SlideShare a Scribd company logo
o refers to the act of creating a virtual (rather than actual) version of something, including
virtual computer hardware platforms, storage devices, and computer network resources.
o Virtualization began in the 1960s
o Type of virtualization
o Server Virtualization
o Storage Virtualization
o Desktop Virtualization
o Application Virtualization
o Network Virtualization
Physical server
Operating system
application
Drawback
Cost
Maintenance
OS Doesn't Match With Application
Compatibility
Physical server
Operating system
application
Virtual machine monitor or hypervisor
Operating system
application
Operating system
application
VM VM VM
Fidelity The environment it creates for the VM is essentially identical to the
original (hardware) physical machine.
Isolation or Safety The VMM must have complete control of the system
resources.
Performance There should be little or no difference in performance between
the VM and a physical equivalent.
• Layer that exits between the operating system and hardware
• Provides the necessary services
• Provide features for the smooth running of multiple operating systems.
Physical server
Virtual machine monitor or hypervisor
VM VM VM
Server virtualization is the partitioning of a physical server into
smaller virtual servers to help maximize your server resources.
Para Virtualization
Full Virtualization
•Hardware Assisted
•Software Assisted
Hybrid Virtualization: ( Hardware Virtualized with PV Drivers )
OS level Virtualization:
 Virtual machine simulates hardware to allow an
unmodified guest OS to be run in isolation
 There is two type of Full virtualizations in the
enterprise market:
 Software assisted full virtualization
 Hardware-assisted full virtualization
 t completely relies on binary translation
to trap and virtualize the execution of
sensitive
 It emulates the hardware using the
software instruction sets
 it often criticized for performance issue.
 eliminates the binary translation
and it directly interrupts with
hardware using the
virtualization technology
 hardware using the
virtualization technology (Intel
VT-x and AMD-V)
Full Virtualization. A full virtualization solution is one that creates virtual and isolated
versions of an entire computer, including CPU, memory, and I/O devices. The key
characteristic of a full virtualization solution is that it allows you to run arbitrary guest
operating systems. This is because the virtual machine looks and feels exactly like a real
computer, up to the point where a guest operating system cannot tell the difference. Full
virtualization should be contrasted with other solutions like paravirtualization, where the
guest OS is specifically modified to run on a hypervisor, and OS-level virtualization, where
groups of processes are isolated from the rest of the system using OS-level features.
Software-only. A software-only virtualization solution is one that does not need special
hardware support, specifically the Intel "VT-x" or "AMD-V" features.
Binary translation. Binary translation is one specific approach to implementing full
virtualization that does not require hardware virtualization features. It involves examining
the executable code of the virtual guest for "unsafe" instructions, translating these into
"safe" equivalents, and then executing the translated code. Alternatives to binary
translation are binary patching, and full system emulation.
Direct execution. This is a mode that can be combined with binary translation. With direct
execution, most code is executed directly on the CPU, and only the code that needs to be
translated is actually translated.
 Executable code from the guest is allowed to execute directly on
the host CPU by the hypervisor
 Hypervisor has configured the CPU in such a way that all
potentially unsafe instructions will caused a "trap“
 An unsafe instruction is one that for example tries to access or
modify the memory of another guest
 A trap is an exceptional condition that transfers control back to the
hypervisor
 Once the hypervisor has received a trap, it will inspect the
offending instruction, emulate it in a safe way, and continue
execution after the instruction
 The approach usually has good performance, because the majority
of the instructions will not cause a trap, and will execute straight
on the CPU with no overhead.
 It doesn’t need to simulate the hardware for the
virtual machines.
 The hypervisor is installed on a physical server (host)
 guest OS is installed into the environment
 Virtual guests aware that it has been virtualized
 guest source codes will be modified with sensitive
information
 guests will directly communicate with the host
(hypervisor) using the drivers.
 combination of both Full & Paravirtualization
 virtual machine uses paravirtualization for specific hardware drivers
 host uses full virtualization for other features.
 Operating system-level virtualization is widely used
 also knowns “containerization”
 host uses full virtualization for other features.

More Related Content

What's hot

Hardware virtualization basic
Hardware virtualization basicHardware virtualization basic
Hardware virtualization basicSanoj Kumar
 
Virtualization
VirtualizationVirtualization
Virtualization
raulverma
 
Hypervisor Framework
Hypervisor FrameworkHypervisor Framework
Hypervisor Framework
Edgar Barbosa
 
Hypervisors
HypervisorsHypervisors
Hypervisors
Inzemamul Haque
 
Virtualization
VirtualizationVirtualization
Virtualization
Birju Tank
 
Virtualization using VMWare Workstation
Virtualization using VMWare WorkstationVirtualization using VMWare Workstation
Virtualization using VMWare Workstation
Hitesh Gupta
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
vwchu
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
Rinaldo John
 
how to install VMware
how to install VMwarehow to install VMware
how to install VMware
rtchandu
 
Virtualization Technology Overview
Virtualization Technology OverviewVirtualization Technology Overview
Virtualization Technology Overview
OpenCity Community
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
Mehul Boghra
 
Virtualization Basics
Virtualization BasicsVirtualization Basics
Virtualization Basics
SrikantMishra12
 
Virtualization security and threat
Virtualization security and threatVirtualization security and threat
Virtualization security and threat
Ammarit Thongthua ,CISSP CISM GXPN CSSLP CCNP
 
Virtualization ppt1
Virtualization ppt1Virtualization ppt1
Virtualization ppt1
abdulrubbinmohsin
 
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Spiceworks
 
Virtualization 101 - DeepDive
Virtualization 101 - DeepDiveVirtualization 101 - DeepDive
Virtualization 101 - DeepDiveAmit Agarwal
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu Jaeger
Spiceworks
 
Hypervisor seminar
Hypervisor seminarHypervisor seminar
Hypervisor seminar용환 노
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
Rubal Sagwal
 
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Spiceworks
 

What's hot (20)

Hardware virtualization basic
Hardware virtualization basicHardware virtualization basic
Hardware virtualization basic
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Hypervisor Framework
Hypervisor FrameworkHypervisor Framework
Hypervisor Framework
 
Hypervisors
HypervisorsHypervisors
Hypervisors
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization using VMWare Workstation
Virtualization using VMWare WorkstationVirtualization using VMWare Workstation
Virtualization using VMWare Workstation
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
how to install VMware
how to install VMwarehow to install VMware
how to install VMware
 
Virtualization Technology Overview
Virtualization Technology OverviewVirtualization Technology Overview
Virtualization Technology Overview
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
 
Virtualization Basics
Virtualization BasicsVirtualization Basics
Virtualization Basics
 
Virtualization security and threat
Virtualization security and threatVirtualization security and threat
Virtualization security and threat
 
Virtualization ppt1
Virtualization ppt1Virtualization ppt1
Virtualization ppt1
 
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
 
Virtualization 101 - DeepDive
Virtualization 101 - DeepDiveVirtualization 101 - DeepDive
Virtualization 101 - DeepDive
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu Jaeger
 
Hypervisor seminar
Hypervisor seminarHypervisor seminar
Hypervisor seminar
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
 
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
 

Similar to Vcp6.7 episode 1

A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2
Krishna Kumar Singh
 
Unit 3 Virtualization.pdf
Unit 3 Virtualization.pdfUnit 3 Virtualization.pdf
Unit 3 Virtualization.pdf
PrachiKurhade3
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
Selvaraj Kesavan
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
Rishikese MR
 
Virtualization
VirtualizationVirtualization
Virtualization
vishnurk
 
Fullandparavirtualization.ppt
Fullandparavirtualization.pptFullandparavirtualization.ppt
Fullandparavirtualization.ppt
ImXaib
 
virtualization in cloud technology
virtualization in cloud technologyvirtualization in cloud technology
virtualization in cloud technology
Pavani Prathyusha
 
Virtulization submission
Virtulization submissionVirtulization submission
Virtulization submission
Radhika Kalavadiya
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computing
Pyingkodi Maran
 
Virtualization
VirtualizationVirtualization
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
Neha417639
 
All about virtualization spiceworks - slideshare
All about virtualization  spiceworks - slideshareAll about virtualization  spiceworks - slideshare
All about virtualization spiceworks - slideshare
Spiceworks Ziff Davis
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computing
Mayank Aggarwal
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
Kingston Smiler
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisorsGaurav Suri
 
VSS LEC5.pdf
VSS LEC5.pdfVSS LEC5.pdf
VSS LEC5.pdf
RiyaBatool
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
IGZ Software house
 
virtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfvirtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdf
KowsalyaJayakumar2
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server VirtualisationAlan McSweeney
 

Similar to Vcp6.7 episode 1 (20)

A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Unit 3 Virtualization.pdf
Unit 3 Virtualization.pdfUnit 3 Virtualization.pdf
Unit 3 Virtualization.pdf
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Fullandparavirtualization.ppt
Fullandparavirtualization.pptFullandparavirtualization.ppt
Fullandparavirtualization.ppt
 
virtualization in cloud technology
virtualization in cloud technologyvirtualization in cloud technology
virtualization in cloud technology
 
Virtulization submission
Virtulization submissionVirtulization submission
Virtulization submission
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computing
 
Virtualization
VirtualizationVirtualization
Virtualization
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
 
All about virtualization spiceworks - slideshare
All about virtualization  spiceworks - slideshareAll about virtualization  spiceworks - slideshare
All about virtualization spiceworks - slideshare
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computing
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
 
VSS LEC5.pdf
VSS LEC5.pdfVSS LEC5.pdf
VSS LEC5.pdf
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
virtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfvirtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdf
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Vcp6.7 episode 1

  • 1.
  • 2. o refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources. o Virtualization began in the 1960s o Type of virtualization o Server Virtualization o Storage Virtualization o Desktop Virtualization o Application Virtualization o Network Virtualization
  • 4. Physical server Operating system application Virtual machine monitor or hypervisor Operating system application Operating system application VM VM VM
  • 5. Fidelity The environment it creates for the VM is essentially identical to the original (hardware) physical machine. Isolation or Safety The VMM must have complete control of the system resources. Performance There should be little or no difference in performance between the VM and a physical equivalent.
  • 6. • Layer that exits between the operating system and hardware • Provides the necessary services • Provide features for the smooth running of multiple operating systems. Physical server Virtual machine monitor or hypervisor VM VM VM
  • 7. Server virtualization is the partitioning of a physical server into smaller virtual servers to help maximize your server resources. Para Virtualization Full Virtualization •Hardware Assisted •Software Assisted Hybrid Virtualization: ( Hardware Virtualized with PV Drivers ) OS level Virtualization:
  • 8.  Virtual machine simulates hardware to allow an unmodified guest OS to be run in isolation  There is two type of Full virtualizations in the enterprise market:  Software assisted full virtualization  Hardware-assisted full virtualization
  • 9.  t completely relies on binary translation to trap and virtualize the execution of sensitive  It emulates the hardware using the software instruction sets  it often criticized for performance issue.
  • 10.  eliminates the binary translation and it directly interrupts with hardware using the virtualization technology  hardware using the virtualization technology (Intel VT-x and AMD-V)
  • 11. Full Virtualization. A full virtualization solution is one that creates virtual and isolated versions of an entire computer, including CPU, memory, and I/O devices. The key characteristic of a full virtualization solution is that it allows you to run arbitrary guest operating systems. This is because the virtual machine looks and feels exactly like a real computer, up to the point where a guest operating system cannot tell the difference. Full virtualization should be contrasted with other solutions like paravirtualization, where the guest OS is specifically modified to run on a hypervisor, and OS-level virtualization, where groups of processes are isolated from the rest of the system using OS-level features. Software-only. A software-only virtualization solution is one that does not need special hardware support, specifically the Intel "VT-x" or "AMD-V" features. Binary translation. Binary translation is one specific approach to implementing full virtualization that does not require hardware virtualization features. It involves examining the executable code of the virtual guest for "unsafe" instructions, translating these into "safe" equivalents, and then executing the translated code. Alternatives to binary translation are binary patching, and full system emulation. Direct execution. This is a mode that can be combined with binary translation. With direct execution, most code is executed directly on the CPU, and only the code that needs to be translated is actually translated.
  • 12.  Executable code from the guest is allowed to execute directly on the host CPU by the hypervisor  Hypervisor has configured the CPU in such a way that all potentially unsafe instructions will caused a "trap“  An unsafe instruction is one that for example tries to access or modify the memory of another guest  A trap is an exceptional condition that transfers control back to the hypervisor  Once the hypervisor has received a trap, it will inspect the offending instruction, emulate it in a safe way, and continue execution after the instruction  The approach usually has good performance, because the majority of the instructions will not cause a trap, and will execute straight on the CPU with no overhead.
  • 13.  It doesn’t need to simulate the hardware for the virtual machines.  The hypervisor is installed on a physical server (host)  guest OS is installed into the environment  Virtual guests aware that it has been virtualized  guest source codes will be modified with sensitive information  guests will directly communicate with the host (hypervisor) using the drivers.
  • 14.  combination of both Full & Paravirtualization  virtual machine uses paravirtualization for specific hardware drivers  host uses full virtualization for other features.
  • 15.  Operating system-level virtualization is widely used  also knowns “containerization”  host uses full virtualization for other features.