SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE)
e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 5 Ver. II (Sep - Oct 2016), PP 187-191
www.iosrjournals.org
DOI: 10.9790/1676-110502187191 www.iosrjournals.org 187 | Page
Virtualization Approach: Theory and Application
Hamdani1
, Andysah Putera Utama Siahaan2
1
Faculty of Engineering,Universitas Pembangunan Panca Budi, Medan, Indonesia
2
Faculty of Computer Science,Universitas Pembangunan Panca Budi, Medan, Indonesia
Abstract: Virtualization is a new method regarding using computing resources efficiently, by maximizing
energy efficiency, extend the life of the hardware and also recycles. Virtualization technology is a system of
work done by the software can merge some real physical systems into a single virtual form commonly known as
virtualization without prejudice advantages over the single system. Of course, this system can reduce the
amount of hardware, electrical energy consumption and time used thereby increasing the level of efficiency and
effectiveness. Also, virtualization certainly reduces heat energy arising from the number of installed hardware,
thereby reducing the increase in temperature geothermal (Global Warming). Some virtualization includes
Server Virtualization, Network Virtualization, Memory Virtualization, Grid Computing, Application
Virtualization, Storage Virtualization, Virtualization and Thin Client Platform.
Keywords: Virtualization, Virtual Machine
I. Introduction
Virtualization is a method that emulates a real system into a virtual system that physically separated
dependence. In other words, something that has been virtualized can no longer be seen with the eye or held, but
has the same function as the original system. The purpose of virtualization is to make savings from all aspects.
Virtualization is a concept that was first developed in the 1960s to manage mainframe hardware. And also in
1960-based computer x86 architecture are faced with the same problem, namely rigidity and
underutilization.Virtualization is always used first of all just to test the invention or new system over an existing
system. It aims to get results or to test whether the new system has still to be compatible or needed further
improvement. Then some subsequent period virtualization can stand alone in a parent (host) system.This
understanding tries to describe the virtualization technique. It describes the basic rule of the virtuality.
II. Theories
2.1 Virtual Machine
Virtual machine (VM) is a device that typically is a software or operating system, which can not be
seen physically but can be run in an environment other. In this case, the VM is referred to as a "guest" because
the device only rides, while the environment is running so-called "host." The basic concept of the virtual
machine is that it emulates the hardware of a computer consisting of a CPU, memory, HDD into multiple
execution environments, so that seems to have the physical device on each virtualization. VM to appear for their
trial to run multiple operating systems on a single computer.
Fig. 1 Virtual Machine Architecture
Virtualization Approach: Theory and Application
DOI: 10.9790/1676-110502187191 www.iosrjournals.org 188 | Page
Figure 1 shows the virtual machine architecture. The server can covers several virtual machines
simultaneously. Virtual machine technology has many functions such as hardware consolidation, facilitate the
rescue system, and run the software earlier. One of the most important applications of virtual machine
technology is cross-platform integration. Some other important applications are:
1. Server Consolidation. If several servers run applications that only takes up very little resources, VM can
be used to incorporate the applications that run on only one server, even if the application requires that the
operating system is different.
2. Automation and consolidation. Each VM can act as different environments; this allows developers so no
need to provide environment physically.
3. Easy System Recovery. Virtualization can be used for system recovery that requires portability and
flexibility across platforms.
4. The demonstration software. With VM technology, clean operating system, and its configuration can be
provided quickly.
A. Virtualization Types
Virtual Machine provides convenience regarding the distribution of hardware resources that exist in
each guest system, each running a guest operating system itself. The software provides the virtualization is
called a virtual machine monitor or hypervisor. A hypervisor can run on hardware or an operating system.
The main advantages and VM system are:
1. Various operating system environment can be run on the same computer, in strong isolation between
environments
2. VM can provide the instruction set architecture (ISA) that is different to that of the hardware.
The operating system on the guest does not have the same operating system. The use of the VM to
support a variety of different operating systems became so popular in embedded systems, where the real-time
operating system is used in conjunction with a high-level operating system such as Linux or Windows. Another
function is to sandbox that isolates changes in the codes that suspicion arises from the OS that can not be trusted
because it is still in the development stage. VM has other benefits in the development of operating systems such
as access better debugging and reboots faster than the original machine.
2.2 Virtualization Process
A virtual machine process sometimes called an application virtual machine, runs as a normal
application inside an operating system and supports the process. VM process was created at the time the process
was initiated and is destroyed when the process exits. The aim is to provide a programming environment that is
platform-independent which abstracts the details of the software or operating system and allow a program
executed in the same way on any platform. The process VM provides a high-level abstraction process is
implemented clicking VM-use interpreters. VM-type became popular with the Java programming language,
which is implemented by the Java Virtual Machine. Another example is the .NET Framework, which runs on a
VM called the Common Language Runtime. A special case of the VM process is a system that abstracts the
communication mechanism of cluster computers. VMnya is not a single process, but rather one process per
physical machine in the cluster. VM is designed to simplify the work program an application in parallel with
letting the programmer focus on algorithms rather than the communication mechanisms provided by the
interconnect and operating systems. The fact that communication was not hidden and the cluster is not cultivated
represented as a single machine.
2.3 Virtualization Sample
In GNU / Linux, one is the famous virtual machine is Vmware. VMware allows multiple operating
systems to run on one machine PC simultaneously. It can be done without having to reconfigure the storage
media and reboot. On the Virtual Machine supplied will be executed by the operating system as desired. In this
way, the user can boot up an operating system Linux as the host operating system and then run other operating
systems, such as Microsoft Windows or Solaris. The operating system that runs on the host operating system is
known as the guest operating system.
Virtualization Approach: Theory and Application
DOI: 10.9790/1676-110502187191 www.iosrjournals.org 189 | Page
Fig. 2VMware Virtual Machine Scheme
VMware logically regarded as software is often used for the experimental new operating system, games,
applications, to install two operating systems and run (cross platform) on the same drive without having to dual-
boot. Technically we just press Alt + Tab to switch operating systems. But VMware is not the emulator as well
as PS2 emulator because it does not emulate a CPU and hardware in a Virtual Machine (VM), but only allow
other operating systems to run in parallel with the operating system has been running. Each Virtual Machine
(VM) can have its IP address that can be tested connections of the connected network (ping). The sample of this
can be seen in Figure 2. It describes the scheme of the virtualization usage.
III. Implementation
Before the virtualization runs, the operating system must first be executed first. If the operating system
on a computer having problems, eating the worst thing to do is reinstall. While in the world of virtualization
everything changed 180 degrees.
3.1 Full Virtualization
Full Virtualization is a way of doing virtualization for the various virtual machine environment, where
the model of full virtualization provides a complete modeling of hardware. The complete simulation allows any
software that can be executed directly on the host operating system can also be executed on the guest operating
systems in, including all operating systems.One illustration of full virtualization is a control program of the
operating system CP / CMS from IBM. Each user of the CP / CMS given a computer system (which is a virtual
machine) that stands alone. The virtual machine has all the capabilities of the underlying hardware, and to its
users, the virtual machine can not be distinguished by a system of its own. Simulations carried out thoroughly
and based on the principle of operation of hardware that includes instruction sets, main memory, interrupts,
exceptions, and device access. A result is a machine that can be shared among many users.Full virtualization is
only possible with the right combination of hardware and the right software. For example, it is not possible for
most systems IBM System / 360. X86 systems also were once thought not to be able to run full virtualization,
but by using the binary technique translation, VMware can run full virtualization.
The main challenge in full virtualization is the simulation of the operation that requires special
privileges such as instruction M / K. The effect of any operations performed in the VM must be kept inside the
VM - virtual operation is not allowed to change the status in another VM, the control program, or hardware.
Instructions whose influence is regulated by the control program can be directly executed by the hardware.
While the instructions that could affect up to outside the VM must be wrapped and simulated. Full virtualization
has so far proved a success for the division of a computer system to be used for the isolation of many users and
users with other users and with the control program to obtain the reliability and security of the system.
Virtualization Approach: Theory and Application
DOI: 10.9790/1676-110502187191 www.iosrjournals.org 190 | Page
3.2 Half Virtualization
Half Virtualization in computer science is a virtualization technique that is used for implementation on
a wide variety of virtual machine environment, which in this part of VM virtualization environment only
provides partial hardware simulation only. Not all of the hardware features simulated so that not all software can
run without modification first.The primary key of the partial address virtualization is virtualization, which
means that each virtual machine consists of an address independent. This ability should be supported by the
ability to relocate from a hardware address - already exists in most practical implementations of virtualization
half.Virtualization is the initial part of their full virtualization. Virtualization part used in the first generation of
time-sharing systems CTSS and experimental paging system on the IBM M44 / 44x. This term can also be used
to describe the operating system that provides separate address space for different users or
processes.Virtualization half is much more easy to implement than full virtualization, often unable to provide a
useful and powerful VM and supports critical applications. The drawback is a hardware compatibility issue
earlier and portability (not multiple systems). If hardware features are not simulated, then the software that uses
the feature will fail to run.
3.3 Native Virtualization
Native Virtualization is a technique by which a VM is used to simulate a complete hardware
environment so that the operating system can run unmodified on the same CPU type in complete isolation in the
VM container. Native virtualization leveraging the capabilities of hardware support available in the latest
processors from Intel (Intel VT) and Advanced Micro Devices (AMD-V) to provide performance closer to the
original system.Native virtualization, also known as accelerated virtualization or virtualization hybrid is a
combination of full virtualization and acceleration techniques I / O and is often used to greatly improve the
performance of full virtualization. Typically, this method starts with the Virtual Machine Monitor is capable of
full virtualization ago, based on analysis of performance, running acceleration technique chosen. I / O and
network drivers are part of the most common virtualization accelerated in the original.
IV. Virtualization and Probabilities
In the past, the boundaries between virtualization and portability are fairly clear boundaries. When you
hear the word virtualization of computing, always first imagined virtual memory, and virtual machine (like Java)
or virtual environment (Operating System running on other operating systems). But not imagined that
virtualization can be attributed to its portability. Portability is more complex than just a program that can be
moved easily and may be made without too much reconfiguration in another environment. Portability in a
Windows environment which I am most familiar is the Portable Application Suite, in the Linux environment is
already so familiar it feels us with LiveCD, LiveDVDs, and LiveUSB.Currently, there are so many alternatives
to VMware as virtualization. From the world of open source, we know Xen, QEMU, and VirtualBox Colinux.
Even Microsoft also issued a Virtual PC. The most exciting development is all becoming increasingly compact.
Sekompak possible to enable the Virtual Disks that have been made can be moved easily. Virtualization is now
the case is not too complex. Configuration is easy, and there are many alternatives to VMWare. There are some
things that make us need to think further about green computing, matter and energy efficiency.
Virtualization on a more serious computing from the desktop is needed mainly for efficiency. Basically,
virtualization has always been that the existence of the operating system. Several processes or software is
computing nicer to work in their natural environment or even have software that is only available on the specific
operating system platform. For example, the famous AutoCAD drafter environment has not had a substitution
outside of Windows. Virtualization also creates other efficiencies, where a machine can be used to run multiple
operating systems, or operate system can be run at any time when required by the same machine that was
running the other operating system.
V. Virtualization Softwares
Before attempting virtualization to note is how adequate capabilities (hardware) computer to virtual
desired operating system. The host system needs a large of resources since it shares its resources to the guest
operating systems. There are some of the virtualization software available, such as:
4.1 coLinux
coLinux or Cooperative Linux is a special Virtualization in Windows for multiple Linux distributions.
With coLinux, we can run Ubuntu, Debian, ArchLinux, Fedora and others. The interesting thing is, when the
image is placed at the Linux USB Portable Notebook, it did not disturb. I say almost no degradation of
performance which means until the process is finished booting Linux. We can bring coLinux daemon without
having to be installed on a USB Flash image at the same time we need.
Virtualization Approach: Theory and Application
DOI: 10.9790/1676-110502187191 www.iosrjournals.org 191 | Page
4.2 QEMU
QEMU emulator can run as meaning it can run operating systems for one type of machine to machine
another kind or as a virtualizationapplication with QEMU accelerator executes guest code (other operating
systems) directly to the host (the primary operating system / parent). This is another type of savings. QEMU is
more advanced than coLinux because it is available on multiple operating systems.Qemu is equipped with
QEMU Manager GUI so that we can arrange the images of operating systems and virtualization that we prepare
with ease. Allocate resources, disk space and what devices in parent operating system that will be mapped to the
virtual operating system (Guest OS). Defining this should be done with the text mode configuration coLinux.
Performance, in some ways, coLinux better, but QEMU has more features than coLinux. coLinux present for
Windows users who want to learn Linux. Running Qemu as an emulator, not required complicated procedures.
To try an OS, we do not even need to allocate space for the virtual hard disk image; we can even run the iso
from the operating system. If we've already downloaded the Ubuntu iso, FreeDOS or the latest Fedora, then we
can immediately run with QEMU with only direct CD / DVD to boot the iso. Qemu present as a virtualizes app
in many operating systems for computing broadly than just try.
4.3 VirtualBox
VirtualBox became part of the SUN. VirtualBox foreclosed SUN SUN to add the portfolio, especially
in working on Xen virtualization as Novell bundled into SUSE Linux Enterprise and Microsoft acquired from
Connectix VirtualPC. SUN declare VirtualBox virtual computing ready for a more serious so that it can be used
from home to enterprise scale.VirtualBox is available on many operating systems (host): Linux, Solaris, and
OpenBSD. Virtualbox developed rapidly, releases the series out in a relatively fast also with new features. The
concept offered at Full Virtualization in VirtualBox is the same as VMWare, QEMU, and Win4Lin where the
hardware specifications of the guest hosts will follow the hardware specifications of increasingly sophisticated
increasingly sophisticated hardware host a guest anyway. However, there is some hardware virtualized host alias
does not follow that the CD / DVD drive, hard drive, RAM, and VGA memory of the benefits you can manage
the ability of the virtualized hardware but it can not exceed the ability of the host hardware.Like a guest requires
the original computer RAM and hard drive space. The amount of RAM memory RAM will cut the guest host,
are trivial RAM must be allocated to the guest host. For example, a guest requires 256 MB of RAM memory
and a memory of 1 Gb host so the host memory: 256 Mb to 1 Gb reduced. If there is a guest host, more memory
to be allocated again. As for the guest, the disk should not beexceeding the capacity of the host storage. Virtual
hard disk files can be stored on a flash drive, a regular hard drive, network and so on, but the virtual disk
capacity can not exceed the virtual hard drive where it was saved.
VI. Conclusion
Virtualization is a method to make something off of physical dependence. Example; a virtual machine
is a computer, which was only in the form of a file on the hard disk. With virtualization, then a computer
(physical) can run many virtual computers while at the same time. The types of VM is the VM system in which
a VM can run its operating system; then the VM is where the VM just to run a single process. Then VM is also
divided by the level of virtualization, namely full virtualization which simulates all the features of the hardware
that allow software running on a VM without modification. Then virtualization half, where not all of the
hardware features simulated. The latter is a native virtualization, which is a full virtualization combined with the
help of hardware that supports virtualization.
References
[1]. P. G and Vijayrajan, “Analysis of Performance in the Virtual Machines Environment,” International Journal of Advanced Science
and Technology, vol. 32, no. 7, pp. 53-64, 2011.
[2]. Ali dan N. Meghanathan, “Virtual Machines And Networks, Installation, Performance, Study, Advantages and Virtualization
Options,” International Journal of Network Security & Its Applications, vol. 3, no. 1, pp. 1-15, 2011.
[3]. S. M., H. G. M., N. A. dan U. J., “Performance Analysis of Kernal-Based Virtual Machine,” International Journal of Computer
Science & Information Technology, vol. 5, no. 1, pp. 137-144, 2013.
[4]. X. Zhao, K. Borders dan A. Prakash, Virtual Machine Security Systems, vol. 57, USA: Department of EECS, University of
Michigan, 2013, pp. 339-365.
[5]. P. H. Gum, “System/370 extended architecture: Facilities for virtual machines,” IBM Journal of Research and Development, vol. 27,
no. 6, p. 530–544, 1983.
[6]. P. F. Silvia, R. Karthiha, R. Aarthy dan C. S. G. Das, “Virtual machine vs Real Machine: Security Systems,” International Journal
of Engineering and Technology, vol. 1, no. 1, pp. 9-13, 2009.
[7]. A. P. U. Siahaan, “Comparison Analysis of CPU Scheduling : FCFS, SJF and Round Robin,” International Journal of Engineering
Development and Research, vol. 4, no. 3, pp. 124-132, 2016.
[8]. R. A. Meyer dan L. H. Seawright, “A Virtual Machine Time Sharing System,” IBM System Journal, vol. 9, no. 3, pp. 199-218, 1970.

More Related Content

What's hot

Software Quality Attributes
Software Quality AttributesSoftware Quality Attributes
Software Quality Attributes
Hayim Makabee
 

What's hot (20)

Virtualization
VirtualizationVirtualization
Virtualization
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Distributed Systems Real Life Applications
Distributed Systems Real Life ApplicationsDistributed Systems Real Life Applications
Distributed Systems Real Life Applications
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docx
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtual Machine Concept
Virtual Machine ConceptVirtual Machine Concept
Virtual Machine Concept
 
Software Quality Attributes
Software Quality AttributesSoftware Quality Attributes
Software Quality Attributes
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Underlying principles of parallel and distributed computing
Underlying principles of parallel and distributed computingUnderlying principles of parallel and distributed computing
Underlying principles of parallel and distributed computing
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
cloud computing: Vm migration
cloud computing: Vm migrationcloud computing: Vm migration
cloud computing: Vm migration
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
 
Unit1
Unit1Unit1
Unit1
 
Aneka platform
Aneka platformAneka platform
Aneka platform
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Taxonomy for bugs
Taxonomy for bugsTaxonomy for bugs
Taxonomy for bugs
 

Similar to Virtualization Approach: Theory and Application

VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
IJNSA Journal
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdf
AkshithaReddy42848
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
Neha417639
 

Similar to Virtualization Approach: Theory and Application (20)

Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computing
 
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
virtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfvirtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdf
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
Dz25764770
Dz25764770Dz25764770
Dz25764770
 
Dz25764770
Dz25764770Dz25764770
Dz25764770
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
VSS LEC5.pdf
VSS LEC5.pdfVSS LEC5.pdf
VSS LEC5.pdf
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Vitualisation
VitualisationVitualisation
Vitualisation
 
5-Emulation.docx
5-Emulation.docx5-Emulation.docx
5-Emulation.docx
 
Ijebea14 260
Ijebea14 260Ijebea14 260
Ijebea14 260
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdf
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
 
CH14-Virtual Machines.pptx
CH14-Virtual Machines.pptxCH14-Virtual Machines.pptx
CH14-Virtual Machines.pptx
 
virtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxvirtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptx
 
lect 1TO 5.pptx
lect 1TO 5.pptxlect 1TO 5.pptx
lect 1TO 5.pptx
 

More from Universitas Pembangunan Panca Budi

Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Universitas Pembangunan Panca Budi
 

More from Universitas Pembangunan Panca Budi (20)

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 

Virtualization Approach: Theory and Application

  • 1. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 5 Ver. II (Sep - Oct 2016), PP 187-191 www.iosrjournals.org DOI: 10.9790/1676-110502187191 www.iosrjournals.org 187 | Page Virtualization Approach: Theory and Application Hamdani1 , Andysah Putera Utama Siahaan2 1 Faculty of Engineering,Universitas Pembangunan Panca Budi, Medan, Indonesia 2 Faculty of Computer Science,Universitas Pembangunan Panca Budi, Medan, Indonesia Abstract: Virtualization is a new method regarding using computing resources efficiently, by maximizing energy efficiency, extend the life of the hardware and also recycles. Virtualization technology is a system of work done by the software can merge some real physical systems into a single virtual form commonly known as virtualization without prejudice advantages over the single system. Of course, this system can reduce the amount of hardware, electrical energy consumption and time used thereby increasing the level of efficiency and effectiveness. Also, virtualization certainly reduces heat energy arising from the number of installed hardware, thereby reducing the increase in temperature geothermal (Global Warming). Some virtualization includes Server Virtualization, Network Virtualization, Memory Virtualization, Grid Computing, Application Virtualization, Storage Virtualization, Virtualization and Thin Client Platform. Keywords: Virtualization, Virtual Machine I. Introduction Virtualization is a method that emulates a real system into a virtual system that physically separated dependence. In other words, something that has been virtualized can no longer be seen with the eye or held, but has the same function as the original system. The purpose of virtualization is to make savings from all aspects. Virtualization is a concept that was first developed in the 1960s to manage mainframe hardware. And also in 1960-based computer x86 architecture are faced with the same problem, namely rigidity and underutilization.Virtualization is always used first of all just to test the invention or new system over an existing system. It aims to get results or to test whether the new system has still to be compatible or needed further improvement. Then some subsequent period virtualization can stand alone in a parent (host) system.This understanding tries to describe the virtualization technique. It describes the basic rule of the virtuality. II. Theories 2.1 Virtual Machine Virtual machine (VM) is a device that typically is a software or operating system, which can not be seen physically but can be run in an environment other. In this case, the VM is referred to as a "guest" because the device only rides, while the environment is running so-called "host." The basic concept of the virtual machine is that it emulates the hardware of a computer consisting of a CPU, memory, HDD into multiple execution environments, so that seems to have the physical device on each virtualization. VM to appear for their trial to run multiple operating systems on a single computer. Fig. 1 Virtual Machine Architecture
  • 2. Virtualization Approach: Theory and Application DOI: 10.9790/1676-110502187191 www.iosrjournals.org 188 | Page Figure 1 shows the virtual machine architecture. The server can covers several virtual machines simultaneously. Virtual machine technology has many functions such as hardware consolidation, facilitate the rescue system, and run the software earlier. One of the most important applications of virtual machine technology is cross-platform integration. Some other important applications are: 1. Server Consolidation. If several servers run applications that only takes up very little resources, VM can be used to incorporate the applications that run on only one server, even if the application requires that the operating system is different. 2. Automation and consolidation. Each VM can act as different environments; this allows developers so no need to provide environment physically. 3. Easy System Recovery. Virtualization can be used for system recovery that requires portability and flexibility across platforms. 4. The demonstration software. With VM technology, clean operating system, and its configuration can be provided quickly. A. Virtualization Types Virtual Machine provides convenience regarding the distribution of hardware resources that exist in each guest system, each running a guest operating system itself. The software provides the virtualization is called a virtual machine monitor or hypervisor. A hypervisor can run on hardware or an operating system. The main advantages and VM system are: 1. Various operating system environment can be run on the same computer, in strong isolation between environments 2. VM can provide the instruction set architecture (ISA) that is different to that of the hardware. The operating system on the guest does not have the same operating system. The use of the VM to support a variety of different operating systems became so popular in embedded systems, where the real-time operating system is used in conjunction with a high-level operating system such as Linux or Windows. Another function is to sandbox that isolates changes in the codes that suspicion arises from the OS that can not be trusted because it is still in the development stage. VM has other benefits in the development of operating systems such as access better debugging and reboots faster than the original machine. 2.2 Virtualization Process A virtual machine process sometimes called an application virtual machine, runs as a normal application inside an operating system and supports the process. VM process was created at the time the process was initiated and is destroyed when the process exits. The aim is to provide a programming environment that is platform-independent which abstracts the details of the software or operating system and allow a program executed in the same way on any platform. The process VM provides a high-level abstraction process is implemented clicking VM-use interpreters. VM-type became popular with the Java programming language, which is implemented by the Java Virtual Machine. Another example is the .NET Framework, which runs on a VM called the Common Language Runtime. A special case of the VM process is a system that abstracts the communication mechanism of cluster computers. VMnya is not a single process, but rather one process per physical machine in the cluster. VM is designed to simplify the work program an application in parallel with letting the programmer focus on algorithms rather than the communication mechanisms provided by the interconnect and operating systems. The fact that communication was not hidden and the cluster is not cultivated represented as a single machine. 2.3 Virtualization Sample In GNU / Linux, one is the famous virtual machine is Vmware. VMware allows multiple operating systems to run on one machine PC simultaneously. It can be done without having to reconfigure the storage media and reboot. On the Virtual Machine supplied will be executed by the operating system as desired. In this way, the user can boot up an operating system Linux as the host operating system and then run other operating systems, such as Microsoft Windows or Solaris. The operating system that runs on the host operating system is known as the guest operating system.
  • 3. Virtualization Approach: Theory and Application DOI: 10.9790/1676-110502187191 www.iosrjournals.org 189 | Page Fig. 2VMware Virtual Machine Scheme VMware logically regarded as software is often used for the experimental new operating system, games, applications, to install two operating systems and run (cross platform) on the same drive without having to dual- boot. Technically we just press Alt + Tab to switch operating systems. But VMware is not the emulator as well as PS2 emulator because it does not emulate a CPU and hardware in a Virtual Machine (VM), but only allow other operating systems to run in parallel with the operating system has been running. Each Virtual Machine (VM) can have its IP address that can be tested connections of the connected network (ping). The sample of this can be seen in Figure 2. It describes the scheme of the virtualization usage. III. Implementation Before the virtualization runs, the operating system must first be executed first. If the operating system on a computer having problems, eating the worst thing to do is reinstall. While in the world of virtualization everything changed 180 degrees. 3.1 Full Virtualization Full Virtualization is a way of doing virtualization for the various virtual machine environment, where the model of full virtualization provides a complete modeling of hardware. The complete simulation allows any software that can be executed directly on the host operating system can also be executed on the guest operating systems in, including all operating systems.One illustration of full virtualization is a control program of the operating system CP / CMS from IBM. Each user of the CP / CMS given a computer system (which is a virtual machine) that stands alone. The virtual machine has all the capabilities of the underlying hardware, and to its users, the virtual machine can not be distinguished by a system of its own. Simulations carried out thoroughly and based on the principle of operation of hardware that includes instruction sets, main memory, interrupts, exceptions, and device access. A result is a machine that can be shared among many users.Full virtualization is only possible with the right combination of hardware and the right software. For example, it is not possible for most systems IBM System / 360. X86 systems also were once thought not to be able to run full virtualization, but by using the binary technique translation, VMware can run full virtualization. The main challenge in full virtualization is the simulation of the operation that requires special privileges such as instruction M / K. The effect of any operations performed in the VM must be kept inside the VM - virtual operation is not allowed to change the status in another VM, the control program, or hardware. Instructions whose influence is regulated by the control program can be directly executed by the hardware. While the instructions that could affect up to outside the VM must be wrapped and simulated. Full virtualization has so far proved a success for the division of a computer system to be used for the isolation of many users and users with other users and with the control program to obtain the reliability and security of the system.
  • 4. Virtualization Approach: Theory and Application DOI: 10.9790/1676-110502187191 www.iosrjournals.org 190 | Page 3.2 Half Virtualization Half Virtualization in computer science is a virtualization technique that is used for implementation on a wide variety of virtual machine environment, which in this part of VM virtualization environment only provides partial hardware simulation only. Not all of the hardware features simulated so that not all software can run without modification first.The primary key of the partial address virtualization is virtualization, which means that each virtual machine consists of an address independent. This ability should be supported by the ability to relocate from a hardware address - already exists in most practical implementations of virtualization half.Virtualization is the initial part of their full virtualization. Virtualization part used in the first generation of time-sharing systems CTSS and experimental paging system on the IBM M44 / 44x. This term can also be used to describe the operating system that provides separate address space for different users or processes.Virtualization half is much more easy to implement than full virtualization, often unable to provide a useful and powerful VM and supports critical applications. The drawback is a hardware compatibility issue earlier and portability (not multiple systems). If hardware features are not simulated, then the software that uses the feature will fail to run. 3.3 Native Virtualization Native Virtualization is a technique by which a VM is used to simulate a complete hardware environment so that the operating system can run unmodified on the same CPU type in complete isolation in the VM container. Native virtualization leveraging the capabilities of hardware support available in the latest processors from Intel (Intel VT) and Advanced Micro Devices (AMD-V) to provide performance closer to the original system.Native virtualization, also known as accelerated virtualization or virtualization hybrid is a combination of full virtualization and acceleration techniques I / O and is often used to greatly improve the performance of full virtualization. Typically, this method starts with the Virtual Machine Monitor is capable of full virtualization ago, based on analysis of performance, running acceleration technique chosen. I / O and network drivers are part of the most common virtualization accelerated in the original. IV. Virtualization and Probabilities In the past, the boundaries between virtualization and portability are fairly clear boundaries. When you hear the word virtualization of computing, always first imagined virtual memory, and virtual machine (like Java) or virtual environment (Operating System running on other operating systems). But not imagined that virtualization can be attributed to its portability. Portability is more complex than just a program that can be moved easily and may be made without too much reconfiguration in another environment. Portability in a Windows environment which I am most familiar is the Portable Application Suite, in the Linux environment is already so familiar it feels us with LiveCD, LiveDVDs, and LiveUSB.Currently, there are so many alternatives to VMware as virtualization. From the world of open source, we know Xen, QEMU, and VirtualBox Colinux. Even Microsoft also issued a Virtual PC. The most exciting development is all becoming increasingly compact. Sekompak possible to enable the Virtual Disks that have been made can be moved easily. Virtualization is now the case is not too complex. Configuration is easy, and there are many alternatives to VMWare. There are some things that make us need to think further about green computing, matter and energy efficiency. Virtualization on a more serious computing from the desktop is needed mainly for efficiency. Basically, virtualization has always been that the existence of the operating system. Several processes or software is computing nicer to work in their natural environment or even have software that is only available on the specific operating system platform. For example, the famous AutoCAD drafter environment has not had a substitution outside of Windows. Virtualization also creates other efficiencies, where a machine can be used to run multiple operating systems, or operate system can be run at any time when required by the same machine that was running the other operating system. V. Virtualization Softwares Before attempting virtualization to note is how adequate capabilities (hardware) computer to virtual desired operating system. The host system needs a large of resources since it shares its resources to the guest operating systems. There are some of the virtualization software available, such as: 4.1 coLinux coLinux or Cooperative Linux is a special Virtualization in Windows for multiple Linux distributions. With coLinux, we can run Ubuntu, Debian, ArchLinux, Fedora and others. The interesting thing is, when the image is placed at the Linux USB Portable Notebook, it did not disturb. I say almost no degradation of performance which means until the process is finished booting Linux. We can bring coLinux daemon without having to be installed on a USB Flash image at the same time we need.
  • 5. Virtualization Approach: Theory and Application DOI: 10.9790/1676-110502187191 www.iosrjournals.org 191 | Page 4.2 QEMU QEMU emulator can run as meaning it can run operating systems for one type of machine to machine another kind or as a virtualizationapplication with QEMU accelerator executes guest code (other operating systems) directly to the host (the primary operating system / parent). This is another type of savings. QEMU is more advanced than coLinux because it is available on multiple operating systems.Qemu is equipped with QEMU Manager GUI so that we can arrange the images of operating systems and virtualization that we prepare with ease. Allocate resources, disk space and what devices in parent operating system that will be mapped to the virtual operating system (Guest OS). Defining this should be done with the text mode configuration coLinux. Performance, in some ways, coLinux better, but QEMU has more features than coLinux. coLinux present for Windows users who want to learn Linux. Running Qemu as an emulator, not required complicated procedures. To try an OS, we do not even need to allocate space for the virtual hard disk image; we can even run the iso from the operating system. If we've already downloaded the Ubuntu iso, FreeDOS or the latest Fedora, then we can immediately run with QEMU with only direct CD / DVD to boot the iso. Qemu present as a virtualizes app in many operating systems for computing broadly than just try. 4.3 VirtualBox VirtualBox became part of the SUN. VirtualBox foreclosed SUN SUN to add the portfolio, especially in working on Xen virtualization as Novell bundled into SUSE Linux Enterprise and Microsoft acquired from Connectix VirtualPC. SUN declare VirtualBox virtual computing ready for a more serious so that it can be used from home to enterprise scale.VirtualBox is available on many operating systems (host): Linux, Solaris, and OpenBSD. Virtualbox developed rapidly, releases the series out in a relatively fast also with new features. The concept offered at Full Virtualization in VirtualBox is the same as VMWare, QEMU, and Win4Lin where the hardware specifications of the guest hosts will follow the hardware specifications of increasingly sophisticated increasingly sophisticated hardware host a guest anyway. However, there is some hardware virtualized host alias does not follow that the CD / DVD drive, hard drive, RAM, and VGA memory of the benefits you can manage the ability of the virtualized hardware but it can not exceed the ability of the host hardware.Like a guest requires the original computer RAM and hard drive space. The amount of RAM memory RAM will cut the guest host, are trivial RAM must be allocated to the guest host. For example, a guest requires 256 MB of RAM memory and a memory of 1 Gb host so the host memory: 256 Mb to 1 Gb reduced. If there is a guest host, more memory to be allocated again. As for the guest, the disk should not beexceeding the capacity of the host storage. Virtual hard disk files can be stored on a flash drive, a regular hard drive, network and so on, but the virtual disk capacity can not exceed the virtual hard drive where it was saved. VI. Conclusion Virtualization is a method to make something off of physical dependence. Example; a virtual machine is a computer, which was only in the form of a file on the hard disk. With virtualization, then a computer (physical) can run many virtual computers while at the same time. The types of VM is the VM system in which a VM can run its operating system; then the VM is where the VM just to run a single process. Then VM is also divided by the level of virtualization, namely full virtualization which simulates all the features of the hardware that allow software running on a VM without modification. Then virtualization half, where not all of the hardware features simulated. The latter is a native virtualization, which is a full virtualization combined with the help of hardware that supports virtualization. References [1]. P. G and Vijayrajan, “Analysis of Performance in the Virtual Machines Environment,” International Journal of Advanced Science and Technology, vol. 32, no. 7, pp. 53-64, 2011. [2]. Ali dan N. Meghanathan, “Virtual Machines And Networks, Installation, Performance, Study, Advantages and Virtualization Options,” International Journal of Network Security & Its Applications, vol. 3, no. 1, pp. 1-15, 2011. [3]. S. M., H. G. M., N. A. dan U. J., “Performance Analysis of Kernal-Based Virtual Machine,” International Journal of Computer Science & Information Technology, vol. 5, no. 1, pp. 137-144, 2013. [4]. X. Zhao, K. Borders dan A. Prakash, Virtual Machine Security Systems, vol. 57, USA: Department of EECS, University of Michigan, 2013, pp. 339-365. [5]. P. H. Gum, “System/370 extended architecture: Facilities for virtual machines,” IBM Journal of Research and Development, vol. 27, no. 6, p. 530–544, 1983. [6]. P. F. Silvia, R. Karthiha, R. Aarthy dan C. S. G. Das, “Virtual machine vs Real Machine: Security Systems,” International Journal of Engineering and Technology, vol. 1, no. 1, pp. 9-13, 2009. [7]. A. P. U. Siahaan, “Comparison Analysis of CPU Scheduling : FCFS, SJF and Round Robin,” International Journal of Engineering Development and Research, vol. 4, no. 3, pp. 124-132, 2016. [8]. R. A. Meyer dan L. H. Seawright, “A Virtual Machine Time Sharing System,” IBM System Journal, vol. 9, no. 3, pp. 199-218, 1970.