0% found this document useful (0 votes)
28 views25 pages

Virtualization

Virtualization allows multiple operating systems and applications to run on the same machine concurrently by sharing hardware resources. It provides benefits like efficient resource allocation, lower costs, high availability, and remote access. The document discusses virtualization concepts like virtual machines, hypervisors, and different types of virtualization architectures and levels of implementation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views25 pages

Virtualization

Virtualization allows multiple operating systems and applications to run on the same machine concurrently by sharing hardware resources. It provides benefits like efficient resource allocation, lower costs, high availability, and remote access. The document discusses virtualization concepts like virtual machines, hypervisors, and different types of virtualization architectures and levels of implementation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 25

Virtualization

• Virtualization is the "creation of a virtual version of something, such


as a server, a desktop, a storage device, an operating system or network
resources".
• Shared resources, also known as network resources, refer to computer
data, information, or hardware devices that can be easily accessed from
a remote computer through a local area network.
• With the help of Virtualization, multiple operating systems and
applications can run on same Machine and its same hardware at the
same time increasing the utilization and flexibility of hardware.
Virtualization
• Virtualization is a technique, which allows to share a single physical
instance of a resource or an application among multiple customers and
organizations at one time.
• It does by assigning a logical name to a physical storage and providing a
pointer to that physical resource on demand.
• Hardware virtualization, which plays a fundamental role in efficiently
delivering Infrastructure-as-a-Service (IaaS) solutions for cloud computing.
• Virtualization technologies provide a virtual environment for not only
executing applications but also for storage, memory, and networking.
• The machine on which the virtual machine is going to be build is known as
Host Machine and that virtual machine is referred as a Guest Machine.
BENEFITS OF VIRTUALIZATION

1.More flexible and efficient allocation of resources.


2.Enhance development productivity.
3.It lowers the cost of IT infrastructure.
4.Remote access and rapid scalability.
5.High availability and disaster recovery.
6.Pay per use of the IT infrastructure on demand.
7.Enables running multiple operating system.
Virtualization Terminologies
1. Virtual Machine (VM)
2. Virtual server.
3. Virtual desktop.
4. Hypervisor.
5. Host system.
6. Guest system.
7. Virtual Infrastructure.
8. P2V.
9. Snapshot
10. Clone
1. Virtual Machine (VM)
virtual representation of the computer on your desk.
It can do everything a physical machine does, only everything is virtual and usually
delivered over a network connection.
VMs are software based, you can often run more than one VM on the same physical
machine.
Eg: two separate versions of Windows running at the same time or running a different
operating system.
2.Virtual Server
• A server, that is running in a virtual environment.
• A common setup many offices employ is to have one physical server on premise.
• This server then hosts separate virtual servers that in turn host different services like
email, networking, storage, etc..

3.Virtual Desktop
• a virtually delivered version of an operating system like Windows, Linux etc..
• For example, if you own a Mac and need to access a Windows only program, one
solution is to use a virtual version of Windows.
4. Hypervisor
• The hypervisor is essentially a small operating system that enables virtualization.
• Its job is to take physical hardware resources and combine them into a platform that is then
delivered virtually to one, or many different users.

5. Host machine and Guest machine


A computer on which a hypervisor runs one or more virtual machines is called a host
machine, and each virtual machine is called a guest machine.

7. Virtual Infrastructure
• Combine a bunch of different types of VMs together into one solution, including hardware,
storage, desktops, and servers you create a virtual infrastructure.
8. P2V
• P2V, or Physical to Virtual, is a term used by IT experts to refer to the act of migrating a physical
system to a virtual one.
• example of P2V is the merging of physical servers into a virtual environment that is hosted on one
server.

9. Snapshot
• A snapshot is an image of the state of the virtual machine at a specific point of time.
• This includes all of the data, configurations, programs open at that time.
• like the Save button – it saves your progress.
• Snapshots are also kept in case something goes wrong with the VM. You can easily revert back to an
older snapshot, one that was taken before the problem.

10. Clone
The action of taking one VM and creating an exact copy that can then be used by another computer or
user.
Virtualization Architectures
• A hypervisor is a hardware virtualization technique that allows multiple guest
operating systems (OS) to run on a single host system at the same time. A
hypervisor is also known as a virtual machine manager (VMM).

Types of Hypervisor
1. TYPE-1 Hypervisor-Native Hypervisor or Bare metal hypervisor
2. TYPE-2 Hypervisor-Hosted Hypervisor
TYPE-1 Hypervisor

• In Type 1, the hypervisor run directly on the hardware platform.


• It is also known as “Native Hypervisor” or “Bare metal hypervisor”.
• It dose not require any base server operating system.
• It has direct access to hardware resources.

• providing excellent performance and stability since it does not run inside Windows or any other
operating system.
• The guest OS is not aware that it is not running on real hardware and does not require any
modification.
• It requires only resources from the host machine.
• The hypervisor or VMM coordinates instructions between the guest and the host CPU.
Examples of Type 1 hypervisors include VMware ESXi, Citrix XenServer and Microsoft Hyper-V
hypervisor
Advantage of type 1:
• If a single virtual machine crash, it does not affect the rest of the guest operation
system. Since they can directly communicate with hardware resources, they are much
faster and secure than type 2 hypervisor.
TYPE-2 Hypervisor:
• A Host operating system runs on underlying host system.
• It is also known as ‘Hosted Hypervisor”.
• A software installed on an operating system (Windows, Linux, MacOS).
• Hypervisor asks operating system to make hardware calls.
• Type 2 or hosted hypervisor resides on top of the host OS. The hypervisor simply runs
as an application on the host OS and the OS takes care of all the hardware
• Example of Type 2 hypervisor include VMware Player
Disadvantage of type 2:
• Since type 2 hypervisors cannot directly communicate with the hardware, they are
less efficient than the type 1.
• They have more points of failure since anything that affect the stability of the base
operating system can also affect the guest OS and the virtual machine.
• When the base OS needs a reboot, all the VM will also be rebooted.
Implementation Levels of Virtualization
• Virtualization is a computer architecture technology by which multiple virtual
machines (VMs) are multiplexed in the same hardware machine.
• The purpose of a VM is to enhance resource sharing by many users and improve
computer performance in terms of resource utilization and application flexibility.
Virtualization can be implemented at various operational levels,
• Instruction set architecture (ISA) level
• Hardware level
• Operating system level
• Library support level
• Application level
• A traditional computer runs with a host operating system specially tailored for its
hardware architecture.
• After virtualization, different user applications managed by their own operating
systems (guest OS) can run on the same hardware, independent of the host OS. This is
done by adding additional software called a virtualization layer.
Instruction Set Architecture Level

• At the ISA level, virtualization is performed by emulating a given ISA by the ISA of the host machine.
• For example, MIPS binary code can run on an x86-based host machine with the help of ISA emulation.
• With this approach, it is possible to run a large amount of legacy binary code written for various
processors on any given new hardware host machine.
• Instruction set emulation leads to virtual ISAs created on any hardware machine.
• The basic emulation method is through code interpretation.
• An interpreter program interprets the source instructions to target instructions one by one.
• One source instruction may require tens or hundreds of native target instructions to perform its
function.
• Obviously, this process is relatively slow. For better performance, dynamic binary translation is
desired.
• This approach translates basic blocks of dynamic source instructions to target instructions.
• The basic blocks can also be extended to program traces or super blocks to increase translation
efficiency.
• Instruction set emulation requires binary translation and optimization.
• A virtual instruction set architecture (V-ISA) thus requires adding a processor-specific software
translation layer to the compiler.
Hardware Abstraction Level
• Hardware-level virtualization is performed right on top of the bare hardware.
• on the one hand, this approach generates a virtual hardware environment for a VM.
• On the other hand, the process manages the underlying hardware through
virtualization.
• The idea is to virtualize a computer’s resources, such as its processors, memory, and
I/O devices.
• The intention is to upgrade the hardware utilization rate by multiple users
concurrently.
• The idea was implemented in the IBM VM/370 in the 1960s.
• More recently, the Xen hypervisor has been applied to virtualize x86-based machines
to run Linux or other guest OS applications.
Operating System Level
• This refers to an abstraction layer between traditional OS and user applications.
• OS-level virtualization creates isolated containers on a single physical server and
the OS instances to utilize the hardware and software in data centers.
• The containers behave like real servers.
• OS-level virtualization is commonly used in creating virtual hosting environments
to allocate hardware resources among a large number of mutually distrusting users.
• It is also used, to a lesser extent, in consolidating server hardware by moving
services on separate hosts into containers or VMs on one server.
Library Support Level Virtualization
• Most applications use APIs exported by user-level libraries rather than using lengthy
system calls by the OS.
• Since most systems provide well-documented APIs, such an interface becomes
another candidate for virtualization.
• Virtualization with library interfaces is possible by controlling the communication
link between applications and the rest of a system through API hooks.
• The software tool WINE has implemented this approach to support Windows
applications on top of UNIX hosts.
• Another example is the vCUDA which allows applications executing within VMs to
leverage GPU hardware acceleration.
User-Application Level

• Virtualization at the application level virtualizes an application as a VM.


• On a traditional OS, an application often runs as a process.
• Therefore, application-level virtualization is also known as process-level virtualization.
• The most popular approach is to deploy high level language (HLL)
• In this scenario, the virtualization layer sits as an application program on top of the operating system, and the
layer exports an abstraction of a VM that can run programs written and compiled to a particular abstract
machine definition.
• Any program written in the HLL and compiled for this VM will be able to run on it.
• The Microsoft .NET CLR and Java Virtual Machine (JVM) are two good examples of this class of VM.
• Other forms of application-level virtualization are known as application isolation, application sandboxing, or
application streaming.
• The process involves wrapping the application in a layer that is isolated from the host OS and other
applications.
• The result is an application that is much easier to distribute and remove from user workstations.
• An example is the LANDesk application virtuali-zation platform which deploys software applications as self-
contained, executable files in an isolated environment without requiring installation, system modifications, or
elevated security privileges.
Server virtualization
Levels of virtualization
ApplicationVirtualization:
• Application virtualization helps user to have a remote access of an application from a
server.
• The server stores all personal information and other characteristics of the application, but
can still run on a local workstation through internet.
• Example : User who needs to run two different versions of the same software.
NetworkVirtualization:

• The ability to run multiple virtual networks that each has a separate control and data plan.
• Network virtualization provides a facility to create and provision virtual networks—logical
switches, routers, firewalls, load balancer, Virtual Private Network (VPN), and workload
security within days or even in weeks
Virtual networking
• data communication between two or more virtual machines (VM).
• provides interconnection between VMs, virtual servers and other related components in
a virtualized computing environment.
DesktopVirtualization:
• Desktop virtualization allows the users’ OS to be remotely stored on a server in the data
center.
• It allows the user to access their desktop virtually, from any location by different machine.
• Users who wants specific operating systems other than Windows Server will need to have a
virtual desktop.
benefits of desktop virtualization
user mobility, portability, easy management of software installation, and updates.

StorageVirtualization:

• Storage virtualization is an array of servers (use of multiple servers to provide the same
service in such a way that service will still be available if the servers fails ) that are managed
by a virtual storage system.
• It makes managing storage from multiple sources to be managed and utilized as a single
repository.
Software Virtualization
• Virtualized software is an application that will be "installed" into its
own self-contained unit.
• Example of software virtualization is VMware software, virtual box
etc.
• A VirtualBox (VB) is a software virtualization package that installs on
an operating system as an application. VirtualBox allows additional
operating systems to be installed on it, as a Guest OS, and run in a
virtual environment.

You might also like