SlideShare a Scribd company logo
13-04-2023 1
UNIVERSITY INSTITUTE OF
COMPUTING
Master of Computer Applications(CC& Devops)
Cloud Computing
Virtualization
DISCOVER . LEARN . EMPOWER
2
Course outcome
Cloud Computing
Virtualization: Concept of
virtualization, Taxonomy of
Virtualization Techniques,
Hypervisor and its types, Pros and
cons of Virtualization, Virtual
Machine provisioning and
lifecycle, Load Balancing and its
algorithms.
CO Course Outcomes Level
1 Apply the fundamental and essential
concepts of Cloud Computing in
deploying web applications.
Understand
2 Analyze the various cloud service
providers on the basis of
requirements and constraints.
Understand
3 Implement the fundamental
concepts of cloud storage and
demonstrate their use in storage
systems such as Microsoft Azure.
Excellent
4 Design and implement the concept
of traffic manager and perform load
balancing in cloud environment.
Good
5 Simulate concepts of virtualization
and its migration over the cloud.
Understand
Syllabus
13-04-2023 3
UNIT II
Resource Management: Introduction, resource provisioning and
scheduling. Resource scheduling algorithms.
Virtualization: Concept of virtualization, Taxonomy of Virtualization
Techniques, Hypervisor and its types, Pros and cons of Virtualization,
Virtual Machine provisioning and lifecycle, Load Balancing and its
algorithms.
Traffic Manager: Introduction, Benefits, Types, Managing traffic
between datacenters.
VM Migration: Introduction, Approaches, seven step model of migration
into cloud, Migration risks and mitigation.
Virtualization
13-04-2023 4
Virtualization is the "creation of a virtual (rather than actual)
version of something, such as a server, a desktop, a storage
device, an operating system or network resources".
13-04-2023 5
Virtualization is a technique, which allows to share a single physical instance
of a resource or an application among multiple customers and organizations. It
does by assigning a logical name to a physical storage and providing a pointer
to that physical resource when demanded.
13-04-2023 6
13-04-2023 7
13-04-2023 8
Virtualization
13-04-2023 9
Creation of a virtual machine over existing operating system
and hardware is known as Hardware Virtualization. A Virtual
machine provides an environment that is logically separated
from the underlying hardware.
The machine on which the virtual machine is going to create is
known as Host Machine and that virtual machine is referred as
a Guest Machine
Types of Virtualization
13-04-2023 10
Hardware Virtualization
• When the virtual machine software or virtual machine
manager (VMM) is directly installed on the hardware system is
known as hardware virtualization.
• The main job of hypervisor is to control and monitoring the
processor, memory and other hardware resources.
• After virtualization of hardware system we can install different
operating system on it and run different applications on those OS.
13-04-2023 11
Hardware Virtualization
• Hardware virtualization is the creation of virtual versions of
computers, operating systems, or their components. It uses a
software layer called a hypervisor or a virtual machine monitor to
provide abstracted hardware to multiple guest operating systems.
Hardware virtualization allows you to run different operating
systems on the same physical computer and share the physical
hardware resources more efficiently. It can improve the
performance and lower the costs of computing.
13-04-2023 12
Hardware Virtualization
13-04-2023 13
Operating System Virtualization
When the virtual machine software or virtual machine
manager (VMM) is installed on the Host operating system instead of
directly on the hardware system is known as operating system
virtualization.
Usage:
Operating System Virtualization is mainly used for testing the
applications on different platforms of OS.
13-04-2023 14
Operating System Virtualization
13-04-2023 15
Server Virtualization
When the virtual machine software or virtual machine
manager (VMM) is directly installed on the Server system is known
as server virtualization.
Server virtualization is a partition of physical servers into multiple virtual
servers. Here, each virtual server is running its own operating system and
applications.
Usage:
Server virtualization is done because a single physical server can be
divided into multiple servers on the demand basis and for balancing
the load.
13-04-2023 16
How Server Virtualization works?
Each virtual server performs like a unique physical device, which
is capable to run its own operating system.
Here software which is specially designed for this purpose is used.
An administrator which is present in the software can convert one
physical server into multiple servers. So these multiple servers are
enough to use all the machines processing power.
CPU works with multiple processors that provides the ability to
run several complicated tasks with ease.
Here, the virtual server specially dedicates only to a particular task
to perform better. There are many servers which use only a small
part of their overall capability.
However, another problem which arises is that the larger the
computer network the more complex a server will be.
13-04-2023 17
Server Virtualization
13-04-2023 18
Storage Virtualization
Storage virtualization is the process of grouping the physical storage
from multiple network storage devices so that it looks like a single
storage device.
Usage:
Storage virtualization is mainly done for back-up and recovery
purposes.
13-04-2023 19
Storage Virtualization
13-04-2023 20
Hypervisor
A hypervisor is a form of virtualization software used in
Cloud hosting to divide and allocate the resources on various
pieces of hardware.
The program which provides partitioning, isolation or
abstraction is called virtualization hypervisor.
The hypervisor is a hardware virtualization technique that
allows multiple guest operating systems (OS) to run on a
single host system at the same time.
A hypervisor is sometimes also called a virtual machine
manager(VMM).
13-04-2023 21
13-04-2023 22
Types of Hypervisor
TYPE-1 Hypervisor:
The hypervisor runs directly on the underlying host system. It is also
known as “Native Hypervisor” or “Bare metal hypervisor”. It does
not require any base server operating system. It has direct access to
hardware resources. Examples of Type 1 hypervisors include
VMware ESXi, Microsoft Hyper-V hypervisor.
13-04-2023 23
Type - 1
13-04-2023 24
Pros & Cons of Type-1 Hypervisor
Pros:
Such kind of hypervisors are
very efficient because they have
direct access to the physical
hardware resources(like Cpu,
Memory, Network, Physical
storage). This causes the
empowerment the security
because there is nothing any
kind of the third party resource
so that attacker couldn’t
compromise with anything.
13-04-2023 25
Cons:
One problem with Type-1
hypervisor is that they
usually need a dedicated
separate machine to perform
its operation and to instruct
different VMs and control
the host hardware resources.
TYPE-2 Hypervisor
A Host operating system runs on the underlying host system. It is
also known as ‘Hosted Hypervisor”. Such kind of hypervisors
doesn’t run directly over the underlying hardware rather they run as
an application in a Host system(physical machine). Basically,
software installed on an operating system. Hypervisor asks the
operating system to make hardware calls.
13-04-2023 26
Example of Type 2 hypervisor includes VMware Player or Parallels
Desktop. Hosted hypervisors are often found on endpoints like
PCs.
The type-2 hypervisor is are very useful for engineers, security
analyst(for checking malware, or malicious source code and newly
developed applications).
Type- 2
13-04-2023 27
Pros & Cons of Type-2 Hypervisor
Pros: Such kind
of hypervisors allows quick
and easy access to a guest
Operating System alongside
the host machine running.
These hypervisors usually
come with additional useful
features for guest machine.
Such tools enhance the
coordination between the
host machine and guest
machine.
13-04-2023 28
Cons: Here there is no direct
access to the physical hardware
resources so the efficiency of
these hypervisors lags in
performance as compared to the
type-1 hypervisors, and
potential security risks are also
there an attacker can
compromise the security
weakness if there is access to
the host operating system so he
can also access the guest
operating system.
Advantages of Virtualization
• Using Virtualization for Efficient Hardware Utilization
• Using Virtualization to Increase Availability
• Disaster Recovery
• Save Energy
• Deploying Servers too fast
• Save Space in your Server Room or Datacenter
• Testing and setting up Lab Environment
• Shifting all your Local Infrastructure to Cloud in a day
• Possibility to Divide Services
13-04-2023 29
Disadvantages of Virtualization
• Extra Costs
• Software Licensing
• Learn the new Infrastructure
13-04-2023 30
Broad Division of Virtualization
13-04-2023 31
Broad Division of Virtualization
13-04-2023 32
Virtual Machine Life Cycle
The cycle starts by a request delivered to the IT department,
stating the requirement for creating a new server for a particular
service.
This request is being processed by the IT administration to start
seeing the servers’ resource pool, matching these resources with
requirements
Starting the provision of the needed virtual machine.
Once it provisioned and started, it is ready to provide the required
service according to an SLA.
Virtual is being released; and free resources.
13-04-2023 33
Virtual Machine Life Cycle
13-04-2023 34
Virtual Machine Provisioning
The common and normal steps of provisioning a virtual server are
as follows:
Firstly, you need to select a server from a pool of available servers
(physical servers with enough capacity) along with the appropriate
OS template you need to provision the virtual machine.
Secondly, you need to load the appropriate software (operating
System you selected in the previous step, device drivers,
middleware, and the needed applications for the service required).
Thirdly, you need to customize and configure the machine (e.g., IP
address, Gateway) to configure an associated network and storage
resources.
Finally, the virtual server is ready to start with its newly loaded
software.
13-04-2023 35
Virtual Machine Provisioning
• To summarize, server provisioning is defining server’s configuration
based on the organization requirements, a hardware, and software
component (processor, RAM, storage, networking, operating system,
applications, etc.).
• Normally, virtual machines can be provisioned by manually installing an
operating system, by using a preconfigured VM template, by cloning an
existing VM, or by importing a physical server or a virtual server from
another hosting platform. Physical servers can also be virtualized and
provisioned using P2V (Physical to Virtual) tools and techniques (e.g.,
virt-p2v).
• After creating a virtual machine by virtualizing a physical server, or by
building a new virtual server in the virtual environment, a template can
be created out of it.
• Most virtualization management vendors (VMware, XenServer, etc.)
provide the data center’s administration with the ability to do such tasks
in an easy way.
13-04-2023 36
Virtual Machine Life Cycle
13-04-2023 37
Load balancing
• Cloud load balancing is defined as the method of splitting workloads
and computing properties in a cloud computing. It enables enterprise to
manage workload demands or application demands by distributing
resources among numerous computers, networks or servers. Cloud load
balancing includes holding the circulation of workload traffic and
demands that exist over the Internet.
13-04-2023 38
Load balancing
13-04-2023 39
Cloud load balancing is defined as
the method of splitting workloads
and computing properties in a cloud
computing.
It enables enterprise to manage
workload demands or application
demands by distributing resources
among numerous computers,
networks or servers.
Cloud load balancing includes
holding the circulation of workload
traffic and demands that exist over
the Internet.
Load balancing
There are two elementary solutions to overcome the problem of
overloading on the servers-
 First is a single-server solution in which the server is
upgraded to a higher performance server. However, the new
server may also be overloaded soon, demanding another
upgrade. Moreover, the upgrading process is arduous and
expensive.
 Second is a multiple-server solution in which a scalable
service system on a cluster of servers is built. That’s why it is
more cost effective as well as more scalable to build a server
cluster system for network services.
13-04-2023 40
Load balancing
13-04-2023 41
Bibliography
13-04-2023 42
• Cloud Computing Bible, Barrie Sosinsky, Wiley-India, 2010.
• Cloud Computing: Principles and Paradigms, Editors: Rajkumar Buyya,
James Broberg, Andrzej M. Goscinski, Wile, 2011
•https://www.tutorialspoint.com/virtualization2.0/virtualization2.0_pros_an
d_cons.htm
• http://www.webgranth.com/a-complete-reference-to-cloud-computing
THANK YOU

More Related Content

Similar to Lecture 11 (Virtualization and Load Balancer).pptx

Virtualisation.pptx
Virtualisation.pptxVirtualisation.pptx
Virtualisation.pptx
RavinderSingh704945
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
Sweta Kumari Barnwal
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
Siddharth Coontoor
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET Journal
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
Mohammad Ilyas Malik
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
NIKHILKUMAR SHARDOOR
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
Selvaraj Kesavan
 
Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud Computing
Hitesh Mohapatra
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
Rishikese MR
 
1 virtualization
1 virtualization1 virtualization
1 virtualization
ROSHNI PRADHAN
 
1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx
shruti533256
 
Virtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.pptVirtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.ppt
MohammadArmanulHaque
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdf
AkshithaReddy42848
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
Soumyajit Basu
 
VIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptxVIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptx
KelvinBakespear
 
Virtualizaiton-3.pptx
Virtualizaiton-3.pptxVirtualizaiton-3.pptx
Virtualizaiton-3.pptx
sebghataslamzai
 
cloud concepts and technologies
cloud concepts and technologiescloud concepts and technologies
cloud concepts and technologies
Kalai Selvi
 
Mid term report
Mid term reportMid term report
Mid term reportlokesh039
 
The Future of Computing: Exploring the Potential of Virtualization Server
The Future of Computing: Exploring the Potential of Virtualization ServerThe Future of Computing: Exploring the Potential of Virtualization Server
The Future of Computing: Exploring the Potential of Virtualization Server
FredReynolds2
 

Similar to Lecture 11 (Virtualization and Load Balancer).pptx (20)

Virtualisation.pptx
Virtualisation.pptxVirtualisation.pptx
Virtualisation.pptx
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
 
Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud Computing
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
1 virtualization
1 virtualization1 virtualization
1 virtualization
 
1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx
 
Virtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.pptVirtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.ppt
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdf
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
 
VIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptxVIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptx
 
Virtualizaiton-3.pptx
Virtualizaiton-3.pptxVirtualizaiton-3.pptx
Virtualizaiton-3.pptx
 
cloud concepts and technologies
cloud concepts and technologiescloud concepts and technologies
cloud concepts and technologies
 
lect 1TO 5.pptx
lect 1TO 5.pptxlect 1TO 5.pptx
lect 1TO 5.pptx
 
Mid term report
Mid term reportMid term report
Mid term report
 
The Future of Computing: Exploring the Potential of Virtualization Server
The Future of Computing: Exploring the Potential of Virtualization ServerThe Future of Computing: Exploring the Potential of Virtualization Server
The Future of Computing: Exploring the Potential of Virtualization Server
 

Recently uploaded

S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 

Recently uploaded (20)

S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 

Lecture 11 (Virtualization and Load Balancer).pptx

  • 1. 13-04-2023 1 UNIVERSITY INSTITUTE OF COMPUTING Master of Computer Applications(CC& Devops) Cloud Computing Virtualization DISCOVER . LEARN . EMPOWER
  • 2. 2 Course outcome Cloud Computing Virtualization: Concept of virtualization, Taxonomy of Virtualization Techniques, Hypervisor and its types, Pros and cons of Virtualization, Virtual Machine provisioning and lifecycle, Load Balancing and its algorithms. CO Course Outcomes Level 1 Apply the fundamental and essential concepts of Cloud Computing in deploying web applications. Understand 2 Analyze the various cloud service providers on the basis of requirements and constraints. Understand 3 Implement the fundamental concepts of cloud storage and demonstrate their use in storage systems such as Microsoft Azure. Excellent 4 Design and implement the concept of traffic manager and perform load balancing in cloud environment. Good 5 Simulate concepts of virtualization and its migration over the cloud. Understand
  • 3. Syllabus 13-04-2023 3 UNIT II Resource Management: Introduction, resource provisioning and scheduling. Resource scheduling algorithms. Virtualization: Concept of virtualization, Taxonomy of Virtualization Techniques, Hypervisor and its types, Pros and cons of Virtualization, Virtual Machine provisioning and lifecycle, Load Balancing and its algorithms. Traffic Manager: Introduction, Benefits, Types, Managing traffic between datacenters. VM Migration: Introduction, Approaches, seven step model of migration into cloud, Migration risks and mitigation.
  • 4. Virtualization 13-04-2023 4 Virtualization is the "creation of a virtual (rather than actual) version of something, such as a server, a desktop, a storage device, an operating system or network resources".
  • 5. 13-04-2023 5 Virtualization is a technique, which allows to share a single physical instance of a resource or an application among multiple customers and organizations. It does by assigning a logical name to a physical storage and providing a pointer to that physical resource when demanded.
  • 9. Virtualization 13-04-2023 9 Creation of a virtual machine over existing operating system and hardware is known as Hardware Virtualization. A Virtual machine provides an environment that is logically separated from the underlying hardware. The machine on which the virtual machine is going to create is known as Host Machine and that virtual machine is referred as a Guest Machine
  • 11. Hardware Virtualization • When the virtual machine software or virtual machine manager (VMM) is directly installed on the hardware system is known as hardware virtualization. • The main job of hypervisor is to control and monitoring the processor, memory and other hardware resources. • After virtualization of hardware system we can install different operating system on it and run different applications on those OS. 13-04-2023 11
  • 12. Hardware Virtualization • Hardware virtualization is the creation of virtual versions of computers, operating systems, or their components. It uses a software layer called a hypervisor or a virtual machine monitor to provide abstracted hardware to multiple guest operating systems. Hardware virtualization allows you to run different operating systems on the same physical computer and share the physical hardware resources more efficiently. It can improve the performance and lower the costs of computing. 13-04-2023 12
  • 14. Operating System Virtualization When the virtual machine software or virtual machine manager (VMM) is installed on the Host operating system instead of directly on the hardware system is known as operating system virtualization. Usage: Operating System Virtualization is mainly used for testing the applications on different platforms of OS. 13-04-2023 14
  • 16. Server Virtualization When the virtual machine software or virtual machine manager (VMM) is directly installed on the Server system is known as server virtualization. Server virtualization is a partition of physical servers into multiple virtual servers. Here, each virtual server is running its own operating system and applications. Usage: Server virtualization is done because a single physical server can be divided into multiple servers on the demand basis and for balancing the load. 13-04-2023 16
  • 17. How Server Virtualization works? Each virtual server performs like a unique physical device, which is capable to run its own operating system. Here software which is specially designed for this purpose is used. An administrator which is present in the software can convert one physical server into multiple servers. So these multiple servers are enough to use all the machines processing power. CPU works with multiple processors that provides the ability to run several complicated tasks with ease. Here, the virtual server specially dedicates only to a particular task to perform better. There are many servers which use only a small part of their overall capability. However, another problem which arises is that the larger the computer network the more complex a server will be. 13-04-2023 17
  • 19. Storage Virtualization Storage virtualization is the process of grouping the physical storage from multiple network storage devices so that it looks like a single storage device. Usage: Storage virtualization is mainly done for back-up and recovery purposes. 13-04-2023 19
  • 21. Hypervisor A hypervisor is a form of virtualization software used in Cloud hosting to divide and allocate the resources on various pieces of hardware. The program which provides partitioning, isolation or abstraction is called virtualization hypervisor. The hypervisor is a hardware virtualization technique that allows multiple guest operating systems (OS) to run on a single host system at the same time. A hypervisor is sometimes also called a virtual machine manager(VMM). 13-04-2023 21
  • 23. Types of Hypervisor TYPE-1 Hypervisor: The hypervisor runs directly on the underlying host system. It is also known as “Native Hypervisor” or “Bare metal hypervisor”. It does not require any base server operating system. It has direct access to hardware resources. Examples of Type 1 hypervisors include VMware ESXi, Microsoft Hyper-V hypervisor. 13-04-2023 23
  • 25. Pros & Cons of Type-1 Hypervisor Pros: Such kind of hypervisors are very efficient because they have direct access to the physical hardware resources(like Cpu, Memory, Network, Physical storage). This causes the empowerment the security because there is nothing any kind of the third party resource so that attacker couldn’t compromise with anything. 13-04-2023 25 Cons: One problem with Type-1 hypervisor is that they usually need a dedicated separate machine to perform its operation and to instruct different VMs and control the host hardware resources.
  • 26. TYPE-2 Hypervisor A Host operating system runs on the underlying host system. It is also known as ‘Hosted Hypervisor”. Such kind of hypervisors doesn’t run directly over the underlying hardware rather they run as an application in a Host system(physical machine). Basically, software installed on an operating system. Hypervisor asks the operating system to make hardware calls. 13-04-2023 26 Example of Type 2 hypervisor includes VMware Player or Parallels Desktop. Hosted hypervisors are often found on endpoints like PCs. The type-2 hypervisor is are very useful for engineers, security analyst(for checking malware, or malicious source code and newly developed applications).
  • 28. Pros & Cons of Type-2 Hypervisor Pros: Such kind of hypervisors allows quick and easy access to a guest Operating System alongside the host machine running. These hypervisors usually come with additional useful features for guest machine. Such tools enhance the coordination between the host machine and guest machine. 13-04-2023 28 Cons: Here there is no direct access to the physical hardware resources so the efficiency of these hypervisors lags in performance as compared to the type-1 hypervisors, and potential security risks are also there an attacker can compromise the security weakness if there is access to the host operating system so he can also access the guest operating system.
  • 29. Advantages of Virtualization • Using Virtualization for Efficient Hardware Utilization • Using Virtualization to Increase Availability • Disaster Recovery • Save Energy • Deploying Servers too fast • Save Space in your Server Room or Datacenter • Testing and setting up Lab Environment • Shifting all your Local Infrastructure to Cloud in a day • Possibility to Divide Services 13-04-2023 29
  • 30. Disadvantages of Virtualization • Extra Costs • Software Licensing • Learn the new Infrastructure 13-04-2023 30
  • 31. Broad Division of Virtualization 13-04-2023 31
  • 32. Broad Division of Virtualization 13-04-2023 32
  • 33. Virtual Machine Life Cycle The cycle starts by a request delivered to the IT department, stating the requirement for creating a new server for a particular service. This request is being processed by the IT administration to start seeing the servers’ resource pool, matching these resources with requirements Starting the provision of the needed virtual machine. Once it provisioned and started, it is ready to provide the required service according to an SLA. Virtual is being released; and free resources. 13-04-2023 33
  • 34. Virtual Machine Life Cycle 13-04-2023 34
  • 35. Virtual Machine Provisioning The common and normal steps of provisioning a virtual server are as follows: Firstly, you need to select a server from a pool of available servers (physical servers with enough capacity) along with the appropriate OS template you need to provision the virtual machine. Secondly, you need to load the appropriate software (operating System you selected in the previous step, device drivers, middleware, and the needed applications for the service required). Thirdly, you need to customize and configure the machine (e.g., IP address, Gateway) to configure an associated network and storage resources. Finally, the virtual server is ready to start with its newly loaded software. 13-04-2023 35
  • 36. Virtual Machine Provisioning • To summarize, server provisioning is defining server’s configuration based on the organization requirements, a hardware, and software component (processor, RAM, storage, networking, operating system, applications, etc.). • Normally, virtual machines can be provisioned by manually installing an operating system, by using a preconfigured VM template, by cloning an existing VM, or by importing a physical server or a virtual server from another hosting platform. Physical servers can also be virtualized and provisioned using P2V (Physical to Virtual) tools and techniques (e.g., virt-p2v). • After creating a virtual machine by virtualizing a physical server, or by building a new virtual server in the virtual environment, a template can be created out of it. • Most virtualization management vendors (VMware, XenServer, etc.) provide the data center’s administration with the ability to do such tasks in an easy way. 13-04-2023 36
  • 37. Virtual Machine Life Cycle 13-04-2023 37
  • 38. Load balancing • Cloud load balancing is defined as the method of splitting workloads and computing properties in a cloud computing. It enables enterprise to manage workload demands or application demands by distributing resources among numerous computers, networks or servers. Cloud load balancing includes holding the circulation of workload traffic and demands that exist over the Internet. 13-04-2023 38
  • 39. Load balancing 13-04-2023 39 Cloud load balancing is defined as the method of splitting workloads and computing properties in a cloud computing. It enables enterprise to manage workload demands or application demands by distributing resources among numerous computers, networks or servers. Cloud load balancing includes holding the circulation of workload traffic and demands that exist over the Internet.
  • 40. Load balancing There are two elementary solutions to overcome the problem of overloading on the servers-  First is a single-server solution in which the server is upgraded to a higher performance server. However, the new server may also be overloaded soon, demanding another upgrade. Moreover, the upgrading process is arduous and expensive.  Second is a multiple-server solution in which a scalable service system on a cluster of servers is built. That’s why it is more cost effective as well as more scalable to build a server cluster system for network services. 13-04-2023 40
  • 42. Bibliography 13-04-2023 42 • Cloud Computing Bible, Barrie Sosinsky, Wiley-India, 2010. • Cloud Computing: Principles and Paradigms, Editors: Rajkumar Buyya, James Broberg, Andrzej M. Goscinski, Wile, 2011 •https://www.tutorialspoint.com/virtualization2.0/virtualization2.0_pros_an d_cons.htm • http://www.webgranth.com/a-complete-reference-to-cloud-computing