SlideShare a Scribd company logo
1 of 20
Compiled by Pitiel
QUESTION 20
EUCALYPTUS IN CLOUD COMPUTING
EUCALYPTUS
 Stands for Elastic utility Computing Architecture for Linking
Your Programs To Useful Systems
 It is an open source platform for implementing Infrastructure
as a Service (IaaS) in a private or hybrid cloud computing
environment
 The Eucalyptus cloud platform pools together existing
virtualized infrastructure to create cloud resources for
infrastructure as a service, network as a service and storage as
a service.
EUCALYPTUSFEATURES
 Supports both Linux and Windows virtual machines
 Works with multiple hypervisors including VMware, Xen and
KVM
 Internal processes communications are secured through SOAP
and WS-Security
 Multiple clusters can be virtualised as a single cloud
EUCALYPTUSARCHITECTURE
MANAGED MODE
 In this mode, it just manages a local network of instances, which includes
security groups and IP addresses
SYSTEM MODE
 In this mode, it assigns a MAC address and attaches the instance’s network
interface to the physical network through the NC’s bridge
STATIC MODE
 In this mode, it assigns IP addresses to instances
THREEMODESOFEUCALYPTUS
 Users can run Amazon or Eucalyptus machine images as
instances on both the clouds
 It has 100% API compatibility with all the AWS services. There
are many tools developed to interact seamlessly between
AWS and Eucalyptus
 It is not very popular but is a string competitor to OpenStack
and CloudStack
ADVANTAGESOFEUCALYPTUS
Architecture Five main components
installation Is easy compared to other IaaS offerings
administration Strong CLI compatible with EC2 API
security Baseline security + component registration
popularity Medium
IaaS offering Public + private (hybrid)
SUMMARY
QUESTION 23
HYPERVISOR
 A hypervisor is a software that creates and runs virtual machines. It is also called a
virtual machine monitor. It isolates the hypervisor operating system and resources
from the virtual machines and enables the creation and management of those VMs
 The physical hardware that is used as a hypervisor is called the host
 It is paart of the private cloud that manages the virtual machines, i.e. it is the part
(program) that enables multiple operating systems to share the same hardware
HYPERVISOR
 Virtualisation of hardware components of the host computer
so that the virtual machines can be supported by the
hardware machines
 Determining and creating the number of virtual machines
 Is responsible for isolating all virtual machines in a single host
computer so that any changes to or usage of virtual machine
does not affect each other or the host itself
ROLESOFHYPERVISOR
 Hypervisor is used for data replication by data analysis firm
dealing with collecting and organising data
 Hypervisor enables server consolidation due to the
downloadable enhancements allowing servers to be
consolidated
USESOFHYPERVISOR
 Consolidates workloads
 It provides economic relaxation around the datacenter, OS backup,
hardware servers and even cuts down on power usage, making it an
overall cost-effective transition
 VMM offers better uptime, faster deployment, reduced workload and cost
predictions for operational needs
 Secures the operating environment from internal conflicts
 Reduces time consumption in testing and run-time debugging
 Automates the management processes, resulting in low operational
expenses
ADVANTAGESOFAHYPERVISOR
 Lacks the capability of running VMs on domestic computers
 Security may become an issue. While robust, hypervisors may
become an easy cyberattack target. Vulnerability increases
because of the centralised system, the company network,
server rooms
 Causes more intrusions and a possible denial-of-service attack
DISADVANTAGESOFHYPERVISOR
Type 1 hypervisor “bare metal” examples of type 1 hypervisors
are Citrix/Xen Server, Vmware ESXi and Microsoft Hyper-V
Type 2 hypervisor: hypervisors run on a host operating system
that provides virtualisation services. Examples of type 2
hypervisors include Microsoft Virtual PC, Oracle Virtual Box,
Vmware Workstation, Oracle Solaris Zones.
TWOMAINTYPESOFHYPERVISORS
 Runs directly on the underlying computer’s physical hardware,
interacting directly with its CPU, memory and physical
storage. For this reason, type 1 hypervisors are also referred
to as bare-metal hypervisors
 A type 1 hypervisor takes the place of the host operating
system
TYPE1HYPERVISOR
 Type 1 hypervisors are highly efficient because they have direct access to
physical hardware. This also increases their security because there is
nothing in between them and the CPU that an attacker could compromise
 Type 1 hypervisors often need a separate management machine to
administer different VMs and control the host hardware
ADVANTAGESOFTYPE1HYPERVISOR
DISADVANTAGESOFTYPE1HYPERVISORS
 Type 2 or hosted hypervisors, also known as client hypervisors
run as a software layer on top of the OS of the host machine.
They are used to abstract guest operating systems from the
host OS. Support guest virtual machines by coordinating calls
for central processing unit (CPU), OS. This makes it easy for an
end user to run a VM on a personal computing (PC) device
TYPE2HYPERVISOR
 The OS takes care of all the hardware
 Installing a type 2 is much easier than that of a type 1
 They have more points of failure since anything that affect the stability of the base
operating system can also affect the guest OS and the virtual machine. When the
base OS needs a reboot, all the VM will also be rebooted.
ADVANTAGESOFTYPE2HYPERVISOR
DISADVANTAGESOFTYPE2HYPERVISORS
T H E E N D
THANKYOUFORYOURCOOPERATION

More Related Content

Similar to E-TECH.pptx

Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud ComputingPyingkodi Maran
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxVivek Shelke
 
Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptxBinod Rimal
 
Platform virtualization.raj
Platform virtualization.rajPlatform virtualization.raj
Platform virtualization.rajNRajaMohanReddy
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...Neha417639
 
virtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfvirtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfKowsalyaJayakumar2
 
Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloudChetna Purohit
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfAkshithaReddy42848
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computingSoumyajit Basu
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containersSelvaraj Kesavan
 
Security challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governanceSecurity challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governanceAdam Bert Lacay
 
Mid term report
Mid term reportMid term report
Mid term reportlokesh039
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computingMayank Aggarwal
 
Virtualization.pdf
Virtualization.pdfVirtualization.pdf
Virtualization.pdfaimarcarillo
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 

Similar to E-TECH.pptx (20)

Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computing
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptx
 
Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptx
 
Platform virtualization.raj
Platform virtualization.rajPlatform virtualization.raj
Platform virtualization.raj
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
virtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfvirtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdf
 
Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloud
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdf
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
 
Vitualisation
VitualisationVitualisation
Vitualisation
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
 
incs775_lect6.ppt
incs775_lect6.pptincs775_lect6.ppt
incs775_lect6.ppt
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Security challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governanceSecurity challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governance
 
Mid term report
Mid term reportMid term report
Mid term report
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computing
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
Virtualization.pdf
Virtualization.pdfVirtualization.pdf
Virtualization.pdf
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

E-TECH.pptx

  • 2. QUESTION 20 EUCALYPTUS IN CLOUD COMPUTING
  • 3. EUCALYPTUS  Stands for Elastic utility Computing Architecture for Linking Your Programs To Useful Systems  It is an open source platform for implementing Infrastructure as a Service (IaaS) in a private or hybrid cloud computing environment  The Eucalyptus cloud platform pools together existing virtualized infrastructure to create cloud resources for infrastructure as a service, network as a service and storage as a service.
  • 4. EUCALYPTUSFEATURES  Supports both Linux and Windows virtual machines  Works with multiple hypervisors including VMware, Xen and KVM  Internal processes communications are secured through SOAP and WS-Security  Multiple clusters can be virtualised as a single cloud
  • 6. MANAGED MODE  In this mode, it just manages a local network of instances, which includes security groups and IP addresses SYSTEM MODE  In this mode, it assigns a MAC address and attaches the instance’s network interface to the physical network through the NC’s bridge STATIC MODE  In this mode, it assigns IP addresses to instances THREEMODESOFEUCALYPTUS
  • 7.  Users can run Amazon or Eucalyptus machine images as instances on both the clouds  It has 100% API compatibility with all the AWS services. There are many tools developed to interact seamlessly between AWS and Eucalyptus  It is not very popular but is a string competitor to OpenStack and CloudStack ADVANTAGESOFEUCALYPTUS
  • 8. Architecture Five main components installation Is easy compared to other IaaS offerings administration Strong CLI compatible with EC2 API security Baseline security + component registration popularity Medium IaaS offering Public + private (hybrid) SUMMARY
  • 10.  A hypervisor is a software that creates and runs virtual machines. It is also called a virtual machine monitor. It isolates the hypervisor operating system and resources from the virtual machines and enables the creation and management of those VMs  The physical hardware that is used as a hypervisor is called the host  It is paart of the private cloud that manages the virtual machines, i.e. it is the part (program) that enables multiple operating systems to share the same hardware HYPERVISOR
  • 11.  Virtualisation of hardware components of the host computer so that the virtual machines can be supported by the hardware machines  Determining and creating the number of virtual machines  Is responsible for isolating all virtual machines in a single host computer so that any changes to or usage of virtual machine does not affect each other or the host itself ROLESOFHYPERVISOR
  • 12.  Hypervisor is used for data replication by data analysis firm dealing with collecting and organising data  Hypervisor enables server consolidation due to the downloadable enhancements allowing servers to be consolidated USESOFHYPERVISOR
  • 13.  Consolidates workloads  It provides economic relaxation around the datacenter, OS backup, hardware servers and even cuts down on power usage, making it an overall cost-effective transition  VMM offers better uptime, faster deployment, reduced workload and cost predictions for operational needs  Secures the operating environment from internal conflicts  Reduces time consumption in testing and run-time debugging  Automates the management processes, resulting in low operational expenses ADVANTAGESOFAHYPERVISOR
  • 14.  Lacks the capability of running VMs on domestic computers  Security may become an issue. While robust, hypervisors may become an easy cyberattack target. Vulnerability increases because of the centralised system, the company network, server rooms  Causes more intrusions and a possible denial-of-service attack DISADVANTAGESOFHYPERVISOR
  • 15. Type 1 hypervisor “bare metal” examples of type 1 hypervisors are Citrix/Xen Server, Vmware ESXi and Microsoft Hyper-V Type 2 hypervisor: hypervisors run on a host operating system that provides virtualisation services. Examples of type 2 hypervisors include Microsoft Virtual PC, Oracle Virtual Box, Vmware Workstation, Oracle Solaris Zones. TWOMAINTYPESOFHYPERVISORS
  • 16.  Runs directly on the underlying computer’s physical hardware, interacting directly with its CPU, memory and physical storage. For this reason, type 1 hypervisors are also referred to as bare-metal hypervisors  A type 1 hypervisor takes the place of the host operating system TYPE1HYPERVISOR
  • 17.  Type 1 hypervisors are highly efficient because they have direct access to physical hardware. This also increases their security because there is nothing in between them and the CPU that an attacker could compromise  Type 1 hypervisors often need a separate management machine to administer different VMs and control the host hardware ADVANTAGESOFTYPE1HYPERVISOR DISADVANTAGESOFTYPE1HYPERVISORS
  • 18.  Type 2 or hosted hypervisors, also known as client hypervisors run as a software layer on top of the OS of the host machine. They are used to abstract guest operating systems from the host OS. Support guest virtual machines by coordinating calls for central processing unit (CPU), OS. This makes it easy for an end user to run a VM on a personal computing (PC) device TYPE2HYPERVISOR
  • 19.  The OS takes care of all the hardware  Installing a type 2 is much easier than that of a type 1  They have more points of failure since anything that affect the stability of the base operating system can also affect the guest OS and the virtual machine. When the base OS needs a reboot, all the VM will also be rebooted. ADVANTAGESOFTYPE2HYPERVISOR DISADVANTAGESOFTYPE2HYPERVISORS
  • 20. T H E E N D THANKYOUFORYOURCOOPERATION