SlideShare une entreprise Scribd logo
1  sur  19
Virtualization 101 Presented by Gaurav Marwaha
History The prototypical illustration of full virtualization is in the control program of IBM's CP/CMS operating system – first demonstrated with IBM's CP-40 research system in 1967, then distributed via open source in CP/CMS in 1967-1972, and re-implemented in IBM's VM family from 1972 to the present. Each CP/CMS user was provided a simulated, stand-alone computer. Each such virtual machine had the complete capabilities of the underlying machine, and (for its user) the virtual machine was indistinguishable from a private system. This simulation was comprehensive, and was based on the Principles of Operation manual for the hardware. It thus included such elements as instruction set, main memory, interrupts, exceptions, and device access. The result was a single machine that could be multiplexed among many users.
What is Virtualization? Virtual machine Physical machine ,[object Object]
Virtual Machines: a full abstraction of a physical machine,[object Object]
Definitions ,[object Object]
Software Virtualization runs the virtualized operating system on top of a software virtualization platform running on an existing operating system.
Hardware Virtualization runs the virtualized operating system on top of a software platform running directly on top of the hardware without an existing operating system. The engine used to run hardware virtualization referred to as a hypervisor.
Desktop Virtualization allows you to rely on virtual machines to provision desktop systems. Desktop virtualization has several advantages, the least of which is the ability to centralize desktop deployments and reduce distributed management costs.,[object Object]
Mobility – can be moved from one host to another quickly
Can templatize OS creation or use custom OS
Easy to backup – just copy the file
Easy to maintain – application developers do not need to bother about hardware details they just provide a file with required RAM,[object Object]
Easy management; patch application and virus protection
Huge energy savings
Better security and problem isolation
Easy to upgrade or migrate to new environments,[object Object]
Instead of capturing the installation process you capture what an application needs to run in an OS
Huge energy savings
Better security and problem isolation

Contenu connexe

Tendances

VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
aleyeldean
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
Gaurav Suri
 

Tendances (20)

Virtual machine
Virtual machineVirtual machine
Virtual machine
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
 
Server virtualization by VMWare
Server virtualization by VMWareServer virtualization by VMWare
Server virtualization by VMWare
 
Virtualization
VirtualizationVirtualization
Virtualization
 
What’s New in VMware vSphere 7?
What’s New in VMware vSphere 7?What’s New in VMware vSphere 7?
What’s New in VMware vSphere 7?
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization
 
Vmware overview
Vmware overviewVmware overview
Vmware overview
 
Virtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMwareVirtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMware
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
 
VMWARE VS MS-HYPER-V
VMWARE VS MS-HYPER-VVMWARE VS MS-HYPER-V
VMWARE VS MS-HYPER-V
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
 
Virtualization
VirtualizationVirtualization
Virtualization
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
 
Virtualization
VirtualizationVirtualization
Virtualization
 
VMware Esx Short Presentation
VMware Esx Short PresentationVMware Esx Short Presentation
VMware Esx Short Presentation
 

En vedette

Gost 13067 67
 Gost 13067 67 Gost 13067 67
Gost 13067 67
cosy_mousy
 
Entrevista jornal i e estanque_parte1
Entrevista jornal i e estanque_parte1Entrevista jornal i e estanque_parte1
Entrevista jornal i e estanque_parte1
Elisio Estanque
 
Gost 13060 67
 Gost 13060 67 Gost 13060 67
Gost 13060 67
cosy_mousy
 
Rubricas
Rubricas Rubricas
Rubricas
SMSMUN
 
GoogleBookmarks.html
GoogleBookmarks.htmlGoogleBookmarks.html
GoogleBookmarks.html
fale1
 

En vedette (20)

People in a product team
People in a product teamPeople in a product team
People in a product team
 
Hiring senior people
Hiring senior peopleHiring senior people
Hiring senior people
 
Agile Metrics
Agile MetricsAgile Metrics
Agile Metrics
 
Data Science - Experiments
Data Science - ExperimentsData Science - Experiments
Data Science - Experiments
 
fabula?
fabula?fabula?
fabula?
 
P02022013
P02022013P02022013
P02022013
 
certificate-VTSP
certificate-VTSPcertificate-VTSP
certificate-VTSP
 
Gost 13067 67
 Gost 13067 67 Gost 13067 67
Gost 13067 67
 
Entrevista jornal i e estanque_parte1
Entrevista jornal i e estanque_parte1Entrevista jornal i e estanque_parte1
Entrevista jornal i e estanque_parte1
 
1TORSpsych
1TORSpsych1TORSpsych
1TORSpsych
 
Reading Comprehension and iPod Touch Technology
Reading Comprehension and iPod Touch TechnologyReading Comprehension and iPod Touch Technology
Reading Comprehension and iPod Touch Technology
 
Exemplo+4
Exemplo+4Exemplo+4
Exemplo+4
 
Caida Del Cabello Y Causas
Caida Del Cabello Y Causas
Caida Del Cabello Y Causas
Caida Del Cabello Y Causas
 
Http
HttpHttp
Http
 
Carga se volvió dulce la
Carga se volvió dulce laCarga se volvió dulce la
Carga se volvió dulce la
 
Gost 13060 67
 Gost 13060 67 Gost 13060 67
Gost 13060 67
 
Economic and Environmental Drivers for Virtualization
Economic and Environmental Drivers for VirtualizationEconomic and Environmental Drivers for Virtualization
Economic and Environmental Drivers for Virtualization
 
Antidotos Caseros Para La Caida Del Pelo
Antidotos Caseros Para La Caida Del Pelo
Antidotos Caseros Para La Caida Del Pelo
Antidotos Caseros Para La Caida Del Pelo
 
Rubricas
Rubricas Rubricas
Rubricas
 
GoogleBookmarks.html
GoogleBookmarks.htmlGoogleBookmarks.html
GoogleBookmarks.html
 

Similaire à Virtualization 101

Mid term report
Mid term reportMid term report
Mid term report
lokesh039
 
Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)
rajsandhu1989
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session
aleyeldean
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdf
AkshithaReddy42848
 
Virtualization terminology
Virtualization terminologyVirtualization terminology
Virtualization terminology
Zeno Idzerda
 
V terminology guide
V terminology guideV terminology guide
V terminology guide
Rizi Butt
 

Similaire à Virtualization 101 (20)

virtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxvirtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptx
 
Mid term report
Mid term reportMid term report
Mid term report
 
cloud basics.
cloud basics.cloud basics.
cloud basics.
 
virtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfvirtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdf
 
Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)
 
Vitualisation
VitualisationVitualisation
Vitualisation
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session
 
Getting Started With Virtualization
Getting Started With VirtualizationGetting Started With Virtualization
Getting Started With Virtualization
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdf
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
Presentation on Top Cloud Computing Technologies
Presentation on Top Cloud Computing TechnologiesPresentation on Top Cloud Computing Technologies
Presentation on Top Cloud Computing Technologies
 
Virtualization terminology
Virtualization terminologyVirtualization terminology
Virtualization terminology
 
V terminology guide
V terminology guideV terminology guide
V terminology guide
 
微软虚拟化技术概览
微软虚拟化技术概览微软虚拟化技术概览
微软虚拟化技术概览
 
Virtualization concepts in cloud computing
Virtualization concepts in cloud computingVirtualization concepts in cloud computing
Virtualization concepts in cloud computing
 
Best Practices For Using Virtualization In Development Environments
Best Practices For Using Virtualization In Development EnvironmentsBest Practices For Using Virtualization In Development Environments
Best Practices For Using Virtualization In Development Environments
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 
IBM Private Cloud Solutions with IBM i
IBM Private Cloud Solutions with IBM iIBM Private Cloud Solutions with IBM i
IBM Private Cloud Solutions with IBM i
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 

Virtualization 101

  • 1. Virtualization 101 Presented by Gaurav Marwaha
  • 2. History The prototypical illustration of full virtualization is in the control program of IBM's CP/CMS operating system – first demonstrated with IBM's CP-40 research system in 1967, then distributed via open source in CP/CMS in 1967-1972, and re-implemented in IBM's VM family from 1972 to the present. Each CP/CMS user was provided a simulated, stand-alone computer. Each such virtual machine had the complete capabilities of the underlying machine, and (for its user) the virtual machine was indistinguishable from a private system. This simulation was comprehensive, and was based on the Principles of Operation manual for the hardware. It thus included such elements as instruction set, main memory, interrupts, exceptions, and device access. The result was a single machine that could be multiplexed among many users.
  • 3.
  • 4.
  • 5.
  • 6. Software Virtualization runs the virtualized operating system on top of a software virtualization platform running on an existing operating system.
  • 7. Hardware Virtualization runs the virtualized operating system on top of a software platform running directly on top of the hardware without an existing operating system. The engine used to run hardware virtualization referred to as a hypervisor.
  • 8.
  • 9. Mobility – can be moved from one host to another quickly
  • 10. Can templatize OS creation or use custom OS
  • 11. Easy to backup – just copy the file
  • 12.
  • 13. Easy management; patch application and virus protection
  • 15. Better security and problem isolation
  • 16.
  • 17. Instead of capturing the installation process you capture what an application needs to run in an OS
  • 19. Better security and problem isolation
  • 20.
  • 23. Can look at Physical Address Extension switch at startup
  • 25. Rely on shared storage
  • 27. OS licensing – windows has a separate policy for virtual servers
  • 28. Its hypervisor is called ESX
  • 30. It is important to have a visual diagram else it may become confusing
  • 32. Focus on VM management
  • 34.
  • 35.
  • 36. Offers a product named xenserver for server virtualization and xendesktop for desktop virtualization
  • 37. Xenserver has four editions ranging from free Express to Platinum edition
  • 39. Virtual Server and Virtual PC are two products
  • 40. It has a built in hypervisor (Hyper-V) which is part of Windows 2008 server OS
  • 42. Offers very mature server and desktop products
  • 43. Its hypervisor is called ESXOracle (Oracle VM), Novell (Xen), Red Hat (Xen), IBM, Sun (xVM), Virtual Iron, and others also all offer their own hypervisors
  • 44. Software Appliances A software appliance is a software application combined with just enough operating system (JeOS) for it to run optimally on industry standard hardware (typically a server) or in a virtual machine. JeOS is the abbreviation (pronounced "juice") for the concept of Just Enough Operating System as it applies to a software appliance. JeOS is not a generic, one-size-fits-all operating system. Rather, it refers to a customized operating system that precisely fits the needs of a particular application. The application's OS requirements can be determined manually, or with an analytical tool. Therefore, JeOS includes only the pieces of an operating system (often Linux) required to support a particular application and any other third-party components contained in the appliance. This makes the appliance smaller, and possibly more secure than an application running under a full general purpose OS.
  • 45. FIREWALL Virtual Appliance CRM Virtual Appliance Linux Linux What is a Virtual Appliance Firewall SW Pre-built, pre-configured and ready-to-run software application packaged with the OS inside a Virtual Machine. Or packaged inside multiple Virtual Machines Linux Apache mySQL Tomcat Linux
  • 46. Virtual Appliances Virtual appliances are virtual machine templates, sometimes in the Open Virtualization Format (OVF), that contain preconfigured operating systems and applications. Since VMs are self-contained and transportable, they can be delivered in a preconfigured state as virtual appliances. VAPs are most often designed to run on Linux operating systems because of the licensing cost. Few vendors have created VAPs based on Microsoft technologies because they have to become Windows resellers to do so. Some considerations that need addressable when we choose a VAP: Has the OS been hardened? Is the appliance upgradeable? Scalability Microsoft v/s Linux Licensing Custom OS?
  • 49.
  • 50. Applications can be deployed in streaming mode to reduce network usage and hard disk requirements
  • 51.
  • 52.
  • 53. Reliability and scalability logic remain hidden giving the illusion of infinite (elastic) capacity.
  • 54. These services are programmatically controlled on-demand
  • 55. Charges are consumption based – no upfront investment
  • 56. Loosely coupled set of services19