virtualized applications supports mobility and portability; in fact, some devices
can’t handle a full remote desktop environment, but almost every device can handle a virtualized
app.
Limitations:
• Graphics-intensive apps might be glitchy – Latency in these types of applications can cause some stuttering
during the rendering process.
• Device drivers could affect use of peripherals – Any application that requires a device driver that is OS-
specific could make it difficult to use equipment such as printers or scanners.
Types of Virtualization – OS Virtualization
Desktop virtualization: Most organizations have nontechnical staff that use desktop systems to run common business
applications. For instance, you might have the following staff-
A customer service team that requires a desktop computer with Windows 10 and customer-relationship management
software
A marketing team that requires Windows Vista for sales applications
You can use desktop virtualization to run these different desktop operating systems on virtual machines, which your teams
can access remotely. This type of virtualization makes desktop management efficient and secure, saving money on desktop
hardware. The following are types of desktop virtualization-
Virtual desktop infrastructure: Virtual desktop infrastructure runs virtual desktops on a remote server. Your users can
access them by using client devices.
Local desktop virtualization: In local desktop virtualization, you run the hypervisor on a local computer and create a
virtual computer with a different operating system. You can switch between your local and virtual environment in the
same way you can switch between applications.
Implementation Level of Virtualization
A traditional computer runs with host operating system specially tailored for its hardware
architecture.
After virtualization, different user applications managed by their own operating
systems (guest OS) can run on the same hardware, independent of the host OS.
Implementation Level of Virtualization
This is often done by adding additional software, called a virtualization layer. This
virtualization layer is known as hypervisor or virtual machine monitor (VMM).The
VMs are shown in the upper boxes, where applications run with their own guest OS over
the virtualized CPU, memory, and I/O resources.
The main function of the software layer for virtualization is to virtualize the physical
hardware of a host machine into virtual resources to be used by the VMs, exclusively.
The virtualization software creates the abstraction of VMs by interposing a virtualization
layer at various levels of a computer system.
Common virtualization layers include
Instruction Set Architecture (ISA) level,
Hardware level,
Operating System level,
Library Support level, and
Application level
Implementation Level of Virtualization
Implementation Level of Virtualization
Library Level:
• Most applications use APIs exported by user level libraries. Since most systems
provide well documented APIs, such an interface becomes another candidate for
virtualization.
• API hooks make it possible as it controls the link of communication from the application
to the system.
• An API (Application Programming Interface) is a set of rules and protocols that
allows different software applications to communicate with each other. APIs enable the
exchange of data, features, and functionality between applications, simplifying and
accelerating software development.
Implementation Level of Virtualization
Application Level:
• The application-level virtualization is used when there is a desire to virtualize only one
application and is the last of the implementation levels of virtualization in Cloud
Computing.
• One does not need to virtualize the entire environment of the platform.
• This is generally used when you run virtual machines that use high-level languages. The
application will sit above the virtualization layer, which in turn sits on the application
program.
• It lets the high-level language programs compiled to be used at the application level of
the virtual machine run seamlessly.
Load Balancing in Cloud Computing
The most common load balancing techniques used in cloud computing are:
Network Load Balancing: This technique is used to balance the network traffic across
multiple servers or instances. It is implemented at the network layer and ensures that the
incoming traffic is distributed evenly across the available servers.
Application Load Balancing: This technique is used to balance the workload across
multiple instances of an application. It is implemented at the application layer and
ensures that each instance receives an equal share of the incoming requests.
Database Load Balancing: This technique is used to balance the workload across
multiple database servers. It is implemented at the database layer and ensures that the
incoming queries are distributed evenly across the available database servers.
Load Balancing in Cloud Computing
Advantages:
Improved Performance: Load balancing helps to distribute the workload across
multiple resources, which reduces the load on each resource and improves the overall
performance of the system.
High Availability: Load balancing ensures that there is no single point of failure in the
system, which provides high availability and fault tolerance to handle server failures.
Scalability: Load balancing makes it easier to scale resources up or down as needed,
which helps to handle spikes in traffic or changes in demand.
Efficient Resource Utilization: Load balancing ensures that resources are used
efficiently, which reduces wastage and helps to optimize costs.
Load Balancing in Cloud Computing
Disadvantages:
VPC – Stands for Virtual Private Cloud, It is a secured cloud space created within a
public cloud, where you can run the code, store your files, host websites, and can do
anything else they could do in an ordinary private cloud.
Amazon Virtual Private Cloud is a service that allows its users to launch their virtual
machines in a protected as well as isolated virtual environment defined by them.
You have complete control over your VPC, from creation to customization and even
deletion. It’s applicable to organizations where the data is scattered and needs to be
managed well.
VPC can be referred to as the private cloud inside the cloud. It is a logical grouping of
servers in a specified network. The servers that you are going to deploy in the Virtual
Private Cloud(VPC) will be completely isolated from the other servers that are deployed
in the Amazon Web Services. You can have complete control of the IP address to the
virtual machines and route tables and gateways to the VPC.
Network Peering in Cloud Computing
VPC Peering - It is an AWS networking function that provides safe and direct
communication between different VPCs.
By using the VPC peering feature, organizations can establish private connections that
facilitate the secure and smooth transfer of resources and data across various VPCs in
the AWS Cloud.
Amazon peering provides an effective way of linking Virtual Private Clouds (VPCs) and
offers strong networking capabilities inside AWS.
Network Peering in Cloud Computing
AWS VPC Peering Connection Lifecycle - The lifecycle of AWS VPC peering
connection involves with serval key stages. Those are as follow:
Initiation: The life cycle process starts with initiating a request to peer two VPCs.
This request involves with specifying the VPCs to be peered and their respective
settings.
Approval: After the request is raised, the administrator of the receiving VPC have to
accept that peering connection. This step involves both the parties to agrees the
connection establishment.
Establishment: One Both approved the peering connection, the VPC peering
connection is established. This enables the communication between two VPCs, if
they were within same network, i.e., allowing instances in one VPC to communicate
with other VPC’s instance using private IP address.
Network Peering in Cloud Computing
Hypervisor is a key component that enables cloud computing. It allows multiple virtual
machines to run simultaneously on a single physical server, maximizing hardware
utilization.
A hypervisor, also called a virtual machine monitor (VMM), is a software program that
creates and runs virtual machines (VMs) on a host machine.
Acting as a layer between the hardware and virtual machines, hypervisors allow multiple
operating systems to share the resources of a single physical server.
This virtualization enables businesses to better utilize server capacity, reduce hardware
costs, and simplify operations.
A Cloud Hypervisor is software that creates and runs virtual machines. Hypervisors are a
crucial part of the technology that makes Cloud Computing Virtualization possible.
Hypervisor in Cloud Computing
Types of Hypervisor –
TYPE-1 Hypervisor: The hypervisor runs directly on the underlying host system. It is
also known as a “Native Hypervisor” or “Bare metal hypervisor”.
It does not require any base server operating system. It has direct access to hardware
resources.
Examples of Type 1 hypervisors include VMware ESXi, Citrix Xen Server, and Microsoft
Hyper-V hypervisor.
Pros of Type-1 Hypervisor: Such kinds of hypervisors are very efficient because they
have direct access to the physical hardware resources (like Cpu, Memory, Network, and
Physical storage). This causes the empowerment of the security because there is nothing
any kind of the third party resource so that attacker couldn’t compromise with anything.
Cons of Type-1 Hypervisor: : One problem with Type-1 hypervisors is that they usually
need a dedicated separate machine to perform their operation and to instruct different
VMs and control the host hardware resources.
Hypervisor in Cloud Computing
TYPE-2 Hypervisor: A Host operating system runs on the underlying host system. It is also
known as ‘Hosted Hypervisor”. Such kind of hypervisors doesn’t run directly over the underlying
hardware rather they run as an application in a physical machine. Basically, the software is installed
on an operating system. Hypervisor asks the operating system to make hardware calls.
An example of a Type 2 hypervisor includes KVM, VirtualBox, and VMware Workstation. The type-2
hypervisor is very useful for engineers, and security analysts for checking malware, or malicious
source code and newly developed applications.
Pros of Type-2 Hypervisor: Such kind of hypervisors allows quick and easy access to a guest
Operating System alongside the host machine running. These hypervisors usually come with
additional useful features for guest machines. Such tools enhance the coordination between the host
machine and the guest machine.
Cons of Type-2 Hypervisor : There is no direct access to the physical hardware resources so the
efficiency of these hypervisors lags in performance as compared to the type-1 hypervisors, and
potential security risks are also there an attacker can compromise the security weakness if there is
access to the host operating system so he can also access the guest operating system.
Hypervisor in Cloud Computing
Type 1 hypervisors offer much better performance than Type 2 ones because there’s no
middle layer, making them the logical choice for mission-critical applications and
workloads.
But that’s not to say that hosted hypervisors don’t have their place – they’re much simpler to
set up, so they’re a good but if, you need to deploy a test environment quickly.
One of the best ways to determine which hypervisor meets your needs is to compare their
performance metrics. These include CPU overhead, the amount of maximum host and guest
memory, and support for virtual processors.
Hypervisor in Cloud Computing
3. Virtual machine performance: Virtual systems should meet or exceed the performance of
their physical counterparts, at least in relation to the applications within each server. Everything
beyond meeting this benchmark is profit.
Hypervisor in Cloud Computing
5. Test for yourself: You can gain basic experience from your existing desktop or laptop. You
can run both VMware vSphere and Microsoft Hyper-V in either VMware Workstation or
VMware Fusion to create a nice virtual learning and testing environment.
Containers Vs Hypervisor
Containers and hypervisors both facilitate sharing physical infrastructure through virtualization, but containers
operate at the application layer while hypervisors work at the hardware layer, allowing multiple operating
systems per server. Here is the following comparison to help you understand better:
Advantage of Hypervisor
In the world of cloud computing, hypervisors act as architects, optimizing resources and promoting flexibility.
Let’s find their advantages, encouraging businesses toward efficiency and adaptability.
Resource Optimization: Hypervisors efficiently manage resources, allowing multiple virtual machines
(VMs) to run on a single physical server. This optimization maximizes server use, reducing costs and energy
consumption.
Flexibility and Scalability: They offer the flexibility to scale resources up or down based on demand. This
flexibility is vital for businesses, as it allows them to adapt to changing needs without investing in additional
hardware.
Isolation and Security: Hypervisors create isolated environments for each VM, preventing issues in one VM
from affecting others. This isolation enhances security by, reducing the risk of data breaches and ensuring a
more stable system.
Hardware Consolidation: By consolidating multiple VMs onto a single server, hypervisors save physical
space and reduce hardware requirements. This consolidation streamlines management and maintenance
efforts.
Testing and Development: They provide a safe playground for testing new software or applications without
impacting the live environment. Developers can experiment without risking the stability of the production
environment.
Disadvantage of Hypervisor
While hypervisors offer immense benefits in cloud computing, they also come with potential drawbacks, from
performance considerations to management complexities. Let’s explore these disadvantages.
Performance Overhead: Running multiple virtual machines on a single physical server can lead to
performance overhead. This additional layer of virtualization may slightly slow down operations compared to
running directly on hardware.
Resource Consumption: While hypervisors optimize resource usage, there’s still a need for sufficient
hardware resources to support multiple virtual machines. This could require an initial investment in hardware.
Complexity in Management: Managing several virtual machines on a single server can become complex. It
requires specialized skills and adds an additional layer of complexity to IT infrastructure management.
Licensing Costs: Depending on the hypervisor and its features, there might be licensing costs involved,
especially for enterprise-level functionalities, adding to the overall expenses.
Single Point of Failure: If the hypervisor itself encounters issues or fails, it can impact all the VMs running
on that server, leading to downtime and potential data loss.
QA - Hypervisor
Installing a virtual machine (VM) involves setting up virtualization software and creating a virtual environment
where you can run another operating system (OS). Here’s a step-by-step guide:
Step 1: Choose a Virtualization Software : Popular options include:
VirtualBox (free, open-source, good for beginners)
VMware Workstation Player (free for personal use, more performance optimization)
Microsoft Hyper-V (built into Windows Pro & Enterprise)
Parallels Desktop (for macOS users)
Step 2: Download and Install Virtualization Software
Download the chosen software from its official website.
VirtualBox
VMware Workstation Player
Run the installer and follow on-screen instructions.
Enable virtualization in BIOS/UEFI if needed (for Intel VT-x or AMD-V).
Step 3: Download an Operating System (OS)
Choose an ISO file of the OS you want to install (e.g., Windows, Linux).
You can download official ISOs from:
Windows: Microsoft
Linux: Ubuntu, Fedora
Installation of VM
Virtual Machine (VM) monitoring services are tools and platforms used to track the performance, availability,
and resource utilization of virtual machines in real-time. These services help administrators detect issues,
optimize resource usage, and ensure smooth operations in virtualized environments.
Key Features of VM Monitoring Services:
Performance Monitoring
Tracks CPU, memory, disk, and network usage of VMs.
Detects performance bottlenecks.
Resource Utilization
Provides insights into VM workload distribution.
Helps optimize resource allocation.
Security Monitoring
Detects unauthorized access or unusual activity.
Monitors vulnerabilities and threats.
VM monitoring services