SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Trend in
International Open Access Journal
ISSN No: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Virtualization i
Arun Prasath.
Department of Computer Applications, Dr.
ABSTRACT
Virtualization and virtual situations are major basics
for files input in cloud adding. It is assistances for
together the visitor user and the worker: while it
provides the first with the features needed to execute
his demand, it gives the second the capacity to be
cover different guests with no extra cost. The essential
component in a virtual design is called hypervisor,
having extra-privileges, which makes it able to play
major role of dealing the input of data and
hypervisor has many advantages regarding the cost,
the simplicity of performance, the availability. But in
the other hand, the major character played by this
group makes it the faultless target for mean users
targeting to attack the near system.
Keyword: Cloud Computing; Virtualization
technology; Server Virtualization; Network
Virtualization; Storage Virtualization.
INTRODUCTION
The IT trade’s effort on virtualization skill has better
largely in the previous few years. However, the
concept has been around much slower, as you can
read in the brief history below. This section also
offers a high level view of the virtualization
technology and procedures that occur today, and
highlights a number of reasons why group are
agreement virtualization more and more.
VIRTUALIZATION IN CLOUD COMPUTING:
Virtualization in computing is design of virtual (not
real) of virtual something such as hardware, software,
platform or operating system or a loading or a
network. In a virtualized situation IT creativity has to
achieve many changes as the changes occur e
in virtual atmosphere than in a physical environment.
Because of virtualization clouds are accessible and
alert.
International Journal of Trend in Scientific Research and Development (IJTSRD)
International Open Access Journal | www.ijtsrd.com
ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
Virtualization in Cloud Computing
Arun Prasath. M1
, Mrs. T. Sathiyabama2
1
IIIMCA, 2
Assistant Professor
Department of Computer Applications, Dr. Sns Rajalakshmi College of Arts & Science,
Coimbatore, Tamilnadu, India
Virtualization and virtual situations are major basics
for files input in cloud adding. It is assistances for
together the visitor user and the worker: while it
provides the first with the features needed to execute
is demand, it gives the second the capacity to be
cover different guests with no extra cost. The essential
component in a virtual design is called hypervisor,
privileges, which makes it able to play
major role of dealing the input of data and funds. This
hypervisor has many advantages regarding the cost,
the simplicity of performance, the availability. But in
the other hand, the major character played by this
group makes it the faultless target for mean users
Cloud Computing; Virtualization
technology; Server Virtualization; Network
The IT trade’s effort on virtualization skill has better
largely in the previous few years. However, the
has been around much slower, as you can
read in the brief history below. This section also
offers a high level view of the virtualization
technology and procedures that occur today, and
highlights a number of reasons why group are
more and more.
VIRTUALIZATION IN CLOUD COMPUTING:
Virtualization in computing is design of virtual (not
real) of virtual something such as hardware, software,
platform or operating system or a loading or a
network. In a virtualized situation IT creativity has to
achieve many changes as the changes occur extra fast
in virtual atmosphere than in a physical environment.
Because of virtualization clouds are accessible and
COMPONENTS OF CLOUD COMPUTING:
Cloud computing has clients, data centers, distributed
servers as the modules.
Clients: Users like computers, laptops, tablets,
computer, and mobile phones.
Data Centers: These are a group of waiters where the
request is presented. Virtualization is done where
various requests of effective servers are produced.
Distributed Server: Servers wh
locally which are physically remote.
VIRTUAL MACHINE:
A virtual machine (VM) is an idea layer or the
situation between hardware components and the end
user. Virtual machines have an capacity to run any
working systems on them and in diffe
referred to as virtual clouds.
HYPERVISORS:
In virtualization knowledge, there is one section of
software that allows the physical servers can have
several instances of virtual technologies and it called
as Hypervisor. These instances are v
that create in virtualization atmosphere and the
hypervisor is responsible for directing and regulatory
these machines on communication, resource sharing
and changing the virtual machines.
NETWORK VIRTUALIZATION:
The cloud computing system
TCP/IP based procedures on communication. It is like
communication in LAN systems. Each computer has
one exact, unique IP and they are shared with each
other. Here also the equal with little changed, instead
of computers we have virt
machines (VM‘s). The main thing here is the IP‘s we
Research and Development (IJTSRD)
www.ijtsrd.com
6 | Sep – Oct 2018
Oct 2018 Page: 875
shmi College of Arts & Science,
COMPONENTS OF CLOUD COMPUTING:
Cloud computing has clients, data centers, distributed
s like computers, laptops, tablets,
computer, and mobile phones.
: These are a group of waiters where the
request is presented. Virtualization is done where
various requests of effective servers are produced.
Servers which exist in non
ocally which are physically remote.
A virtual machine (VM) is an idea layer or the
situation between hardware components and the end-
user. Virtual machines have an capacity to run any
working systems on them and in different cases it
In virtualization knowledge, there is one section of
software that allows the physical servers can have
several instances of virtual technologies and it called
as Hypervisor. These instances are virtual machines
that create in virtualization atmosphere and the
hypervisor is responsible for directing and regulatory
these machines on communication, resource sharing
and changing the virtual machines.
NETWORK VIRTUALIZATION:
The cloud computing systems are really using the
TCP/IP based procedures on communication. It is like
communication in LAN systems. Each computer has
one exact, unique IP and they are shared with each
other. Here also the equal with little changed, instead
of computers we have virtual laptops or virtual
machines (VM‘s). The main thing here is the IP‘s we
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
talking about are varies from the IP‘s we can design
on operating systems which we can set to our stage if
we have that contact (in case of IaaS service),
statically or dynamically. These IP‘s are available
from group of network which we have educated about
it in network virtualization
VIRTUALIZATION FOR CLOUD
The goal of virtualization is to collaboratively develop
the IT properties such as storage, workstation and
network to determined level and to moderate the cost
of IT resources which can be completed by combining
multiple idle resources into common pools and
creating different virtual machines to execute various
jobs simultaneously. The resources can be assigned
or changed dynamically. Customer should be aware of
basic methods such as emulation, hypervisor, full,
para and hardware supported virtualization while
using virtualization in cloud computing background.
Emulation: It is a virtualization skill which converts
the performance of the computer hardware to a
software database and lies in the operating system
layer which lies on the hardware.
Virtual Machine Monitor or Hypervisor
software layer that can display and virtualizes the
resources of a cloud machine. The software level
creates virtual properties such as CPU, recall and
operating systems nearby or distantly.
Para Virtualization: It relates message between
hypervisor and invitee operating system to develop
efficiency and act.
Full Virtualization: Hypervisor creates remote
environment between the guest or virtual server and
the host or server hardware.
VIRTUALIZATION TYPES
Client Virtualization:
This client virtualization technology makes the system
manager to almost monitor and update the client
machines like workstation desktop, laptop and mobile
devices. It develops the client machines managing
and improves the safety to secure from hackers and
cybercriminals.
Storage Virtualization:
It creates the thought of reliable loading from physical
packing. Three kind of data storage are use in
virtualization, they are DAS (Direct Attached
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
talking about are varies from the IP‘s we can design
on operating systems which we can set to our stage if
we have that contact (in case of IaaS service),
These IP‘s are available
from group of network which we have educated about
The goal of virtualization is to collaboratively develop
the IT properties such as storage, workstation and
ermined level and to moderate the cost
of IT resources which can be completed by combining
multiple idle resources into common pools and
creating different virtual machines to execute various
jobs simultaneously. The resources can be assigned
ynamically. Customer should be aware of
basic methods such as emulation, hypervisor, full,
para and hardware supported virtualization while
using virtualization in cloud computing background.
It is a virtualization skill which converts
rformance of the computer hardware to a
software database and lies in the operating system
Virtual Machine Monitor or Hypervisor: A
software layer that can display and virtualizes the
resources of a cloud machine. The software level
creates virtual properties such as CPU, recall and
: It relates message between
and invitee operating system to develop
: Hypervisor creates remote
environment between the guest or virtual server and
ualization technology makes the system
manager to almost monitor and update the client
machines like workstation desktop, laptop and mobile
devices. It develops the client machines managing
and improves the safety to secure from hackers and
It creates the thought of reliable loading from physical
packing. Three kind of data storage are use in
virtualization, they are DAS (Direct Attached
Storage), NAS (Network Attached Storage) and SAN
(Storage Area Network).
Data Leakage:
Organizations are in great threat of files escape when
an employee safeguards the access to its data stored in
cloud structure.
Virtualization Security Threats:
Safety threats in virtualization are classified into
virtual machine risk, hypervisor threat, virtual
arrangement and virtual system
machine threat faces while treating status of virtual
machine, software updates, resource contention,
patching and virtual machine capital.
Elastic Resource Management:
Cloud computing system produce new arguments
because of system bands and high volume data
created by these systems. In order to work active
flexible resource running, we need to look at the
concerns such as resource sharing, resource
provisioning, resource mappi
variation. Cloud services meet issues on the requests
of service level bounce and disposal.
CONCLUSION:
Cloud computing is a new method to use and supply
IT services that is determined by consumer internet
leanings the cloud computing model forms on the
growth of the world wild web, combining rapid
scalability, creation of the internet and internet
connected devices. The cloud allows users to execute
difficult computing tasks without the need to know
the basic technology. Cloud computing is developing
at a serious time for the IT trade. There is growing
awareness that physical and IT states, system, and
structure are fast success a breaking point. The
explosion of data, transaction, and digitally aware
devices is straining existing IT setup and acts.
Exponential growth in communication and services is
showing borders in network bandwidth and storage
size. Supply useless and demand points are putting
weight on drive and value system.
REFERENCES:
1. Urmila Jangid, Nidhi Sharma, Kalpana Rathi,
(Dec 2014) “A Survey on Secure the Cloud
Environment using hypervisor
virtualization technology”,
of Innovative Computer Science &
Engineering, Volume 1 Issue 3
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 876
Storage), NAS (Network Attached Storage) and SAN
Organizations are in great threat of files escape when
an employee safeguards the access to its data stored in
Virtualization Security Threats:
Safety threats in virtualization are classified into
hypervisor threat, virtual
arrangement and virtual system risk. The virtual
machine threat faces while treating status of virtual
machine, software updates, resource contention,
patching and virtual machine capital.
Elastic Resource Management:
omputing system produce new arguments
because of system bands and high volume data
created by these systems. In order to work active
flexible resource running, we need to look at the
concerns such as resource sharing, resource
provisioning, resource mapping and resource
variation. Cloud services meet issues on the requests
of service level bounce and disposal.
Cloud computing is a new method to use and supply
IT services that is determined by consumer internet
leanings the cloud computing model forms on the
growth of the world wild web, combining rapid
scalability, creation of the internet and internet-
devices. The cloud allows users to execute
difficult computing tasks without the need to know
the basic technology. Cloud computing is developing
at a serious time for the IT trade. There is growing
awareness that physical and IT states, system, and
ture are fast success a breaking point. The
explosion of data, transaction, and digitally aware
devices is straining existing IT setup and acts.
Exponential growth in communication and services is
showing borders in network bandwidth and storage
ly useless and demand points are putting
weight on drive and value system.
Nidhi Sharma, Kalpana Rathi,
(Dec 2014) “A Survey on Secure the Cloud
Environment using hypervisor-based
virtualization technology”, International Journal
of Innovative Computer Science &
Engineering, Volume 1 Issue 3
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
2. T. Swathi, K. Srikanth, S. Raghunath
Reddy,(May2014)“VIRTUALIZATION IN
CLOUD COMPUTING”, International Journal of
Computer Science and Mobile Computing, Vol.3
Issue.5
3. Kamyab khajehei, (April 2014) “Role of
virtualization in cloud computing”, International
Journal of Advance Research in Computer
Science and Management Studies, Volume 2,
Issue 4, ISSN: 2321-7782 (Online).
4. Krishna tej Koganti, Eswar Patnala, Sai Saga
Narasingu, J. N. Chaitanya, (
“Virtualization Technology in Cloud Computing
Environment”, International Journal of Emerging
Technology and Advanced Engineerin
3, Issue 3.
5. Pankaj Sareen, (March 2013) “Cloud Computing:
Virtualization and Role of IT Governance in
Cloud”, International Journal of Advanced
Research in Computer Science.
6. Farzad Sabahi, (February 2012)
Virtualization for Cloud Environment Using
Hypervisor-based Technologyǁ, International
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
Srikanth, S. Raghunath
Reddy,(May2014)“VIRTUALIZATION IN
CLOUD COMPUTING”, International Journal of
Computer Science and Mobile Computing, Vol.3
Kamyab khajehei, (April 2014) “Role of
virtualization in cloud computing”, International
Journal of Advance Research in Computer
Science and Management Studies, Volume 2,
Krishna tej Koganti, Eswar Patnala, Sai Sagar
, (March 2013)
Virtualization Technology in Cloud Computing
Environment”, International Journal of Emerging
Technology and Advanced Engineering, Volume
Pankaj Sareen, (March 2013) “Cloud Computing:
ion and Role of IT Governance in
Cloud”, International Journal of Advanced
Farzad Sabahi, (February 2012) ―Secure
Virtualization for Cloud Environment Using
ǁ, International
Journal of Machine Learning and Computing, Vol.
2, No. 1.
7. Siddharth Jain, Rakesh Kumar, Anamika, Sunil
Kumar Jangir, (Dec 2014) “A Comparative Study
for Cloud Computing Platform on Open Source
Software”, ABHIYANTRIKI:
Journal of Engineering & Techn
Vol. 1, No. 2, pg: 28-35.
8. Rakesh Kumar, Bhanu Bhushan Parashar,
(November, 2014) “Dynamic Resource Allocation
and Management Using Open
Conference on Emerging Technologies in
Computer Engineering (NCETCE)
Supported by: Computer Society C
Delhi Section.
9. Rakesh Kumar, Sonu Agarwal, Muskan
Bansal, Anurag Mishra, (November, 2014)
“Open Source Virtualization Management Using
Ganeti Platform”, National Conference on
Emerging Technologies in C
Engineering (NCETCE)
Computer Society Chapter, IEEE
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 877
Machine Learning and Computing, Vol.
Siddharth Jain, Rakesh Kumar, Anamika, Sunil
Kumar Jangir, (Dec 2014) “A Comparative Study
for Cloud Computing Platform on Open Source
ABHIYANTRIKI: An International
Journal of Engineering & Technology (AIJET),
Rakesh Kumar, Bhanu Bhushan Parashar,
(November, 2014) “Dynamic Resource Allocation
and Management Using Open Stack”, National
Conference on Emerging Technologies in
Computer Engineering (NCETCE) – 2014,
by: Computer Society Chapter, IEEE
Rakesh Kumar, Sonu Agarwal, Muskan
Bansal, Anurag Mishra, (November, 2014)
“Open Source Virtualization Management Using
Ganeti Platform”, National Conference on
Emerging Technologies in Computer
Engineering (NCETCE) – 2014, Supported by:
Computer Society Chapter, IEEE Delhi Section.

More Related Content

What's hot

Cloud Computing? What is it and its future trends?
Cloud Computing? What is it and its future trends?Cloud Computing? What is it and its future trends?
Cloud Computing? What is it and its future trends?ziaurrehman4484
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewIJEACS
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computingAliAbdelwahab6
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigmNazneen Sheikh
 
Group seminar report on cloud computing
Group seminar report on cloud computingGroup seminar report on cloud computing
Group seminar report on cloud computingSandhya Rathi
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computingJagan Mohan Bishoyi
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1Sagar Kumar
 
Cloud computing for enterprise
Cloud computing for enterpriseCloud computing for enterprise
Cloud computing for enterprisePravin Asar
 
Cloud computing – An Overview
Cloud computing – An OverviewCloud computing – An Overview
Cloud computing – An OverviewKannan Subbiah
 
Business implementation of Cloud Computing
Business implementation of Cloud ComputingBusiness implementation of Cloud Computing
Business implementation of Cloud ComputingQuaid Sodawala
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing reportErManish5
 
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014  - Cloud Computing Project Title and AbstractFinal Year IEEE Project 2013-2014  - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstractelysiumtechnologies
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing reportANKIT KUMAR
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant guptaPrashant Gupta
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
 

What's hot (20)

Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
Cloud Computing? What is it and its future trends?
Cloud Computing? What is it and its future trends?Cloud Computing? What is it and its future trends?
Cloud Computing? What is it and its future trends?
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A Review
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigm
 
Group seminar report on cloud computing
Group seminar report on cloud computingGroup seminar report on cloud computing
Group seminar report on cloud computing
 
Edge Computing: Drivers and Trends
Edge Computing: Drivers and TrendsEdge Computing: Drivers and Trends
Edge Computing: Drivers and Trends
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1
 
Cloud computing for enterprise
Cloud computing for enterpriseCloud computing for enterprise
Cloud computing for enterprise
 
Cloud computing – An Overview
Cloud computing – An OverviewCloud computing – An Overview
Cloud computing – An Overview
 
Business implementation of Cloud Computing
Business implementation of Cloud ComputingBusiness implementation of Cloud Computing
Business implementation of Cloud Computing
 
484 488
484 488484 488
484 488
 
Cloud computing Report
Cloud computing ReportCloud computing Report
Cloud computing Report
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014  - Cloud Computing Project Title and AbstractFinal Year IEEE Project 2013-2014  - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing report
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant gupta
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
 

Similar to Virtualization in Cloud Computing

IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET Journal
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing Priti Banya Mohanty
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxbudabrooks46239
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computingMehul Patel
 
Cloud white paper v3.0
Cloud white paper v3.0Cloud white paper v3.0
Cloud white paper v3.0CK Toh
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud ComputingMonica Rivera
 
Virtualized Networking in Virtualized Data Center and Cloud Computing
Virtualized  Networking in Virtualized Data Center and Cloud ComputingVirtualized  Networking in Virtualized Data Center and Cloud Computing
Virtualized Networking in Virtualized Data Center and Cloud ComputingJIM MUKERJEE
 
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxInternational Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxvrickens
 
Advantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of VirtualizationAdvantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of VirtualizationElizabeth Anderson
 
Quick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-ukQuick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-ukAssespro Nacional
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelCloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelIJERA Editor
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised ComputingIOSR Journals
 
Cloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open SourceCloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open SourceAhmadShah Sultani
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computingijccsa
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computingneirew J
 

Similar to Virtualization in Cloud Computing (20)

IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
 
Cloud white paper v3.0
Cloud white paper v3.0Cloud white paper v3.0
Cloud white paper v3.0
 
Ijetcas14 440
Ijetcas14 440Ijetcas14 440
Ijetcas14 440
 
Cloudcpmuting journal
Cloudcpmuting journalCloudcpmuting journal
Cloudcpmuting journal
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud Computing
 
Virtualized Networking in Virtualized Data Center and Cloud Computing
Virtualized  Networking in Virtualized Data Center and Cloud ComputingVirtualized  Networking in Virtualized Data Center and Cloud Computing
Virtualized Networking in Virtualized Data Center and Cloud Computing
 
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxInternational Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docx
 
Advantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of VirtualizationAdvantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of Virtualization
 
Quick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-ukQuick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-uk
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelCloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment Model
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
 
Cloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open SourceCloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open Source
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 

Virtualization in Cloud Computing

  • 1. International Journal of Trend in International Open Access Journal ISSN No: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Virtualization i Arun Prasath. Department of Computer Applications, Dr. ABSTRACT Virtualization and virtual situations are major basics for files input in cloud adding. It is assistances for together the visitor user and the worker: while it provides the first with the features needed to execute his demand, it gives the second the capacity to be cover different guests with no extra cost. The essential component in a virtual design is called hypervisor, having extra-privileges, which makes it able to play major role of dealing the input of data and hypervisor has many advantages regarding the cost, the simplicity of performance, the availability. But in the other hand, the major character played by this group makes it the faultless target for mean users targeting to attack the near system. Keyword: Cloud Computing; Virtualization technology; Server Virtualization; Network Virtualization; Storage Virtualization. INTRODUCTION The IT trade’s effort on virtualization skill has better largely in the previous few years. However, the concept has been around much slower, as you can read in the brief history below. This section also offers a high level view of the virtualization technology and procedures that occur today, and highlights a number of reasons why group are agreement virtualization more and more. VIRTUALIZATION IN CLOUD COMPUTING: Virtualization in computing is design of virtual (not real) of virtual something such as hardware, software, platform or operating system or a loading or a network. In a virtualized situation IT creativity has to achieve many changes as the changes occur e in virtual atmosphere than in a physical environment. Because of virtualization clouds are accessible and alert. International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal | www.ijtsrd.com ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Virtualization in Cloud Computing Arun Prasath. M1 , Mrs. T. Sathiyabama2 1 IIIMCA, 2 Assistant Professor Department of Computer Applications, Dr. Sns Rajalakshmi College of Arts & Science, Coimbatore, Tamilnadu, India Virtualization and virtual situations are major basics for files input in cloud adding. It is assistances for together the visitor user and the worker: while it provides the first with the features needed to execute is demand, it gives the second the capacity to be cover different guests with no extra cost. The essential component in a virtual design is called hypervisor, privileges, which makes it able to play major role of dealing the input of data and funds. This hypervisor has many advantages regarding the cost, the simplicity of performance, the availability. But in the other hand, the major character played by this group makes it the faultless target for mean users Cloud Computing; Virtualization technology; Server Virtualization; Network The IT trade’s effort on virtualization skill has better largely in the previous few years. However, the has been around much slower, as you can read in the brief history below. This section also offers a high level view of the virtualization technology and procedures that occur today, and highlights a number of reasons why group are more and more. VIRTUALIZATION IN CLOUD COMPUTING: Virtualization in computing is design of virtual (not real) of virtual something such as hardware, software, platform or operating system or a loading or a network. In a virtualized situation IT creativity has to achieve many changes as the changes occur extra fast in virtual atmosphere than in a physical environment. Because of virtualization clouds are accessible and COMPONENTS OF CLOUD COMPUTING: Cloud computing has clients, data centers, distributed servers as the modules. Clients: Users like computers, laptops, tablets, computer, and mobile phones. Data Centers: These are a group of waiters where the request is presented. Virtualization is done where various requests of effective servers are produced. Distributed Server: Servers wh locally which are physically remote. VIRTUAL MACHINE: A virtual machine (VM) is an idea layer or the situation between hardware components and the end user. Virtual machines have an capacity to run any working systems on them and in diffe referred to as virtual clouds. HYPERVISORS: In virtualization knowledge, there is one section of software that allows the physical servers can have several instances of virtual technologies and it called as Hypervisor. These instances are v that create in virtualization atmosphere and the hypervisor is responsible for directing and regulatory these machines on communication, resource sharing and changing the virtual machines. NETWORK VIRTUALIZATION: The cloud computing system TCP/IP based procedures on communication. It is like communication in LAN systems. Each computer has one exact, unique IP and they are shared with each other. Here also the equal with little changed, instead of computers we have virt machines (VM‘s). The main thing here is the IP‘s we Research and Development (IJTSRD) www.ijtsrd.com 6 | Sep – Oct 2018 Oct 2018 Page: 875 shmi College of Arts & Science, COMPONENTS OF CLOUD COMPUTING: Cloud computing has clients, data centers, distributed s like computers, laptops, tablets, computer, and mobile phones. : These are a group of waiters where the request is presented. Virtualization is done where various requests of effective servers are produced. Servers which exist in non ocally which are physically remote. A virtual machine (VM) is an idea layer or the situation between hardware components and the end- user. Virtual machines have an capacity to run any working systems on them and in different cases it In virtualization knowledge, there is one section of software that allows the physical servers can have several instances of virtual technologies and it called as Hypervisor. These instances are virtual machines that create in virtualization atmosphere and the hypervisor is responsible for directing and regulatory these machines on communication, resource sharing and changing the virtual machines. NETWORK VIRTUALIZATION: The cloud computing systems are really using the TCP/IP based procedures on communication. It is like communication in LAN systems. Each computer has one exact, unique IP and they are shared with each other. Here also the equal with little changed, instead of computers we have virtual laptops or virtual machines (VM‘s). The main thing here is the IP‘s we
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com talking about are varies from the IP‘s we can design on operating systems which we can set to our stage if we have that contact (in case of IaaS service), statically or dynamically. These IP‘s are available from group of network which we have educated about it in network virtualization VIRTUALIZATION FOR CLOUD The goal of virtualization is to collaboratively develop the IT properties such as storage, workstation and network to determined level and to moderate the cost of IT resources which can be completed by combining multiple idle resources into common pools and creating different virtual machines to execute various jobs simultaneously. The resources can be assigned or changed dynamically. Customer should be aware of basic methods such as emulation, hypervisor, full, para and hardware supported virtualization while using virtualization in cloud computing background. Emulation: It is a virtualization skill which converts the performance of the computer hardware to a software database and lies in the operating system layer which lies on the hardware. Virtual Machine Monitor or Hypervisor software layer that can display and virtualizes the resources of a cloud machine. The software level creates virtual properties such as CPU, recall and operating systems nearby or distantly. Para Virtualization: It relates message between hypervisor and invitee operating system to develop efficiency and act. Full Virtualization: Hypervisor creates remote environment between the guest or virtual server and the host or server hardware. VIRTUALIZATION TYPES Client Virtualization: This client virtualization technology makes the system manager to almost monitor and update the client machines like workstation desktop, laptop and mobile devices. It develops the client machines managing and improves the safety to secure from hackers and cybercriminals. Storage Virtualization: It creates the thought of reliable loading from physical packing. Three kind of data storage are use in virtualization, they are DAS (Direct Attached International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 talking about are varies from the IP‘s we can design on operating systems which we can set to our stage if we have that contact (in case of IaaS service), These IP‘s are available from group of network which we have educated about The goal of virtualization is to collaboratively develop the IT properties such as storage, workstation and ermined level and to moderate the cost of IT resources which can be completed by combining multiple idle resources into common pools and creating different virtual machines to execute various jobs simultaneously. The resources can be assigned ynamically. Customer should be aware of basic methods such as emulation, hypervisor, full, para and hardware supported virtualization while using virtualization in cloud computing background. It is a virtualization skill which converts rformance of the computer hardware to a software database and lies in the operating system Virtual Machine Monitor or Hypervisor: A software layer that can display and virtualizes the resources of a cloud machine. The software level creates virtual properties such as CPU, recall and : It relates message between and invitee operating system to develop : Hypervisor creates remote environment between the guest or virtual server and ualization technology makes the system manager to almost monitor and update the client machines like workstation desktop, laptop and mobile devices. It develops the client machines managing and improves the safety to secure from hackers and It creates the thought of reliable loading from physical packing. Three kind of data storage are use in virtualization, they are DAS (Direct Attached Storage), NAS (Network Attached Storage) and SAN (Storage Area Network). Data Leakage: Organizations are in great threat of files escape when an employee safeguards the access to its data stored in cloud structure. Virtualization Security Threats: Safety threats in virtualization are classified into virtual machine risk, hypervisor threat, virtual arrangement and virtual system machine threat faces while treating status of virtual machine, software updates, resource contention, patching and virtual machine capital. Elastic Resource Management: Cloud computing system produce new arguments because of system bands and high volume data created by these systems. In order to work active flexible resource running, we need to look at the concerns such as resource sharing, resource provisioning, resource mappi variation. Cloud services meet issues on the requests of service level bounce and disposal. CONCLUSION: Cloud computing is a new method to use and supply IT services that is determined by consumer internet leanings the cloud computing model forms on the growth of the world wild web, combining rapid scalability, creation of the internet and internet connected devices. The cloud allows users to execute difficult computing tasks without the need to know the basic technology. Cloud computing is developing at a serious time for the IT trade. There is growing awareness that physical and IT states, system, and structure are fast success a breaking point. The explosion of data, transaction, and digitally aware devices is straining existing IT setup and acts. Exponential growth in communication and services is showing borders in network bandwidth and storage size. Supply useless and demand points are putting weight on drive and value system. REFERENCES: 1. Urmila Jangid, Nidhi Sharma, Kalpana Rathi, (Dec 2014) “A Survey on Secure the Cloud Environment using hypervisor virtualization technology”, of Innovative Computer Science & Engineering, Volume 1 Issue 3 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 876 Storage), NAS (Network Attached Storage) and SAN Organizations are in great threat of files escape when an employee safeguards the access to its data stored in Virtualization Security Threats: Safety threats in virtualization are classified into hypervisor threat, virtual arrangement and virtual system risk. The virtual machine threat faces while treating status of virtual machine, software updates, resource contention, patching and virtual machine capital. Elastic Resource Management: omputing system produce new arguments because of system bands and high volume data created by these systems. In order to work active flexible resource running, we need to look at the concerns such as resource sharing, resource provisioning, resource mapping and resource variation. Cloud services meet issues on the requests of service level bounce and disposal. Cloud computing is a new method to use and supply IT services that is determined by consumer internet leanings the cloud computing model forms on the growth of the world wild web, combining rapid scalability, creation of the internet and internet- devices. The cloud allows users to execute difficult computing tasks without the need to know the basic technology. Cloud computing is developing at a serious time for the IT trade. There is growing awareness that physical and IT states, system, and ture are fast success a breaking point. The explosion of data, transaction, and digitally aware devices is straining existing IT setup and acts. Exponential growth in communication and services is showing borders in network bandwidth and storage ly useless and demand points are putting weight on drive and value system. Nidhi Sharma, Kalpana Rathi, (Dec 2014) “A Survey on Secure the Cloud Environment using hypervisor-based virtualization technology”, International Journal of Innovative Computer Science & Engineering, Volume 1 Issue 3
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com 2. T. Swathi, K. Srikanth, S. Raghunath Reddy,(May2014)“VIRTUALIZATION IN CLOUD COMPUTING”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.5 3. Kamyab khajehei, (April 2014) “Role of virtualization in cloud computing”, International Journal of Advance Research in Computer Science and Management Studies, Volume 2, Issue 4, ISSN: 2321-7782 (Online). 4. Krishna tej Koganti, Eswar Patnala, Sai Saga Narasingu, J. N. Chaitanya, ( “Virtualization Technology in Cloud Computing Environment”, International Journal of Emerging Technology and Advanced Engineerin 3, Issue 3. 5. Pankaj Sareen, (March 2013) “Cloud Computing: Virtualization and Role of IT Governance in Cloud”, International Journal of Advanced Research in Computer Science. 6. Farzad Sabahi, (February 2012) Virtualization for Cloud Environment Using Hypervisor-based Technologyǁ, International International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Srikanth, S. Raghunath Reddy,(May2014)“VIRTUALIZATION IN CLOUD COMPUTING”, International Journal of Computer Science and Mobile Computing, Vol.3 Kamyab khajehei, (April 2014) “Role of virtualization in cloud computing”, International Journal of Advance Research in Computer Science and Management Studies, Volume 2, Krishna tej Koganti, Eswar Patnala, Sai Sagar , (March 2013) Virtualization Technology in Cloud Computing Environment”, International Journal of Emerging Technology and Advanced Engineering, Volume Pankaj Sareen, (March 2013) “Cloud Computing: ion and Role of IT Governance in Cloud”, International Journal of Advanced Farzad Sabahi, (February 2012) ―Secure Virtualization for Cloud Environment Using ǁ, International Journal of Machine Learning and Computing, Vol. 2, No. 1. 7. Siddharth Jain, Rakesh Kumar, Anamika, Sunil Kumar Jangir, (Dec 2014) “A Comparative Study for Cloud Computing Platform on Open Source Software”, ABHIYANTRIKI: Journal of Engineering & Techn Vol. 1, No. 2, pg: 28-35. 8. Rakesh Kumar, Bhanu Bhushan Parashar, (November, 2014) “Dynamic Resource Allocation and Management Using Open Conference on Emerging Technologies in Computer Engineering (NCETCE) Supported by: Computer Society C Delhi Section. 9. Rakesh Kumar, Sonu Agarwal, Muskan Bansal, Anurag Mishra, (November, 2014) “Open Source Virtualization Management Using Ganeti Platform”, National Conference on Emerging Technologies in C Engineering (NCETCE) Computer Society Chapter, IEEE International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 877 Machine Learning and Computing, Vol. Siddharth Jain, Rakesh Kumar, Anamika, Sunil Kumar Jangir, (Dec 2014) “A Comparative Study for Cloud Computing Platform on Open Source ABHIYANTRIKI: An International Journal of Engineering & Technology (AIJET), Rakesh Kumar, Bhanu Bhushan Parashar, (November, 2014) “Dynamic Resource Allocation and Management Using Open Stack”, National Conference on Emerging Technologies in Computer Engineering (NCETCE) – 2014, by: Computer Society Chapter, IEEE Rakesh Kumar, Sonu Agarwal, Muskan Bansal, Anurag Mishra, (November, 2014) “Open Source Virtualization Management Using Ganeti Platform”, National Conference on Emerging Technologies in Computer Engineering (NCETCE) – 2014, Supported by: Computer Society Chapter, IEEE Delhi Section.