SlideShare a Scribd company logo
1 of 18
Chapter 9: Virtualization and
Cloud Computing
IT Essentials 7.0
2
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
9.1 Virtualization
3
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Virtualization
Cloud Computing and Virtualization
 Virtualization enables a single computer to host multiple independent virtual computers called
virtual machines (VM) that share the host computer hardware.
 Virtualization software separates the actual physical hardware from the VM instances.
 An image of a VM can be saved as a file and then be re-started when required.
 Cloud computing separates the applications from
the hardware.
 Service providers such as Amazon Web Services
(AWS) own and manage the cloud infrastructure.
Virtualization is the foundation which supports
cloud computing.
4
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Virtualization
Traditional Server Deployment
 Traditionally, organizations delivered applications and services using powerful dedicated servers.
 These dedicated servers are equipped with large amounts of RAM, powerful CPUs, and multiple
large storage devices.
 Disadvantages include: wasted resources, single-point of failure, and server sprawl.
5
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Virtualization
Server Virtualization
 Server virtualization takes advantage of idle resources to reduce the number of servers required.
 A program called the hypervisor is used to manage the computer resources and various VMs.
 It provides VMs access to the hardware in the physical machine such as CPUs, memory, disk
controllers, and NICs.
 Each VM runs a complete and separate operating system.
6
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Virtualization
Advantages of Server Virtualization
 Better use of resources
 Less space required
 Less energy consumed
 Reduced cost
 Faster server provisioning
 Maximize server uptime
 Improved disaster recovery
 Support for legacy systems
7
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Virtualization
Client-Side Virtualization
 Client-side virtualization enables
users to run VMs on their local
computer.
 It allows users to test new operating
systems, software, or to run older
software.
 Host computer – the physical
computer controlled by a user.
 Host OS - the operating system
of the host computer.
 Guest OS - the operating system
that is running in the VM.
8
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Virtualization
Type 1 and Type 2 Hypervisors
 Type 1 (native) hypervisor is typically used
with server virtualization. For example,
they are used in data centers and cloud
computing.
 Type 1 hypervisors run directly on the
hardware of a host, and manage the
allocation of system resources to VMs.
 Type 1 hypervisors include VMware
vSphere / ESXi, Xen, and Oracle VM
Server.
9
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Virtualization
Type 1 and Type 2 Hypervisors (Cont.)
 Type 2 (hosted) hypervisors are commonly used with client-side virtualization.
 Type 2 hypervisors work with the host computer to create and use multiple VMs.
 Type 2 hypervisors include VMware Workstation, Windows Hyper-V, and Oracle
VirtualBox.
10
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Virtualization
Virtual Machine Requirements
Windows Hyper-V Minimum Requirements for Windows 10
Host OS Windows 10 Pro or Windows Server (2012 and 2016)
Processor 64-bit CPU with Second Level Address Translation (SLAT)
BIOS CPU support for VM Monitor Mode Extension (VT-c on Intel CPUs)
Memory Minimum 4GB system RAM
Hard Disk Space At least 15GB per VM
Hyper-V is included in Windows 10 Pro
11
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Virtualization
Virtual Machine Requirements (Cont.)
Windows Hyper-V Minimum Requirements for Windows 8
Host OS Windows 8 Pro or Enterprise 64-bit OS
Processor 64-bit CPU with Second Level Address Translation (SLAT)
BIOS BIOS-level Hardware Virtualization support
Memory Minimum 4GB system RAM
Hard Disk Space At least 15GB per Virtual OS
12
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Virtualization
Virtual Machine Requirements (Cont.)
Windows Virtual PC Requirements in Windows 7
Processor 1 GHz 32-bit or 64-bit Processor
Memory 2GB
Hard Disk Space At least 15 GB per Virtual OS
13
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Virtualization
Lab – Install Linux in a Virtual Machine and Explore the GUI
In this lab, you will install a Linux OS in a virtual machine using a desktop virtualization application,
such as VirtualBox. After completing the installation, you will explore the GUI interface.
Objectives:
Part 1: Prepare a Computer for Virtualization
Part 2: Install a Linux OS on the Virtual Machine
Part 3: Explore the GUI
14
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
9.2 Cloud Computing
15
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cloud Computing
How We Use the Cloud
Cloud computing provides users with on-demand delivery of computing services
over the Internet. Cloud computing services are owned and hosted by service
providers. Most of us already use cloud services when you use social media
applications, access an online music library, or use online storage for save photos.
Organizations typically pay cloud providers a usage fee based on user access and
usage of services.
16
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cloud Computing
Cloud Services
 Cloud service providers can provide
various services tailored to meet
customer requirements.
• Software as a Service (SaaS)
• Platform as a Service (PaaS)
• Infrastructure as a Service (IaaS)
 Cloud service providers have extended
the IaaS model to also provide IT as a
service (ITaaS).
17
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cloud Computing
Cloud Computing Characteristics
• On-demand (self-service)
• Rapid elasticity
• Resource pooling
• Measured and metered service
• Broad network access
Lecture 1.pptx

More Related Content

Similar to Lecture 1.pptx

Using Microsoft Virtualization Technologies: Today and ...
Using Microsoft Virtualization Technologies: Today and ...Using Microsoft Virtualization Technologies: Today and ...
Using Microsoft Virtualization Technologies: Today and ...
webhostingguy
 
Virtualization Seminar Beekelaar Dublin 18jan2007
Virtualization Seminar Beekelaar Dublin 18jan2007Virtualization Seminar Beekelaar Dublin 18jan2007
Virtualization Seminar Beekelaar Dublin 18jan2007
rajsri
 
Server Virtualization Sentrana Seminar
Server Virtualization   Sentrana SeminarServer Virtualization   Sentrana Seminar
Server Virtualization Sentrana Seminar
bryanrandol
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
Alan McSweeney
 
WindowsAzureSDK1.7
WindowsAzureSDK1.7WindowsAzureSDK1.7
WindowsAzureSDK1.7
Saravanan G
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
Colloquium
 

Similar to Lecture 1.pptx (20)

Using Microsoft Virtualization Technologies: Today and ...
Using Microsoft Virtualization Technologies: Today and ...Using Microsoft Virtualization Technologies: Today and ...
Using Microsoft Virtualization Technologies: Today and ...
 
Virtualization Seminar Beekelaar Dublin 18jan2007
Virtualization Seminar Beekelaar Dublin 18jan2007Virtualization Seminar Beekelaar Dublin 18jan2007
Virtualization Seminar Beekelaar Dublin 18jan2007
 
Presentation cloud computing workshop - virtualization
Presentation   cloud computing workshop - virtualizationPresentation   cloud computing workshop - virtualization
Presentation cloud computing workshop - virtualization
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Server Virtualization Sentrana Seminar
Server Virtualization   Sentrana SeminarServer Virtualization   Sentrana Seminar
Server Virtualization Sentrana Seminar
 
Virtualisation.pptx
Virtualisation.pptxVirtualisation.pptx
Virtualisation.pptx
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
 
vmware interview Q and a
vmware interview Q and avmware interview Q and a
vmware interview Q and a
 
WindowsAzureSDK1.7
WindowsAzureSDK1.7WindowsAzureSDK1.7
WindowsAzureSDK1.7
 
Virtualizaiton-3.pptx
Virtualizaiton-3.pptxVirtualizaiton-3.pptx
Virtualizaiton-3.pptx
 
A0950107
A0950107A0950107
A0950107
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
 
VMware Interview questions and answers
VMware Interview questions and answersVMware Interview questions and answers
VMware Interview questions and answers
 
Vmwareinterviewqa 100927111554-phpapp01
Vmwareinterviewqa 100927111554-phpapp01Vmwareinterviewqa 100927111554-phpapp01
Vmwareinterviewqa 100927111554-phpapp01
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Presentation on Top Cloud Computing Technologies
Presentation on Top Cloud Computing TechnologiesPresentation on Top Cloud Computing Technologies
Presentation on Top Cloud Computing Technologies
 
Windows Server 2016 First Look (Part 1)
Windows Server 2016 First Look (Part 1)Windows Server 2016 First Look (Part 1)
Windows Server 2016 First Look (Part 1)
 
Cloud stack for z Systems - July 2016
Cloud stack for z Systems - July 2016Cloud stack for z Systems - July 2016
Cloud stack for z Systems - July 2016
 
Virtualization
VirtualizationVirtualization
Virtualization
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
 

Recently uploaded

QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Lecture 1.pptx

  • 1. Chapter 9: Virtualization and Cloud Computing IT Essentials 7.0
  • 2. 2 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9.1 Virtualization
  • 3. 3 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Virtualization Cloud Computing and Virtualization  Virtualization enables a single computer to host multiple independent virtual computers called virtual machines (VM) that share the host computer hardware.  Virtualization software separates the actual physical hardware from the VM instances.  An image of a VM can be saved as a file and then be re-started when required.  Cloud computing separates the applications from the hardware.  Service providers such as Amazon Web Services (AWS) own and manage the cloud infrastructure. Virtualization is the foundation which supports cloud computing.
  • 4. 4 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Virtualization Traditional Server Deployment  Traditionally, organizations delivered applications and services using powerful dedicated servers.  These dedicated servers are equipped with large amounts of RAM, powerful CPUs, and multiple large storage devices.  Disadvantages include: wasted resources, single-point of failure, and server sprawl.
  • 5. 5 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Virtualization Server Virtualization  Server virtualization takes advantage of idle resources to reduce the number of servers required.  A program called the hypervisor is used to manage the computer resources and various VMs.  It provides VMs access to the hardware in the physical machine such as CPUs, memory, disk controllers, and NICs.  Each VM runs a complete and separate operating system.
  • 6. 6 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Virtualization Advantages of Server Virtualization  Better use of resources  Less space required  Less energy consumed  Reduced cost  Faster server provisioning  Maximize server uptime  Improved disaster recovery  Support for legacy systems
  • 7. 7 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Virtualization Client-Side Virtualization  Client-side virtualization enables users to run VMs on their local computer.  It allows users to test new operating systems, software, or to run older software.  Host computer – the physical computer controlled by a user.  Host OS - the operating system of the host computer.  Guest OS - the operating system that is running in the VM.
  • 8. 8 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Virtualization Type 1 and Type 2 Hypervisors  Type 1 (native) hypervisor is typically used with server virtualization. For example, they are used in data centers and cloud computing.  Type 1 hypervisors run directly on the hardware of a host, and manage the allocation of system resources to VMs.  Type 1 hypervisors include VMware vSphere / ESXi, Xen, and Oracle VM Server.
  • 9. 9 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Virtualization Type 1 and Type 2 Hypervisors (Cont.)  Type 2 (hosted) hypervisors are commonly used with client-side virtualization.  Type 2 hypervisors work with the host computer to create and use multiple VMs.  Type 2 hypervisors include VMware Workstation, Windows Hyper-V, and Oracle VirtualBox.
  • 10. 10 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Virtualization Virtual Machine Requirements Windows Hyper-V Minimum Requirements for Windows 10 Host OS Windows 10 Pro or Windows Server (2012 and 2016) Processor 64-bit CPU with Second Level Address Translation (SLAT) BIOS CPU support for VM Monitor Mode Extension (VT-c on Intel CPUs) Memory Minimum 4GB system RAM Hard Disk Space At least 15GB per VM Hyper-V is included in Windows 10 Pro
  • 11. 11 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Virtualization Virtual Machine Requirements (Cont.) Windows Hyper-V Minimum Requirements for Windows 8 Host OS Windows 8 Pro or Enterprise 64-bit OS Processor 64-bit CPU with Second Level Address Translation (SLAT) BIOS BIOS-level Hardware Virtualization support Memory Minimum 4GB system RAM Hard Disk Space At least 15GB per Virtual OS
  • 12. 12 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Virtualization Virtual Machine Requirements (Cont.) Windows Virtual PC Requirements in Windows 7 Processor 1 GHz 32-bit or 64-bit Processor Memory 2GB Hard Disk Space At least 15 GB per Virtual OS
  • 13. 13 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Virtualization Lab – Install Linux in a Virtual Machine and Explore the GUI In this lab, you will install a Linux OS in a virtual machine using a desktop virtualization application, such as VirtualBox. After completing the installation, you will explore the GUI interface. Objectives: Part 1: Prepare a Computer for Virtualization Part 2: Install a Linux OS on the Virtual Machine Part 3: Explore the GUI
  • 14. 14 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9.2 Cloud Computing
  • 15. 15 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cloud Computing How We Use the Cloud Cloud computing provides users with on-demand delivery of computing services over the Internet. Cloud computing services are owned and hosted by service providers. Most of us already use cloud services when you use social media applications, access an online music library, or use online storage for save photos. Organizations typically pay cloud providers a usage fee based on user access and usage of services.
  • 16. 16 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cloud Computing Cloud Services  Cloud service providers can provide various services tailored to meet customer requirements. • Software as a Service (SaaS) • Platform as a Service (PaaS) • Infrastructure as a Service (IaaS)  Cloud service providers have extended the IaaS model to also provide IT as a service (ITaaS).
  • 17. 17 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cloud Computing Cloud Computing Characteristics • On-demand (self-service) • Rapid elasticity • Resource pooling • Measured and metered service • Broad network access