SlideShare a Scribd company logo
1 of 5
Taxonomy of virtualization
 Virtualization is mainly used to emulate the execution environment,
storage, and networks. The execution environment is classified into two:
– Process-level – implemented on top of an existing operating system.
– System-level – implemented directly on hardware and does not or minimum
requirement of the existing operating system.
OR,
Virtualization covers a wide range of emulation techniques that are applied to
different areas of computing. A classification of these techniques helps us better
understand their characteristics and use
Virtualization is mainly used to emulate
● Execution Environments: To provide support for the execution of the
programs eg. OS, and Application.
○ Process Level: Implemented on top of an existing OS that has full control of
the hardware
○ System Level: Implemented directly on Hardware and do not require support
from existing OS.
● Storage: Storage virtualization is a system administration practice that allows
decoupling the physical organization of the hardware from its logical
representation.
● Networks: Network virtualization combines hardware appliances and specific
software for the creation and management of a virtual network.
Machine Reference Model
 It defines the interfaces between the levels of abstractions, which hide
implementation details. Virtualization techniques actually replace one of
the layers and intercept the calls that are directed toward it.
 Hardware is expressed in terms of the Instruction Set Architecture
(ISA).
– ISA for the processor, registers, memory, and interrupt management.
 Application Binary Interface (ABI) separates the OS layer from the
application and libraries which are managed by the OS.
– System Calls defined
– Allows portabilities of applications and libraries across OS.
API – it interfaces applications to libraries and/or the underlying OS.
 The layered approach simplifies the development and implementation of
a computing system.
ISA
ISA has been divided into two security classes:– Privileged Instructions –
Nonprivileged Instructions
Nonprivileged instructions
 That can be used without interfering with other tasks because they do not
access shared resources. Ex. Arithmetic, floating & fixed point.
Privileged instructions
 They are executed under specific restrictions and are mostly used for
sensitive operations, which expose (behavior-sensitive) or modify
(control sensitive) the privileged state.
– Behavior-sensitive = operate on the I/O
– Control-sensitive = alter the state of the CPU register.
Privileged Hierarchy:
Security Ring
 Ring-0 is in the most privileged level, used by the kernel.
 Ring-1 & 2 are used by the OS-level services and, R3 in the least privileged
level is used by the user. The recent system support two levels:– Ring 0 –
supervisor mode – Ring 3 – user mode
OR,
Taxonomy of virtualization
 Virtual machines are broadly classified into two types: System Virtual
Machines (also known as Virtual Machines) and Process Virtual Machines
(also known as Application Virtual Machines). The classification is based
on their usage and degree of similarity to the linked physical machine. The
system VM mimics the whole system hardware stack and allows for the
execution of the whole operating system Process VM, on the other hand,
provides a layer to an operating system that is used to replicate the
programming environment for the execution of specific processes.
 A Process Virtual Machine, also known as an application virtual machine,
operates as a regular program within a host OS and supports a single
process. It is formed when the process begins and deleted when it
terminates. Its goal is to create a platform-independent programming
environment that abstracts away features of the underlying hardware or
operating system, allowing a program to run on any platform. With Linux,
for example, Wine software aids in the execution of Windows applications.
 A System Virtual Machine, such as VirtualBox, offers a full system
platform that allows the operation of a whole operating system (OS).
 Virtual Machines are used to distribute and designate suitable system
resources to software (which might be several operating systems or an
application), and the software is restricted to the resources provided by the
VM. The actual software layer that allows virtualization is the Virtual
Machine Monitor (also known as Hypervisor). Hypervisors are classified
into two groups based on their relationship to the underlying hardware.
Native VM is a hypervisor that takes direct control of the underlying
hardware, whereas hosted VM is a different software layer that runs within
the operating system and so has an indirect link with the underlying
hardware.
 The system VM abstracts the Instruction Set Architecture, which differs
slightly from that of the actual hardware platform. The primary benefits of
system VM include consolidation (it allows multiple operating systems to
coexist on a single computer system with strong isolation from each other),
application provisioning, maintenance, high availability, and disaster
recovery, as well as sandboxing, faster reboot, and improved debugging
access.
 The process VM enables conventional application execution inside the
underlying operating system to support a single process. To support the
execution of numerous applications associated with numerous processes,
we can construct numerous instances of process VM. The process VM is
formed when the process starts and terminates when the process is
terminated. The primary goal of process VM is to provide platform
independence (in terms of development environment), which implies that
applications may be executed in the same way on any of the underlying
hardware and software platforms. Process VM as opposed to system VM,
abstracts high-level programming languages. Although Process VM is
built using an interpreter, it achieves comparable speed to compiler-based
programming languages using a just-in-time compilation mechanism.
o Java Virtual Machine (JVM) and Common Language Runtime are
two popular examples of Process VMs that are used to virtualize the
Java programming language and the.NET Framework programming
environment, respectively.

More Related Content

What's hot

Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigmRipal Ranpara
 
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationDistributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationMNM Jain Engineering College
 
Importance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML DesigningImportance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML DesigningABHISHEK KUMAR
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applicationsBurhan Ahmed
 
Perception in artificial intelligence
Perception in artificial intelligencePerception in artificial intelligence
Perception in artificial intelligenceMinakshi Atre
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed systemishapadhy
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud ComputingJithin Parakka
 
program flow mechanisms, advanced computer architecture
program flow mechanisms, advanced computer architectureprogram flow mechanisms, advanced computer architecture
program flow mechanisms, advanced computer architecturePankaj Kumar Jain
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed SystemsRupsee
 
Issues in knowledge representation
Issues in knowledge representationIssues in knowledge representation
Issues in knowledge representationSravanthi Emani
 
Data Designs (Software Engg.)
Data Designs (Software Engg.)Data Designs (Software Engg.)
Data Designs (Software Engg.)Arun Shukla
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memoryAshish Kumar
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemorySHIKHA GAUTAM
 

What's hot (20)

Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
 
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationDistributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communication
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Importance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML DesigningImportance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML Designing
 
Task programming
Task programmingTask programming
Task programming
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
 
Perception in artificial intelligence
Perception in artificial intelligencePerception in artificial intelligence
Perception in artificial intelligence
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed system
 
Distributed System ppt
Distributed System pptDistributed System ppt
Distributed System ppt
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud Computing
 
program flow mechanisms, advanced computer architecture
program flow mechanisms, advanced computer architectureprogram flow mechanisms, advanced computer architecture
program flow mechanisms, advanced computer architecture
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Issues in knowledge representation
Issues in knowledge representationIssues in knowledge representation
Issues in knowledge representation
 
Data Designs (Software Engg.)
Data Designs (Software Engg.)Data Designs (Software Engg.)
Data Designs (Software Engg.)
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
 
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Virtual machine security
Virtual machine securityVirtual machine security
Virtual machine security
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
 

Similar to Taxonomy of Virtualization Techniques and Their Classifications

Virtualization
VirtualizationVirtualization
Virtualizationvishnurk
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computingMayank Aggarwal
 
virtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfvirtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfKowsalyaJayakumar2
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxVivek Shelke
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud ComputingRishikese MR
 
Unit 3 Virtualization.pdf
Unit 3 Virtualization.pdfUnit 3 Virtualization.pdf
Unit 3 Virtualization.pdfPrachiKurhade3
 
Operating system Definition Structures
Operating  system Definition  StructuresOperating  system Definition  Structures
Operating system Definition Structuresanair23
 
CloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfCloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfkhan593595
 
CloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfCloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfkhan593595
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfAkshithaReddy42848
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computingSoumyajit Basu
 
Operating systems Overview
Operating systems OverviewOperating systems Overview
Operating systems OverviewNAILBITER
 

Similar to Taxonomy of Virtualization Techniques and Their Classifications (20)

Virtualization
VirtualizationVirtualization
Virtualization
 
Unit II.ppt
Unit II.pptUnit II.ppt
Unit II.ppt
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computing
 
VSS-1.pdf
VSS-1.pdfVSS-1.pdf
VSS-1.pdf
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
virtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfvirtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdf
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptx
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
lect 1TO 5.pptx
lect 1TO 5.pptxlect 1TO 5.pptx
lect 1TO 5.pptx
 
Unit 3 Virtualization.pdf
Unit 3 Virtualization.pdfUnit 3 Virtualization.pdf
Unit 3 Virtualization.pdf
 
Vitualisation
VitualisationVitualisation
Vitualisation
 
Operating system Definition Structures
Operating  system Definition  StructuresOperating  system Definition  Structures
Operating system Definition Structures
 
Virtualization Approach: Theory and Application
Virtualization Approach: Theory and ApplicationVirtualization Approach: Theory and Application
Virtualization Approach: Theory and Application
 
CloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfCloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdf
 
CloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfCloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdf
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdf
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
 
Operating systems Overview
Operating systems OverviewOperating systems Overview
Operating systems Overview
 
incs775_lect6.ppt
incs775_lect6.pptincs775_lect6.ppt
incs775_lect6.ppt
 

More from shruti533256

More on Emulsion.docx
More on Emulsion.docxMore on Emulsion.docx
More on Emulsion.docxshruti533256
 
More on Virtualization.ppt
More on Virtualization.pptMore on Virtualization.ppt
More on Virtualization.pptshruti533256
 
Virtualization Introduction.ppt
Virtualization Introduction.pptVirtualization Introduction.ppt
Virtualization Introduction.pptshruti533256
 
Virtualization summary b.docx
Virtualization summary b.docxVirtualization summary b.docx
Virtualization summary b.docxshruti533256
 
Virtualization summary a.docx
Virtualization summary a.docxVirtualization summary a.docx
Virtualization summary a.docxshruti533256
 
More on Virtualization 2.pptx
More on Virtualization 2.pptxMore on Virtualization 2.pptx
More on Virtualization 2.pptxshruti533256
 
Virtualization concepts 2.pptx
Virtualization concepts 2.pptxVirtualization concepts 2.pptx
Virtualization concepts 2.pptxshruti533256
 
6- Threaded Interpretation.docx
6- Threaded Interpretation.docx6- Threaded Interpretation.docx
6- Threaded Interpretation.docxshruti533256
 
More on Virtualization 3.pptx
More on Virtualization 3.pptxMore on Virtualization 3.pptx
More on Virtualization 3.pptxshruti533256
 
2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docxshruti533256
 
Course Plan Virtualization concepts.docx
Course Plan Virtualization concepts.docxCourse Plan Virtualization concepts.docx
Course Plan Virtualization concepts.docxshruti533256
 
3-Types of Virtual Machines.docx
3-Types of Virtual Machines.docx3-Types of Virtual Machines.docx
3-Types of Virtual Machines.docxshruti533256
 
1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docxshruti533256
 
6-Nfa & equivalence with RE.pdf
6-Nfa & equivalence with RE.pdf6-Nfa & equivalence with RE.pdf
6-Nfa & equivalence with RE.pdfshruti533256
 
9-Pumping Lemma.pdf
9-Pumping Lemma.pdf9-Pumping Lemma.pdf
9-Pumping Lemma.pdfshruti533256
 
5-DFA and equivalence with RE.pdf
5-DFA and equivalence with RE.pdf5-DFA and equivalence with RE.pdf
5-DFA and equivalence with RE.pdfshruti533256
 
2-Chomsky hierarchy of languages.ppt
2-Chomsky hierarchy of languages.ppt2-Chomsky hierarchy of languages.ppt
2-Chomsky hierarchy of languages.pptshruti533256
 

More from shruti533256 (19)

More on Emulsion.docx
More on Emulsion.docxMore on Emulsion.docx
More on Emulsion.docx
 
More on Virtualization.ppt
More on Virtualization.pptMore on Virtualization.ppt
More on Virtualization.ppt
 
Virtualization Introduction.ppt
Virtualization Introduction.pptVirtualization Introduction.ppt
Virtualization Introduction.ppt
 
Virtualization summary b.docx
Virtualization summary b.docxVirtualization summary b.docx
Virtualization summary b.docx
 
Virtualization summary a.docx
Virtualization summary a.docxVirtualization summary a.docx
Virtualization summary a.docx
 
More on Virtualization 2.pptx
More on Virtualization 2.pptxMore on Virtualization 2.pptx
More on Virtualization 2.pptx
 
Virtualization concepts 2.pptx
Virtualization concepts 2.pptxVirtualization concepts 2.pptx
Virtualization concepts 2.pptx
 
6- Threaded Interpretation.docx
6- Threaded Interpretation.docx6- Threaded Interpretation.docx
6- Threaded Interpretation.docx
 
Overview.ppt
Overview.pptOverview.ppt
Overview.ppt
 
More on Virtualization 3.pptx
More on Virtualization 3.pptxMore on Virtualization 3.pptx
More on Virtualization 3.pptx
 
2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx
 
Course Plan Virtualization concepts.docx
Course Plan Virtualization concepts.docxCourse Plan Virtualization concepts.docx
Course Plan Virtualization concepts.docx
 
3-Types of Virtual Machines.docx
3-Types of Virtual Machines.docx3-Types of Virtual Machines.docx
3-Types of Virtual Machines.docx
 
1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx
 
5-Emulation.docx
5-Emulation.docx5-Emulation.docx
5-Emulation.docx
 
6-Nfa & equivalence with RE.pdf
6-Nfa & equivalence with RE.pdf6-Nfa & equivalence with RE.pdf
6-Nfa & equivalence with RE.pdf
 
9-Pumping Lemma.pdf
9-Pumping Lemma.pdf9-Pumping Lemma.pdf
9-Pumping Lemma.pdf
 
5-DFA and equivalence with RE.pdf
5-DFA and equivalence with RE.pdf5-DFA and equivalence with RE.pdf
5-DFA and equivalence with RE.pdf
 
2-Chomsky hierarchy of languages.ppt
2-Chomsky hierarchy of languages.ppt2-Chomsky hierarchy of languages.ppt
2-Chomsky hierarchy of languages.ppt
 

Recently uploaded

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Recently uploaded (20)

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

Taxonomy of Virtualization Techniques and Their Classifications

  • 1. Taxonomy of virtualization  Virtualization is mainly used to emulate the execution environment, storage, and networks. The execution environment is classified into two: – Process-level – implemented on top of an existing operating system. – System-level – implemented directly on hardware and does not or minimum requirement of the existing operating system. OR, Virtualization covers a wide range of emulation techniques that are applied to different areas of computing. A classification of these techniques helps us better understand their characteristics and use Virtualization is mainly used to emulate ● Execution Environments: To provide support for the execution of the programs eg. OS, and Application. ○ Process Level: Implemented on top of an existing OS that has full control of the hardware ○ System Level: Implemented directly on Hardware and do not require support from existing OS. ● Storage: Storage virtualization is a system administration practice that allows decoupling the physical organization of the hardware from its logical representation. ● Networks: Network virtualization combines hardware appliances and specific software for the creation and management of a virtual network.
  • 2. Machine Reference Model  It defines the interfaces between the levels of abstractions, which hide implementation details. Virtualization techniques actually replace one of the layers and intercept the calls that are directed toward it.  Hardware is expressed in terms of the Instruction Set Architecture (ISA). – ISA for the processor, registers, memory, and interrupt management.  Application Binary Interface (ABI) separates the OS layer from the application and libraries which are managed by the OS. – System Calls defined – Allows portabilities of applications and libraries across OS. API – it interfaces applications to libraries and/or the underlying OS.
  • 3.  The layered approach simplifies the development and implementation of a computing system. ISA ISA has been divided into two security classes:– Privileged Instructions – Nonprivileged Instructions Nonprivileged instructions  That can be used without interfering with other tasks because they do not access shared resources. Ex. Arithmetic, floating & fixed point. Privileged instructions  They are executed under specific restrictions and are mostly used for sensitive operations, which expose (behavior-sensitive) or modify (control sensitive) the privileged state. – Behavior-sensitive = operate on the I/O – Control-sensitive = alter the state of the CPU register. Privileged Hierarchy: Security Ring  Ring-0 is in the most privileged level, used by the kernel.  Ring-1 & 2 are used by the OS-level services and, R3 in the least privileged level is used by the user. The recent system support two levels:– Ring 0 – supervisor mode – Ring 3 – user mode OR, Taxonomy of virtualization  Virtual machines are broadly classified into two types: System Virtual Machines (also known as Virtual Machines) and Process Virtual Machines (also known as Application Virtual Machines). The classification is based on their usage and degree of similarity to the linked physical machine. The system VM mimics the whole system hardware stack and allows for the execution of the whole operating system Process VM, on the other hand,
  • 4. provides a layer to an operating system that is used to replicate the programming environment for the execution of specific processes.  A Process Virtual Machine, also known as an application virtual machine, operates as a regular program within a host OS and supports a single process. It is formed when the process begins and deleted when it terminates. Its goal is to create a platform-independent programming environment that abstracts away features of the underlying hardware or operating system, allowing a program to run on any platform. With Linux, for example, Wine software aids in the execution of Windows applications.  A System Virtual Machine, such as VirtualBox, offers a full system platform that allows the operation of a whole operating system (OS).  Virtual Machines are used to distribute and designate suitable system resources to software (which might be several operating systems or an application), and the software is restricted to the resources provided by the VM. The actual software layer that allows virtualization is the Virtual Machine Monitor (also known as Hypervisor). Hypervisors are classified into two groups based on their relationship to the underlying hardware. Native VM is a hypervisor that takes direct control of the underlying hardware, whereas hosted VM is a different software layer that runs within the operating system and so has an indirect link with the underlying hardware.  The system VM abstracts the Instruction Set Architecture, which differs slightly from that of the actual hardware platform. The primary benefits of system VM include consolidation (it allows multiple operating systems to coexist on a single computer system with strong isolation from each other), application provisioning, maintenance, high availability, and disaster recovery, as well as sandboxing, faster reboot, and improved debugging access.  The process VM enables conventional application execution inside the underlying operating system to support a single process. To support the execution of numerous applications associated with numerous processes, we can construct numerous instances of process VM. The process VM is formed when the process starts and terminates when the process is terminated. The primary goal of process VM is to provide platform independence (in terms of development environment), which implies that applications may be executed in the same way on any of the underlying hardware and software platforms. Process VM as opposed to system VM, abstracts high-level programming languages. Although Process VM is
  • 5. built using an interpreter, it achieves comparable speed to compiler-based programming languages using a just-in-time compilation mechanism. o Java Virtual Machine (JVM) and Common Language Runtime are two popular examples of Process VMs that are used to virtualize the Java programming language and the.NET Framework programming environment, respectively.