SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
VIRTUALIZATION
TECHNOLOGY
INTRODUCTION
Virtualization is technology that allows you to create multiple simulated environments or
dedicated resources from a single, physical hardware system.
Creation of a virtual -- rather than actual -- version of something, such as an operating
system, a server, a storage device or network resources.
VIRTUALIZATION
Virtualization refers to Abstraction of the computer resources.
It refers to creation of a virtual resources such as server, file or network
CONCEPT OF VIRTUALIZATION
Virtualization describes a technology in which an application, guest operating
system or data storage is abstracted away from the true underlying hardware or
software.
A great example of how virtualization works in your daily life is the separation of your hard drive
into different parts. It started as the ability to run multiple operating systems on one hardware set
and now it is a vital part of testing and cloud-based computing.
WHY?
❏ Isolation among users
❏ Resource sharing
❏ Dynamical resources
❏ Aggregation of resources
IS IT SECURE?
► Virtualization is an elegant solution to many common security problems.
► In a development environment, each developer can have their own sandbox,
immune from another developer’s rogue or runaway code.
► When VMs and applications are properly isolated, only one application on one OS is
affected by an attack.
HOW IT WORKS?
● Virtualization software makes it possible to run multiple operating systems and multiple
applications on the same server at the same time” – Mike Adams, VMware
● Provide applications with the standard versions to their cloud users.
● Normally in the cloud computing, users share the data present in the clouds like application
Virtualization users share the Infrastructure.
SECURITY
● Security is one of the important concerns.
● Prevents unauthorised access.
● Protection from Harmful viruses and Cyber threats.
● Encryption process:
It takes place with protocols which will protect the data from other threats.
ECONOMICAL
● Saves the cost for a physical system such as hardware and servers.
● Stores Data in Virtual server.
● Reduces the wastage, decreases the electricity bills.
FLEXIBLE OPERATIONS
● The network switch implemented today is very easy to use, flexible and saves time.
● It eliminates the problem of recovering the data from crashed or corrupted devices and hence
saves time.
FLEXIBLE DATA TRANSFER
● The data can transfer to the virtual server and retrieve anytime.
● Easy to locate the required data and transfer them.
● Additional storage is provided.
ELIMINATES RISK OF SYSTEM FAILURE
● Failure can cause damage to the company but the virtualizations help you to perform
the same task in multiple devices at the same time.
● Even if a server crashes with the help of the second server the customer can access the data.
THANK YOU

Contenu connexe

Tendances

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
pradeepfdo
 
Architecture Challenges In Cloud Computing
Architecture Challenges In Cloud ComputingArchitecture Challenges In Cloud Computing
Architecture Challenges In Cloud Computing
IndicThreads
 
Extend enterprise backup sheet
Extend enterprise backup sheetExtend enterprise backup sheet
Extend enterprise backup sheet
Justin Trent
 

Tendances (20)

What is VDI And How Does It Work
What is VDI And How Does It WorkWhat is VDI And How Does It Work
What is VDI And How Does It Work
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017Scality SDS Day, London, 20 SEP 2017
Scality SDS Day, London, 20 SEP 2017
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concernsCloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concerns
 
Virtualized Networking in Virtualized Data Center and Cloud Computing
Virtualized  Networking in Virtualized Data Center and Cloud ComputingVirtualized  Networking in Virtualized Data Center and Cloud Computing
Virtualized Networking in Virtualized Data Center and Cloud Computing
 
Cloud-computing part 1
Cloud-computing part 1Cloud-computing part 1
Cloud-computing part 1
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Let's talk CLOUD!
Let's talk CLOUD!Let's talk CLOUD!
Let's talk CLOUD!
 
Expedient Pyramid
Expedient Pyramid Expedient Pyramid
Expedient Pyramid
 
Hybrid DR in the Cloud - Cloud Expo 2015 Demo Theater
Hybrid DR in the Cloud - Cloud Expo 2015 Demo TheaterHybrid DR in the Cloud - Cloud Expo 2015 Demo Theater
Hybrid DR in the Cloud - Cloud Expo 2015 Demo Theater
 
Cluster computing pptl (2)
Cluster computing pptl (2)Cluster computing pptl (2)
Cluster computing pptl (2)
 
The Future of Your Security Operations - Part 1: Terms, Trends & Opinions
The Future of Your Security Operations - Part 1: Terms, Trends & OpinionsThe Future of Your Security Operations - Part 1: Terms, Trends & Opinions
The Future of Your Security Operations - Part 1: Terms, Trends & Opinions
 
Cloud Based Disaster Recovery (DRaaS)
Cloud Based Disaster Recovery (DRaaS)Cloud Based Disaster Recovery (DRaaS)
Cloud Based Disaster Recovery (DRaaS)
 
Virtualisation advances for teaching and research
Virtualisation advances for teaching and researchVirtualisation advances for teaching and research
Virtualisation advances for teaching and research
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
 
Your Move to the Cloud: Everything You Need to Know
Your Move to the Cloud: Everything You Need to KnowYour Move to the Cloud: Everything You Need to Know
Your Move to the Cloud: Everything You Need to Know
 
Architecture Challenges In Cloud Computing
Architecture Challenges In Cloud ComputingArchitecture Challenges In Cloud Computing
Architecture Challenges In Cloud Computing
 
Virtual environment
Virtual environmentVirtual environment
Virtual environment
 
Extend enterprise backup sheet
Extend enterprise backup sheetExtend enterprise backup sheet
Extend enterprise backup sheet
 

Similaire à VIRTUALIZATION TECHNOLOGY

virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
XanGwaps
 
Cloud Computing vs Virtualization From Desktop to Server
Cloud Computing vs Virtualization From Desktop to ServerCloud Computing vs Virtualization From Desktop to Server
Cloud Computing vs Virtualization From Desktop to Server
Fadly Rizal Ahmad Fadzil
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
Abhijit Kundu
 

Similaire à VIRTUALIZATION TECHNOLOGY (20)

virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
 
Cloud Computing vs Virtualization From Desktop to Server
Cloud Computing vs Virtualization From Desktop to ServerCloud Computing vs Virtualization From Desktop to Server
Cloud Computing vs Virtualization From Desktop to Server
 
cloude computing
cloude computingcloude computing
cloude computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtualization security for the cloud computing technology
Virtualization security for the cloud computing technologyVirtualization security for the cloud computing technology
Virtualization security for the cloud computing technology
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
 
Cloudcpmuting journal
Cloudcpmuting journalCloudcpmuting journal
Cloudcpmuting journal
 
Cloud.pptx
Cloud.pptxCloud.pptx
Cloud.pptx
 
cloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptxcloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptxCloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptx
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
Virtualization vs. Cloud Computing: What's the Difference?
Virtualization vs. Cloud Computing: What's the Difference?Virtualization vs. Cloud Computing: What's the Difference?
Virtualization vs. Cloud Computing: What's the Difference?
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
Cloud computing by shashank
Cloud computing by shashankCloud computing by shashank
Cloud computing by shashank
 

Plus de RohitK71 (11)

Gram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellationsGram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellations
 
Negotiation
Negotiation Negotiation
Negotiation
 
QUEUEING NETWORKS
QUEUEING NETWORKSQUEUEING NETWORKS
QUEUEING NETWORKS
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
INTEGRATION TESTING
INTEGRATION TESTINGINTEGRATION TESTING
INTEGRATION TESTING
 
INHERITANCE
INHERITANCEINHERITANCE
INHERITANCE
 
Dbms seminar
Dbms seminarDbms seminar
Dbms seminar
 
Cn application layer_paradigms
Cn application layer_paradigmsCn application layer_paradigms
Cn application layer_paradigms
 
Compiler design error handling
Compiler design error handlingCompiler design error handling
Compiler design error handling
 
Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)
 
Usp message queues
Usp message queuesUsp message queues
Usp message queues
 

Dernier

Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 

Dernier (20)

Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 

VIRTUALIZATION TECHNOLOGY

  • 2. INTRODUCTION Virtualization is technology that allows you to create multiple simulated environments or dedicated resources from a single, physical hardware system. Creation of a virtual -- rather than actual -- version of something, such as an operating system, a server, a storage device or network resources.
  • 3. VIRTUALIZATION Virtualization refers to Abstraction of the computer resources. It refers to creation of a virtual resources such as server, file or network
  • 4. CONCEPT OF VIRTUALIZATION Virtualization describes a technology in which an application, guest operating system or data storage is abstracted away from the true underlying hardware or software. A great example of how virtualization works in your daily life is the separation of your hard drive into different parts. It started as the ability to run multiple operating systems on one hardware set and now it is a vital part of testing and cloud-based computing.
  • 5. WHY? ❏ Isolation among users ❏ Resource sharing ❏ Dynamical resources ❏ Aggregation of resources
  • 6. IS IT SECURE? ► Virtualization is an elegant solution to many common security problems. ► In a development environment, each developer can have their own sandbox, immune from another developer’s rogue or runaway code. ► When VMs and applications are properly isolated, only one application on one OS is affected by an attack.
  • 7. HOW IT WORKS? ● Virtualization software makes it possible to run multiple operating systems and multiple applications on the same server at the same time” – Mike Adams, VMware ● Provide applications with the standard versions to their cloud users. ● Normally in the cloud computing, users share the data present in the clouds like application Virtualization users share the Infrastructure.
  • 8.
  • 9. SECURITY ● Security is one of the important concerns. ● Prevents unauthorised access. ● Protection from Harmful viruses and Cyber threats. ● Encryption process: It takes place with protocols which will protect the data from other threats.
  • 10. ECONOMICAL ● Saves the cost for a physical system such as hardware and servers. ● Stores Data in Virtual server. ● Reduces the wastage, decreases the electricity bills.
  • 11. FLEXIBLE OPERATIONS ● The network switch implemented today is very easy to use, flexible and saves time. ● It eliminates the problem of recovering the data from crashed or corrupted devices and hence saves time.
  • 12. FLEXIBLE DATA TRANSFER ● The data can transfer to the virtual server and retrieve anytime. ● Easy to locate the required data and transfer them. ● Additional storage is provided.
  • 13. ELIMINATES RISK OF SYSTEM FAILURE ● Failure can cause damage to the company but the virtualizations help you to perform the same task in multiple devices at the same time. ● Even if a server crashes with the help of the second server the customer can access the data.
  • 14.