SlideShare a Scribd company logo
WELCOME
VIRTUALIZATION 
Seminar Presented By: 
Vishnu Ramakrishnan 
Roll No:87 
S7, CS-B 
Guided by : Dr. SudheepElayidom 
2
The Modern Age of Computers 3
Problems in current Scenario 
The data-centresare: 
Full of under-utilized servers. 
Complicate in management. 
Power consumption 
Greater wattage per unit area. 
Electricity overloaded. 
Cooling at capacity. 
Environmental problem 
4
What is Virtualization 
Virtualization--the abstraction of computer resources. 
Defenition: Virtualization is a framework or methodology of dividing the resources of a computer into multiple execution environments, by applying one or more concepts or technologies such as hardware and software partitioning, time- sharing, partial or complete machine simulation, emulation, and quality of service. 
Virtualization hides the physical characteristics of computing resources from their users, be they applications, or end users. 
This includes making a single physical resource (such as a server, an operating system, an application, or storage device) appear to function as multiple virtual resources; it can also include making multiple physical resources (such as storage devices or servers) appear as a single virtual resource. 
5
Normal Computer System 
Hardware 
Operating 
System 
Applications 
6
Virtualization -One Server for Multiple Applications/OS 
Hardware 
Operating 
System 
Applications 
Hardware 
Operating 
System 
Application 
Hypervisor 
Operating 
System 
Application 
Operating 
System 
Application 
Operating 
System 
Application 
Operating 
System 
Applications 
Hypervisoris a software program that manages multiple operating systems (or multiple instances of the same operating system) on a single computer system. 
The hypervisor manages the system's processor, memory, and other resources to allocate what each operating system requires. 
Hypervisors are designed for a particular processor architecture and may also be called Virtualization managers. 
7
CPU Capacity Utilization 8
Why Virtualization 
Consolidate the workloads of several under-utilized servers to fewer machines, perhaps a single machine. 
Provides secure, isolated sandboxes for running untrusted applications. 
Provides emulation of hardware, or hardware configuration that you do not have (such as multiple processors). 
Virtualization can also be used to simulate networks of independent computers. 
Virtual machines can be used to run multiple operating systems simultaneously. Some such systems may be hard or impossible to run on newer real hardware. 
9
Why Virtualization 
Allow for powerful debugging and performance monitoring. Operating systems can be debugged without losing productivity. 
Virtual machines can isolate what they run, so they provide fault and error containment. 
Virtual machines are great tools for research and academic experiments. They encapsulate the entire state of a running system. The state also provides an abstraction of the workload being run. 
Virtualization can enable existing operating systems to run on shared memory multiprocessors. 
Virtual machines can be used to create arbitrary test scenarios, and can lead to effective quality assurance. 
And plenty of other reasons…… 
10
Types of Virtualization 
Platform Virtualization (Close to Cloud Computing) 
Full Virtualization 
Paravirtualization 
Hardware-assisted Virtualization 
Partial Virtualization 
OS-level Virtualization 
Memory Virtualization 
Desktop Virtualization 
Application Virtualization 
Network (Device and I/O) Virtualization 
11
Full Virtualization 
Virtualization technique used to provide a complete simulation of the underlying hardware, in the Virtual machine. 
One machine is accessed and manipulated by more than one users or OS’s. 
All software (including all OS’s) capable of execution on the raw hardware can be run in the virtual machine. 
Full Virtualization has proven highly successful in cases when 
Sharing a computer system among multiple users, 
Isolating users from each other (and from the control program), and 
Emulating new hardware to achieve improved reliability, security and productivity. 
12
Full Virtualization 
Best example of full Virtualization was that provided by the control program of IBM's CP/CMS operating system. Each CP/CMS user was provided a simulated, stand-alone computer. 
Each such virtual machine had the complete capabilities of the underlying machine, and (for its user) the virtual machine was indistinguishable from a private system. 
13
Full Virtualization -Requirements 
Equivalence: a program running under the VMM should exhibit a behavior essentially identical to that demonstrated when running on an equivalent machine directly. 
Resource control (safety): the VMM must be in complete control of the virtualized resources. 
Efficiency: a majority of the machine instructions must be executed without VMM intervention. 
14
Full Virtualization -Challenges 
Interception and Simulation of privileged operations --I/O instructions 
The effects of every operation performed within a given virtual machine must be kept within that virtual machine –virtual operations cannot be allowed to alter the state of any other virtual machine, the control program, or the hardware. 
Some machine instructions can be executed directly by the hardware, E.g., memory locations and arithmetic registers. 
Other instructions that would "pierce the virtual machine" cannot be allowed to execute directly; they must instead be trapped and simulated. Such instructions either access or affect state information that is outside the virtual machine. 
Some hardware is not easy to be used for full Virtualization, e.g., x86 
15
Challenges of x86 Hardware Virtualization 
The x86 architecture offers four levels of privilege known as Ring 0, 1, 2 and 3 to operating systems and applications to manage access to the computer hardware. 
Virtualizing the x86 architecture requires placing a Virtualization layer under the OS (which expects to be in the most privileged Ring 0) to create and manage the virtual machines that deliver shared resources. 
Solutions are : 
> Binary translation (Eg: VMWare) 
> OS assisted Virtualization or Paravirtualization. 
> Hardware-assisted Virtualization 
16
Kernel code of non-virtualizableinstructions are translated to replace with new sequences of instructions that have the intended effect on the virtual hardware. 
Each virtual machine monitor provides each Virtual Machine with all the services of the physical system, including a virtual BIOS, virtual devices and virtualized memory management. 
This combination of binary translation and direct execution provides Full Virtualization as the guest OS is fully abstracted from the underlying hardware by the Virtualization layer. 
The guest OS is not aware it is being virtualized and requires no modification. 
The hypervisor translates all operating system instructions on the fly and caches the results for future use, while user level instructions run unmodified at native speed. 
Examples 
VMware 
Microsoft Virtual Server 
Binary Translation 17
Paravirtualization (OS Assisted) 
Paravirtualization –via a modified OS kernel as guest OS 
Paravirtualization involves modifying the OS kernel to replace non-virtualizableinstructions with hypercalls that communicate directly with the Virtualization layer hypervisor. 
The hypervisor also provides hypercall interfaces for other critical kernel operations such as memory management, interrupt handling and time keeping. 
Paravirtualization is different from full Virtualization, where the unmodified OS does not know it is virtualized and sensitive OS calls are trapped using binary translation. 
It is very difficult to build the more sophisticated binary translation support necessary for full Virtualization, modifying the guest OS to enable paravirtualization is relatively easy. 
Paravirtualization cannot support unmodified OS 
Example: 
Xen --modified Linux kernel and a version of Windows XP 
Hardware 
Paravirtualized 
Guest OS 
Application 
Ring 2 
Ring 1 
Ring 0 
Ring 3 
Direct 
Execution 
of user and OS 
Requests 
Hypercalls to the 
Virtualization Layer 
replace 
non-virtualiable 
OS instructions 
Virtualization layer 
18
Hardware vendors are rapidly embracing Virtualization and developing new features to simplify Virtualization techniques. 
First generation enhancements target privileged instructions with a new CPU execution mode feature that allows the VMM to run in a new root mode below ring 0. 
Privileged and sensitive calls are set to automatically trap to the hypervisor, removing the need for either binary translation or paraVirtualization. 
Due to high hypervisor to guest transition overhead and a rigid programming model, binary translation approach currently outperforms hardware assist implementations. 
Hardware-Assisted Virtualization 
Hardware 
Guest OS 
Application 
Ring 2 
Ring 1 
Ring 0 
Ring 3 
Direct 
Execution 
of user and OS 
Requests 
OS requests traps 
to VMM without 
binary translation 
or paravirtualization 
VMM 
Non-root 
Mode 
Privilege 
Levels 
Root Mode 
Privilege 
Levels 
19
OS-level Virtualization 
OS-level Virtualization –Server Virtualization method. 
kernel of an OS allows for multiple isolated user- space instances, instead of just one. 
Each OS instance(or Container) looks and feels like a real server to each user. 
This method virtualizes servers on the operating system (kernel) layer. This creates isolated containers on a single physical server and OS instance to utilize hardware, software, data center and management efforts with maximum efficiency. 
Virtual hosting environments commonly use operating system–level Virtualization, where it is useful for securely allocating finite hardware resources amongst a large number of mutually- distrusting users. 
Hardware 
OS 
Container 1 
OS-Level Virtualization 
Standard 
Host OS 
OS Virtualization 
layer 
OS 
Container 2 
OS 
Container 3 
20
Application Virtualization 
Software technology that encapsulates application software from the underlying operating system. 
A fully virtualized application is not actually installed in the traditional sense, although it is still executed as if it is installed (runtime Virtualization). 
Full application Virtualization requires a Virtualization layer. Application Virtualization layers replace part of the runtime environment normally provided by the operating system. The layer intercepts all file and Registry operations of virtualized applications and transparently redirects them to a virtualized location. 
Benefits : 
Allows applications to run in environments that do not suit the native application (Eg: Wine). 
Uses fewer resources than a separate virtual machine. 
Improve portability, manageability and compatibility of applications. 
Improved security, by isolating applications from the operating system. 
Reduces system integration and administration costs in an Organization. 
21
Memory Virtualization 
Memory Virtualization decouples random access memory (RAM) resources from individual systems in the data center, and then aggregates those resources into a virtualized memory pool available to any computer in the cluster. 
The memory pool is accessed by the operating system or applications running on top of the operating system. 
The distributed memory pool can then be utilized as a high-speed cache, a messaging layer, or a large, shared memory resource for a CPU or a GPU application. 
Machine memory 
Physical memory 
Virtual memory 
Process 1 
Process 2 
VM1 
Process 1 
Process 2 
VM2 
Benefits: 
•Improves memory utilization via the sharing of scarce resources. 
•Increases efficiency and decreases run time for data intensive and I/O bound applications 
•Allows applications on multiple servers to share data without replication, decreasing total memory needs 
•Lowers latency and provides faster access than other solutions. 
22
Device and I/O Virtualization 
I/O Virtualization environments are created by abstracting the upper layer protocols from the physical connections. 
One physical adapter card appear as multiple virtual network interface cards (vNICs) and virtual host bus adapters. 
In the physical view, virtual I/O replaces a server’s multiple I/O cables with a single cable that provides a shared transport for all network and storage connections. 
Simplify management, lower costs and improve performance of servers in enterprise environments. 
Benefits: 
•Management agility: By abstracting upper layer protocols from physical connections, I/O Virtualization provides greater flexibility, greater utilization and faster provisioning when compared to traditional architectures. 
•Reduced cost:Virtual I/O lowers costs and enables simplified server management by using fewer cards, cables, and switch ports, while still achieving full network I/O performance. 
•Reduced cabling:In a virtualized I/O environment, only one cable is needed to connect servers to both storage and network traffic. This can reduce data center cabling. 
•Increased density:I/O Virtualization increases the practical density of I/O by allowing more connections to exist within a given space. 
23
Popular Hypervisors 
Xen 
> Developed by Xen Project Team in 2003. 
> Runs on Linux, BSD, Solaris. 
KVM 
> Developed by OVA(Open Virtualization Alliance) and released in 2012. 
> Supports many of Linux, BSD, Solaris, Windows, ReactOS, and AROS Research Operating System. 
QEMU 
> Open-Source, developed by QEMU Team. 
> Runs on Linux, Windows, and some UNIX Platforms. 
VirtualBox 
> Developed by Oracle Corporation in 2007. 
> Runs on Linux, Mac OS X, Windows(from XP), Solaris, and OpenSolaris 
VMWare 
> Developed by VMWare.inc in 1997 
>Runs on Windows, Linux, Mac OS X 
24
To Sum up… 
Virtualization provides the agility required to speed up IT operations, and reduces cost by increasing infrastructure utilization. 
By minimizing user involvement, Virtualization speeds up the process, reduces labor costs and reduces the possibility of human errors. 
Binary translation is the most established technology for full Virtualization. 
Paravirtualization delivers performance benefits with maintenance costs. 
Hardware assist is the future of Virtualization, but it still has a long way to go. 
25
References 
VMWare ® 
IBM ® 
Microsoft® 
Intel ® 
AMD ® 
http://www.xen.org/ 
http://www.parallels.com/ 
http://www.webopedia.com/ 
26
Any Questions…..?? 
27
Thank You! 
28

More Related Content

What's hot

Server virtualization
Server virtualizationServer virtualization
Server virtualization
ofsorganizer
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
Ashok Kumar
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
Rinaldo John
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
vishal choudhary
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
vwchu
 
Virtualization
VirtualizationVirtualization
Virtualization
vishnurk
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
Mehul Patel
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
Nikunj Dhameliya
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
Rahul Hada
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
NIKHILKUMAR SHARDOOR
 
Virtualization
VirtualizationVirtualization
Virtualization
Kingston Smiler
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
Dr.Neeraj Kumar Pandey
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
Mehul Boghra
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
Kingston Smiler
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
Dr.Neeraj Kumar Pandey
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisorsGaurav Suri
 
Platform as a Service (PaaS)
Platform as a Service (PaaS)Platform as a Service (PaaS)
Platform as a Service (PaaS)
Halil Burak Cetinkaya
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
Soumyajit Basu
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docx
kumari36
 

What's hot (20)

Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
 
Virtualization
VirtualizationVirtualization
Virtualization
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
 
Virtualization
VirtualizationVirtualization
Virtualization
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
 
Platform as a Service (PaaS)
Platform as a Service (PaaS)Platform as a Service (PaaS)
Platform as a Service (PaaS)
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docx
 

Viewers also liked

Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)
Sonu Mamman
 
Evaluation of Virtual Clusters Performance on a Cloud Computing Infrastructure
Evaluation of Virtual Clusters Performance on a Cloud Computing InfrastructureEvaluation of Virtual Clusters Performance on a Cloud Computing Infrastructure
Evaluation of Virtual Clusters Performance on a Cloud Computing InfrastructureEuroCloud
 
An Implementation of Virtual Cluster on a Cloud
An Implementation of Virtual Cluster on a CloudAn Implementation of Virtual Cluster on a Cloud
An Implementation of Virtual Cluster on a Cloud
Pongsakorn U-chupala
 
Cs6703 grid and cloud computing unit 3
Cs6703 grid and cloud computing unit 3Cs6703 grid and cloud computing unit 3
Cs6703 grid and cloud computing unit 3
RMK ENGINEERING COLLEGE, CHENNAI
 
1.Introduction to virtualization
1.Introduction to virtualization1.Introduction to virtualization
1.Introduction to virtualization
Hwanju Kim
 
Disaster Recovery - On-Premise & Cloud
Disaster Recovery - On-Premise & CloudDisaster Recovery - On-Premise & Cloud
Disaster Recovery - On-Premise & Cloud
Corley S.r.l.
 
AWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster RecoveryAWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster Recovery
Amazon Web Services
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualizationAyaz Shahid
 
Case Studies (Questions and Answers)
Case Studies (Questions and Answers)Case Studies (Questions and Answers)
Case Studies (Questions and Answers)
113068
 
Journey Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster RecoveryJourney Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster Recovery
Amazon Web Services
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
Chandrani Ray Chowdhury
 
Disaster recovery and the cloud
Disaster recovery and the cloudDisaster recovery and the cloud
Disaster recovery and the cloud
Jason Dea
 

Viewers also liked (13)

Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)
 
Evaluation of Virtual Clusters Performance on a Cloud Computing Infrastructure
Evaluation of Virtual Clusters Performance on a Cloud Computing InfrastructureEvaluation of Virtual Clusters Performance on a Cloud Computing Infrastructure
Evaluation of Virtual Clusters Performance on a Cloud Computing Infrastructure
 
An Implementation of Virtual Cluster on a Cloud
An Implementation of Virtual Cluster on a CloudAn Implementation of Virtual Cluster on a Cloud
An Implementation of Virtual Cluster on a Cloud
 
Cs6703 grid and cloud computing unit 3
Cs6703 grid and cloud computing unit 3Cs6703 grid and cloud computing unit 3
Cs6703 grid and cloud computing unit 3
 
1.Introduction to virtualization
1.Introduction to virtualization1.Introduction to virtualization
1.Introduction to virtualization
 
Disaster Recovery - On-Premise & Cloud
Disaster Recovery - On-Premise & CloudDisaster Recovery - On-Premise & Cloud
Disaster Recovery - On-Premise & Cloud
 
AWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster RecoveryAWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster Recovery
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
 
Case Studies (Questions and Answers)
Case Studies (Questions and Answers)Case Studies (Questions and Answers)
Case Studies (Questions and Answers)
 
Journey Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster RecoveryJourney Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster Recovery
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
 
Disaster recovery and the cloud
Disaster recovery and the cloudDisaster recovery and the cloud
Disaster recovery and the cloud
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 

Similar to Virtualization and cloud Computing

APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
Neha417639
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
Selvaraj Kesavan
 
A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2
Krishna Kumar Singh
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptx
Vivek Shelke
 
CloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfCloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdf
khan593595
 
CloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfCloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdf
khan593595
 
Fullandparavirtualization.ppt
Fullandparavirtualization.pptFullandparavirtualization.ppt
Fullandparavirtualization.ppt
ImXaib
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
Dr. Sunil Kr. Pandey
 
1 virtualization
1 virtualization1 virtualization
1 virtualization
ROSHNI PRADHAN
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
AJIT NEGI
 
Live VM Migration
Live VM MigrationLive VM Migration
Live VM Migration
Shivam Singh
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computing
Mayank Aggarwal
 
Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud Computing
Hitesh Mohapatra
 
Virtualizaiton-3.pptx
Virtualizaiton-3.pptxVirtualizaiton-3.pptx
Virtualizaiton-3.pptx
sebghataslamzai
 
Virtulization submission
Virtulization submissionVirtulization submission
Virtulization submission
Radhika Kalavadiya
 
Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptx
Binod Rimal
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation OverviewLogicalis
 
Unit II.ppt
Unit II.pptUnit II.ppt
Unit II.ppt
HARISHK762704
 

Similar to Virtualization and cloud Computing (20)

APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
 
A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptx
 
CloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfCloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdf
 
CloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfCloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdf
 
Fullandparavirtualization.ppt
Fullandparavirtualization.pptFullandparavirtualization.ppt
Fullandparavirtualization.ppt
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
1 virtualization
1 virtualization1 virtualization
1 virtualization
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
 
Live VM Migration
Live VM MigrationLive VM Migration
Live VM Migration
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computing
 
Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud Computing
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualizaiton-3.pptx
Virtualizaiton-3.pptxVirtualizaiton-3.pptx
Virtualizaiton-3.pptx
 
Virtulization submission
Virtulization submissionVirtulization submission
Virtulization submission
 
Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptx
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overview
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation Overview
 
Unit II.ppt
Unit II.pptUnit II.ppt
Unit II.ppt
 

More from Rishikese MR

Natural Language Processing
Natural Language ProcessingNatural Language Processing
Natural Language Processing
Rishikese MR
 
Fuzzy Logic
Fuzzy LogicFuzzy Logic
Fuzzy Logic
Rishikese MR
 
Crowd Sourcing With Smart Phone
Crowd Sourcing With Smart PhoneCrowd Sourcing With Smart Phone
Crowd Sourcing With Smart Phone
Rishikese MR
 
BLUE BRAIN
BLUE BRAINBLUE BRAIN
BLUE BRAIN
Rishikese MR
 
The No SQL Principles and Basic Application Of Casandra Model
The No SQL Principles and Basic Application Of Casandra ModelThe No SQL Principles and Basic Application Of Casandra Model
The No SQL Principles and Basic Application Of Casandra Model
Rishikese MR
 
CYBORG
CYBORG CYBORG
CYBORG
Rishikese MR
 
DATA WAREHOUSING
DATA WAREHOUSINGDATA WAREHOUSING
DATA WAREHOUSING
Rishikese MR
 
Automatic 2D to 3D Video Conversion For 3DTV's
 Automatic 2D to 3D Video Conversion For 3DTV's Automatic 2D to 3D Video Conversion For 3DTV's
Automatic 2D to 3D Video Conversion For 3DTV's
Rishikese MR
 
Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed application
Rishikese MR
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
Rishikese MR
 
EMOTION BASED COMPUTING
EMOTION BASED COMPUTINGEMOTION BASED COMPUTING
EMOTION BASED COMPUTING
Rishikese MR
 
BITCOIN TECHNOLOGY AND ITS USES
BITCOIN TECHNOLOGY AND ITS USESBITCOIN TECHNOLOGY AND ITS USES
BITCOIN TECHNOLOGY AND ITS USES
Rishikese MR
 
3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE
Rishikese MR
 
OVERVIEW OF FACEBOOK SCALABLE ARCHITECTURE.
OVERVIEW  OF FACEBOOK SCALABLE ARCHITECTURE.OVERVIEW  OF FACEBOOK SCALABLE ARCHITECTURE.
OVERVIEW OF FACEBOOK SCALABLE ARCHITECTURE.
Rishikese MR
 
Google Glass and its Features
Google Glass and its FeaturesGoogle Glass and its Features
Google Glass and its Features
Rishikese MR
 
Artificial intelligence in gaming.
Artificial intelligence in gaming.Artificial intelligence in gaming.
Artificial intelligence in gaming.
Rishikese MR
 
A seminar on neo4 j
A seminar on neo4 jA seminar on neo4 j
A seminar on neo4 j
Rishikese MR
 

More from Rishikese MR (19)

1 2 3 4 5 g
1 2 3 4 5 g1 2 3 4 5 g
1 2 3 4 5 g
 
Natural Language Processing
Natural Language ProcessingNatural Language Processing
Natural Language Processing
 
Fuzzy Logic
Fuzzy LogicFuzzy Logic
Fuzzy Logic
 
Crowd Sourcing With Smart Phone
Crowd Sourcing With Smart PhoneCrowd Sourcing With Smart Phone
Crowd Sourcing With Smart Phone
 
BLUE BRAIN
BLUE BRAINBLUE BRAIN
BLUE BRAIN
 
The No SQL Principles and Basic Application Of Casandra Model
The No SQL Principles and Basic Application Of Casandra ModelThe No SQL Principles and Basic Application Of Casandra Model
The No SQL Principles and Basic Application Of Casandra Model
 
CYBORG
CYBORG CYBORG
CYBORG
 
DATA WAREHOUSING
DATA WAREHOUSINGDATA WAREHOUSING
DATA WAREHOUSING
 
Automatic 2D to 3D Video Conversion For 3DTV's
 Automatic 2D to 3D Video Conversion For 3DTV's Automatic 2D to 3D Video Conversion For 3DTV's
Automatic 2D to 3D Video Conversion For 3DTV's
 
Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed application
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
EMOTION BASED COMPUTING
EMOTION BASED COMPUTINGEMOTION BASED COMPUTING
EMOTION BASED COMPUTING
 
BITCOIN TECHNOLOGY AND ITS USES
BITCOIN TECHNOLOGY AND ITS USESBITCOIN TECHNOLOGY AND ITS USES
BITCOIN TECHNOLOGY AND ITS USES
 
3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE
 
OUTERNET
OUTERNETOUTERNET
OUTERNET
 
OVERVIEW OF FACEBOOK SCALABLE ARCHITECTURE.
OVERVIEW  OF FACEBOOK SCALABLE ARCHITECTURE.OVERVIEW  OF FACEBOOK SCALABLE ARCHITECTURE.
OVERVIEW OF FACEBOOK SCALABLE ARCHITECTURE.
 
Google Glass and its Features
Google Glass and its FeaturesGoogle Glass and its Features
Google Glass and its Features
 
Artificial intelligence in gaming.
Artificial intelligence in gaming.Artificial intelligence in gaming.
Artificial intelligence in gaming.
 
A seminar on neo4 j
A seminar on neo4 jA seminar on neo4 j
A seminar on neo4 j
 

Recently uploaded

Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 

Recently uploaded (20)

Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 

Virtualization and cloud Computing

  • 2. VIRTUALIZATION Seminar Presented By: Vishnu Ramakrishnan Roll No:87 S7, CS-B Guided by : Dr. SudheepElayidom 2
  • 3. The Modern Age of Computers 3
  • 4. Problems in current Scenario The data-centresare: Full of under-utilized servers. Complicate in management. Power consumption Greater wattage per unit area. Electricity overloaded. Cooling at capacity. Environmental problem 4
  • 5. What is Virtualization Virtualization--the abstraction of computer resources. Defenition: Virtualization is a framework or methodology of dividing the resources of a computer into multiple execution environments, by applying one or more concepts or technologies such as hardware and software partitioning, time- sharing, partial or complete machine simulation, emulation, and quality of service. Virtualization hides the physical characteristics of computing resources from their users, be they applications, or end users. This includes making a single physical resource (such as a server, an operating system, an application, or storage device) appear to function as multiple virtual resources; it can also include making multiple physical resources (such as storage devices or servers) appear as a single virtual resource. 5
  • 6. Normal Computer System Hardware Operating System Applications 6
  • 7. Virtualization -One Server for Multiple Applications/OS Hardware Operating System Applications Hardware Operating System Application Hypervisor Operating System Application Operating System Application Operating System Application Operating System Applications Hypervisoris a software program that manages multiple operating systems (or multiple instances of the same operating system) on a single computer system. The hypervisor manages the system's processor, memory, and other resources to allocate what each operating system requires. Hypervisors are designed for a particular processor architecture and may also be called Virtualization managers. 7
  • 9. Why Virtualization Consolidate the workloads of several under-utilized servers to fewer machines, perhaps a single machine. Provides secure, isolated sandboxes for running untrusted applications. Provides emulation of hardware, or hardware configuration that you do not have (such as multiple processors). Virtualization can also be used to simulate networks of independent computers. Virtual machines can be used to run multiple operating systems simultaneously. Some such systems may be hard or impossible to run on newer real hardware. 9
  • 10. Why Virtualization Allow for powerful debugging and performance monitoring. Operating systems can be debugged without losing productivity. Virtual machines can isolate what they run, so they provide fault and error containment. Virtual machines are great tools for research and academic experiments. They encapsulate the entire state of a running system. The state also provides an abstraction of the workload being run. Virtualization can enable existing operating systems to run on shared memory multiprocessors. Virtual machines can be used to create arbitrary test scenarios, and can lead to effective quality assurance. And plenty of other reasons…… 10
  • 11. Types of Virtualization Platform Virtualization (Close to Cloud Computing) Full Virtualization Paravirtualization Hardware-assisted Virtualization Partial Virtualization OS-level Virtualization Memory Virtualization Desktop Virtualization Application Virtualization Network (Device and I/O) Virtualization 11
  • 12. Full Virtualization Virtualization technique used to provide a complete simulation of the underlying hardware, in the Virtual machine. One machine is accessed and manipulated by more than one users or OS’s. All software (including all OS’s) capable of execution on the raw hardware can be run in the virtual machine. Full Virtualization has proven highly successful in cases when Sharing a computer system among multiple users, Isolating users from each other (and from the control program), and Emulating new hardware to achieve improved reliability, security and productivity. 12
  • 13. Full Virtualization Best example of full Virtualization was that provided by the control program of IBM's CP/CMS operating system. Each CP/CMS user was provided a simulated, stand-alone computer. Each such virtual machine had the complete capabilities of the underlying machine, and (for its user) the virtual machine was indistinguishable from a private system. 13
  • 14. Full Virtualization -Requirements Equivalence: a program running under the VMM should exhibit a behavior essentially identical to that demonstrated when running on an equivalent machine directly. Resource control (safety): the VMM must be in complete control of the virtualized resources. Efficiency: a majority of the machine instructions must be executed without VMM intervention. 14
  • 15. Full Virtualization -Challenges Interception and Simulation of privileged operations --I/O instructions The effects of every operation performed within a given virtual machine must be kept within that virtual machine –virtual operations cannot be allowed to alter the state of any other virtual machine, the control program, or the hardware. Some machine instructions can be executed directly by the hardware, E.g., memory locations and arithmetic registers. Other instructions that would "pierce the virtual machine" cannot be allowed to execute directly; they must instead be trapped and simulated. Such instructions either access or affect state information that is outside the virtual machine. Some hardware is not easy to be used for full Virtualization, e.g., x86 15
  • 16. Challenges of x86 Hardware Virtualization The x86 architecture offers four levels of privilege known as Ring 0, 1, 2 and 3 to operating systems and applications to manage access to the computer hardware. Virtualizing the x86 architecture requires placing a Virtualization layer under the OS (which expects to be in the most privileged Ring 0) to create and manage the virtual machines that deliver shared resources. Solutions are : > Binary translation (Eg: VMWare) > OS assisted Virtualization or Paravirtualization. > Hardware-assisted Virtualization 16
  • 17. Kernel code of non-virtualizableinstructions are translated to replace with new sequences of instructions that have the intended effect on the virtual hardware. Each virtual machine monitor provides each Virtual Machine with all the services of the physical system, including a virtual BIOS, virtual devices and virtualized memory management. This combination of binary translation and direct execution provides Full Virtualization as the guest OS is fully abstracted from the underlying hardware by the Virtualization layer. The guest OS is not aware it is being virtualized and requires no modification. The hypervisor translates all operating system instructions on the fly and caches the results for future use, while user level instructions run unmodified at native speed. Examples VMware Microsoft Virtual Server Binary Translation 17
  • 18. Paravirtualization (OS Assisted) Paravirtualization –via a modified OS kernel as guest OS Paravirtualization involves modifying the OS kernel to replace non-virtualizableinstructions with hypercalls that communicate directly with the Virtualization layer hypervisor. The hypervisor also provides hypercall interfaces for other critical kernel operations such as memory management, interrupt handling and time keeping. Paravirtualization is different from full Virtualization, where the unmodified OS does not know it is virtualized and sensitive OS calls are trapped using binary translation. It is very difficult to build the more sophisticated binary translation support necessary for full Virtualization, modifying the guest OS to enable paravirtualization is relatively easy. Paravirtualization cannot support unmodified OS Example: Xen --modified Linux kernel and a version of Windows XP Hardware Paravirtualized Guest OS Application Ring 2 Ring 1 Ring 0 Ring 3 Direct Execution of user and OS Requests Hypercalls to the Virtualization Layer replace non-virtualiable OS instructions Virtualization layer 18
  • 19. Hardware vendors are rapidly embracing Virtualization and developing new features to simplify Virtualization techniques. First generation enhancements target privileged instructions with a new CPU execution mode feature that allows the VMM to run in a new root mode below ring 0. Privileged and sensitive calls are set to automatically trap to the hypervisor, removing the need for either binary translation or paraVirtualization. Due to high hypervisor to guest transition overhead and a rigid programming model, binary translation approach currently outperforms hardware assist implementations. Hardware-Assisted Virtualization Hardware Guest OS Application Ring 2 Ring 1 Ring 0 Ring 3 Direct Execution of user and OS Requests OS requests traps to VMM without binary translation or paravirtualization VMM Non-root Mode Privilege Levels Root Mode Privilege Levels 19
  • 20. OS-level Virtualization OS-level Virtualization –Server Virtualization method. kernel of an OS allows for multiple isolated user- space instances, instead of just one. Each OS instance(or Container) looks and feels like a real server to each user. This method virtualizes servers on the operating system (kernel) layer. This creates isolated containers on a single physical server and OS instance to utilize hardware, software, data center and management efforts with maximum efficiency. Virtual hosting environments commonly use operating system–level Virtualization, where it is useful for securely allocating finite hardware resources amongst a large number of mutually- distrusting users. Hardware OS Container 1 OS-Level Virtualization Standard Host OS OS Virtualization layer OS Container 2 OS Container 3 20
  • 21. Application Virtualization Software technology that encapsulates application software from the underlying operating system. A fully virtualized application is not actually installed in the traditional sense, although it is still executed as if it is installed (runtime Virtualization). Full application Virtualization requires a Virtualization layer. Application Virtualization layers replace part of the runtime environment normally provided by the operating system. The layer intercepts all file and Registry operations of virtualized applications and transparently redirects them to a virtualized location. Benefits : Allows applications to run in environments that do not suit the native application (Eg: Wine). Uses fewer resources than a separate virtual machine. Improve portability, manageability and compatibility of applications. Improved security, by isolating applications from the operating system. Reduces system integration and administration costs in an Organization. 21
  • 22. Memory Virtualization Memory Virtualization decouples random access memory (RAM) resources from individual systems in the data center, and then aggregates those resources into a virtualized memory pool available to any computer in the cluster. The memory pool is accessed by the operating system or applications running on top of the operating system. The distributed memory pool can then be utilized as a high-speed cache, a messaging layer, or a large, shared memory resource for a CPU or a GPU application. Machine memory Physical memory Virtual memory Process 1 Process 2 VM1 Process 1 Process 2 VM2 Benefits: •Improves memory utilization via the sharing of scarce resources. •Increases efficiency and decreases run time for data intensive and I/O bound applications •Allows applications on multiple servers to share data without replication, decreasing total memory needs •Lowers latency and provides faster access than other solutions. 22
  • 23. Device and I/O Virtualization I/O Virtualization environments are created by abstracting the upper layer protocols from the physical connections. One physical adapter card appear as multiple virtual network interface cards (vNICs) and virtual host bus adapters. In the physical view, virtual I/O replaces a server’s multiple I/O cables with a single cable that provides a shared transport for all network and storage connections. Simplify management, lower costs and improve performance of servers in enterprise environments. Benefits: •Management agility: By abstracting upper layer protocols from physical connections, I/O Virtualization provides greater flexibility, greater utilization and faster provisioning when compared to traditional architectures. •Reduced cost:Virtual I/O lowers costs and enables simplified server management by using fewer cards, cables, and switch ports, while still achieving full network I/O performance. •Reduced cabling:In a virtualized I/O environment, only one cable is needed to connect servers to both storage and network traffic. This can reduce data center cabling. •Increased density:I/O Virtualization increases the practical density of I/O by allowing more connections to exist within a given space. 23
  • 24. Popular Hypervisors Xen > Developed by Xen Project Team in 2003. > Runs on Linux, BSD, Solaris. KVM > Developed by OVA(Open Virtualization Alliance) and released in 2012. > Supports many of Linux, BSD, Solaris, Windows, ReactOS, and AROS Research Operating System. QEMU > Open-Source, developed by QEMU Team. > Runs on Linux, Windows, and some UNIX Platforms. VirtualBox > Developed by Oracle Corporation in 2007. > Runs on Linux, Mac OS X, Windows(from XP), Solaris, and OpenSolaris VMWare > Developed by VMWare.inc in 1997 >Runs on Windows, Linux, Mac OS X 24
  • 25. To Sum up… Virtualization provides the agility required to speed up IT operations, and reduces cost by increasing infrastructure utilization. By minimizing user involvement, Virtualization speeds up the process, reduces labor costs and reduces the possibility of human errors. Binary translation is the most established technology for full Virtualization. Paravirtualization delivers performance benefits with maintenance costs. Hardware assist is the future of Virtualization, but it still has a long way to go. 25
  • 26. References VMWare ® IBM ® Microsoft® Intel ® AMD ® http://www.xen.org/ http://www.parallels.com/ http://www.webopedia.com/ 26