SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
Virtualization
Virtualization
• Virtualization is a technology that helps us to install different
Operating Systems on a hardware. They are completely separated
and independent from each other.
• This blend of virtualization technologies - or virtual infrastructure -
provides a layer of abstraction between computing, storage and
networking hardware, and the applications running on it
• Virtualization - Various techniques and methods of creating a
virtual (rather than actual) version of something, such as:
– Computer hardware platform
– Operating System (OS) – Virtual Machine or VM
– Storage device
– Network resources
Virtualization (cont.)
Hardware
‘Nonvirtualized’ system
A single OS controls all hardware
platform resources
Virtualized system
It makes it possible to run multiple Virtual
Containers on a single physical platform
Hardware
History of Virtualization
• Virtualization is an approach that was developed by the pioneers
of computing systems, IBM and Boroughs (now Unisys) back in
the ancient days of computing, the 1960s.
• It involved using unused computing resources to create an
artificial, but useful, view of system capabilities.
• In the 80’s and early 90’s the industry moved from leveraging
singular mainframes to running collections of smaller and
cheaper x86 servers. As a result the concept of virtualization
become less prominent. That changed in 1999 with VMware’s
introduction of VMware workstation.
Virtual Machines (VM)
• A machine with virtualization software can host
numerous applications, including those that run
on different operating systems, on a single
platform.
• Software that supports multiple operating systems
on a single computer.
• Each operating system is it’s own “virtual machine”
with it’s own:
– Operating system, RAM, Storage
• Shared CPU
• The host operating system can support a number of virtual machines, each of
which has the characteristics of a particular OS.
• The solution that enables virtualization is a virtual machine monitor (VMM), or
hypervisor
Virtual Machines (cont.)
Virtual
Machine
Server
• Instead of being stored on the local computer,
the VMs may be stored on a remote server.
• A hypervisor is a piece of computer software, firmware or hardware that creates
and runs virtual machines. (i.e virtual machine manager or virtual machine
monitor
• Host machine: The computer that runs and has one or more virtual machines.
• Each virtual machine is called a guest machine.
Role of a Hypervisor
• The explanation of a hypervisor up to this point has been fairly
simple: it is a layer of software that sits between the hardware and
the one or more virtual machines that it supports. Its job is also
fairly simple. The three characteristics are,
• Provide an environment identical to the physical environment
• Provide that environment with minimal performance cost
• Retain complete control of the system resources
Classes of Hypervisors
• There are two classes of hypervisors, and their names,
Type 1 (Native of Bare Metal Hypervisor) and
• Type 2 (Hosted Hypervisor), give no clue at all to their
differences. The only item of note between them is how
they are deployed, but it is enough of a variance to point
out.
Type 1 Hypervisors
• Type 1 hypervisors run directly on the server hardware without an
operating system beneath it.
• Because there is no intervening layer between the hypervisor and
the physical hardware, this is also referred to as a bare-metal
implementation.
• Without an intermediary, the Type 1 hypervisor can directly
communicate with the hardware resources in the stack below it,
making it much more efficient than the Type 2 hypervisor.
• Guest operations are handed off and, as such, a guest cannot
affect the hypervisor on which it is supported.
Example: VMware ESXi, XenServer
Type 2 Hypervisors
• A Type 2 hypervisor itself is an application that runs a top a traditional operating
system.
• Often Type 2 hypervisors are easy to install and deploy because much of the
hardware configuration work, such as networking and storage, has already been
covered by the operating system.
• Type 2 hypervisors are not as efficient as Type 1 hypervisors because of
thisextra layer between the hypervisor itself and the hardware.
• Type 2 hypervisors are also less reliable because there are more points of
failure: anything that affects the availability of the underlying operating system
also can impact the hypervisor and the guests it supports.
• A well-known example of a hosted hypervisor is Oracle VM VirtualBox. Others
include VMWare Server and Workstation, Microsoft Virtual PC, KVM, QEMU and
Parallels.
Features of Virtualzation
• Partitioning: In a single physical system by partitioning the
available resources it supports multiple applications and operating
systems.
• Isolation: Each virtual machine runs in an isolated manner from its
host system and other virtual machine. Its benifit is if any VM
crashes, the other VM and the host system are not affected.
• Encapsulation: Each VM is encapsulates its file system. It works
like an independant guest software configuration.
• Interposition: In VM all the new guest actions are performed
through the monitor. these actions are done without the knowledge
of the OS.
Types of Virtualization
• Today the term virtualization is widely applied to a
number of concepts, some of which are described
below:
– Server Virtualization
– Client & Desktop Virtualization
– Services and Applications Virtualization
– Network Virtualization
– Storage Virtualization
Server Virtualization
• It is virtualizing your server infrastructure where you do not have to
use any more physical servers for different purposes.
• With server virtualization one physical machine is divided many virtual
servers. At the core of such virtualization is the concept of a
hypervisor (virtual machine monitor). Server virtualization has a large
number of benefits for the companies making use of the technology.
Among those frequently listed:
– Increased Hardware Utilization – This results in hardware saving, reduced
administration overhead, and energy savings.
– Security – Clean images can be used to restore compromised systems.
Virtual machines can also provide sandboxing and isolation to limit attacks.
– Development – Debugging and performance monitoring scenarios can be
easily setup in a repeatable fashion. Developers also have easy access to
operating systems they might not otherwise be able to install on their
desktops.
Application/Desktop Virtualization
• Virtualization is not only a server domain technology. It is being put to a number of uses
on the client side at both the desktop and application level.
• Such virtualization can be broken out into four categories:
– Local Application Virtualization/Streaming
– Hosted Application Virtualization
– Hosted Desktop Virtualization
– Local Desktop Virtualization
Client & Desktop Virtualization : This is similar to server virtualization, but this time is on
the user’s site where you virtualize their desktops. We change their desktops with thin
clients and by utilizing the datacenter resources.
Services and Applications Virtualization: The virtualization technology isolates
applications from the underlying operating system and from other applications, in order to
increase compatibility and manageability. For example – Docker can be used for that
purpose.
Client & Desktop Virtualization
Services and Applications Virtualization
Network Virtualization
• It is a part of virtualization infrastructure, which is used especially if you are
going to visualize your servers. It helps you in creating multiple switching,
Vlans, NAT-ing, etc.
• Network virtualization involves platform virtualization, often combined with
resource virtualization. Network virtualization is categorized as either
external, combining many networks, or parts of networks, into a virtual unit,
or internal, providing network-like functionality to the software containers on
a single system.
• Virtual Private Networks (VPNs) have been a common component of the
network administrators’ toolbox.
• Virtual LANs (VLANs) are another commonly used network virtualization
concept.
The following illustration shows the VMware schema:
Storage Virtualization
• This is widely used in datacenters
where you have a big storage and it
helps you to create, delete,
allocated storage to different
hardware. This allocation is done
through network connection. The
leader on storage is SAN.
• Storage virtualization refers to the
process of abstracting logical
storage from physical storage.
• General benefits of storage virtualization
include:
– Migration.
– Utilization
– Management

Contenu connexe

Tendances (20)

Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
 
Different types of virtualisation
Different types of virtualisationDifferent types of virtualisation
Different types of virtualisation
 
Hypervisor
HypervisorHypervisor
Hypervisor
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtual machine subhash gupta
Virtual machine subhash guptaVirtual machine subhash gupta
Virtual machine subhash gupta
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
 
VMware Overview
VMware OverviewVMware Overview
VMware Overview
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Hypervisors
HypervisorsHypervisors
Hypervisors
 
Virtualization
VirtualizationVirtualization
Virtualization
 

Similaire à Lecture5 virtualization

lecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxlecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxAnilkumarbehera16
 
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravym456
 
Chap 2 virtulizatin
Chap 2 virtulizatinChap 2 virtulizatin
Chap 2 virtulizatinRaj Sarode
 
Virtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudVirtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudNishant Munjal
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containersSelvaraj Kesavan
 
Introductin to virtualization i
Introductin to virtualization   iIntroductin to virtualization   i
Introductin to virtualization iParth Patel
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulizationAJIT NEGI
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud ComputingPyingkodi Maran
 
Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptxBinod Rimal
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud ComputingJamie Shoup
 
6-Virtualizaiton-6.pptx
6-Virtualizaiton-6.pptx6-Virtualizaiton-6.pptx
6-Virtualizaiton-6.pptxAnsarHasas1
 
Unit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxUnit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxNayanrai14
 
Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingHitesh Mohapatra
 
Introduction to Virtualization
Introduction to Virtualization Introduction to Virtualization
Introduction to Virtualization Wellshop.pk
 

Similaire à Lecture5 virtualization (20)

lecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxlecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptx
 
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
 
Chap 2 virtulizatin
Chap 2 virtulizatinChap 2 virtulizatin
Chap 2 virtulizatin
 
Virtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudVirtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of Cloud
 
Virtualization
VirtualizationVirtualization
Virtualization
 
1 (3).pptx
1 (3).pptx1 (3).pptx
1 (3).pptx
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
 
Introductin to virtualization i
Introductin to virtualization   iIntroductin to virtualization   i
Introductin to virtualization i
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computing
 
Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptx
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud Computing
 
6-Virtualizaiton-6.pptx
6-Virtualizaiton-6.pptx6-Virtualizaiton-6.pptx
6-Virtualizaiton-6.pptx
 
Parth virt
Parth virtParth virt
Parth virt
 
Unit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxUnit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptx
 
1 virtualization
1 virtualization1 virtualization
1 virtualization
 
Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud Computing
 
Introduction to Virtualization
Introduction to Virtualization Introduction to Virtualization
Introduction to Virtualization
 

Plus de hktripathy

Lect 3 background mathematics
Lect 3 background mathematicsLect 3 background mathematics
Lect 3 background mathematicshktripathy
 
Lect 2 getting to know your data
Lect 2 getting to know your dataLect 2 getting to know your data
Lect 2 getting to know your datahktripathy
 
Lect 1 introduction
Lect 1 introductionLect 1 introduction
Lect 1 introductionhktripathy
 
Lecture7.1 data sampling
Lecture7.1 data samplingLecture7.1 data sampling
Lecture7.1 data samplinghktripathy
 
Lecture6 introduction to data streams
Lecture6 introduction to data streamsLecture6 introduction to data streams
Lecture6 introduction to data streamshktripathy
 
Lecture4 big data technology foundations
Lecture4 big data technology foundationsLecture4 big data technology foundations
Lecture4 big data technology foundationshktripathy
 
Lecture3 business intelligence
Lecture3 business intelligenceLecture3 business intelligence
Lecture3 business intelligencehktripathy
 
Lecture2 big data life cycle
Lecture2 big data life cycleLecture2 big data life cycle
Lecture2 big data life cyclehktripathy
 
Lecture1 introduction to big data
Lecture1 introduction to big dataLecture1 introduction to big data
Lecture1 introduction to big datahktripathy
 
Lect9 Decision tree
Lect9 Decision treeLect9 Decision tree
Lect9 Decision treehktripathy
 
Lect8 Classification & prediction
Lect8 Classification & predictionLect8 Classification & prediction
Lect8 Classification & predictionhktripathy
 
Lect7 Association analysis to correlation analysis
Lect7 Association analysis to correlation analysisLect7 Association analysis to correlation analysis
Lect7 Association analysis to correlation analysishktripathy
 
Lect6 Association rule & Apriori algorithm
Lect6 Association rule & Apriori algorithmLect6 Association rule & Apriori algorithm
Lect6 Association rule & Apriori algorithmhktripathy
 
Lect5 principal component analysis
Lect5 principal component analysisLect5 principal component analysis
Lect5 principal component analysishktripathy
 
Lect4 principal component analysis-I
Lect4 principal component analysis-ILect4 principal component analysis-I
Lect4 principal component analysis-Ihktripathy
 
Lect 3 background mathematics for Data Mining
Lect 3 background mathematics for Data MiningLect 3 background mathematics for Data Mining
Lect 3 background mathematics for Data Mininghktripathy
 
Lect 2 getting to know your data
Lect 2 getting to know your dataLect 2 getting to know your data
Lect 2 getting to know your datahktripathy
 
Lect 1 introduction
Lect 1 introductionLect 1 introduction
Lect 1 introductionhktripathy
 

Plus de hktripathy (18)

Lect 3 background mathematics
Lect 3 background mathematicsLect 3 background mathematics
Lect 3 background mathematics
 
Lect 2 getting to know your data
Lect 2 getting to know your dataLect 2 getting to know your data
Lect 2 getting to know your data
 
Lect 1 introduction
Lect 1 introductionLect 1 introduction
Lect 1 introduction
 
Lecture7.1 data sampling
Lecture7.1 data samplingLecture7.1 data sampling
Lecture7.1 data sampling
 
Lecture6 introduction to data streams
Lecture6 introduction to data streamsLecture6 introduction to data streams
Lecture6 introduction to data streams
 
Lecture4 big data technology foundations
Lecture4 big data technology foundationsLecture4 big data technology foundations
Lecture4 big data technology foundations
 
Lecture3 business intelligence
Lecture3 business intelligenceLecture3 business intelligence
Lecture3 business intelligence
 
Lecture2 big data life cycle
Lecture2 big data life cycleLecture2 big data life cycle
Lecture2 big data life cycle
 
Lecture1 introduction to big data
Lecture1 introduction to big dataLecture1 introduction to big data
Lecture1 introduction to big data
 
Lect9 Decision tree
Lect9 Decision treeLect9 Decision tree
Lect9 Decision tree
 
Lect8 Classification & prediction
Lect8 Classification & predictionLect8 Classification & prediction
Lect8 Classification & prediction
 
Lect7 Association analysis to correlation analysis
Lect7 Association analysis to correlation analysisLect7 Association analysis to correlation analysis
Lect7 Association analysis to correlation analysis
 
Lect6 Association rule & Apriori algorithm
Lect6 Association rule & Apriori algorithmLect6 Association rule & Apriori algorithm
Lect6 Association rule & Apriori algorithm
 
Lect5 principal component analysis
Lect5 principal component analysisLect5 principal component analysis
Lect5 principal component analysis
 
Lect4 principal component analysis-I
Lect4 principal component analysis-ILect4 principal component analysis-I
Lect4 principal component analysis-I
 
Lect 3 background mathematics for Data Mining
Lect 3 background mathematics for Data MiningLect 3 background mathematics for Data Mining
Lect 3 background mathematics for Data Mining
 
Lect 2 getting to know your data
Lect 2 getting to know your dataLect 2 getting to know your data
Lect 2 getting to know your data
 
Lect 1 introduction
Lect 1 introductionLect 1 introduction
Lect 1 introduction
 

Dernier

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 

Dernier (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Lecture5 virtualization

  • 2. Virtualization • Virtualization is a technology that helps us to install different Operating Systems on a hardware. They are completely separated and independent from each other. • This blend of virtualization technologies - or virtual infrastructure - provides a layer of abstraction between computing, storage and networking hardware, and the applications running on it • Virtualization - Various techniques and methods of creating a virtual (rather than actual) version of something, such as: – Computer hardware platform – Operating System (OS) – Virtual Machine or VM – Storage device – Network resources
  • 3. Virtualization (cont.) Hardware ‘Nonvirtualized’ system A single OS controls all hardware platform resources Virtualized system It makes it possible to run multiple Virtual Containers on a single physical platform Hardware
  • 4. History of Virtualization • Virtualization is an approach that was developed by the pioneers of computing systems, IBM and Boroughs (now Unisys) back in the ancient days of computing, the 1960s. • It involved using unused computing resources to create an artificial, but useful, view of system capabilities. • In the 80’s and early 90’s the industry moved from leveraging singular mainframes to running collections of smaller and cheaper x86 servers. As a result the concept of virtualization become less prominent. That changed in 1999 with VMware’s introduction of VMware workstation.
  • 5.
  • 6. Virtual Machines (VM) • A machine with virtualization software can host numerous applications, including those that run on different operating systems, on a single platform. • Software that supports multiple operating systems on a single computer. • Each operating system is it’s own “virtual machine” with it’s own: – Operating system, RAM, Storage • Shared CPU • The host operating system can support a number of virtual machines, each of which has the characteristics of a particular OS. • The solution that enables virtualization is a virtual machine monitor (VMM), or hypervisor
  • 7. Virtual Machines (cont.) Virtual Machine Server • Instead of being stored on the local computer, the VMs may be stored on a remote server.
  • 8. • A hypervisor is a piece of computer software, firmware or hardware that creates and runs virtual machines. (i.e virtual machine manager or virtual machine monitor • Host machine: The computer that runs and has one or more virtual machines. • Each virtual machine is called a guest machine.
  • 9. Role of a Hypervisor • The explanation of a hypervisor up to this point has been fairly simple: it is a layer of software that sits between the hardware and the one or more virtual machines that it supports. Its job is also fairly simple. The three characteristics are, • Provide an environment identical to the physical environment • Provide that environment with minimal performance cost • Retain complete control of the system resources
  • 10. Classes of Hypervisors • There are two classes of hypervisors, and their names, Type 1 (Native of Bare Metal Hypervisor) and • Type 2 (Hosted Hypervisor), give no clue at all to their differences. The only item of note between them is how they are deployed, but it is enough of a variance to point out.
  • 11. Type 1 Hypervisors • Type 1 hypervisors run directly on the server hardware without an operating system beneath it. • Because there is no intervening layer between the hypervisor and the physical hardware, this is also referred to as a bare-metal implementation. • Without an intermediary, the Type 1 hypervisor can directly communicate with the hardware resources in the stack below it, making it much more efficient than the Type 2 hypervisor. • Guest operations are handed off and, as such, a guest cannot affect the hypervisor on which it is supported. Example: VMware ESXi, XenServer
  • 12.
  • 13. Type 2 Hypervisors • A Type 2 hypervisor itself is an application that runs a top a traditional operating system. • Often Type 2 hypervisors are easy to install and deploy because much of the hardware configuration work, such as networking and storage, has already been covered by the operating system. • Type 2 hypervisors are not as efficient as Type 1 hypervisors because of thisextra layer between the hypervisor itself and the hardware. • Type 2 hypervisors are also less reliable because there are more points of failure: anything that affects the availability of the underlying operating system also can impact the hypervisor and the guests it supports. • A well-known example of a hosted hypervisor is Oracle VM VirtualBox. Others include VMWare Server and Workstation, Microsoft Virtual PC, KVM, QEMU and Parallels.
  • 14.
  • 15. Features of Virtualzation • Partitioning: In a single physical system by partitioning the available resources it supports multiple applications and operating systems. • Isolation: Each virtual machine runs in an isolated manner from its host system and other virtual machine. Its benifit is if any VM crashes, the other VM and the host system are not affected. • Encapsulation: Each VM is encapsulates its file system. It works like an independant guest software configuration. • Interposition: In VM all the new guest actions are performed through the monitor. these actions are done without the knowledge of the OS.
  • 16. Types of Virtualization • Today the term virtualization is widely applied to a number of concepts, some of which are described below: – Server Virtualization – Client & Desktop Virtualization – Services and Applications Virtualization – Network Virtualization – Storage Virtualization
  • 17. Server Virtualization • It is virtualizing your server infrastructure where you do not have to use any more physical servers for different purposes. • With server virtualization one physical machine is divided many virtual servers. At the core of such virtualization is the concept of a hypervisor (virtual machine monitor). Server virtualization has a large number of benefits for the companies making use of the technology. Among those frequently listed: – Increased Hardware Utilization – This results in hardware saving, reduced administration overhead, and energy savings. – Security – Clean images can be used to restore compromised systems. Virtual machines can also provide sandboxing and isolation to limit attacks. – Development – Debugging and performance monitoring scenarios can be easily setup in a repeatable fashion. Developers also have easy access to operating systems they might not otherwise be able to install on their desktops.
  • 18. Application/Desktop Virtualization • Virtualization is not only a server domain technology. It is being put to a number of uses on the client side at both the desktop and application level. • Such virtualization can be broken out into four categories: – Local Application Virtualization/Streaming – Hosted Application Virtualization – Hosted Desktop Virtualization – Local Desktop Virtualization Client & Desktop Virtualization : This is similar to server virtualization, but this time is on the user’s site where you virtualize their desktops. We change their desktops with thin clients and by utilizing the datacenter resources. Services and Applications Virtualization: The virtualization technology isolates applications from the underlying operating system and from other applications, in order to increase compatibility and manageability. For example – Docker can be used for that purpose.
  • 19. Client & Desktop Virtualization Services and Applications Virtualization
  • 20. Network Virtualization • It is a part of virtualization infrastructure, which is used especially if you are going to visualize your servers. It helps you in creating multiple switching, Vlans, NAT-ing, etc. • Network virtualization involves platform virtualization, often combined with resource virtualization. Network virtualization is categorized as either external, combining many networks, or parts of networks, into a virtual unit, or internal, providing network-like functionality to the software containers on a single system. • Virtual Private Networks (VPNs) have been a common component of the network administrators’ toolbox. • Virtual LANs (VLANs) are another commonly used network virtualization concept.
  • 21. The following illustration shows the VMware schema:
  • 22. Storage Virtualization • This is widely used in datacenters where you have a big storage and it helps you to create, delete, allocated storage to different hardware. This allocation is done through network connection. The leader on storage is SAN. • Storage virtualization refers to the process of abstracting logical storage from physical storage. • General benefits of storage virtualization include: – Migration. – Utilization – Management