Virtualization
Cloud Computing
School of Computer Engineering
3
Virtualisation: Concept
virtualization technologies have a long trail in the
history of computer science and have been available in
many flavors by providing virtual environments at the
operating system level, the programming language
level, and the application level
It is a broad concept that refers to the creation of a
virtual version of something, whether hardware, a
software environment, storage, or a network.
Mainly Virtualization means, running multiple operating
systems on a single machine but sharing all the
hardware resources.
And it helps us to provide the pool of IT resources so
that we can share these IT resources in order to get
benefits
Virtualisation: Concept
3
In a virtualized environment there are three major
components: guest, host, and virtualization layer.
The guest represents the system component that
interacts with the virtualization layer rather than
with the host
The host represents the original environment where
the guest is supposed to be managed.
The virtualization layer is responsible for recreating
the same or a different environment where the guest
will operate
Virtualisation in Cloud
3 Computing
Virtualization is a technique, which allows to share
a single physical instance of a resource or an
application among multiple customers and
organizations.
It does by assigning a logical name to a physical
storage and providing a pointer to that physical
resource when demanded.
Virtualization in cloud computing allows you to
run multiple applications and OS on the same
server, thereby providing for efficient resource
utilization and reducing costs.
Virtualization Architecture
4
Virtualization
With the help of Virtualization multiple operating
systems and applications can run on same Machine and
its same hardware at the same time increasing the
utilization and flexibility of hardware.
The machine on which the virtual machine is
going to be build is known as Host Machine
and
that virtual machine is referred as a Guest
Machine.
Virtualization Reference Model
The virtualization model consists of
a host or physical resources in the first layer
virtualization tool in the second layer and
a guest in the third layer
Advantages of Virtualization
Allows any network-enabled device to access any
network application over any network.
Maintains isolation of one workload from another
application to enhance security in the environment.
Virtualization of an application allows users to be
comfortable with different versions of the operating
system.
can support and allow application with multiple
instances to run on various machines concurrently.
Optimizes the use of a single system.
Enhances the reliability or availability of an application
through redundancy.
Server/Compute Virtualization
In cloud computing, it refers to making a virtual edition of a
device or resource, such as a server, storage device, network, or
an operating system where the structure splits the resources as
one or more environments for execution.
The following are the advantages of server/compute
virtualization:
1. Consistency
2. Energy efficiency
3. Enhanced disaster recovery
4. Cost savings
A virtual machine is a reasonable computing system like a
physical machine which governs an application and operating
system (OS).
Server/Compute Virtualization
A virtual machine (VM) can be configured with the
following virtual components:
• Virtual central processing unit (vCPU)
• Virtual random access memory (vRAM)
• Virtual disk
• Virtual network adaptor (vNIC)
• Virtual DVD/CD-ROM and floppy drives
• Virtual SCSI (Small Computer System Interface)
controller
• Virtual USB controllers
• Virtual machine console
Server/Compute Virtualization
Server/Compute Components
The logical components of a server/compute system
comprise the following:
• File system
• Operating system
• Volume manager
• Device drivers
Hypervisor
5
The hypervisor is a firmware or low-level program
that acts as a Virtual Machine Manager(VMM).
Hypervisor is a form of virtualization software
used in Cloud hosting to divide and allocate the
resources on various pieces of hardware.
The program which provide partitioning, isolation
or abstraction is called virtualization hypervisor.
Hypervisor is a hardware virtualization technique
that allows multiple guest operating systems (OS)
to share/run on a single host system at the same
time.
Hypervisor Taxonomy
Hypervisor is a compute virtualization software
which facilitates manifold operating systems to
operate on physical machines simultaneously.
The hypervisor is the main constituent of the data
center consolidation.
Hypervisor has two main constituents—virtual
machine monitor (VMM) and kernel.
There are two types of hypervisor:
Type 1 and Type 2
Types of Hypervisors
6
Type 1 hypervisors run directly on the
system hardware. It dose not require any base
server operating system. It has direct access to
hardware resources
Type 2 hypervisors run on a host operating
system that provides virtualization services,
such as I/O device and memory management.
Basically a software installed on an operating
system.
Type-1 Hypervisor
7
Hypervisors
Features of Type-1 and 2 Hypervisor
9
Type-1 Hypervisor:
provides better performance
provides greater flexibility
Servers that run Type 1 hypervisors are often single-purpose servers
that offer no other function.
Type 1 hypervisors are production hypervisors or hypervisors that run
VMs offering services to users.
support hardware virtualization.
Type-2 Hypervisor:
Less efficient
Less flexible
offer a series of different services.
rarely used in production.
perform software virtualization.
Virtualization
Types of Virtualization
11
Hardware Virtualization
Software Virtualization
Memory Virtualization
Storage Virtualization
Data Virtualization
Network Virtualization
Desktop Virtualization
Application Virtualization
Hardware Virtualization
12
Hardware virtualization also known as server virtualization runs on
the concept that an individual independent segment of hardware or
a physical server, may be made up of multiple smaller segments of
hardware or servers, essentially consolidating multiple servers into
virtual servers that run on a single primary physical server.
In hardware virtualization, software called hypervisor is used. With
the help of hypervisor virtual machine, software embedded into
the hardware component of the server. The work of hypervisor is
that it manages the physical hardware resource which is shared
between the customer and the provider.
Hardware Virtualization
12
When the virtual machine software or virtual machine
manager (VMM) is directly installed on the hardware
system is known as hardware virtualization.
The main job of hypervisor
is to control and monitoring the processor, memory and other
hardware resources.
After virtualization of hardware system we can install different
operating system on it and run different applications on those OS.
Usage:Hardware virtualization is mainly done for the server
platforms, because controlling virtual machines is much easier than
controlling a physical server.
Server Virtualization
When the virtual machine software or virtual machine
manager (VMM) is directly installed on the Server
system is known as server virtualization.
Usage:
Server virtualization is done because a single physical server
can be divided into multiple servers on the demand basis and
for balancing the load.
Hardware
13
Virtualization:
Subtype
Full Virtualizations–
• The underlying hardware is fully simulated.
• Guest software does not require any modifications.
Para-virtualization –
• The hardware is not simulated instead the guest
software run their own isolated domains.
Emulation Virtualization –
• The virtual machine simulates the hardware and
becomes independent of it.
• Guest software does not require any modifications.
Full virtualization
Full virtualization is a common and cost-effective type
of virtualization, which is basically a method by which
computer service requests are separated from the
physical hardware that facilitates them.
With full virtualization, operating systems and their
hosted software are run on top of virtual hardware.
It differs from other forms of virtualization (like
paravirtualization and hardware-assisted virtualization)
in its total isolation of guest operating systems from
their hosts.
Full virtualization
Full virtualization is fulfilled by
the use of both binary
translation and direct execution.
In full virtualization, guest OS
is completely isolated by the
virtual machine from the
virtualization layer and
hardware.
Microsoft and Parallels systems
are examples of full
virtualization..
Para virtualization
In para virtualization, the hardware is not simulated
the guest software runs its isolated system.
It is not necessary to simulate the hardware, but it
utilizes an API which modifies the guest operating
system.
Para-virtualization
Paravirtualization is the
category of CPU virtualization
which uses hypercalls for
operations to handle
instructions at compile time.
In paravirtualization, guest OS
is not completely isolated but
it is partially isolated by the
virtual machine from the
virtualization layer and
hardware.
VMware and Xen are some
examples of
paravirtualization..
Emulation virtualization
In emulation virtualization, hardware is simulated by
the virtual machine and it is independent.
Here, the guest operating system does not require any
other modification.
In this virtualizations, computer hardware as
architectural support builds and manages a fully
virtualized VM.
Full Virtualization Vrs.
Paravirtualization
1. virtual machines permit the 1. a virtual machine does not
execution of the instructions with implement full isolation of OS but
the running of unmodified OS in rather provides a different API which
an entirely isolated is utilized when OS is subjected to
alteration.
2. Full Virtualization is less secure 2. PV is more secure than the FV
3. FV uses binary translation and a 3. PV uses hypercalls at compile time
direct approach as a technique for for operations
operations.
4. FV is slow than PV in operation 4. PV is faster in operation as
compared to FV
5. FV is more portable and 5. Paravirtualization is less portable
compatible and compatible
6. Examples of full virtualization 6. Examples of paravirtualization are
are Microsoft and Parallels Microsoft Hyper-V, Citrix Xen, etc.
systems.
Full Virtualization Vrs.
Paravirtualization 7. The guest operating system
7. It supports all guest
operating systems without has to be modified and only a
modification. few operating systems support
it.
8. The guest operating system 8. Using the drivers, the guest
will issue hardware calls. operating system will directly
communicate with the
9. It is less streamlined hypervisor
compared to para-
virtualization. 9. It is more streamlined.
10. It provides the best isolation
10.It provides less isolation
compared to full virtualization.
Hardware
14
Virtualization:
Subtypes
Full Virtualization Para Virtualization Emulation
Software Virtualization
15
• Software Virtualization involves the
creation and operation of multiple virtual
environments on the host machine.
• It is used to enable a complete computer
system in order to allow the guest operating
system to run.
• For instance, letting LINUX OS to run as a
guest that is natively using a Microsoft
Windows OS.
Software
16
Virtualization :Subtypes
Operating System Virtualization –
hosting multiple OS on the
native OS
Application Virtualization –
hosting individual applications
in a virtual environment separate from the native
OS
Service Virtualization –
hosting specific services
related to a particular application.
Operating System
16 Virtualization
Operating System Virtualization –
hosting multiple OS on the
native OS
When the virtual machine software or virtual
machine manager (VMM) is installed on the
Host operating system instead of directly on the
hardware system is known as operating system
virtualization.
Usage:
Operating System Virtualization is mainly used for
testing the applications on different platforms of OS.
Memory Virtualization
17
•P hy s i c a l m e m o r y a c ro s s d i ff e r e n t s e r ve r s i s aggregated
into a single virtualized memory pool.
•It provides the benefit of an enlarged contiguous working
memory.
•For instance, as some OS such as Microsoft Windows OS
allows a portion of your storage disk to serve as an extension of
your RAM.
Memory Virtualization:
18
Subtypes
Application-level control – Applications access the
memory pool directly.
Operating system level control – Access to the
memory pool is provided through an operating
system.
Storage Virtualization
•19
•Multiple physical storage devices are
grouped together, which then appear as a single
storage device.
•This provides various advantages such as
homogenization of storage across storage devices
of multiple capacity and speeds, reduced downtime,
load balancing and better optim izatio n of
performance and speed.
•Partitioning your hard drive into multiple
partitions is an example of this virtualization.
Storage Virtualization
•19
•Storage virtualization is the process of grouping
the physical storage from multiple network storage
devices so that it looks like a single storage device.
•Storage virtualization is also implemented by
using software applications.
•Usage:
•Storage virtualization is mainly done for back-
up and recovery purposes.
Storage Virtualization:
Subtypes 20
1. Block
Virtualization –
Virtualisation on block
level means that
storage capacity is
made available to the
operating system or
the applications in the
form of virtual disks.
Storage Virtualization:
Subtypes
2. File Virtualization
Virtualisation on file level
means that the
virtualisation entity
provides virtual storage to
the operating systems or
applications in the form of
files and directories
Data Virtualization
1
•It lets us to easily
manipulate data, as the
data is pr es e nt ed as
an ab s tract l ayer
co m pl etel y
independent of data
structure and
database systems.
•Decreases data input and
formatting errors.
Network Virtualization
22
In network virtualization, multiple sub-networks
can be created on the same physical network,
which may or may not is authorized to
communicate with each other.
This enables restriction of file movement across
networks and enhances security, and
allows better monitoring and identification of data
usage.
It also increases reliability as a disruption in one
network doesn’t affect other networks, and the
diagnosis is easier.
Exploring Network Virtualization
In network virtualization, multiple virtual networks run
with the help of a physical
network as shown in Fig.
Network virtualization comprises
rationally grouping and segmenting
physical network(s) into distinct rational
units known as ‘virtual network(s)’ and
forming them to act as one or multiple
separate network(s).
It permits multiple virtual networks to
share network resources.
Exploring Network Virtualization
In virtual data center (VDC), network virtualization comprises
virtualization of both VM and physical networks.
The physical network may consist of network routers, hubs, switches,
repeaters, adapters, and bridges.
A VM network exists within a physical server.
A computer on which a hypervisor runs one or more virtual machines
is called a host machine, and each virtual machine is called a guest
machine.
Network virtualization permits a manager to construct multiple
virtual networks in the data center (DC).
A virtual network offers alignment of all the nodes which belong to a
similar working unit in an enterprise.
Benefits of Network Virtualization
Reduction of hardware expense
Energy expenses
Recoverability
Disaster recuperation
Features of Network Components
Virtual Switches
Virtual LAN
Virtual Switches:
Virtual switches act as an interface between virtual
ethernet and the physical ethernet. Virtual switches
develop VM network and support the ethernet protocol .
They manage storage, administration, and VM migration
traffic to and from the hypervisor kernel.
A virtual switch can have multiple port groups.
Features of Network Components
The IBM system Networking Distributed Virtual
Switch 5000V is a superior, feature rich distributed
virtual switch for VMware environments along
with policy-based VM associatively. The IBM
Distributed Virtual Switch (DVS) 5000V allows
network managers accustomed with IBM System.
Features of Network Components
Virtual LAN allows one to have separate LANs among ports on the same switch.
VLAN trunking allows traffic from multiple VLANs to traverse a single network
connection.
VLAN membership can be defined in several ways:
(a) Port-based
(b) Protocol-based
(c) MAC-layer grouping
(d) Network-layer grouping
(e) Multicast grouping
(f) Policy grouping
Network
23
Virtualization :Subtypes
Internal network:
Enables a single system to
function like a network
External network:
Consolidation of
multiple networks
into a single one, or
segregation of a
single network into
multiple ones
Desktop Virtualization
•24
•This is perh a p s t h e m o s t c o m m o n f o r m
o f virtualization for any regular IT employee.
•The user’s desktop is stored on a remote server,
allowing the user to access his desktop from any
device or location.
•Employees can work conveniently from the
comfort of their home. Since the data transfer takes
place over secure protocols, any risk of data theft is
minimized.
Desktop virtualization
Desktop virtualization is actually a type of illusion provided to the user using
different techniques.
It involves encapsulating and delivering either access to an entire information
system environment or the environment itself to a remote client device.
For IT organizations, desktop administration is expensive, manual, and time-
consuming.
As compared to desktop virtualization, server virtualization makes datacenters
more quick and effective by advanced levels of accessibility, quicker application
delivery, and enhanced utilization.
Desktop Virtualization
Desktop virtualization is a type of software technology used to
separate the desktop and its connected application software from the
physical device used by the client.
Remote desktop virtualization works in a manner similar to client–
server model in which applications can be executed on any remote
desktop with different operating systems and with the help of the
protocol of remote display, a user can interact with the application as
shown in Fig. 8.1.
In a virtualized desktop, virtualization breaks the connection between
hardware and the elements facilitate the IT staff to alter, update, and
organize these elements independently for greater business quickness
and improved response time.
Desktop Virtualization
Advantages of Desktop
Virtualization
Simpler provisioning of new desktops
Installation of new applications at cheap rates
Desktop image-management capabilities
Increased data security
Longer time given for customer desktop infrastructure
Protected reserved access to a business’ desktop settings
Advantages of Desktop
Virtualization
Facilitation of thin clients
Improved security
Better business continuity and disaster recovery
Abridged PC repairs
Suppleness of access
Improved deployment and management
Features of Desktop Virtualization
Drivers
Reduction in cost of desktops
Reduction in management cost of desktop
Easy setting of desktops
Reduced cost to refresh desktops
Techniques used for Desktop
Virtualization
The two desktop virtualization techniques basically used
for providing services to users are as follows:
• Remote desktop services (RDS)
• Virtual desktop infrastructure (VDI)
VDI and RDS are designed for providing services to users as
per their requirement.
Differences between RDS and VDI
Remote Desktop Services
Remote desktop services (RDS) is customarily called
terminal services. It is a blanket term for characteristics of
Microsoft Windows server which permits consumers to
distantly access Windows applications and graphical
desktops.
The advantages of RDS are as follows:
Data recovery in tragedy
Operation from anyplace
Economical
Remote Desktop Services
The disadvantages of RDS are as follows:
Requirement of powerful RDS
Requirement of RDS monitoring
Requirement of reliable network
Requirement of right adjustment in network
Knowledgeable administrator
Virtual Desktop Infrastructure
Virtual desktop infrastructure (VDI) refers to the hosting of
a desktop OS running in a VM on a server in the virtual
data center (VDC).
VDI allows a user to access a remote desktop environment
from an endpoint device via a remote desktop delivery
protocol.
The VDI architecture consists of several components that
work together to provide an end-to-end solution.
Virtual Desktop Infrastructure
Advantages of VDI are:
Low price in buying desktop computers
Centralized client operating system management
Swift client implementation
Reduction in the costs of desktop
Reduction in the cost of electricity
Enhanced security of data
Protected remote access
Lesser applications compatibility troubles
Virtual Desktop Infrastructure
Disadvantages of VDI are:
Printing normally involves third-party appends
Scanning is natively unsupported
Bi-directional audio is natively unsupported
Exhibit protocols are unsuitable for graphic design
Needs low-latency association between the virtual
infrastructure and customer
Needs enterprise class server hardware and storage areas
network for VMs permanently delivered to particular users
Needs trained IT staff
Components for Desktop
Virtualization
The VDI architecture consists of several components that
work together to
provide an end-to-end solution. The main components
are:
• Endpoint devices
• A connection broker
• VM hosting
Application Virtualization
Application Virtualization technology offers skills to
install applications without altering or making any variation
to the file system, underlying OS, or registry of the
computing platform in which they are installed as shown in
Figure
© Oxford University Press 2018. All rights reserved
Application Virtualization
Technology categories that fall under application
virtualization include the following:
• Streaming of application: Before startup, rather than
delivering the whole application, portions of the
application’s code, settings, and data are delivered
according to their requirement.
• VDI or desktop virtualization: The application is
introduced in blade PC or VM which also comprises the
operating system (OS). This makes management of
infrastructure and formation of virtual desktops easy to
grant access of virtual desktops. VDI may normally fill up
the gaps wherever applications’ streaming fails.
Application Virtualization
Advantages of Application Virtualization:
Improved workload management
Reduced hardware cost
Increased flexibility for working remotely
Simplified application deployment: Applications are never
installed on to an operating System; hence the deployment
of the applications is greatly simplified. Furthermore,
complete removal of all application bits from a PC during
retirement is assured.
Application Virtualization
Simplified operating system image management: Since
applications are completely different from the OS,
managing OS images is simpler, especially during OS
patches and upgrades. It helps to create a more dynamic
desktop environment, in which the desktop is an
aggregation of separately managed components.
Elimination of resource conflicts: Since each application
has its own virtual OS resources, resource and application
conflict issues are eliminated.
Application Virtualization
Limitations of Application Virtualization:
All software cannot be virtualized. For example,
applications that require a device driver or 16-bit
applications that require shared memory space cannot be
virtualized.
Some types of software cannot be virtualized, such as anti-
virus packages and applications that require heavy OS
integration.
Tools used for Application
Virtualization
The tools for application virtualization include:
Microsoft Application Virtualization (App-V)
VMWare ThinApp
Flexera Software Supporting Application Virtualization
Types of Virtualization: At
25
a Glanc
e
Benefits of Virtualization
26
Easily outsource your hardware and eliminate any energy
costs associated with its operation.
the efficiency, security and cost advantages.
Run operating systems where the physical
hardware is unavailable.
Easier to create new machines, backup machines, etc.
Software testing using “clean” installs of operating systems
and software
Emulate more machines than are physically available.
Timeshare lightly loaded systems on one host.
Easy migration of virtual machines (shutdown needed or not).
Storage Area Network
Storage area network (SAN) refers to the LAN design for
managing huge amounts of data transfer.
It uses interconnection technology for supporting data storage,
retrieval, and replication. NAS works on TCP/IP, whereas SAN for
disk blocks transformation works on low-level network protocols.
Storage area networks are actually designed for data
management. It is a rapid storage device network and can be
connected with servers.
SAN is helpful for transferring data from one storage device to
another without disturbing other devices.
SAN also supports fast backup as CPU cycles of server are not
involved in the backup process. At the time of recovery, SAN plays
an important role.
Storage Area Network
Network Attached Storage
Network-attached storage (NAS) is actually a dedicated
file storage device for providing local area network
nodes with file-based shared storage using a standard
ethernet connection.
NAS has its own IP address and each NAS exists on the
LAN as an independent network node.
Some examples of NAS devices include Seagate Central, Seagate
Business Storage NAS, and 8-Bay Rackmounts. All NAS products
provide a secure and centralized location for the files.
Accessing of NAS system storage data is easy—it can be
accessed from anywhere, whether one is in own house, on
another computer, or through mobile, Wi-fi technology, etc.
Network Attached Storage
NAS has the following benefits:
Broad access to information
Better efficiency
Better flexibility
Centralized storage
Simplified management
Scalability
High availability
Security
Network Attached Storage
NAS has the following components:
NAS head (CPU and memory)
Network interface cards (NICs) for providing connectivity
Operating system for handling NAS functionality
Network file system (NFS) and common Internet file system (CIFS)
protocols for file sharing. NFS mainly supports UNIX-based
operating environments, whereas CIFS is supported by Microsoft
Windows-based operating environments. Supported file sharing
protocols facilitate users to share files with different operating
platforms.
Storage protocols to connect and manage physical disk resources
Storage array
Comparison between SAN and NAS:
Comparison between SAN and NAS:
• Storage area network (SAN) supports
networking, whereas network-attached
storage (NAS) is a storage device, in a
network.
• Operating systems consider SAN as a
disk, whereas a NAS device is a file
server.
• SAN supports block-level storage for
servers, whereas NAS devices support
file-level storage. For saving files such
as word documents or MS Excel
spreadsheets, NAS is generally used.