SlideShare a Scribd company logo
1 of 55
Virtualization
Prepared by: Assistant prof. Aslamzai
1
Learning Objectives
• Understand the basics of virtualization
• Understand how the different resources such as processors, memory, storage,
and network can be virtualized
• Understand the pros and cons of different approaches to virtualization
• Understand the basics of hypervisor and its security issues
• Understand how cloud computing is different from virtualization
• Understand how cloud computing leverages the virtualization for its different
service models
2
Virtualization
• Virtualization is the idea of partitioning or dividing the resources of a single
server into multiple segregated VMs.
• Virtualization is the idea of dividing a single hard ware or software into
multiple system
• Virtualization technology has been proposed and developed over a
relatively long period.
• The earliest use of VMs was by IBM in 1960, intended to leverage
investments in expensive mainframe computers
3
Virtualization
• Virtualization refers to the act of creating a virtual (rather than actual)
version of something, including (but not limited to) a virtual computer
hardware platform, operating system (OS), storage device, or computer
network resources.
4
Cont..
• Before virtualization
5
Cont.…
• After Virtualization
6
Virtualization Opportunities
• Virtualization is the process of abstracting the physical resources to the pool of
virtual resources that can be given to any virtual machines (VMs). The different
resources can be virtualized:
1. memory
2. processors
3. storage
4. network
7
Processor Virtualization
• Processor virtualization allows the VMs to share the virtual processors that are
abstracted from the physical processors available at the underlying infrastructure.
The virtualization layer abstracts the physical processor to the pool of virtual
processors that is shared by the VMs. The virtualization layer will be normally any
hypervisors.
8
Cont..
9
Memory Virtualization
• The process of providing a virtual main memory to the VMs is known as memory
virtualization or main memory virtualization.
• In main memory virtualization, the physical main memory is mapped to the virtual
main memory as in the virtual memory concepts in most of the OSs. The main idea of
main memory virtualization is to map the virtual page numbers to the physical page
numbers.
• All the modern x86 processors are supporting main memory virtualization. Main
memory virtualization can also be achieved by using the hypervisor software.
Normally, in the virtualized data centers, the unused main memory of the different
servers will consolidate as a virtual main memory pool and can be given to the VMs.
10
Cont.
Memory virtualization
11
Storage Virtualization
• Storage virtualization is a form of resource virtualization where multiple physical
storage disks are abstracted as a pool of virtual storage disks to the VMs. Normally,
the virtualized storage will be called a logical storage.
• The other advanced storage virtualization techniques are storage area networks
(SAN) and network-attached storage (NAS).
12
Cont.
• Storage virtualization
13
Network Virtualization
• Network virtualization is a type of resource virtualization in which the physical
network can be abstracted to create a virtual network. Normally, the physical
network components like router, switch, and Network Interface Card (NIC) will be
controlled by the virtualization software to provide virtual network components.
• The virtual network is a single software-based entity that contains the network
hardware and software resources. Network virtualization can be achieved from
internal network or by combining many external networks.
14
Cont.
• Network virtualization
15
Data Virtualization
• Data virtualization is the ability to retrieve the data without knowing its type and the
physical location where it is stored. It aggregates the heterogeneous data from the
different sources to a single logical/virtual volume of data.
• This logical data can be accessed from any applications such as web services, E-
commerce applications, web portals, Software as a Service (SaaS) applications, and
mobile application.
• It also ensures the single point access to data by aggregating data from different
sources.
16
Cont.
• Data virtualization
17
Application Virtualization
• Application virtualization is the enabling technology for SaaS of cloud computing.
• The application virtualization offers the ability to the user to use the application
without the need to install any software or tools in the machine. Normally, the
applications will be developed and hosted in the central server.
• The hosted application will be again virtualized, and the users will be given the
separated/isolated virtual copy to access.
18
Cont.
• Application virtualization
19
Briefly About Virtualization
• Hypervisor/Virtual Machine
Monitor
• Host Operating System
• Guest Operating System
• Every Virtual Machine is given a
set of virtual hardware.
• Involves many software and
hardware architectural
modifications. (Memory
Management, CPU Management)
20 of
42
When would we use virtualization
• Running different operating system in one computer
• To make best use of computer hardware
• Maintaining capability with older system
21
Approaches to Virtualization
• There are three different approaches to virtualization. Before discussing them, it is
important to know about protection rings in OSs.
• Protection rings are used to isolate the OS from untrusted user applications.
• The OS can be protected with different privilege levels. In protection
ring architecture, the rings are arranged in hierarchical order from ring 0 to ring 3
22
Cont.
23
Cont.
There are three types of approaches followed for virtualization:
1. Full virtualization
2. Para virtualization
3. Hardware-assisted virtualization
24
1.Full Virtualization
Full virtualization is a technique in which a complete installation of one
machine is run on another.
• –The result is a system in which all software running on the server is within
a virtual machine
25
Type of virtualization cont..
• In a fully virtualized deployment, the software running on the server is
displayed on the clients.
26
Type of virtualization cont..
• Virtualization is relevant to cloud computing because it is one of the ways in
which you will access services on the cloud.
• That is, the remote datacenter may be delivering your services in a fully
virtualized format.
27
Type of virtualization cont..
• Full virtualization has been successful for several purposes:
• Sharing a computer system among multiple users
• Isolating users from each other and from the control program
28
Partial virtualization
• Partial virtualization allows multiple operating systems to run on a single
hardware device at the same time by more efficiently using system
resources, like processors and memory
• Partial virtualization typically runs better than the full virtualization
model.
29
Partial virtualization
• In Partial virtualization deployment, many different operating systems can
run simultaneously.
30
Hardware-Assisted Virtualization
• In the two previous approaches, there is an additional overhead of binary
translation or modification of guest OS to achieve virtualization.
• But in this approach, hardware vendors itself, like Intel and AMD, offer the support
for virtualization, which eliminates much overhead involved in the binary translation
and guest OS modification.
• Popular hardware vendors like Intel and AMD has given the hardware extension to
their x86-based processor to support virtualization. For example, the Intel releases
its Intel Virtualization Technology (VT-x) and AMD releases its AMD-v to simplify the
virtualization techniques.
31
Cont.
• In hardware-assisted virtualization, the VMM has the highest privilege (root privilege)
level even though it is working below ring 0.
• The OS resides at ring 0 and the user application at ring 3. Unlike the other
virtualization approaches, the guest OS and the user applications are having the same
privilege level (nonroot privilege level).
• As discussed earlier, the hardware-assisted virtualization technique removes binary
translation and paravirtualization. Here, the OS requests directly the
hypervisor without any translation.
32
Cont.
• Hardware assisted virtualization
33
Summary of three types of virtualization
34
Benefits
• Virtualization can help companies maximize the value of IT investments,
decreasing the server hardware, energy consumption, and cost and
complexity of managing IT systems while increasing the flexibility of the
overall environment.
35
Benefits
• But there are also reduced costs across your organization.
• If you reduce the number of physical servers you use, then you save money
on hardware, cooling, and electricity.
36
hypervisor
• A hypervisor, also called a virtual machine manager (VMM), is a program that allows
multiple operating systems to share a single hardware host.
• Each operating system appears to have the host's processor, memory, and other
resources all to itself. However, the hypervisor is actually controlling the host
processor and resources, allocating what is needed to each operating system in turn
and making sure that the guest operating systems (called virtual machines) cannot
disrupt each other.
37
What is a hypervisor?
• The virtualization tools or hypervisor is the low level program that allows multiple
operating systems to run concurrently on a single host computer.
• hypervisor has two type:
1.native or bare-metal hypervisors
2.hosted hypervisors
38
Native or bare-metal hypervisors
• These hypervisors run directly on the host's hardware to control the
hardware and to manage guest operating systems.
• For this reason, they are sometimes called bare metal hypervisors. A guest
operating system runs as a process on the host.
• Example: Xen Server, VMware ESX/ESXi and Microsoft Hyper-V 2008/2012.
39
Native or bare-metal hypervisors
40
hosted hypervisors
• These hypervisors run on a conventional operating system just as other
computer programs do.
Type-2 hypervisors abstract guest operating systems from the host operating
system.
• For example: VMware Workstation, VMware Player and Virtual Box
41
hosted hypervisors
42
Cont.
43
ESX & ESXi
• ESX (Elastic Sky X) is the VMware’s enterprise server virtualization platform.
• In ESX, VMkernel is the virtualization kernel which is managed by a console operating
system which is also called as Service console.
• Which is linux based and its main purpose is to provide a Management interface for the
host and lot of management agents and other third party software agents are installed on
the service console to provide the functionalists like hardware management and
monitoring of ESX hypervisor.
44
ESX
45
ESXi
• ESXi (Elastic sky X Integrated) is also the VMware’s enterprise server virtualization platform.
In ESXi, Service console is removed. All the VMware related agents and third party agents
such as management and monitoring agents can also run directly on the VMkernel. ESXi
uses Direct Console User Interface (DCUI) instead of a service console to perform
management of ESXi server. ESXi installation will happen very quickly as compared to ESX
installation.
46
ESXi
47
Techniques of VMware
• VMotion
• Storage VMotion
• High Availability
48
VMotion
• VMotion allows you to quickly
move an entire running virtual
machine from one host to
another without any downtime
or interruption to the virtual
machine This is also known as a
“hot” or “live” migration.
• The entire state of a virtual
machine is encapsulated and the
VMFS file system allows both the
source and the target ESX host to
access the virtual machine files
concurrently.
49
Storage VMotion
• Storage VMotion is a new feature introduced
in ESX 3.5, it allows you to migrate a running
virtual machine and its disk files from one
datastore to another on the same ESX host
• The difference between VMotion and
Storage VMotion is that VMotion simply
moves a virtual machine from one ESX host
to another but keeps the storage location of
the VM the same, Storage VMotion on the
other hand changes the storage location of
the virtual machine while it is running and
moves it to another datastore on the same
ESX host. The virtual machine can be moved
to any datastore on the ESX host which
includes local and shared storage.
50
HighAvailability (HA)
• Continuously monitors all hosts in
a cluster and restarts virtual
machines affected by a host failure
on other hosts
• Can also monitor guest OS's for a
failure via a heartbeat and restart
them on the same host in case of a
failure
• Continuously monitors and
chooses the optimal physical
servers within a resource pool on
which to restart virtual machines
51
52
Summary
• Virtualization is a widely used technology in the IT industry to increase resource
utilization and ROI. It allows the same physical infrastructure to be shared between
multiple OSs and applications. The other benefits of virtualization include dynamic
data center, green IT support, ease of administration, and improved disaster
recovery. There are three types of approaches used to achieve virtualization, namely
full virtualization, paravirtualization, and hardware-assisted virtualization. Full
virtualization completely abstracts the guest OS from the underlying infrastructure.
Paravirtualization provides partial abstraction of the guest OS from the underlying
infrastructure with slight modification of the guest OS. In hardware-assisted
virtualization, the hardware vendor itself offers the support for virtualization.
Hypervisors are the key drivers in enabling virtualization in large-scale cloud data
centers. There are two types of hypervisors available, namely type 1 or bare metal
hypervisor and type 2 or hosted hypervisors.
53
Cont.
• Type 1 hypervisors can directly interact with the underlying infrastructure without
the help of the host OS. Type 2 hypervisors need the host OS to interact with the
underlying infrastructure. Since hypervisors are used as the enabling technology in
virtualized data centers, there are different types of attacks targeted on the
hypervisors to disrupt the servers. Normally, the attacks are performed by malicious
codes to compromise the hypervisors. The attacks may target both the guest OS or
host OS. The attacks can be mitigated by strong guest isolation, frequent updates,
enabling least privilege policies, monitoring tools, etc. Virtualization helps in
creating multitenant cloud environment, where a single instance of the resource can
be shared by multiple users. Cloud computing and virtualization are different. Cloud
computing uses virtualization with utility computing to provide different services
such as IaaS, PaaS, and SaaS.
54
Thanks
55

More Related Content

Similar to Virtualization Basics & Cloud Computing

Virtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudVirtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudNishant Munjal
 
Cloud computing 3 cloud and virtualisation
Cloud computing 3 cloud and virtualisationCloud computing 3 cloud and virtualisation
Cloud computing 3 cloud and virtualisationVaibhav Khanna
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containersSelvaraj Kesavan
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud ComputingJamie Shoup
 
Introduction to Virtualization
Introduction to Virtualization Introduction to Virtualization
Introduction to Virtualization Wellshop.pk
 
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravym456
 
Virtualization And Containerization.pptx
Virtualization And Containerization.pptxVirtualization And Containerization.pptx
Virtualization And Containerization.pptxSMIT PAREKH
 
Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptxBinod Rimal
 
Lecture1(VM).pptx
Lecture1(VM).pptxLecture1(VM).pptx
Lecture1(VM).pptxRiyaBatool
 
Introductin to virtualization i
Introductin to virtualization   iIntroductin to virtualization   i
Introductin to virtualization iParth Patel
 

Similar to Virtualization Basics & Cloud Computing (20)

Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Virtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudVirtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of Cloud
 
Cloud computing 3 cloud and virtualisation
Cloud computing 3 cloud and virtualisationCloud computing 3 cloud and virtualisation
Cloud computing 3 cloud and virtualisation
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
 
unit 2.ppt
unit 2.pptunit 2.ppt
unit 2.ppt
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud Computing
 
Introduction to Virtualization
Introduction to Virtualization Introduction to Virtualization
Introduction to Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
 
Virtualization And Containerization.pptx
Virtualization And Containerization.pptxVirtualization And Containerization.pptx
Virtualization And Containerization.pptx
 
Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptx
 
1 (3).pptx
1 (3).pptx1 (3).pptx
1 (3).pptx
 
Lecture1(VM).pptx
Lecture1(VM).pptxLecture1(VM).pptx
Lecture1(VM).pptx
 
Introductin to virtualization i
Introductin to virtualization   iIntroductin to virtualization   i
Introductin to virtualization i
 
Virtulization ppt
Virtulization pptVirtulization ppt
Virtulization ppt
 
2_Virtualization.pptx
2_Virtualization.pptx2_Virtualization.pptx
2_Virtualization.pptx
 
UNIT 1.pdf
UNIT 1.pdfUNIT 1.pdf
UNIT 1.pdf
 

More from AnsarHasas1

Edge Computing Vs Cloud Computing for IT.pdf
Edge Computing Vs Cloud Computing for IT.pdfEdge Computing Vs Cloud Computing for IT.pdf
Edge Computing Vs Cloud Computing for IT.pdfAnsarHasas1
 
9-clustering-.pptx
9-clustering-.pptx9-clustering-.pptx
9-clustering-.pptxAnsarHasas1
 
Case Study Research.pptx
Case Study Research.pptxCase Study Research.pptx
Case Study Research.pptxAnsarHasas1
 
Chapter 3 Research Design (1).pptx
Chapter 3 Research Design (1).pptxChapter 3 Research Design (1).pptx
Chapter 3 Research Design (1).pptxAnsarHasas1
 
Final+Version+Of+Today+Presentation.ppt
Final+Version+Of+Today+Presentation.pptFinal+Version+Of+Today+Presentation.ppt
Final+Version+Of+Today+Presentation.pptAnsarHasas1
 
Chapter 2 Research Process.pptx
Chapter 2 Research Process.pptxChapter 2 Research Process.pptx
Chapter 2 Research Process.pptxAnsarHasas1
 

More from AnsarHasas1 (6)

Edge Computing Vs Cloud Computing for IT.pdf
Edge Computing Vs Cloud Computing for IT.pdfEdge Computing Vs Cloud Computing for IT.pdf
Edge Computing Vs Cloud Computing for IT.pdf
 
9-clustering-.pptx
9-clustering-.pptx9-clustering-.pptx
9-clustering-.pptx
 
Case Study Research.pptx
Case Study Research.pptxCase Study Research.pptx
Case Study Research.pptx
 
Chapter 3 Research Design (1).pptx
Chapter 3 Research Design (1).pptxChapter 3 Research Design (1).pptx
Chapter 3 Research Design (1).pptx
 
Final+Version+Of+Today+Presentation.ppt
Final+Version+Of+Today+Presentation.pptFinal+Version+Of+Today+Presentation.ppt
Final+Version+Of+Today+Presentation.ppt
 
Chapter 2 Research Process.pptx
Chapter 2 Research Process.pptxChapter 2 Research Process.pptx
Chapter 2 Research Process.pptx
 

Recently uploaded

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Virtualization Basics & Cloud Computing

  • 2. Learning Objectives • Understand the basics of virtualization • Understand how the different resources such as processors, memory, storage, and network can be virtualized • Understand the pros and cons of different approaches to virtualization • Understand the basics of hypervisor and its security issues • Understand how cloud computing is different from virtualization • Understand how cloud computing leverages the virtualization for its different service models 2
  • 3. Virtualization • Virtualization is the idea of partitioning or dividing the resources of a single server into multiple segregated VMs. • Virtualization is the idea of dividing a single hard ware or software into multiple system • Virtualization technology has been proposed and developed over a relatively long period. • The earliest use of VMs was by IBM in 1960, intended to leverage investments in expensive mainframe computers 3
  • 4. Virtualization • Virtualization refers to the act of creating a virtual (rather than actual) version of something, including (but not limited to) a virtual computer hardware platform, operating system (OS), storage device, or computer network resources. 4
  • 7. Virtualization Opportunities • Virtualization is the process of abstracting the physical resources to the pool of virtual resources that can be given to any virtual machines (VMs). The different resources can be virtualized: 1. memory 2. processors 3. storage 4. network 7
  • 8. Processor Virtualization • Processor virtualization allows the VMs to share the virtual processors that are abstracted from the physical processors available at the underlying infrastructure. The virtualization layer abstracts the physical processor to the pool of virtual processors that is shared by the VMs. The virtualization layer will be normally any hypervisors. 8
  • 10. Memory Virtualization • The process of providing a virtual main memory to the VMs is known as memory virtualization or main memory virtualization. • In main memory virtualization, the physical main memory is mapped to the virtual main memory as in the virtual memory concepts in most of the OSs. The main idea of main memory virtualization is to map the virtual page numbers to the physical page numbers. • All the modern x86 processors are supporting main memory virtualization. Main memory virtualization can also be achieved by using the hypervisor software. Normally, in the virtualized data centers, the unused main memory of the different servers will consolidate as a virtual main memory pool and can be given to the VMs. 10
  • 12. Storage Virtualization • Storage virtualization is a form of resource virtualization where multiple physical storage disks are abstracted as a pool of virtual storage disks to the VMs. Normally, the virtualized storage will be called a logical storage. • The other advanced storage virtualization techniques are storage area networks (SAN) and network-attached storage (NAS). 12
  • 14. Network Virtualization • Network virtualization is a type of resource virtualization in which the physical network can be abstracted to create a virtual network. Normally, the physical network components like router, switch, and Network Interface Card (NIC) will be controlled by the virtualization software to provide virtual network components. • The virtual network is a single software-based entity that contains the network hardware and software resources. Network virtualization can be achieved from internal network or by combining many external networks. 14
  • 16. Data Virtualization • Data virtualization is the ability to retrieve the data without knowing its type and the physical location where it is stored. It aggregates the heterogeneous data from the different sources to a single logical/virtual volume of data. • This logical data can be accessed from any applications such as web services, E- commerce applications, web portals, Software as a Service (SaaS) applications, and mobile application. • It also ensures the single point access to data by aggregating data from different sources. 16
  • 18. Application Virtualization • Application virtualization is the enabling technology for SaaS of cloud computing. • The application virtualization offers the ability to the user to use the application without the need to install any software or tools in the machine. Normally, the applications will be developed and hosted in the central server. • The hosted application will be again virtualized, and the users will be given the separated/isolated virtual copy to access. 18
  • 20. Briefly About Virtualization • Hypervisor/Virtual Machine Monitor • Host Operating System • Guest Operating System • Every Virtual Machine is given a set of virtual hardware. • Involves many software and hardware architectural modifications. (Memory Management, CPU Management) 20 of 42
  • 21. When would we use virtualization • Running different operating system in one computer • To make best use of computer hardware • Maintaining capability with older system 21
  • 22. Approaches to Virtualization • There are three different approaches to virtualization. Before discussing them, it is important to know about protection rings in OSs. • Protection rings are used to isolate the OS from untrusted user applications. • The OS can be protected with different privilege levels. In protection ring architecture, the rings are arranged in hierarchical order from ring 0 to ring 3 22
  • 24. Cont. There are three types of approaches followed for virtualization: 1. Full virtualization 2. Para virtualization 3. Hardware-assisted virtualization 24
  • 25. 1.Full Virtualization Full virtualization is a technique in which a complete installation of one machine is run on another. • –The result is a system in which all software running on the server is within a virtual machine 25
  • 26. Type of virtualization cont.. • In a fully virtualized deployment, the software running on the server is displayed on the clients. 26
  • 27. Type of virtualization cont.. • Virtualization is relevant to cloud computing because it is one of the ways in which you will access services on the cloud. • That is, the remote datacenter may be delivering your services in a fully virtualized format. 27
  • 28. Type of virtualization cont.. • Full virtualization has been successful for several purposes: • Sharing a computer system among multiple users • Isolating users from each other and from the control program 28
  • 29. Partial virtualization • Partial virtualization allows multiple operating systems to run on a single hardware device at the same time by more efficiently using system resources, like processors and memory • Partial virtualization typically runs better than the full virtualization model. 29
  • 30. Partial virtualization • In Partial virtualization deployment, many different operating systems can run simultaneously. 30
  • 31. Hardware-Assisted Virtualization • In the two previous approaches, there is an additional overhead of binary translation or modification of guest OS to achieve virtualization. • But in this approach, hardware vendors itself, like Intel and AMD, offer the support for virtualization, which eliminates much overhead involved in the binary translation and guest OS modification. • Popular hardware vendors like Intel and AMD has given the hardware extension to their x86-based processor to support virtualization. For example, the Intel releases its Intel Virtualization Technology (VT-x) and AMD releases its AMD-v to simplify the virtualization techniques. 31
  • 32. Cont. • In hardware-assisted virtualization, the VMM has the highest privilege (root privilege) level even though it is working below ring 0. • The OS resides at ring 0 and the user application at ring 3. Unlike the other virtualization approaches, the guest OS and the user applications are having the same privilege level (nonroot privilege level). • As discussed earlier, the hardware-assisted virtualization technique removes binary translation and paravirtualization. Here, the OS requests directly the hypervisor without any translation. 32
  • 33. Cont. • Hardware assisted virtualization 33
  • 34. Summary of three types of virtualization 34
  • 35. Benefits • Virtualization can help companies maximize the value of IT investments, decreasing the server hardware, energy consumption, and cost and complexity of managing IT systems while increasing the flexibility of the overall environment. 35
  • 36. Benefits • But there are also reduced costs across your organization. • If you reduce the number of physical servers you use, then you save money on hardware, cooling, and electricity. 36
  • 37. hypervisor • A hypervisor, also called a virtual machine manager (VMM), is a program that allows multiple operating systems to share a single hardware host. • Each operating system appears to have the host's processor, memory, and other resources all to itself. However, the hypervisor is actually controlling the host processor and resources, allocating what is needed to each operating system in turn and making sure that the guest operating systems (called virtual machines) cannot disrupt each other. 37
  • 38. What is a hypervisor? • The virtualization tools or hypervisor is the low level program that allows multiple operating systems to run concurrently on a single host computer. • hypervisor has two type: 1.native or bare-metal hypervisors 2.hosted hypervisors 38
  • 39. Native or bare-metal hypervisors • These hypervisors run directly on the host's hardware to control the hardware and to manage guest operating systems. • For this reason, they are sometimes called bare metal hypervisors. A guest operating system runs as a process on the host. • Example: Xen Server, VMware ESX/ESXi and Microsoft Hyper-V 2008/2012. 39
  • 40. Native or bare-metal hypervisors 40
  • 41. hosted hypervisors • These hypervisors run on a conventional operating system just as other computer programs do. Type-2 hypervisors abstract guest operating systems from the host operating system. • For example: VMware Workstation, VMware Player and Virtual Box 41
  • 44. ESX & ESXi • ESX (Elastic Sky X) is the VMware’s enterprise server virtualization platform. • In ESX, VMkernel is the virtualization kernel which is managed by a console operating system which is also called as Service console. • Which is linux based and its main purpose is to provide a Management interface for the host and lot of management agents and other third party software agents are installed on the service console to provide the functionalists like hardware management and monitoring of ESX hypervisor. 44
  • 46. ESXi • ESXi (Elastic sky X Integrated) is also the VMware’s enterprise server virtualization platform. In ESXi, Service console is removed. All the VMware related agents and third party agents such as management and monitoring agents can also run directly on the VMkernel. ESXi uses Direct Console User Interface (DCUI) instead of a service console to perform management of ESXi server. ESXi installation will happen very quickly as compared to ESX installation. 46
  • 48. Techniques of VMware • VMotion • Storage VMotion • High Availability 48
  • 49. VMotion • VMotion allows you to quickly move an entire running virtual machine from one host to another without any downtime or interruption to the virtual machine This is also known as a “hot” or “live” migration. • The entire state of a virtual machine is encapsulated and the VMFS file system allows both the source and the target ESX host to access the virtual machine files concurrently. 49
  • 50. Storage VMotion • Storage VMotion is a new feature introduced in ESX 3.5, it allows you to migrate a running virtual machine and its disk files from one datastore to another on the same ESX host • The difference between VMotion and Storage VMotion is that VMotion simply moves a virtual machine from one ESX host to another but keeps the storage location of the VM the same, Storage VMotion on the other hand changes the storage location of the virtual machine while it is running and moves it to another datastore on the same ESX host. The virtual machine can be moved to any datastore on the ESX host which includes local and shared storage. 50
  • 51. HighAvailability (HA) • Continuously monitors all hosts in a cluster and restarts virtual machines affected by a host failure on other hosts • Can also monitor guest OS's for a failure via a heartbeat and restart them on the same host in case of a failure • Continuously monitors and chooses the optimal physical servers within a resource pool on which to restart virtual machines 51
  • 52. 52
  • 53. Summary • Virtualization is a widely used technology in the IT industry to increase resource utilization and ROI. It allows the same physical infrastructure to be shared between multiple OSs and applications. The other benefits of virtualization include dynamic data center, green IT support, ease of administration, and improved disaster recovery. There are three types of approaches used to achieve virtualization, namely full virtualization, paravirtualization, and hardware-assisted virtualization. Full virtualization completely abstracts the guest OS from the underlying infrastructure. Paravirtualization provides partial abstraction of the guest OS from the underlying infrastructure with slight modification of the guest OS. In hardware-assisted virtualization, the hardware vendor itself offers the support for virtualization. Hypervisors are the key drivers in enabling virtualization in large-scale cloud data centers. There are two types of hypervisors available, namely type 1 or bare metal hypervisor and type 2 or hosted hypervisors. 53
  • 54. Cont. • Type 1 hypervisors can directly interact with the underlying infrastructure without the help of the host OS. Type 2 hypervisors need the host OS to interact with the underlying infrastructure. Since hypervisors are used as the enabling technology in virtualized data centers, there are different types of attacks targeted on the hypervisors to disrupt the servers. Normally, the attacks are performed by malicious codes to compromise the hypervisors. The attacks may target both the guest OS or host OS. The attacks can be mitigated by strong guest isolation, frequent updates, enabling least privilege policies, monitoring tools, etc. Virtualization helps in creating multitenant cloud environment, where a single instance of the resource can be shared by multiple users. Cloud computing and virtualization are different. Cloud computing uses virtualization with utility computing to provide different services such as IaaS, PaaS, and SaaS. 54

Editor's Notes

  1. Understand the Difference between ESX and ESXi http://www.vmware.com/products/vsphere/esxi-and-esx/compare.html
  2. Understand the Difference between ESX and ESXi http://www.vmware.com/products/vsphere/esxi-and-esx/compare.html
  3. Understand the Difference between ESX and ESXi http://www.vmware.com/products/vsphere/esxi-and-esx/compare.html
  4. Understand the Difference between ESX and ESXi http://www.vmware.com/products/vsphere/esxi-and-esx/compare.html
  5. VMware VMotion http://www.vmware.com/files/pdf/VMware-VMotion-DS-EN.pdf
  6. VMware Storage VMotion http://www.vmware.com/files/pdf/VMware-Storage-VMotion-DS-EN.pdf
  7. VMware High Availability http://www.vmware.com/files/pdf/VMware-High-Availability-DS-EN.pdf