Basically, this presentation is about the concept of virtualization and load balancer in cloud computing. It gives us a detailed knowledge about virtualization and load balancer.
This presentation tries to explain basics of virtualization, what is server virtualization ? why is it important ? how it is done ? What are the limitations and risks associated with it ?
This Chapter will teach you what is virtualization and the concept of virtualization, Virtual machine its benefit and real time use, understanding Hypervisors (virtual machine monitor)
Need for Virtualization – Pros and cons of Virtualization – Types of Virtualization –System VM, Process VM, Virtual Machine monitor – Virtual machine properties - Interpretation and binary translation, HLL VM - supervisors – Xen, KVM, VMware, Virtual Box, Hyper-V.
This presentation tries to explain basics of virtualization, what is server virtualization ? why is it important ? how it is done ? What are the limitations and risks associated with it ?
This Chapter will teach you what is virtualization and the concept of virtualization, Virtual machine its benefit and real time use, understanding Hypervisors (virtual machine monitor)
Need for Virtualization – Pros and cons of Virtualization – Types of Virtualization –System VM, Process VM, Virtual Machine monitor – Virtual machine properties - Interpretation and binary translation, HLL VM - supervisors – Xen, KVM, VMware, Virtual Box, Hyper-V.
VIRTUALIZATION: Basics of Virtualization, Types of Virtualizations, Implementation Levels of Virtualization, Virtualization Structures, Tools and Mechanisms, Virtualization of CPU, Memory, I/O Devices, Virtual Clusters and Resource management, Virtualization for Data-center Automation, Introduction to MapReduce, GFS, HDFS, Hadoop, Framework.)
Risk Analysis and Mitigation in Virtualized EnvironmentsSiddharth Coontoor
As companies move towards hybrid cloud solution there are still many private cloud solutions still out there. Traditional risk assessment techniques cannot be applied to such virtual servers. This paper is an attempt to identify key assets and assess risks related to these critical assets.
Virtualization is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers)..
Virtualization is a proved technology that makes it possible to run multiple operating system and applications on the same server at same time.
Virtualization is the process of creating a logical(virtual) version of a server operating system, a storage device, or network services.
The technology that work behind virtualization is known as a virtual machine monitor(VM), or virtual manager which separates compute environments from the actual physical infrastructure.
One can Study the key concept of Virtualization, its types, why Virtualization and what are the use cases and Benefits of Virtualization and example of Virtualization.
The Future of Computing: Exploring the Potential of Virtualization ServerFredReynolds2
Virtualization Server may be a viable option if you want to reduce IT expenditures while maximizing your current IT infrastructure’s resources. This method of deploying multiple server applications on a single physical system has gained widespread market acceptance and is proving quite advantageous for small and large businesses.
VIRTUALIZATION: Basics of Virtualization, Types of Virtualizations, Implementation Levels of Virtualization, Virtualization Structures, Tools and Mechanisms, Virtualization of CPU, Memory, I/O Devices, Virtual Clusters and Resource management, Virtualization for Data-center Automation, Introduction to MapReduce, GFS, HDFS, Hadoop, Framework.)
Risk Analysis and Mitigation in Virtualized EnvironmentsSiddharth Coontoor
As companies move towards hybrid cloud solution there are still many private cloud solutions still out there. Traditional risk assessment techniques cannot be applied to such virtual servers. This paper is an attempt to identify key assets and assess risks related to these critical assets.
Virtualization is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers)..
Virtualization is a proved technology that makes it possible to run multiple operating system and applications on the same server at same time.
Virtualization is the process of creating a logical(virtual) version of a server operating system, a storage device, or network services.
The technology that work behind virtualization is known as a virtual machine monitor(VM), or virtual manager which separates compute environments from the actual physical infrastructure.
One can Study the key concept of Virtualization, its types, why Virtualization and what are the use cases and Benefits of Virtualization and example of Virtualization.
The Future of Computing: Exploring the Potential of Virtualization ServerFredReynolds2
Virtualization Server may be a viable option if you want to reduce IT expenditures while maximizing your current IT infrastructure’s resources. This method of deploying multiple server applications on a single physical system has gained widespread market acceptance and is proving quite advantageous for small and large businesses.
Similar to Lecture 11 (Virtualization and Load Balancer).pptx (20)
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Lecture 11 (Virtualization and Load Balancer).pptx
1. 13-04-2023 1
UNIVERSITY INSTITUTE OF
COMPUTING
Master of Computer Applications(CC& Devops)
Cloud Computing
Virtualization
DISCOVER . LEARN . EMPOWER
2. 2
Course outcome
Cloud Computing
Virtualization: Concept of
virtualization, Taxonomy of
Virtualization Techniques,
Hypervisor and its types, Pros and
cons of Virtualization, Virtual
Machine provisioning and
lifecycle, Load Balancing and its
algorithms.
CO Course Outcomes Level
1 Apply the fundamental and essential
concepts of Cloud Computing in
deploying web applications.
Understand
2 Analyze the various cloud service
providers on the basis of
requirements and constraints.
Understand
3 Implement the fundamental
concepts of cloud storage and
demonstrate their use in storage
systems such as Microsoft Azure.
Excellent
4 Design and implement the concept
of traffic manager and perform load
balancing in cloud environment.
Good
5 Simulate concepts of virtualization
and its migration over the cloud.
Understand
3. Syllabus
13-04-2023 3
UNIT II
Resource Management: Introduction, resource provisioning and
scheduling. Resource scheduling algorithms.
Virtualization: Concept of virtualization, Taxonomy of Virtualization
Techniques, Hypervisor and its types, Pros and cons of Virtualization,
Virtual Machine provisioning and lifecycle, Load Balancing and its
algorithms.
Traffic Manager: Introduction, Benefits, Types, Managing traffic
between datacenters.
VM Migration: Introduction, Approaches, seven step model of migration
into cloud, Migration risks and mitigation.
4. Virtualization
13-04-2023 4
Virtualization is the "creation of a virtual (rather than actual)
version of something, such as a server, a desktop, a storage
device, an operating system or network resources".
5. 13-04-2023 5
Virtualization is a technique, which allows to share a single physical instance
of a resource or an application among multiple customers and organizations. It
does by assigning a logical name to a physical storage and providing a pointer
to that physical resource when demanded.
9. Virtualization
13-04-2023 9
Creation of a virtual machine over existing operating system
and hardware is known as Hardware Virtualization. A Virtual
machine provides an environment that is logically separated
from the underlying hardware.
The machine on which the virtual machine is going to create is
known as Host Machine and that virtual machine is referred as
a Guest Machine
11. Hardware Virtualization
• When the virtual machine software or virtual machine
manager (VMM) is directly installed on the hardware system is
known as hardware virtualization.
• The main job of hypervisor is to control and monitoring the
processor, memory and other hardware resources.
• After virtualization of hardware system we can install different
operating system on it and run different applications on those OS.
13-04-2023 11
12. Hardware Virtualization
• Hardware virtualization is the creation of virtual versions of
computers, operating systems, or their components. It uses a
software layer called a hypervisor or a virtual machine monitor to
provide abstracted hardware to multiple guest operating systems.
Hardware virtualization allows you to run different operating
systems on the same physical computer and share the physical
hardware resources more efficiently. It can improve the
performance and lower the costs of computing.
13-04-2023 12
14. Operating System Virtualization
When the virtual machine software or virtual machine
manager (VMM) is installed on the Host operating system instead of
directly on the hardware system is known as operating system
virtualization.
Usage:
Operating System Virtualization is mainly used for testing the
applications on different platforms of OS.
13-04-2023 14
16. Server Virtualization
When the virtual machine software or virtual machine
manager (VMM) is directly installed on the Server system is known
as server virtualization.
Server virtualization is a partition of physical servers into multiple virtual
servers. Here, each virtual server is running its own operating system and
applications.
Usage:
Server virtualization is done because a single physical server can be
divided into multiple servers on the demand basis and for balancing
the load.
13-04-2023 16
17. How Server Virtualization works?
Each virtual server performs like a unique physical device, which
is capable to run its own operating system.
Here software which is specially designed for this purpose is used.
An administrator which is present in the software can convert one
physical server into multiple servers. So these multiple servers are
enough to use all the machines processing power.
CPU works with multiple processors that provides the ability to
run several complicated tasks with ease.
Here, the virtual server specially dedicates only to a particular task
to perform better. There are many servers which use only a small
part of their overall capability.
However, another problem which arises is that the larger the
computer network the more complex a server will be.
13-04-2023 17
19. Storage Virtualization
Storage virtualization is the process of grouping the physical storage
from multiple network storage devices so that it looks like a single
storage device.
Usage:
Storage virtualization is mainly done for back-up and recovery
purposes.
13-04-2023 19
21. Hypervisor
A hypervisor is a form of virtualization software used in
Cloud hosting to divide and allocate the resources on various
pieces of hardware.
The program which provides partitioning, isolation or
abstraction is called virtualization hypervisor.
The hypervisor is a hardware virtualization technique that
allows multiple guest operating systems (OS) to run on a
single host system at the same time.
A hypervisor is sometimes also called a virtual machine
manager(VMM).
13-04-2023 21
23. Types of Hypervisor
TYPE-1 Hypervisor:
The hypervisor runs directly on the underlying host system. It is also
known as “Native Hypervisor” or “Bare metal hypervisor”. It does
not require any base server operating system. It has direct access to
hardware resources. Examples of Type 1 hypervisors include
VMware ESXi, Microsoft Hyper-V hypervisor.
13-04-2023 23
25. Pros & Cons of Type-1 Hypervisor
Pros:
Such kind of hypervisors are
very efficient because they have
direct access to the physical
hardware resources(like Cpu,
Memory, Network, Physical
storage). This causes the
empowerment the security
because there is nothing any
kind of the third party resource
so that attacker couldn’t
compromise with anything.
13-04-2023 25
Cons:
One problem with Type-1
hypervisor is that they
usually need a dedicated
separate machine to perform
its operation and to instruct
different VMs and control
the host hardware resources.
26. TYPE-2 Hypervisor
A Host operating system runs on the underlying host system. It is
also known as ‘Hosted Hypervisor”. Such kind of hypervisors
doesn’t run directly over the underlying hardware rather they run as
an application in a Host system(physical machine). Basically,
software installed on an operating system. Hypervisor asks the
operating system to make hardware calls.
13-04-2023 26
Example of Type 2 hypervisor includes VMware Player or Parallels
Desktop. Hosted hypervisors are often found on endpoints like
PCs.
The type-2 hypervisor is are very useful for engineers, security
analyst(for checking malware, or malicious source code and newly
developed applications).
28. Pros & Cons of Type-2 Hypervisor
Pros: Such kind
of hypervisors allows quick
and easy access to a guest
Operating System alongside
the host machine running.
These hypervisors usually
come with additional useful
features for guest machine.
Such tools enhance the
coordination between the
host machine and guest
machine.
13-04-2023 28
Cons: Here there is no direct
access to the physical hardware
resources so the efficiency of
these hypervisors lags in
performance as compared to the
type-1 hypervisors, and
potential security risks are also
there an attacker can
compromise the security
weakness if there is access to
the host operating system so he
can also access the guest
operating system.
29. Advantages of Virtualization
• Using Virtualization for Efficient Hardware Utilization
• Using Virtualization to Increase Availability
• Disaster Recovery
• Save Energy
• Deploying Servers too fast
• Save Space in your Server Room or Datacenter
• Testing and setting up Lab Environment
• Shifting all your Local Infrastructure to Cloud in a day
• Possibility to Divide Services
13-04-2023 29
33. Virtual Machine Life Cycle
The cycle starts by a request delivered to the IT department,
stating the requirement for creating a new server for a particular
service.
This request is being processed by the IT administration to start
seeing the servers’ resource pool, matching these resources with
requirements
Starting the provision of the needed virtual machine.
Once it provisioned and started, it is ready to provide the required
service according to an SLA.
Virtual is being released; and free resources.
13-04-2023 33
35. Virtual Machine Provisioning
The common and normal steps of provisioning a virtual server are
as follows:
Firstly, you need to select a server from a pool of available servers
(physical servers with enough capacity) along with the appropriate
OS template you need to provision the virtual machine.
Secondly, you need to load the appropriate software (operating
System you selected in the previous step, device drivers,
middleware, and the needed applications for the service required).
Thirdly, you need to customize and configure the machine (e.g., IP
address, Gateway) to configure an associated network and storage
resources.
Finally, the virtual server is ready to start with its newly loaded
software.
13-04-2023 35
36. Virtual Machine Provisioning
• To summarize, server provisioning is defining server’s configuration
based on the organization requirements, a hardware, and software
component (processor, RAM, storage, networking, operating system,
applications, etc.).
• Normally, virtual machines can be provisioned by manually installing an
operating system, by using a preconfigured VM template, by cloning an
existing VM, or by importing a physical server or a virtual server from
another hosting platform. Physical servers can also be virtualized and
provisioned using P2V (Physical to Virtual) tools and techniques (e.g.,
virt-p2v).
• After creating a virtual machine by virtualizing a physical server, or by
building a new virtual server in the virtual environment, a template can
be created out of it.
• Most virtualization management vendors (VMware, XenServer, etc.)
provide the data center’s administration with the ability to do such tasks
in an easy way.
13-04-2023 36
38. Load balancing
• Cloud load balancing is defined as the method of splitting workloads
and computing properties in a cloud computing. It enables enterprise to
manage workload demands or application demands by distributing
resources among numerous computers, networks or servers. Cloud load
balancing includes holding the circulation of workload traffic and
demands that exist over the Internet.
13-04-2023 38
39. Load balancing
13-04-2023 39
Cloud load balancing is defined as
the method of splitting workloads
and computing properties in a cloud
computing.
It enables enterprise to manage
workload demands or application
demands by distributing resources
among numerous computers,
networks or servers.
Cloud load balancing includes
holding the circulation of workload
traffic and demands that exist over
the Internet.
40. Load balancing
There are two elementary solutions to overcome the problem of
overloading on the servers-
First is a single-server solution in which the server is
upgraded to a higher performance server. However, the new
server may also be overloaded soon, demanding another
upgrade. Moreover, the upgrading process is arduous and
expensive.
Second is a multiple-server solution in which a scalable
service system on a cluster of servers is built. That’s why it is
more cost effective as well as more scalable to build a server
cluster system for network services.
13-04-2023 40