CLOUD
VIRTUALIZATION
TECHNOLOGY
MODULE 3
Introduction
• Virtualization is the founding concepts behind the successful adoption
of cloud computing.
• It helps to utilize the full capabilities of the resources.
• On-demand, virtual resources can be provided to the users.
Understanding Virtualization
• With the expansion of computing, Internet and the latest Mobile
technology, the term ”Virtual” has become popular.
• Examples:
• Shopping online on Virtual Stores.
• Virtual guides create virtual tours based on budget and time.
• Download and store videos/songs in our personalized library.
Understanding Virtualization
• Virtualization is a technology that helps us to create a logical/virtual
object of an actual physical object.
• It involves distribution of capabilities of a physical machine among the
users.
• Resources:
• Operating System, Storage, Network.
• Enables optimised usage of resources and ultimately reduces various
costs like license purchase, infrastructural setup.
Working of Virtualization
• A guest OS/application/data storage is separated from the underlying
software or hardware.
• Uses a software layer called Hypervisor.
• Hypervisor emulates the underlying hardware.
• Hypervisors take the physical resources and separates the resources.
• They are installed directly on the hardware.
• Ex: Xen, VMware.
Virtualization
• The main focus of the virtualization is to increase the utilization of
underlying hardware resources to its maximum capacity.
• Results in decreased hardware costs by running multiple virtualized instances
in one physical machine.
• Running an application in virtual mode requires exclusive access to
the processor.
• The task of operating system is to implement abstraction and make
sure there is no interference between applications.
Virtualization Terminology
• Virtual Machine (VM)
• The VM is essentially a virtual representation of the computer/resource.
• It can do everything a physical machine does.
• It is virtual and delivered over a network.
• VMs are software based and can often run more than one VM on the same
physical machine.
• Ex: Two version of windows running at the same time, or a different
operating systems (Linux on Windows, Windows on MacBook)
Virtualization Terminology
• Virtual Server
• A VM that acts as a server.
• This server runs in virtual environment.
• Companies maintain servers on-premise and host virtual machines in
traditional approach.
• Virtual Server is hosted over the internet and acts like a traditional
server.
Virtualization Terminology
• Hypervisor
• Small OS that enables Virtualization
• Its job is to take the physical hardware resources and combine them into a
platform.
• Then it is delivered virtually to one or many different users.
Virtualization Terminology
• Host system
• Also referred as parent, where the physical hardware and software is
installed.
• These components are then copied by the hypervisor and delivered in a
virtual state to the user.
• Guest system
• Also referred as child, where the VM is accessed.
• User interact with the VM under the impression, it is communicating with the
hardware.
• Guest system is virtual.
Virtualization Terminology
• Virtual Infrastructure
• When a different types of VMs are combined together into one solution,
including hardware, storage, desktops, and servers then, it becomes a virtual
infrastructure.
• This solution can be deployed into businesses.
• Clone
• The action of taking one VM and creating an exact copy and using it by
another user or computer.
Hypervisor
• Two types of Hypervisors
• Type 1 Hypervisor (Bare-metal or Native)
• Type 2 Hypervisor
• Type 1 Hypervisor: Runs directly on the host’s hardware.
• Type2 Hypervisor: Runs as a software layer on an OS.
• Most commonly used Hypervisor is Type 1.
Privilege Levels
• Running an application needs an access to the processor.
• OS system, implements an abstraction between these applications to
avoid interference.
• This is achieved by maintaining Privilege Levels or Protection Rings.
• Use of these levels provide logical space and permissions required for
execution.
Privilege Levels or Protection Rings
Rings/Levels
• Ring 0 or Level 0:
• It is the most privileged level.
• Code running in this level is in kernel mode.
• Processes running in kernel mode can affect the entire system.
• If anything fails here, it will probably result in a system shutdown.
• This ring has direct access to the CPU and system memory.
Rings/Levels
• Ring 2 and Ring 3:
• Device drivers are maintained and updated at this level.
• Ring3:
• It is the least privileged ring.
• Any code running here will be in user mode.
• Most applications on the computer will be running in this ring.
• This ring has no direct access to the CPU or Memory.
• To execute anything, the instructions are passed to Ring 0
Techniques of Virtualization
• Categorized into three types:
• Full virtualization
• Para Virtualization
• Hardware assisted Virtualization.
Full Virtualization
• Primary hardware is replicated and made available to the guest OS.
• The guest OS is unaware that it is being virtualized.
• Each virtual machine and its guest OS operate as independent
computers.
• Effects performance of the system.
Para Virtualization
• Hypervisor is installed on the device.
• Then the guest OS is installed into the environment.
• Guest OS communicates with hypervisor using API calls.
• OS assisted Virtualization.
Hardware Assisted Virtualization
• It is a virtualization approach that provides full virtualization using
hardware capabilities.
• It is introduced by Intel and AMD.
• It includes embedding VM into the hardware component of a server.
• Aggregates small physical servers into one large physical server and
use the processor effectively.
Types of Virtualization
• Application Virtualization
• Desktop Virtualization
• Server Virtualization
• Storage Virtualization
• Network Virtualization
Application Virtualization
Application Virtualization
• App virtualization is a technology that allows users to access and use
an application virtually without any installation.
• The most common way to implement application virtualization is
server-based approach.
• Ex: Microsoft App-v, Citrix Virtual apps.
Benefits
• Enables the users to run applications that aren’t native to their
devices.
• Ex: Running Microsoft word on Linux .
• Enables to run remote applications.
• Enhances security by storing data on the server instead of the client.
• Simplifying administration by centralizing application management
and maintenance.
• No installation or maintenance required.
Desktop Virtualization
• It is a technology that lets the users to simulate a desktop.
• It can be either locally or remotely.
• Remote desktop virtualization is implemented through client-server
approach.
Desktop Virtualization Statistics
Benefits
• Resource utilization
• Remote work enablement
• Security
• Simpler administration
• Cost savings
• Supports a broad variety of device types
• Better end-user experience.
Server Virtualization
• It is the process of restructuring a single server into multiple small and
isolated virtual servers.
• Each of these servers is capable of running independently.
• A single server can only use one OS dedicated to a single machine.
• When this server is virtualized, it is transformed into multiple virtual
servers which run on different OS.
• It can be virtualized in Full, Para or Hardware assisted mode.
Server Virtualization
Server Virtualization Statistics
Benefits
• Minimize costs
• Faster server provisioning and deployment
• Energy savings
• Eliminates server complexity
Storage Virtualization
• It is a process of grouping the physical storage from multiple network
storage devices into a single storage device.
• It is managed centrally.
• It allows the system to participate in Storage Area Networks (SANs).
Storage Virtualization
Benefits
• Automated management
• Reduced downtime
• Expansion of storage capacity
• Easier updates
• Enhanced backup, archival and recovery processes.
Storage Virtualization
Network Virtualization
• It is a process of combining the available resources in a network and
splitting up the available bandwidth in to channels.
• Each channel is independent .
• It helps in improving the productivity and efficiency.
• Uses tools such as switches, adapters to combine one or more
networks into virtual units.
Network Virtualization
Overall Statistics of Virtualization
Virtualization using Lego Blocks
THANK YOU