SlideShare a Scribd company logo
1 of 5
Download to read offline
ISSN (online) 2583-455X
BOHR International Journal of Computer Science
2022, Vol. 2, No. 1, pp. 31–35
https://doi.org/10.54646/bijcs.007
www.bohrpub.com
Virtualization in Distributed System: A Brief Overview
Reeya Manandhar and Gajendra Sharma∗
Department of Computer Science and Engineering, Kathmandu University, Dhulikhel, Kavre, Nepal
∗Corresponding author: gajendra.sharma@ku.edu.np
Abstract. Virtual machines are popular because of their efficiency, ease of use, and flexibility. There has been
an increasing demand for the deployment of a robust distributed network for maximizing the performance of
such systems and minimizing the infrastructural cost. In this study, we have discussed various levels at which
virtualization can be implemented for distributed computing, which can contribute to increased efficiency and
performance of distributed computing. The study gives an overview of various types of virtualization techniques
and their benefits. For example, server virtualization helps to create multiple server instances from one physical
server. Such techniques will decrease the infrastructure costs, make the system more scalable, and help in the full
utilization of available resources.
Keywords: Distributed system, virtualization, hypervisor, technology, virtual machine.
INTRODUCTION
The concept of virtual machines has been in the com-
puting community since the early 1960s [8]. The recent
advancement in virtualization technology pursues new
opportunities in delivering services and represents a strate-
gic approach for IT operators to increase their organi-
zational performance. The virtualization technique offers
an isolated, secure system with flexible deployment. Such
mechanisms maximize the reliability, scalability, and fault
tolerance of distributed systems [11].
A distributed system, also known as distributed comput-
ing, is a system consisting of a collection of independent
components located on different machines that commu-
nicate and coordinate actions with each other and are
linked together using the network. All of the nodes in
this network interact and coordinate with each other to
complete tasks, and it appears as a single coherent net-
work to the end-user. The system is highly efficient as
the workload is split and distributed to various nodes for
fast completion. The task running in different nodes forms
a common system where multiple machines can process
the same function at the same time. As computation takes
place separately on each node, adding additional nodes
and functionality as needed is simple, affordable, and
fault-tolerant.
Virtualization is the process of creating virtual instances
of a computer system abstracted from real resources such
as OS, storage devices, or network systems. With it, mul-
tiple instances can run independently and simultaneously
on a single system. Technology advancements have pro-
pelled virtualization to the spotlight of the IT sector. This
technology encompasses a variety of mechanisms and
techniques that address various problems such as perfor-
mance, reliability, security, and resource expenses, which
are the reasons for the rise of this technology.
Distributed virtualization is the process of transparently
sharing resources from several users [15]. Each node is iso-
lated and does not interfere with the other. It helps the end
user to access, store, analyze, and organize the distributed
system components. Various types of virtualizations can be
used to increase performance in distributed systems. Some
of them are OS virtualization, storage virtualization, and
network virtualization. Each of them has its own paradigm
that offers a reliable, secure, and cost-effective distributed
system.
This study gives an overview of virtualization, its type,
and its benefits. The rest of the article is organized as a
literature review in Section “Literature Review”, differ-
ent types of virtualization techniques and their benefits
in Section “Different Types of Virtualizations and Their
Benefits”, and the final section with a concluding note.
31
32 R. Manandhar and G. Sharma
LITERATURE REVIEW
The study [2] presents an x86 virtual machine monitor,
the Xen hypervisor, that enables multiple operating sys-
tems to share conventional hardware in a secure and
resource-managed manner while preserving performance
and functionality. It provides applications such as server
consolidation, co-located hosting facilities, distributed web
services, secure computing platforms, and application
mobility. It provides a platform for the deployment of
network-centric services and addresses the issue related
to host transient servers. It is targeted to host up to 100
virtual machine instances simultaneously. A single virtual
machine can host a real operating system, which may be
securely multiplexed into thousands of unmodified oper-
ating systems. For example, Linux and Windows XP can
be hosted simultaneously with a negligible performance
overhead. Each guest OS handles paging on its own, with
its own guaranteed memory and disk allocation. Guest
OS refers to OSes that Xen can host. Using different vir-
tualization strategies to assess performance in a variety
of microbenchmarks and system-wide testing, Xen sig-
nificantly outperforms rival commercial and open-source
alternatives.
The study [14] presents a self-virtualized device
approach for high-performance I/O virtualization in high-
end systems, permitting guest virtual machines to more
efficiently interact with the virtualized device. A self-
virtualized network interface (SV-NIC) is developed and
tested, which targets the high-end NICs used in the high-
performance domain. The SV-NIC offers virtual inter-
faces (VIFs) to guest virtual machines, manages the
device’s physical resource utilization, and delivers high-
performance network connectivity to guest domains. The
experimental results demonstrate that it is highly scalable
and is about 2X better than the driver-domain approach. It
offers ∼77% higher throughput and ∼53% latency reduc-
tion as compared to the driver-domain approach and
virtual interfaces compared to the Xen hypervisor. The
performance of the SV-NIC enables high performance as
it reduces hypervisor involvement and eliminates driver-
domain involvement in the I/O path.
The study [13] proposes a distributed virtualization sys-
tem (DVS) that allows several instances of a distributed
virtual operating system (VOS) to operate on the same
cluster and can be extended beyond the physical machine
limits. It allocates a subset of nodes for each instance
and shares nodes between them, i.e., supports resource
aggregation and resource partitioning. Each VOS runs
isolated within a distributed container (DC) and can
be executed in different nodes using the same abstract
resources as offered by the DVOS. Each single virtual
resource provided by the host OS on each node acts as
a resource allocation unit. Such granularity allows bet-
ter use of resources and provides greater elasticity and
efficiency. It simplifies application deployment time and
cost and benefits administrators from the process location
transparency because it eliminates the need to deal with IP
addresses, ports, URLs, and other details. A DVS is suitable
for software development applications based on microser-
vices architecture (MSA) or service-oriented architecture
(SOA), as it is inherently distributed. The proposed model
integrates virtualization and DOS technologies to give the
benefits of both, making it appropriate for delivering high-
performance cloud services, including high availability,
replication, elasticity, load balancing, resource manage-
ment, and process migration.
The study [6] explores container-based virtualization
as a lightweight alternative to the hypervisor-based
approach, which can be adopted on smart objects for
enhancing the IoT Cloud service provisioning. It is also
known as operating-system-level virtualization, which
partitions the physical machine resources, creating mul-
tiple isolated user-space instances. It allows IoT Cloud
providers to deploy and analyze its performance on smart
objects in the perspective of an IoT scenario both in terms
of cloud service management and business opportunities.
The two general usage models for containers are the appli-
cation container where a single application runs in the
container and the system container where multiple isolated
instances of user space run at the same time, each one
with its own init process, process space, file system, and
network stack. This technology is also supported by SBC
(single-board computer) devices equipped with a Linux
Container Virtualization (LCV) layer. Some popular con-
tainer engine solutions include Docker, LXC, lmctfy, and
OpenVZ. An experiment is performed using Raspberry Pi
and Docker container engine to investigate the response of
the device when no container and several containers run
according to several configurations that could be adopted
in real use cases. The result shows that the overhead of
container virtualization is minimum with respect to the
overhead due to processing the requests by CoAP servers.
In this study, the Service Level Enforcement Discipline
for Storage (SLEDS) system [7] provides statistical perfor-
mance guarantees on a storage system built from commod-
ity components. It is a distributed controller that manages
client workloads to meet QoS goals. It guarantees that
each client’s storage performance is good as if a subset of
physical resources were dedicated to it and unaffected by
the behavior of other clients. It does so by collecting perfor-
mance samples regularly and throttle (delaying) I/Os from
overly demanding clients whenever other clients suffer
poor performance. It will redirect resources away from
applications that are receiving adequate QoS toward those
with poor performance. The reliability and performance
of I/O service are maintained by decoupling the gate-
way from communications with the server and are based
on a storage area network system for block-level storage
service. Testing the prototype with heterogeneous clients,
they concluded that the system will facilitate both con-
solidated and nonconsolidated worlds where applications
Virtualization in Distributed System: A Brief Overview 33
Table 1. Table representation of above-mentioned related work.
Author Year Objective Algorithm/Mechanism Tools/Protocol
Barham et al. 2003 Enable users to dynamically instantiate
an operating system to execute
whatever they desire
Borrowed Virtual Time (BVT)
scheduling algorithm
2.4 GHz Xeon server with 2GB RAM,
a Broadcom Tigon 3 Gigabit Ethernet
NIC, and a single Hitachi DK32EJ
146GB 10k RPM SCSI disk.
Chambliss et al. 2003 Statistical performance guarantees a
storage system and improves its
effectiveness
Leaky bucket mechanism IBM xSeries 345 servers, with a 2.4
GHz Intel Xeon proces- sor and
512 MB (client)/2 GB (gateway)
RAM, FC SAN fabric
Raj et al. 2007 Investigate the implications of
virtualization for the high-performance
domain, virtualization of peripheral
resources.
Round-robin scheduling algorithm IXP2400-based ethernet board
Lombardi et al. 2011 Identify the security issues of cloud
computing and provide a solution to the
issue.
Based on (KvmSec: A security extension
and KvmSma: Security management
architecture) for the Kernel Virtual
Machines
Python, livibirt, Mysql, Turbogears
Celesti et al. 2016 Explores container virtualization to
analyze its performance on smart objects
from the perspective of a IoT scenario
Container based virtualization, Linux
Container Virtualization (LCV)
Raspberry Pi and Docker container
engine
Pessolani et al. 2019 Integrates Virtualization and DOS
technologies to take the benefits of both
and making proposed system suitable to
deliver provider-class Cloud service
Load balancing, process migration,
consensus, fault detection mechanism
POSIX APIs, RPC protocol
benefit from the reliability of high-end storage devices
and no longer suffer performance failures due to resource
limitations.
The study [12] proposes an architecture, Advanced
Cloud Protection System (ACPS), for monitoring the
integrity of guest virtual machines and the cloud infras-
tructure components while remaining fully transparent to
the service user and the service provider. It shows how
virtualization can increase the security of cloud computing.
It protects the guest’s virtual machines from intruders and
attacks such as worms and viruses. The study highlights
various issues of cloud computing, such as user access,
privacy, data segregation, and recovery mechanism, and
develops a prototype to address those issues. The proto-
type of the proposed ACPS has been fully implemented on
two open-source solutions: Eucalyptus and OpenECP, and
is tested for its effectiveness and performance evaluation.
The findings show that the system is resistant to attacks
and incurs minimal overhead.
The above-mentioned reviews are mentioned in short in
the above table.
DIFFERENT TYPES OF VIRTUALIZATIONS
AND THEIR BENEFITS
Storage Virtualization
Storage virtualization is the process of grouping multiple
physical storage arrays from a virtual area network (SAN)
and making them look like a single virtual storage device.
The process involves abstracting the disks and drives
and presenting them as a single storage unit to facilitate
the application and network-independent management of
storage. It gathers information about the amount of storage
capacity accessible across physical storage components,
combines it, and makes it available to applications [5]. It
provides better utilization and management of storage in
heterogeneous environments. Storage virtualization helps
to address this problem by facilitating easy backup, archiv-
ing, and recovery tasks by consuming less time.
Some of the virtualizing storage are as follows:
• Simplicity:
It simplifies the IT environment as it eliminates
complexities related to data centers by reducing the
amount of hardware needed to run applications. It
enables dynamic storage utilization and virtual scal-
ability of attached storage resources.
• Affordable
It reduces costs related to hardware and other opera-
tional costs as it masks the complexities of managing
infrastructure and resources in memory, networks,
servers, and storage.
• Storage Utilization
It helps in properly partitioning the storage. The
most commonly used data are stored in its highest
performing storage pool, and the least used data are
put in the weakest performance storage pool. They
can be quickly retrieved from virtual storage.
Operating System Virtualization
OS-level virtualization is a technology that partitions the
standard operating system to create multiple isolated
34 R. Manandhar and G. Sharma
virtual machines (VM) so that it can run different appli-
cations handled by multiple users on a single computer at
a time. The kernel of an OS allows more than one isolated
platform instance. Such instances are called containers or
virtualization engines. Such a technique is installed on a
pre-existing operating system, and that operating system
is called the host operating system [10]. The operating
system in OS-level virtualization is configured in such
a way that it behaves like numerous other independent
systems. The virtualized environment accepts instructions
from different users running different applications on the
same machine and does not interfere with each other. It
provides application-transparent virtualization to users by
isolating apps from the OS and offers granular control for
individual applications.
The advantages of operating system virtualization are as
follows:
1. Save time and cost as the user does not require
to install extra hardware support. Fewer machines
mean minimal maintenance, less power, higher elec-
trical saving, and less cooling system requirements.
2. As every instance of this system is virtual, no extra
space is occupied by it.
3. It is not only compatible with small businesses but
also useful for large businesses.
4. By integrating server hardware, OS virtualization
distributes resources across individual servers.
Network Virtualization
Network virtualization is the process of transforming
network functions by combining the available resources
in a network to consolidate multiple physical networks
into one virtual, software-based network [16]. It abstracts
network resources from the underlying hardware and
enables virtual network deployment. Each of the networks
is secure and independent from the others and can be
allocated to a particular server or device in real-time.
Every client has shared access to all the resources on the
network from a single computer. There are two types of
network virtualization: internal virtualization which pro-
vides network-like functionality to software containers to
replicate the functionality of a single network server and
external virtualization which combines multiple local net-
works into a single virtual unit. It intends to optimize
network speed, improve productivity, and manage the
network security of an organization
Some of the benefits of network virtualization are as
follows:
• Faster delivery of application:
Network virtualization automates network configu-
ration, which reduces the deployment time, allowing
for faster delivery of product rollouts or major appli-
cation updates.
• Enhances security
Sensitive data is isolated from one virtual device to
another. So, access to nodes is restricted, making data
more secure.
• Improves manageability
Functional grouping of nodes in a virtual network is
eased. Virtual networks can share the same physical
network, which enhances the utilization of network
resources and allows communication between nodes.
Application Virtualization
Application virtualization, also known as process-level
virtualization, is a technology that allows users to access
and utilize an application from a computer or separate
device other than the one on which it was installed as
if it were installed on a user’s local device. It is useful
when you simply want to virtualize only an application.
The server-based technique is the most common method
to virtualize applications [1]. Remote applications can be
set up on a server by a service provider and sent to an end
user’s computer. The user’s instructions are sent back to
the server to be executed. User experience is the same as
that of an app installed on the real system.
Some of the benefits of virtualized applications are as
follows:
• Simplified management
Instead of manually installing apps on each user’s
workstation, IT administrators simply install an app
once on a central server and then distribute it as
required on user devices via app virtualization, mak-
ing it easier to manage and maintain the application.
• Scalability
Virtual applications can be deployed on any con-
nected device regardless of that device’s operating
system as the app is actually running on the cen-
tralized server. This will lower the organization’s
hardware computing cost. As remote services, many
companies also share application access. It results in
a reduction in software and infrastructure costs. Such
cost reductions are obtained by reducing organiza-
tional needs for several servers, which benefits in
decreased maintenance and power costs.
• Security
Security is maintained across several users. The IT
admin is responsible for managing resources and
controlling user access to the particular application.
If a user’s device is lost, then the IT admin can revoke
sensitive data through remote access.
Server Virtualization
Server virtualization is the process of creating multiple
unique server instances from one physical server, each
running its own operating system independently of mul-
tiple small, isolated virtual servers. It is a cost-effective
Virtualization in Distributed System: A Brief Overview 35
way to provide web hosting services and has boosted
resource utilization to the fullest without having to invest
more in hardware. For creating virtual server instances, a
virtualization software layer called a hypervisor is added
to a host machine [3]. The hypervisor separates the host’s
physical resources from virtual instances. Then virtualiza-
tion software can be used to emulate the physical resources
and create a new virtual server on top of it.
Some of the server virtualization benefits are as follows:
• Server consolidation
Virtualization enables the partition of a single server
onto multiple servers. Due to this, the total number
of servers in the organization can be reduced. This
process is called server consolidation.
• Cost reduction
Server consolidation minimizes costs by increasing
the utilization of existing resources. This eliminates
management costs for those servers, as well as
reduces the energy requirements needed to run the
servers.
• Saves space
We can potentially save a lot of physical space by
hosting multiple virtual servers on fewer physical
servers.
CONCLUSION
The study presents an overview of virtualization in dis-
tributed systems. Various papers related to virtualization
like Xen hypervisor, container-based virtualization, secu-
rity of cloud computing, and storage performance are
discussed in this study. Additionally, different types of
virtualization techniques with its benefits are described. In
conclusion, virtualization in distributed systems enhances
performance, reliability, fault tolerance, flexibility, and
scalability, and minimizes the infrastructure cost of an
organization. As resources are shared transparently among
the nodes, security, privacy, and network management are
some of the key concerns that need to be optimized to make
the virtualization more secure and organized.
REFERENCES
[1] A. (n.d.). What is Application Virtualization? App Virtualization Defini-
tion – Citrix. Citrix.Com. https://www.citrix.com/solutions/vdi-a
nd-daas/what-is-application-virtualization.html
[2] Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A.,
Neugebauer, R., Pratt, I., and Warfield, A. (2003). Xen and the art
of virtualization. Proceedings of the Nineteenth ACM Symposium on
Operating Systems Principles – SOSP ’03. https://doi.org/10.1145/
945445.945462
[3] Bigelow, S. J., and Gillis, A. S. (2021, March 17). What is server
virtualization? The ultimate guide. SearchServerVirtualization. https:
//searchservervirtualization.techtarget.com/definition/server-vir
tualization
[4] Brush, K., and Kirsch, B. (2021, October 13). virtualization. Search-
ServerVirtualization. https://searchservervirtualization.techtar
get.com/definition/virtualization
[5] Castagna, R., and Brown, R. (2021, February 1). storage virtualization.
SearchStorage. https://www.techtarget.com/searchstorage/definit
ion/storage-virtualization
[6] Celesti, A., Mulfari, D., Fazio, M., Villari, M., and Puliafito, A.
(2016). Exploring Container Virtualization in IoT Clouds. 2016 IEEE
International Conference on Smart Computing (SMARTCOMP). https:
//doi.org/10.1109/smartcomp.2016.7501691
[7] Chambliss, D., Alvarez, G., Pandey, P., Jadav, D., Jian Xu, Menon, R.,
and Lee, T. (2003). Performance virtualization for large-scale storage
systems. 22nd International Symposium on Reliable Distributed Systems,
2003. Proceedings. https://doi.org/10.1109/reldis.2003.1238060
[8] Daniels, J. (2009). Server virtualization architecture and implementa-
tion. XRDS: Crossroads, The ACM Magazine for Students, 16(1), 8–12.
https://doi.org/10.1145/1618588.1618592
[9] Figueiredo, R., Dinda, P., and Fortes, J. (2005). Guest Editors’ Intro-
duction: Resource Virtualization Renaissance. Computer, 38(5), 28–31.
https://doi.org/10.1109/mc.2005.159
[10] GeeksforGeeks. (2021, November 9). Operating system based Virtual-
ization. https://www.geeksforgeeks.org/operating-system-based-v
irtualization/
[11] Kaul, A. N. U., Gupta, M. E. E. N. A., and Kaur, K. H. U. S. W. A.
N. T. (2015). Using virtualization for distributed computing. Using
Virtualization for Distributed Computing.
[12] Lombardi, F., and di Pietro, R. (2011). Secure virtualization for cloud
computing. Journal of Network and Computer Applications, 34(4), 1113–
1122. https://doi.org/10.1016/j.jnca.2010.06.008
[13] Pessolani, P. A. (2019). An Architecture Model for a Distributed
Virtualization System. Journal of Computer Science and Technology,
19(2), e17. https://doi.org/10.24215/16666038.19.e17
[14] Raj, H., and Schwan, K. (2007). High performance and scalable
I/O virtualization via self-virtualized devices. Proceedings of the 16th
International Symposium on High Performance Distributed Computing –
HPDC ’07. https://doi.org/10.1145/1272366.1272390
[15] Shewandagn, S. (2022, January 6). Virtualization in Distributed
Systems – Sertsedengle Shewandagn. Medium. https://sertse.mediu
m.com/virtualization-in-distributed-systems-aa54c5c4ee10
[16] Shtil, D. (2020, December 8). What Is Network Virtualization? Gigamon
Blog. https://blog.gigamon.com/2018/01/04/network-virtualizati
on-optimize/
[17] Shukur, H., Zeebaree, S., Zebari, R., Zeebaree, D., Ahmed, O.,
and Salih, A. (2020). Cloud Computing Virtualization of Resources
Allocation for Distributed Systems. Journal of Applied Science and
Technology Trends, 1(3), 98–105. https://doi.org/10.38094/jastt1331

More Related Content

Similar to Virtualization in Distributed System: A Brief Overview

Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computingijccsa
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computingneirew J
 
Performance Analysis of Server Consolidation Algorithms in Virtualized Cloud...
Performance Analysis of Server Consolidation Algorithms in  Virtualized Cloud...Performance Analysis of Server Consolidation Algorithms in  Virtualized Cloud...
Performance Analysis of Server Consolidation Algorithms in Virtualized Cloud...Susheel Thakur
 
Multicloud Deployment of Computing Clusters for Loosely Coupled Multi Task C...
Multicloud Deployment of Computing Clusters for Loosely  Coupled Multi Task C...Multicloud Deployment of Computing Clusters for Loosely  Coupled Multi Task C...
Multicloud Deployment of Computing Clusters for Loosely Coupled Multi Task C...IOSR Journals
 
Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World IRJET Journal
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Cloud computing lab open stack
Cloud computing lab open stackCloud computing lab open stack
Cloud computing lab open stackarunuiet
 
Adoption of Cloud Computing in Healthcare to Improves Patient Care Coordination
Adoption of Cloud Computing in Healthcare to Improves Patient Care CoordinationAdoption of Cloud Computing in Healthcare to Improves Patient Care Coordination
Adoption of Cloud Computing in Healthcare to Improves Patient Care CoordinationMindfire LLC
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAnimesh Chaturvedi
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxbudabrooks46239
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...IOSR Journals
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready referenceHelly Patel
 
ICCT2017: A user mode implementation of filtering rule management plane using...
ICCT2017: A user mode implementation of filtering rule management plane using...ICCT2017: A user mode implementation of filtering rule management plane using...
ICCT2017: A user mode implementation of filtering rule management plane using...Ruo Ando
 
35 content distribution with dynamic migration of services for minimum cost u...
35 content distribution with dynamic migration of services for minimum cost u...35 content distribution with dynamic migration of services for minimum cost u...
35 content distribution with dynamic migration of services for minimum cost u...INFOGAIN PUBLICATION
 

Similar to Virtualization in Distributed System: A Brief Overview (20)

Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Performance Analysis of Server Consolidation Algorithms in Virtualized Cloud...
Performance Analysis of Server Consolidation Algorithms in  Virtualized Cloud...Performance Analysis of Server Consolidation Algorithms in  Virtualized Cloud...
Performance Analysis of Server Consolidation Algorithms in Virtualized Cloud...
 
Multicloud Deployment of Computing Clusters for Loosely Coupled Multi Task C...
Multicloud Deployment of Computing Clusters for Loosely  Coupled Multi Task C...Multicloud Deployment of Computing Clusters for Loosely  Coupled Multi Task C...
Multicloud Deployment of Computing Clusters for Loosely Coupled Multi Task C...
 
lect 1TO 5.pptx
lect 1TO 5.pptxlect 1TO 5.pptx
lect 1TO 5.pptx
 
Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud computing lab open stack
Cloud computing lab open stackCloud computing lab open stack
Cloud computing lab open stack
 
Adoption of Cloud Computing in Healthcare to Improves Patient Care Coordination
Adoption of Cloud Computing in Healthcare to Improves Patient Care CoordinationAdoption of Cloud Computing in Healthcare to Improves Patient Care Coordination
Adoption of Cloud Computing in Healthcare to Improves Patient Care Coordination
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
cloud computing
cloud computingcloud computing
cloud computing
 
F1034047
F1034047F1034047
F1034047
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
H017144148
H017144148H017144148
H017144148
 
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready reference
 
ICCT2017: A user mode implementation of filtering rule management plane using...
ICCT2017: A user mode implementation of filtering rule management plane using...ICCT2017: A user mode implementation of filtering rule management plane using...
ICCT2017: A user mode implementation of filtering rule management plane using...
 
35 content distribution with dynamic migration of services for minimum cost u...
35 content distribution with dynamic migration of services for minimum cost u...35 content distribution with dynamic migration of services for minimum cost u...
35 content distribution with dynamic migration of services for minimum cost u...
 

More from BOHR International Journal of Computer Science (BIJCS)

More from BOHR International Journal of Computer Science (BIJCS) (8)

Object Detection and Ship Classification Using YOLOv5
Object Detection and Ship Classification Using YOLOv5Object Detection and Ship Classification Using YOLOv5
Object Detection and Ship Classification Using YOLOv5
 
A Comprehensive Study on Online Teaching–Learning (OTL) System and Platforms
A Comprehensive Study on Online Teaching–Learning (OTL) System and PlatformsA Comprehensive Study on Online Teaching–Learning (OTL) System and Platforms
A Comprehensive Study on Online Teaching–Learning (OTL) System and Platforms
 
Proposed Arrangements and Cyber Security Challenges in Nuclear Domain: An Exp...
Proposed Arrangements and Cyber Security Challenges in Nuclear Domain: An Exp...Proposed Arrangements and Cyber Security Challenges in Nuclear Domain: An Exp...
Proposed Arrangements and Cyber Security Challenges in Nuclear Domain: An Exp...
 
Disease Prediction Using Machine Learning
Disease Prediction Using Machine LearningDisease Prediction Using Machine Learning
Disease Prediction Using Machine Learning
 
Do US Government and Commercial Media Concern Similar Topics? A Text-mining (...
Do US Government and Commercial Media Concern Similar Topics? A Text-mining (...Do US Government and Commercial Media Concern Similar Topics? A Text-mining (...
Do US Government and Commercial Media Concern Similar Topics? A Text-mining (...
 
Weed Detection Using Convolutional Neural Network
Weed Detection Using Convolutional Neural NetworkWeed Detection Using Convolutional Neural Network
Weed Detection Using Convolutional Neural Network
 
Reframing the Possibilities in Healthcare Using Blue Brain Technology
Reframing the Possibilities in Healthcare Using Blue Brain TechnologyReframing the Possibilities in Healthcare Using Blue Brain Technology
Reframing the Possibilities in Healthcare Using Blue Brain Technology
 
Implementation ofWeb Application for Disease Prediction Using AI
Implementation ofWeb Application for Disease Prediction Using AIImplementation ofWeb Application for Disease Prediction Using AI
Implementation ofWeb Application for Disease Prediction Using AI
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Virtualization in Distributed System: A Brief Overview

  • 1. ISSN (online) 2583-455X BOHR International Journal of Computer Science 2022, Vol. 2, No. 1, pp. 31–35 https://doi.org/10.54646/bijcs.007 www.bohrpub.com Virtualization in Distributed System: A Brief Overview Reeya Manandhar and Gajendra Sharma∗ Department of Computer Science and Engineering, Kathmandu University, Dhulikhel, Kavre, Nepal ∗Corresponding author: gajendra.sharma@ku.edu.np Abstract. Virtual machines are popular because of their efficiency, ease of use, and flexibility. There has been an increasing demand for the deployment of a robust distributed network for maximizing the performance of such systems and minimizing the infrastructural cost. In this study, we have discussed various levels at which virtualization can be implemented for distributed computing, which can contribute to increased efficiency and performance of distributed computing. The study gives an overview of various types of virtualization techniques and their benefits. For example, server virtualization helps to create multiple server instances from one physical server. Such techniques will decrease the infrastructure costs, make the system more scalable, and help in the full utilization of available resources. Keywords: Distributed system, virtualization, hypervisor, technology, virtual machine. INTRODUCTION The concept of virtual machines has been in the com- puting community since the early 1960s [8]. The recent advancement in virtualization technology pursues new opportunities in delivering services and represents a strate- gic approach for IT operators to increase their organi- zational performance. The virtualization technique offers an isolated, secure system with flexible deployment. Such mechanisms maximize the reliability, scalability, and fault tolerance of distributed systems [11]. A distributed system, also known as distributed comput- ing, is a system consisting of a collection of independent components located on different machines that commu- nicate and coordinate actions with each other and are linked together using the network. All of the nodes in this network interact and coordinate with each other to complete tasks, and it appears as a single coherent net- work to the end-user. The system is highly efficient as the workload is split and distributed to various nodes for fast completion. The task running in different nodes forms a common system where multiple machines can process the same function at the same time. As computation takes place separately on each node, adding additional nodes and functionality as needed is simple, affordable, and fault-tolerant. Virtualization is the process of creating virtual instances of a computer system abstracted from real resources such as OS, storage devices, or network systems. With it, mul- tiple instances can run independently and simultaneously on a single system. Technology advancements have pro- pelled virtualization to the spotlight of the IT sector. This technology encompasses a variety of mechanisms and techniques that address various problems such as perfor- mance, reliability, security, and resource expenses, which are the reasons for the rise of this technology. Distributed virtualization is the process of transparently sharing resources from several users [15]. Each node is iso- lated and does not interfere with the other. It helps the end user to access, store, analyze, and organize the distributed system components. Various types of virtualizations can be used to increase performance in distributed systems. Some of them are OS virtualization, storage virtualization, and network virtualization. Each of them has its own paradigm that offers a reliable, secure, and cost-effective distributed system. This study gives an overview of virtualization, its type, and its benefits. The rest of the article is organized as a literature review in Section “Literature Review”, differ- ent types of virtualization techniques and their benefits in Section “Different Types of Virtualizations and Their Benefits”, and the final section with a concluding note. 31
  • 2. 32 R. Manandhar and G. Sharma LITERATURE REVIEW The study [2] presents an x86 virtual machine monitor, the Xen hypervisor, that enables multiple operating sys- tems to share conventional hardware in a secure and resource-managed manner while preserving performance and functionality. It provides applications such as server consolidation, co-located hosting facilities, distributed web services, secure computing platforms, and application mobility. It provides a platform for the deployment of network-centric services and addresses the issue related to host transient servers. It is targeted to host up to 100 virtual machine instances simultaneously. A single virtual machine can host a real operating system, which may be securely multiplexed into thousands of unmodified oper- ating systems. For example, Linux and Windows XP can be hosted simultaneously with a negligible performance overhead. Each guest OS handles paging on its own, with its own guaranteed memory and disk allocation. Guest OS refers to OSes that Xen can host. Using different vir- tualization strategies to assess performance in a variety of microbenchmarks and system-wide testing, Xen sig- nificantly outperforms rival commercial and open-source alternatives. The study [14] presents a self-virtualized device approach for high-performance I/O virtualization in high- end systems, permitting guest virtual machines to more efficiently interact with the virtualized device. A self- virtualized network interface (SV-NIC) is developed and tested, which targets the high-end NICs used in the high- performance domain. The SV-NIC offers virtual inter- faces (VIFs) to guest virtual machines, manages the device’s physical resource utilization, and delivers high- performance network connectivity to guest domains. The experimental results demonstrate that it is highly scalable and is about 2X better than the driver-domain approach. It offers ∼77% higher throughput and ∼53% latency reduc- tion as compared to the driver-domain approach and virtual interfaces compared to the Xen hypervisor. The performance of the SV-NIC enables high performance as it reduces hypervisor involvement and eliminates driver- domain involvement in the I/O path. The study [13] proposes a distributed virtualization sys- tem (DVS) that allows several instances of a distributed virtual operating system (VOS) to operate on the same cluster and can be extended beyond the physical machine limits. It allocates a subset of nodes for each instance and shares nodes between them, i.e., supports resource aggregation and resource partitioning. Each VOS runs isolated within a distributed container (DC) and can be executed in different nodes using the same abstract resources as offered by the DVOS. Each single virtual resource provided by the host OS on each node acts as a resource allocation unit. Such granularity allows bet- ter use of resources and provides greater elasticity and efficiency. It simplifies application deployment time and cost and benefits administrators from the process location transparency because it eliminates the need to deal with IP addresses, ports, URLs, and other details. A DVS is suitable for software development applications based on microser- vices architecture (MSA) or service-oriented architecture (SOA), as it is inherently distributed. The proposed model integrates virtualization and DOS technologies to give the benefits of both, making it appropriate for delivering high- performance cloud services, including high availability, replication, elasticity, load balancing, resource manage- ment, and process migration. The study [6] explores container-based virtualization as a lightweight alternative to the hypervisor-based approach, which can be adopted on smart objects for enhancing the IoT Cloud service provisioning. It is also known as operating-system-level virtualization, which partitions the physical machine resources, creating mul- tiple isolated user-space instances. It allows IoT Cloud providers to deploy and analyze its performance on smart objects in the perspective of an IoT scenario both in terms of cloud service management and business opportunities. The two general usage models for containers are the appli- cation container where a single application runs in the container and the system container where multiple isolated instances of user space run at the same time, each one with its own init process, process space, file system, and network stack. This technology is also supported by SBC (single-board computer) devices equipped with a Linux Container Virtualization (LCV) layer. Some popular con- tainer engine solutions include Docker, LXC, lmctfy, and OpenVZ. An experiment is performed using Raspberry Pi and Docker container engine to investigate the response of the device when no container and several containers run according to several configurations that could be adopted in real use cases. The result shows that the overhead of container virtualization is minimum with respect to the overhead due to processing the requests by CoAP servers. In this study, the Service Level Enforcement Discipline for Storage (SLEDS) system [7] provides statistical perfor- mance guarantees on a storage system built from commod- ity components. It is a distributed controller that manages client workloads to meet QoS goals. It guarantees that each client’s storage performance is good as if a subset of physical resources were dedicated to it and unaffected by the behavior of other clients. It does so by collecting perfor- mance samples regularly and throttle (delaying) I/Os from overly demanding clients whenever other clients suffer poor performance. It will redirect resources away from applications that are receiving adequate QoS toward those with poor performance. The reliability and performance of I/O service are maintained by decoupling the gate- way from communications with the server and are based on a storage area network system for block-level storage service. Testing the prototype with heterogeneous clients, they concluded that the system will facilitate both con- solidated and nonconsolidated worlds where applications
  • 3. Virtualization in Distributed System: A Brief Overview 33 Table 1. Table representation of above-mentioned related work. Author Year Objective Algorithm/Mechanism Tools/Protocol Barham et al. 2003 Enable users to dynamically instantiate an operating system to execute whatever they desire Borrowed Virtual Time (BVT) scheduling algorithm 2.4 GHz Xeon server with 2GB RAM, a Broadcom Tigon 3 Gigabit Ethernet NIC, and a single Hitachi DK32EJ 146GB 10k RPM SCSI disk. Chambliss et al. 2003 Statistical performance guarantees a storage system and improves its effectiveness Leaky bucket mechanism IBM xSeries 345 servers, with a 2.4 GHz Intel Xeon proces- sor and 512 MB (client)/2 GB (gateway) RAM, FC SAN fabric Raj et al. 2007 Investigate the implications of virtualization for the high-performance domain, virtualization of peripheral resources. Round-robin scheduling algorithm IXP2400-based ethernet board Lombardi et al. 2011 Identify the security issues of cloud computing and provide a solution to the issue. Based on (KvmSec: A security extension and KvmSma: Security management architecture) for the Kernel Virtual Machines Python, livibirt, Mysql, Turbogears Celesti et al. 2016 Explores container virtualization to analyze its performance on smart objects from the perspective of a IoT scenario Container based virtualization, Linux Container Virtualization (LCV) Raspberry Pi and Docker container engine Pessolani et al. 2019 Integrates Virtualization and DOS technologies to take the benefits of both and making proposed system suitable to deliver provider-class Cloud service Load balancing, process migration, consensus, fault detection mechanism POSIX APIs, RPC protocol benefit from the reliability of high-end storage devices and no longer suffer performance failures due to resource limitations. The study [12] proposes an architecture, Advanced Cloud Protection System (ACPS), for monitoring the integrity of guest virtual machines and the cloud infras- tructure components while remaining fully transparent to the service user and the service provider. It shows how virtualization can increase the security of cloud computing. It protects the guest’s virtual machines from intruders and attacks such as worms and viruses. The study highlights various issues of cloud computing, such as user access, privacy, data segregation, and recovery mechanism, and develops a prototype to address those issues. The proto- type of the proposed ACPS has been fully implemented on two open-source solutions: Eucalyptus and OpenECP, and is tested for its effectiveness and performance evaluation. The findings show that the system is resistant to attacks and incurs minimal overhead. The above-mentioned reviews are mentioned in short in the above table. DIFFERENT TYPES OF VIRTUALIZATIONS AND THEIR BENEFITS Storage Virtualization Storage virtualization is the process of grouping multiple physical storage arrays from a virtual area network (SAN) and making them look like a single virtual storage device. The process involves abstracting the disks and drives and presenting them as a single storage unit to facilitate the application and network-independent management of storage. It gathers information about the amount of storage capacity accessible across physical storage components, combines it, and makes it available to applications [5]. It provides better utilization and management of storage in heterogeneous environments. Storage virtualization helps to address this problem by facilitating easy backup, archiv- ing, and recovery tasks by consuming less time. Some of the virtualizing storage are as follows: • Simplicity: It simplifies the IT environment as it eliminates complexities related to data centers by reducing the amount of hardware needed to run applications. It enables dynamic storage utilization and virtual scal- ability of attached storage resources. • Affordable It reduces costs related to hardware and other opera- tional costs as it masks the complexities of managing infrastructure and resources in memory, networks, servers, and storage. • Storage Utilization It helps in properly partitioning the storage. The most commonly used data are stored in its highest performing storage pool, and the least used data are put in the weakest performance storage pool. They can be quickly retrieved from virtual storage. Operating System Virtualization OS-level virtualization is a technology that partitions the standard operating system to create multiple isolated
  • 4. 34 R. Manandhar and G. Sharma virtual machines (VM) so that it can run different appli- cations handled by multiple users on a single computer at a time. The kernel of an OS allows more than one isolated platform instance. Such instances are called containers or virtualization engines. Such a technique is installed on a pre-existing operating system, and that operating system is called the host operating system [10]. The operating system in OS-level virtualization is configured in such a way that it behaves like numerous other independent systems. The virtualized environment accepts instructions from different users running different applications on the same machine and does not interfere with each other. It provides application-transparent virtualization to users by isolating apps from the OS and offers granular control for individual applications. The advantages of operating system virtualization are as follows: 1. Save time and cost as the user does not require to install extra hardware support. Fewer machines mean minimal maintenance, less power, higher elec- trical saving, and less cooling system requirements. 2. As every instance of this system is virtual, no extra space is occupied by it. 3. It is not only compatible with small businesses but also useful for large businesses. 4. By integrating server hardware, OS virtualization distributes resources across individual servers. Network Virtualization Network virtualization is the process of transforming network functions by combining the available resources in a network to consolidate multiple physical networks into one virtual, software-based network [16]. It abstracts network resources from the underlying hardware and enables virtual network deployment. Each of the networks is secure and independent from the others and can be allocated to a particular server or device in real-time. Every client has shared access to all the resources on the network from a single computer. There are two types of network virtualization: internal virtualization which pro- vides network-like functionality to software containers to replicate the functionality of a single network server and external virtualization which combines multiple local net- works into a single virtual unit. It intends to optimize network speed, improve productivity, and manage the network security of an organization Some of the benefits of network virtualization are as follows: • Faster delivery of application: Network virtualization automates network configu- ration, which reduces the deployment time, allowing for faster delivery of product rollouts or major appli- cation updates. • Enhances security Sensitive data is isolated from one virtual device to another. So, access to nodes is restricted, making data more secure. • Improves manageability Functional grouping of nodes in a virtual network is eased. Virtual networks can share the same physical network, which enhances the utilization of network resources and allows communication between nodes. Application Virtualization Application virtualization, also known as process-level virtualization, is a technology that allows users to access and utilize an application from a computer or separate device other than the one on which it was installed as if it were installed on a user’s local device. It is useful when you simply want to virtualize only an application. The server-based technique is the most common method to virtualize applications [1]. Remote applications can be set up on a server by a service provider and sent to an end user’s computer. The user’s instructions are sent back to the server to be executed. User experience is the same as that of an app installed on the real system. Some of the benefits of virtualized applications are as follows: • Simplified management Instead of manually installing apps on each user’s workstation, IT administrators simply install an app once on a central server and then distribute it as required on user devices via app virtualization, mak- ing it easier to manage and maintain the application. • Scalability Virtual applications can be deployed on any con- nected device regardless of that device’s operating system as the app is actually running on the cen- tralized server. This will lower the organization’s hardware computing cost. As remote services, many companies also share application access. It results in a reduction in software and infrastructure costs. Such cost reductions are obtained by reducing organiza- tional needs for several servers, which benefits in decreased maintenance and power costs. • Security Security is maintained across several users. The IT admin is responsible for managing resources and controlling user access to the particular application. If a user’s device is lost, then the IT admin can revoke sensitive data through remote access. Server Virtualization Server virtualization is the process of creating multiple unique server instances from one physical server, each running its own operating system independently of mul- tiple small, isolated virtual servers. It is a cost-effective
  • 5. Virtualization in Distributed System: A Brief Overview 35 way to provide web hosting services and has boosted resource utilization to the fullest without having to invest more in hardware. For creating virtual server instances, a virtualization software layer called a hypervisor is added to a host machine [3]. The hypervisor separates the host’s physical resources from virtual instances. Then virtualiza- tion software can be used to emulate the physical resources and create a new virtual server on top of it. Some of the server virtualization benefits are as follows: • Server consolidation Virtualization enables the partition of a single server onto multiple servers. Due to this, the total number of servers in the organization can be reduced. This process is called server consolidation. • Cost reduction Server consolidation minimizes costs by increasing the utilization of existing resources. This eliminates management costs for those servers, as well as reduces the energy requirements needed to run the servers. • Saves space We can potentially save a lot of physical space by hosting multiple virtual servers on fewer physical servers. CONCLUSION The study presents an overview of virtualization in dis- tributed systems. Various papers related to virtualization like Xen hypervisor, container-based virtualization, secu- rity of cloud computing, and storage performance are discussed in this study. Additionally, different types of virtualization techniques with its benefits are described. In conclusion, virtualization in distributed systems enhances performance, reliability, fault tolerance, flexibility, and scalability, and minimizes the infrastructure cost of an organization. As resources are shared transparently among the nodes, security, privacy, and network management are some of the key concerns that need to be optimized to make the virtualization more secure and organized. REFERENCES [1] A. (n.d.). What is Application Virtualization? App Virtualization Defini- tion – Citrix. Citrix.Com. https://www.citrix.com/solutions/vdi-a nd-daas/what-is-application-virtualization.html [2] Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., and Warfield, A. (2003). Xen and the art of virtualization. Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles – SOSP ’03. https://doi.org/10.1145/ 945445.945462 [3] Bigelow, S. J., and Gillis, A. S. (2021, March 17). What is server virtualization? The ultimate guide. SearchServerVirtualization. https: //searchservervirtualization.techtarget.com/definition/server-vir tualization [4] Brush, K., and Kirsch, B. (2021, October 13). virtualization. Search- ServerVirtualization. https://searchservervirtualization.techtar get.com/definition/virtualization [5] Castagna, R., and Brown, R. (2021, February 1). storage virtualization. SearchStorage. https://www.techtarget.com/searchstorage/definit ion/storage-virtualization [6] Celesti, A., Mulfari, D., Fazio, M., Villari, M., and Puliafito, A. (2016). Exploring Container Virtualization in IoT Clouds. 2016 IEEE International Conference on Smart Computing (SMARTCOMP). https: //doi.org/10.1109/smartcomp.2016.7501691 [7] Chambliss, D., Alvarez, G., Pandey, P., Jadav, D., Jian Xu, Menon, R., and Lee, T. (2003). Performance virtualization for large-scale storage systems. 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings. https://doi.org/10.1109/reldis.2003.1238060 [8] Daniels, J. (2009). Server virtualization architecture and implementa- tion. XRDS: Crossroads, The ACM Magazine for Students, 16(1), 8–12. https://doi.org/10.1145/1618588.1618592 [9] Figueiredo, R., Dinda, P., and Fortes, J. (2005). Guest Editors’ Intro- duction: Resource Virtualization Renaissance. Computer, 38(5), 28–31. https://doi.org/10.1109/mc.2005.159 [10] GeeksforGeeks. (2021, November 9). Operating system based Virtual- ization. https://www.geeksforgeeks.org/operating-system-based-v irtualization/ [11] Kaul, A. N. U., Gupta, M. E. E. N. A., and Kaur, K. H. U. S. W. A. N. T. (2015). Using virtualization for distributed computing. Using Virtualization for Distributed Computing. [12] Lombardi, F., and di Pietro, R. (2011). Secure virtualization for cloud computing. Journal of Network and Computer Applications, 34(4), 1113– 1122. https://doi.org/10.1016/j.jnca.2010.06.008 [13] Pessolani, P. A. (2019). An Architecture Model for a Distributed Virtualization System. Journal of Computer Science and Technology, 19(2), e17. https://doi.org/10.24215/16666038.19.e17 [14] Raj, H., and Schwan, K. (2007). High performance and scalable I/O virtualization via self-virtualized devices. Proceedings of the 16th International Symposium on High Performance Distributed Computing – HPDC ’07. https://doi.org/10.1145/1272366.1272390 [15] Shewandagn, S. (2022, January 6). Virtualization in Distributed Systems – Sertsedengle Shewandagn. Medium. https://sertse.mediu m.com/virtualization-in-distributed-systems-aa54c5c4ee10 [16] Shtil, D. (2020, December 8). What Is Network Virtualization? Gigamon Blog. https://blog.gigamon.com/2018/01/04/network-virtualizati on-optimize/ [17] Shukur, H., Zeebaree, S., Zebari, R., Zeebaree, D., Ahmed, O., and Salih, A. (2020). Cloud Computing Virtualization of Resources Allocation for Distributed Systems. Journal of Applied Science and Technology Trends, 1(3), 98–105. https://doi.org/10.38094/jastt1331