SlideShare une entreprise Scribd logo
1  sur  50
Télécharger pour lire hors ligne
DSA 441 – Cloud Computing
Week 2: Virtual Machines and VM Ware
Asst. Prof. Dr. Ferdin Joe John Joseph
Faculty of Information Technology
Thai-Nichi Institute of Technology, Bangkok
Virtualization
Faculty of Information Technology, Thai-Nichi Institute of
Technology
2
• Virtualization, in computing, refers to the act of creating a virtual
(rather than actual) version of something, including but not limited to
a virtual computer hardware platform, operating system (OS), storage
device, or computer network resources.
• The term "virtualization" traces its roots to 1960s mainframes, during
which it was a method of logically dividing the mainframes' resources
for different applications. Since then, the meaning of the term has
evolved to the aforementioned.
Virtualization -Categories
• Server virtualization allows you to run multiple virtual machines on a
single physical server.
• Desktop virtualization allows you to run multiple desktop machines
on a single physical server, and distribute them.
• Application virtualization allows you to distribute multiple copies of
an application from a single physical server.
Faculty of Information Technology, Thai-Nichi Institute of
Technology
3
Illustration
Faculty of Information Technology, Thai-Nichi Institute of
Technology
4
1970 1980 1990 2000 2010 2020 - Today
1960
• Centralized computing
• First virtualization
• Thin Clients
The age of mainframe PC Arrives
Things get
complicated
The Cloud Moves in
• Decentralized
Computing
• PC Sprawl
• Bubble Bursts
• Centralized computing
• Return to Virtualization and Thin
Clients
• The Internet of Things, then the
Internet of Everything!
History
Virtualization for Resource Optimization
Faculty of Information Technology, Thai-Nichi Institute of
Technology
6
1:1 Relationship between Applications and
hardware
No resource optimization
Many:1 relationship between Applications and
hardware
Increased density and resource optimization
Advantages of Virtualization
• Partitioning
• Run multiple operating systems on one physical machine
• Share physical resources between virtual machines
Faculty of Information Technology, Thai-Nichi Institute of
Technology
7
Advantages of Virtualization
• Portability
• Entire virtual machine is saved as a file, so…
• Move, copy, or export as easily as a file
Faculty of Information Technology, Thai-Nichi Institute of
Technology
8
Advantages of Virtualization
• Security
• Hardware is isolated from the operating system
• Recovery as easily as restoring a file
Faculty of Information Technology, Thai-Nichi Institute of
Technology
9
Advantages of Virtualization
• Agnostic
• Migrate a virtual machine between similar, or different, physical servers
Faculty of Information Technology, Thai-Nichi Institute of
Technology
10
Virtualization – Explained (https://youtu.be/FZR0rG3HKIk)
Faculty of Information Technology, Thai-Nichi Institute of
Technology
11
How does the VM works?
• Hypervisor!
• Hypervisor instructs the guest OS
• Loads servers as guests on host hardware
Faculty of Information Technology, Thai-Nichi Institute of
Technology
12
Hypervisor
• A hypervisor, also known as a virtual machine monitor or VMM, is
software that creates and runs virtual machines (VMs).
• A hypervisor allows one host computer to support multiple guest VMs
by virtually sharing its resources, such as memory and processing.
Faculty of Information Technology, Thai-Nichi Institute of
Technology
13
Hypervisor Architecture
Faculty of Information Technology, Thai-Nichi Institute of
Technology
14
Types of Hypervisor
• Bare Metal (Type 1)
• Acts like a lightweight operating system and runs directly on the host’s
hardware
• Hosted (Type 2)
• Runs as a software layer on an operating system, like other computer
programs
Faculty of Information Technology, Thai-Nichi Institute of
Technology
15
Bare Metal Hypervisor
Faculty of Information Technology, Thai-Nichi Institute of
Technology
16
Hosted Hypervisor
Faculty of Information Technology, Thai-Nichi Institute of
Technology
17
CPU Vs GPU
Faculty of Information Technology, Thai-Nichi Institute of
Technology
18
Virtual GPU
Faculty of Information Technology, Thai-Nichi Institute of
Technology
19
VGPU Types
Faculty of Information Technology, Thai-Nichi Institute of
Technology
20
Virtual Box
Faculty of Information Technology, Thai-Nichi Institute of
Technology
21
Download Virtual Box and install
Faculty of Information Technology, Thai-Nichi Institute of
Technology
22
Faculty of Information Technology, Thai-Nichi Institute of
Technology
23
Faculty of Information Technology, Thai-Nichi Institute of
Technology
24
Faculty of Information Technology, Thai-Nichi Institute of
Technology
25
Faculty of Information Technology, Thai-Nichi Institute of
Technology
26
Faculty of Information Technology, Thai-Nichi Institute of
Technology
27
Faculty of Information Technology, Thai-Nichi Institute of
Technology
28
Faculty of Information Technology, Thai-Nichi Institute of
Technology
29
Faculty of Information Technology, Thai-Nichi Institute of
Technology
30
Download Ubuntu Image
Faculty of Information Technology, Thai-Nichi Institute of
Technology
31
Faculty of Information Technology, Thai-Nichi Institute of
Technology
32
Faculty of Information Technology, Thai-Nichi Institute of
Technology
33
Faculty of Information Technology, Thai-Nichi Institute of
Technology
34
Faculty of Information Technology, Thai-Nichi Institute of
Technology
35
Faculty of Information Technology, Thai-Nichi Institute of
Technology
36
Faculty of Information Technology, Thai-Nichi Institute of
Technology
37
Faculty of Information Technology, Thai-Nichi Institute of
Technology
38
Faculty of Information Technology, Thai-Nichi Institute of
Technology
39
Faculty of Information Technology, Thai-Nichi Institute of
Technology
40
Faculty of Information Technology, Thai-Nichi Institute of
Technology
41
Faculty of Information Technology, Thai-Nichi Institute of
Technology
42
Faculty of Information Technology, Thai-Nichi Institute of
Technology
43
Faculty of Information Technology, Thai-Nichi Institute of
Technology
44
Faculty of Information Technology, Thai-Nichi Institute of
Technology
45
Faculty of Information Technology, Thai-Nichi Institute of
Technology
46
Faculty of Information Technology, Thai-Nichi Institute of
Technology
47
Faculty of Information Technology, Thai-Nichi Institute of
Technology
48
Faculty of Information Technology, Thai-Nichi Institute of
Technology
49
• Virtual Private Cloud
• IaaS
• PaaS
• SaaS
Next Week
Faculty of Information Technology, Thai-Nichi Institute of
Technology
50

Contenu connexe

Tendances

Week 10: Cloud Security- DSA 441 Cloud Computing
Week 10: Cloud Security- DSA 441 Cloud ComputingWeek 10: Cloud Security- DSA 441 Cloud Computing
Week 10: Cloud Security- DSA 441 Cloud ComputingFerdin Joe John Joseph PhD
 
GraphTour 2020 - BT: Use of Graph Database in P2P / P2MP Connectivity for Vid...
GraphTour 2020 - BT: Use of Graph Database in P2P / P2MP Connectivity for Vid...GraphTour 2020 - BT: Use of Graph Database in P2P / P2MP Connectivity for Vid...
GraphTour 2020 - BT: Use of Graph Database in P2P / P2MP Connectivity for Vid...Neo4j
 
Splunk for ITOps
Splunk for ITOpsSplunk for ITOps
Splunk for ITOpsSplunk
 
The risk executive agenda -- A compendium of Deloitte insights
The risk executive agenda -- A compendium  of Deloitte insights The risk executive agenda -- A compendium  of Deloitte insights
The risk executive agenda -- A compendium of Deloitte insights Deloitte United States
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 
Leveraging Splunk Enterprise Security with the MITRE’s ATT&CK Framework
Leveraging Splunk Enterprise Security with the MITRE’s ATT&CK FrameworkLeveraging Splunk Enterprise Security with the MITRE’s ATT&CK Framework
Leveraging Splunk Enterprise Security with the MITRE’s ATT&CK FrameworkSplunk
 
eBay Architecture
eBay Architecture eBay Architecture
eBay Architecture Tony Ng
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdfssusera76ea9
 
De-Risk Your Digital Transformation — And Reduce Time, Cost & Complexity
De-Risk Your Digital Transformation — And Reduce Time, Cost & ComplexityDe-Risk Your Digital Transformation — And Reduce Time, Cost & Complexity
De-Risk Your Digital Transformation — And Reduce Time, Cost & ComplexityInductive Automation
 
Sopra Steria: Intelligent Network Analysis in a Telecommunications Environment
Sopra Steria: Intelligent Network Analysis in a Telecommunications EnvironmentSopra Steria: Intelligent Network Analysis in a Telecommunications Environment
Sopra Steria: Intelligent Network Analysis in a Telecommunications EnvironmentNeo4j
 
Kafka in Space | Kafka Summit London 2022
 Kafka in Space | Kafka Summit London 2022 Kafka in Space | Kafka Summit London 2022
Kafka in Space | Kafka Summit London 2022HostedbyConfluent
 
Module - 1_IOT PPT_ 18CS81.pdf
Module - 1_IOT PPT_ 18CS81.pdfModule - 1_IOT PPT_ 18CS81.pdf
Module - 1_IOT PPT_ 18CS81.pdfManjunath Rajgopal
 
Essential Capabilities of an IoT Platform
Essential Capabilities of an IoT PlatformEssential Capabilities of an IoT Platform
Essential Capabilities of an IoT PlatformAmazon Web Services
 
The Customer Journey Is a Graph
The Customer Journey Is a GraphThe Customer Journey Is a Graph
The Customer Journey Is a GraphNeo4j
 
Do You Really Need to Evolve From Monitoring to Observability?
Do You Really Need to Evolve From Monitoring to Observability?Do You Really Need to Evolve From Monitoring to Observability?
Do You Really Need to Evolve From Monitoring to Observability?Splunk
 
Make Your SOC Work Smarter, Not Harder
Make Your SOC Work Smarter, Not HarderMake Your SOC Work Smarter, Not Harder
Make Your SOC Work Smarter, Not HarderSplunk
 

Tendances (20)

Week 12: Cloud AI- DSA 441 Cloud Computing
Week 12: Cloud AI- DSA 441 Cloud ComputingWeek 12: Cloud AI- DSA 441 Cloud Computing
Week 12: Cloud AI- DSA 441 Cloud Computing
 
Week 10: Cloud Security- DSA 441 Cloud Computing
Week 10: Cloud Security- DSA 441 Cloud ComputingWeek 10: Cloud Security- DSA 441 Cloud Computing
Week 10: Cloud Security- DSA 441 Cloud Computing
 
Data wrangling week 6
Data wrangling week 6Data wrangling week 6
Data wrangling week 6
 
Data wrangling week 10
Data wrangling week 10Data wrangling week 10
Data wrangling week 10
 
GraphTour 2020 - BT: Use of Graph Database in P2P / P2MP Connectivity for Vid...
GraphTour 2020 - BT: Use of Graph Database in P2P / P2MP Connectivity for Vid...GraphTour 2020 - BT: Use of Graph Database in P2P / P2MP Connectivity for Vid...
GraphTour 2020 - BT: Use of Graph Database in P2P / P2MP Connectivity for Vid...
 
Splunk for ITOps
Splunk for ITOpsSplunk for ITOps
Splunk for ITOps
 
The risk executive agenda -- A compendium of Deloitte insights
The risk executive agenda -- A compendium  of Deloitte insights The risk executive agenda -- A compendium  of Deloitte insights
The risk executive agenda -- A compendium of Deloitte insights
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
Leveraging Splunk Enterprise Security with the MITRE’s ATT&CK Framework
Leveraging Splunk Enterprise Security with the MITRE’s ATT&CK FrameworkLeveraging Splunk Enterprise Security with the MITRE’s ATT&CK Framework
Leveraging Splunk Enterprise Security with the MITRE’s ATT&CK Framework
 
eBay Architecture
eBay Architecture eBay Architecture
eBay Architecture
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
 
De-Risk Your Digital Transformation — And Reduce Time, Cost & Complexity
De-Risk Your Digital Transformation — And Reduce Time, Cost & ComplexityDe-Risk Your Digital Transformation — And Reduce Time, Cost & Complexity
De-Risk Your Digital Transformation — And Reduce Time, Cost & Complexity
 
Sopra Steria: Intelligent Network Analysis in a Telecommunications Environment
Sopra Steria: Intelligent Network Analysis in a Telecommunications EnvironmentSopra Steria: Intelligent Network Analysis in a Telecommunications Environment
Sopra Steria: Intelligent Network Analysis in a Telecommunications Environment
 
Kafka in Space | Kafka Summit London 2022
 Kafka in Space | Kafka Summit London 2022 Kafka in Space | Kafka Summit London 2022
Kafka in Space | Kafka Summit London 2022
 
State of the Cloud 2022
State of the Cloud 2022State of the Cloud 2022
State of the Cloud 2022
 
Module - 1_IOT PPT_ 18CS81.pdf
Module - 1_IOT PPT_ 18CS81.pdfModule - 1_IOT PPT_ 18CS81.pdf
Module - 1_IOT PPT_ 18CS81.pdf
 
Essential Capabilities of an IoT Platform
Essential Capabilities of an IoT PlatformEssential Capabilities of an IoT Platform
Essential Capabilities of an IoT Platform
 
The Customer Journey Is a Graph
The Customer Journey Is a GraphThe Customer Journey Is a Graph
The Customer Journey Is a Graph
 
Do You Really Need to Evolve From Monitoring to Observability?
Do You Really Need to Evolve From Monitoring to Observability?Do You Really Need to Evolve From Monitoring to Observability?
Do You Really Need to Evolve From Monitoring to Observability?
 
Make Your SOC Work Smarter, Not Harder
Make Your SOC Work Smarter, Not HarderMake Your SOC Work Smarter, Not Harder
Make Your SOC Work Smarter, Not Harder
 

Similaire à Virtualization and VM Ware Explained

Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...drboon
 
Virtualization - An Introduction (Study Notes)
Virtualization - An Introduction (Study Notes)Virtualization - An Introduction (Study Notes)
Virtualization - An Introduction (Study Notes)Marius FAILLOT DEVARRE
 
Basics of Cloud Computing- 5 th semester
Basics of Cloud Computing- 5 th semesterBasics of Cloud Computing- 5 th semester
Basics of Cloud Computing- 5 th semestersadas88
 
Data centre administration
Data centre administrationData centre administration
Data centre administrationUjjwal 'Shanu'
 
IRJET - Analysis of Virtual Machine in Digital Forensics
IRJET -  	  Analysis of Virtual Machine in Digital ForensicsIRJET -  	  Analysis of Virtual Machine in Digital Forensics
IRJET - Analysis of Virtual Machine in Digital ForensicsIRJET Journal
 
Advantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of VirtualizationAdvantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of VirtualizationElizabeth Anderson
 
Isolation of vm
Isolation of vmIsolation of vm
Isolation of vmHome
 
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdfIGedeArieYogantaraSu
 
Unit i cloud computing
Unit i  cloud computingUnit i  cloud computing
Unit i cloud computingMGkaran
 
Cloud computing lab open stack
Cloud computing lab open stackCloud computing lab open stack
Cloud computing lab open stackarunuiet
 
Le nuove tecnologie come vantaggio competitivo della piccola impresa
Le nuove tecnologie come vantaggio competitivo della piccola impresaLe nuove tecnologie come vantaggio competitivo della piccola impresa
Le nuove tecnologie come vantaggio competitivo della piccola impresaStefano A Gazziano
 
PROJECT-BASED MICROCONTROLLER SYSTEM LABORATORY USING BK300 DEVELOPMENT BOARD...
PROJECT-BASED MICROCONTROLLER SYSTEM LABORATORY USING BK300 DEVELOPMENT BOARD...PROJECT-BASED MICROCONTROLLER SYSTEM LABORATORY USING BK300 DEVELOPMENT BOARD...
PROJECT-BASED MICROCONTROLLER SYSTEM LABORATORY USING BK300 DEVELOPMENT BOARD...ijesajournal
 
Project based microcontroller
Project based microcontrollerProject based microcontroller
Project based microcontrollerijesajournal
 
Computer Science
Computer ScienceComputer Science
Computer ScienceWendy Lile
 
Future Internet: Managing Innovation and Testbed
Future Internet: Managing Innovation and TestbedFuture Internet: Managing Innovation and Testbed
Future Internet: Managing Innovation and TestbedShinji Shimojo
 
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...PranavPatil822557
 

Similaire à Virtualization and VM Ware Explained (20)

Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...
 
Virtualization - An Introduction (Study Notes)
Virtualization - An Introduction (Study Notes)Virtualization - An Introduction (Study Notes)
Virtualization - An Introduction (Study Notes)
 
Basics of Cloud Computing- 5 th semester
Basics of Cloud Computing- 5 th semesterBasics of Cloud Computing- 5 th semester
Basics of Cloud Computing- 5 th semester
 
Data centre administration
Data centre administrationData centre administration
Data centre administration
 
IRJET - Analysis of Virtual Machine in Digital Forensics
IRJET -  	  Analysis of Virtual Machine in Digital ForensicsIRJET -  	  Analysis of Virtual Machine in Digital Forensics
IRJET - Analysis of Virtual Machine in Digital Forensics
 
A Web-­Based Simulator for a Discrete Manufacturing System
A Web-­Based Simulator for a Discrete  Manufacturing SystemA Web-­Based Simulator for a Discrete  Manufacturing System
A Web-­Based Simulator for a Discrete Manufacturing System
 
Advantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of VirtualizationAdvantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of Virtualization
 
L1802028184
L1802028184L1802028184
L1802028184
 
Isolation of vm
Isolation of vmIsolation of vm
Isolation of vm
 
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Unit i cloud computing
Unit i  cloud computingUnit i  cloud computing
Unit i cloud computing
 
Cloud computing lab open stack
Cloud computing lab open stackCloud computing lab open stack
Cloud computing lab open stack
 
Le nuove tecnologie come vantaggio competitivo della piccola impresa
Le nuove tecnologie come vantaggio competitivo della piccola impresaLe nuove tecnologie come vantaggio competitivo della piccola impresa
Le nuove tecnologie come vantaggio competitivo della piccola impresa
 
PROJECT-BASED MICROCONTROLLER SYSTEM LABORATORY USING BK300 DEVELOPMENT BOARD...
PROJECT-BASED MICROCONTROLLER SYSTEM LABORATORY USING BK300 DEVELOPMENT BOARD...PROJECT-BASED MICROCONTROLLER SYSTEM LABORATORY USING BK300 DEVELOPMENT BOARD...
PROJECT-BASED MICROCONTROLLER SYSTEM LABORATORY USING BK300 DEVELOPMENT BOARD...
 
Project based microcontroller
Project based microcontrollerProject based microcontroller
Project based microcontroller
 
coa.ppt
coa.pptcoa.ppt
coa.ppt
 
Computer Science
Computer ScienceComputer Science
Computer Science
 
Future Internet: Managing Innovation and Testbed
Future Internet: Managing Innovation and TestbedFuture Internet: Managing Innovation and Testbed
Future Internet: Managing Innovation and Testbed
 
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
 

Plus de Ferdin Joe John Joseph PhD

Sept 6 2021 BTech Artificial Intelligence and Data Science curriculum
Sept 6 2021 BTech Artificial Intelligence and Data Science curriculumSept 6 2021 BTech Artificial Intelligence and Data Science curriculum
Sept 6 2021 BTech Artificial Intelligence and Data Science curriculumFerdin Joe John Joseph PhD
 
Transforming deep into transformers – a computer vision approach
Transforming deep into transformers – a computer vision approachTransforming deep into transformers – a computer vision approach
Transforming deep into transformers – a computer vision approachFerdin Joe John Joseph PhD
 

Plus de Ferdin Joe John Joseph PhD (18)

Invited Talk DGTiCon 2022
Invited Talk DGTiCon 2022Invited Talk DGTiCon 2022
Invited Talk DGTiCon 2022
 
Sept 6 2021 BTech Artificial Intelligence and Data Science curriculum
Sept 6 2021 BTech Artificial Intelligence and Data Science curriculumSept 6 2021 BTech Artificial Intelligence and Data Science curriculum
Sept 6 2021 BTech Artificial Intelligence and Data Science curriculum
 
Hadoop in Alibaba Cloud
Hadoop in Alibaba CloudHadoop in Alibaba Cloud
Hadoop in Alibaba Cloud
 
Cloud Computing Essentials in Alibaba Cloud
Cloud Computing Essentials in Alibaba CloudCloud Computing Essentials in Alibaba Cloud
Cloud Computing Essentials in Alibaba Cloud
 
Transforming deep into transformers – a computer vision approach
Transforming deep into transformers – a computer vision approachTransforming deep into transformers – a computer vision approach
Transforming deep into transformers – a computer vision approach
 
Week 11: Programming for Data Analysis
Week 11: Programming for Data AnalysisWeek 11: Programming for Data Analysis
Week 11: Programming for Data Analysis
 
Week 10: Programming for Data Analysis
Week 10: Programming for Data AnalysisWeek 10: Programming for Data Analysis
Week 10: Programming for Data Analysis
 
Week 9: Programming for Data Analysis
Week 9: Programming for Data AnalysisWeek 9: Programming for Data Analysis
Week 9: Programming for Data Analysis
 
Week 8: Programming for Data Analysis
Week 8: Programming for Data AnalysisWeek 8: Programming for Data Analysis
Week 8: Programming for Data Analysis
 
Programming for Data Analysis: Week 4
Programming for Data Analysis: Week 4Programming for Data Analysis: Week 4
Programming for Data Analysis: Week 4
 
Programming for Data Analysis: Week 3
Programming for Data Analysis: Week 3Programming for Data Analysis: Week 3
Programming for Data Analysis: Week 3
 
Week2: Programming for Data Analysis
Week2: Programming for Data AnalysisWeek2: Programming for Data Analysis
Week2: Programming for Data Analysis
 
Week 1: Programming for Data Analysis
Week 1: Programming for Data AnalysisWeek 1: Programming for Data Analysis
Week 1: Programming for Data Analysis
 
Deep learning - Introduction
Deep learning - IntroductionDeep learning - Introduction
Deep learning - Introduction
 
Data wrangling week 11
Data wrangling week 11Data wrangling week 11
Data wrangling week 11
 
Data wrangling week 9
Data wrangling week 9Data wrangling week 9
Data wrangling week 9
 
Data Wrangling Week 7
Data Wrangling Week 7Data Wrangling Week 7
Data Wrangling Week 7
 
Deep Learning and CNN Architectures
Deep Learning and CNN ArchitecturesDeep Learning and CNN Architectures
Deep Learning and CNN Architectures
 

Dernier

9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectBoston Institute of Analytics
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxdolaknnilon
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceSapana Sha
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhijennyeacort
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 217djon017
 

Dernier (20)

9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptx
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts Service
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2
 

Virtualization and VM Ware Explained

  • 1. DSA 441 – Cloud Computing Week 2: Virtual Machines and VM Ware Asst. Prof. Dr. Ferdin Joe John Joseph Faculty of Information Technology Thai-Nichi Institute of Technology, Bangkok
  • 2. Virtualization Faculty of Information Technology, Thai-Nichi Institute of Technology 2 • Virtualization, in computing, refers to the act of creating a virtual (rather than actual) version of something, including but not limited to a virtual computer hardware platform, operating system (OS), storage device, or computer network resources. • The term "virtualization" traces its roots to 1960s mainframes, during which it was a method of logically dividing the mainframes' resources for different applications. Since then, the meaning of the term has evolved to the aforementioned.
  • 3. Virtualization -Categories • Server virtualization allows you to run multiple virtual machines on a single physical server. • Desktop virtualization allows you to run multiple desktop machines on a single physical server, and distribute them. • Application virtualization allows you to distribute multiple copies of an application from a single physical server. Faculty of Information Technology, Thai-Nichi Institute of Technology 3
  • 4. Illustration Faculty of Information Technology, Thai-Nichi Institute of Technology 4
  • 5. 1970 1980 1990 2000 2010 2020 - Today 1960 • Centralized computing • First virtualization • Thin Clients The age of mainframe PC Arrives Things get complicated The Cloud Moves in • Decentralized Computing • PC Sprawl • Bubble Bursts • Centralized computing • Return to Virtualization and Thin Clients • The Internet of Things, then the Internet of Everything! History
  • 6. Virtualization for Resource Optimization Faculty of Information Technology, Thai-Nichi Institute of Technology 6 1:1 Relationship between Applications and hardware No resource optimization Many:1 relationship between Applications and hardware Increased density and resource optimization
  • 7. Advantages of Virtualization • Partitioning • Run multiple operating systems on one physical machine • Share physical resources between virtual machines Faculty of Information Technology, Thai-Nichi Institute of Technology 7
  • 8. Advantages of Virtualization • Portability • Entire virtual machine is saved as a file, so… • Move, copy, or export as easily as a file Faculty of Information Technology, Thai-Nichi Institute of Technology 8
  • 9. Advantages of Virtualization • Security • Hardware is isolated from the operating system • Recovery as easily as restoring a file Faculty of Information Technology, Thai-Nichi Institute of Technology 9
  • 10. Advantages of Virtualization • Agnostic • Migrate a virtual machine between similar, or different, physical servers Faculty of Information Technology, Thai-Nichi Institute of Technology 10
  • 11. Virtualization – Explained (https://youtu.be/FZR0rG3HKIk) Faculty of Information Technology, Thai-Nichi Institute of Technology 11
  • 12. How does the VM works? • Hypervisor! • Hypervisor instructs the guest OS • Loads servers as guests on host hardware Faculty of Information Technology, Thai-Nichi Institute of Technology 12
  • 13. Hypervisor • A hypervisor, also known as a virtual machine monitor or VMM, is software that creates and runs virtual machines (VMs). • A hypervisor allows one host computer to support multiple guest VMs by virtually sharing its resources, such as memory and processing. Faculty of Information Technology, Thai-Nichi Institute of Technology 13
  • 14. Hypervisor Architecture Faculty of Information Technology, Thai-Nichi Institute of Technology 14
  • 15. Types of Hypervisor • Bare Metal (Type 1) • Acts like a lightweight operating system and runs directly on the host’s hardware • Hosted (Type 2) • Runs as a software layer on an operating system, like other computer programs Faculty of Information Technology, Thai-Nichi Institute of Technology 15
  • 16. Bare Metal Hypervisor Faculty of Information Technology, Thai-Nichi Institute of Technology 16
  • 17. Hosted Hypervisor Faculty of Information Technology, Thai-Nichi Institute of Technology 17
  • 18. CPU Vs GPU Faculty of Information Technology, Thai-Nichi Institute of Technology 18
  • 19. Virtual GPU Faculty of Information Technology, Thai-Nichi Institute of Technology 19
  • 20. VGPU Types Faculty of Information Technology, Thai-Nichi Institute of Technology 20
  • 21. Virtual Box Faculty of Information Technology, Thai-Nichi Institute of Technology 21
  • 22. Download Virtual Box and install Faculty of Information Technology, Thai-Nichi Institute of Technology 22
  • 23. Faculty of Information Technology, Thai-Nichi Institute of Technology 23
  • 24. Faculty of Information Technology, Thai-Nichi Institute of Technology 24
  • 25. Faculty of Information Technology, Thai-Nichi Institute of Technology 25
  • 26. Faculty of Information Technology, Thai-Nichi Institute of Technology 26
  • 27. Faculty of Information Technology, Thai-Nichi Institute of Technology 27
  • 28. Faculty of Information Technology, Thai-Nichi Institute of Technology 28
  • 29. Faculty of Information Technology, Thai-Nichi Institute of Technology 29
  • 30. Faculty of Information Technology, Thai-Nichi Institute of Technology 30
  • 31. Download Ubuntu Image Faculty of Information Technology, Thai-Nichi Institute of Technology 31
  • 32. Faculty of Information Technology, Thai-Nichi Institute of Technology 32
  • 33. Faculty of Information Technology, Thai-Nichi Institute of Technology 33
  • 34. Faculty of Information Technology, Thai-Nichi Institute of Technology 34
  • 35. Faculty of Information Technology, Thai-Nichi Institute of Technology 35
  • 36. Faculty of Information Technology, Thai-Nichi Institute of Technology 36
  • 37. Faculty of Information Technology, Thai-Nichi Institute of Technology 37
  • 38. Faculty of Information Technology, Thai-Nichi Institute of Technology 38
  • 39. Faculty of Information Technology, Thai-Nichi Institute of Technology 39
  • 40. Faculty of Information Technology, Thai-Nichi Institute of Technology 40
  • 41. Faculty of Information Technology, Thai-Nichi Institute of Technology 41
  • 42. Faculty of Information Technology, Thai-Nichi Institute of Technology 42
  • 43. Faculty of Information Technology, Thai-Nichi Institute of Technology 43
  • 44. Faculty of Information Technology, Thai-Nichi Institute of Technology 44
  • 45. Faculty of Information Technology, Thai-Nichi Institute of Technology 45
  • 46. Faculty of Information Technology, Thai-Nichi Institute of Technology 46
  • 47. Faculty of Information Technology, Thai-Nichi Institute of Technology 47
  • 48. Faculty of Information Technology, Thai-Nichi Institute of Technology 48
  • 49. Faculty of Information Technology, Thai-Nichi Institute of Technology 49
  • 50. • Virtual Private Cloud • IaaS • PaaS • SaaS Next Week Faculty of Information Technology, Thai-Nichi Institute of Technology 50