SlideShare a Scribd company logo
Dharmsinh Desai University (M.C.A Dept.)
SEMINAR ON :
VIRTUALIZATION
AND
CONTAINERIZATION
PRESENTED BY :
NAME: SMIT PAREKH
MCA – SEM 2
ROLL NO: MA034
STUDENT ID: 21MAPOG004
KEY POINTS
1. Introduction To Virtualization And Containerization
2. What Is Virtualization?
3. Types Of Virtualization
4. Reason For Virtualization
5. Partial, Para, Operation System Level Virtualization
6. Hypervisor
7. Hardware Assisted Virtualization
8. Emulator
9. Migration
10. Operation system virtualization
KEY POINTS
11. Application virtualization
12. Memory virtualization
13. Storage virtualization
14. Network virtualization
15. What is containerization ?
16. Application containerization
17. Benefits of containerization
18. Types of containerization
19. Micro services and containerization
20. Security due to containerization
1. Introduction to virtualization and
containerization?
• Virtualization and containerization
are the two most frequently used
mechanisms to host applications in
a computer system.
• Virtualization uses the notion of a
virtual machine as the fundamental
unit.
• Containerization, on the other
hand, uses the concept of a
container.
• Both of these technologies play a
crucial role and have their merits
and demerits.
2. What Is Virtualization?
• Virtualization, In computing refers to
the act of creating a virtual version
rather than the actual version of
something, including but not limited
to a virtual computer i.e. hardware
platform, OS, storage devices,
computer network resources.
• Virtualization relies on software to
simulate hardware functionality and
create a virtual computer system.
Types of virtualization
1) Hardware virtualization
2) Desktop virtualization
3) Application virtualization
4) Server virtualization
5) Storage virtualization
6) Network virtualization
1) Hardware Virtualization
✔ Hardware virtualization refers to the
technology of consolidating multiple small
physical servers into a large physical
server for the efficient usage of the
processor.
✔ This involves the embedding of virtual
machine software into a server’s
hardware component.
✔ The virtual machines can interact with
hardware without requiring any
intermediary action from the host
operating system.
✔ Hardware virtualization is essentially used
for performance optimization utilizing the
multiple virtual machines that interact
with the same hardware platform.
2) Desktop Virtualization
• Virtual Desktop Infrastructure (VDI) is an end user computing model
enabling clients to connect remotely to their desktop operating system
environment through a central server, which can host multiple of these
desktops for many users at once.
• From their endpoint device, the user can operate and interact with their
virtual desktop as if they were sitting at the PC, and accomplish tasks on
their network even from very far away and without the required
resources present locally.
• For this reason virtual desktops are vital for empowering remote work and
productivity.
How Does Desktop Virtualization Works?
No matter what kind of VDI deployment is in use, they
do have some common characteristics:
• Centralization: Virtual desktop
infrastructure is always enabled by virtual
machines on a centralized server, whether
locally managed or in the cloud.
• OS Image: VDI always includes an image of
a specific operating system such as Windows
– the most common OS to be virtualized.
• Hosting: Because each desktop is host-
based (through its server), many instances
are stored and used at the same time.
• Constant Connectivity: Endpoints are
unable to display a virtual desktop if they
aren’t connected to the central server, so
users must
remain connected at all times when taking
advantage of VDI.
• VDI Broker: An extra layer in the process
involves what’s called a connection broker,
which orchestrates the acquisition of a
virtual desktop for each user when they
connect, from the server’s available
resources.
• Hypervisor: The hypervisor is a tool that
manages the various virtual machines on the
host server, and ensures that desktops
accessing them have the resources they
require.
3) Application Virtualization
• Application virtualization is a
process that deceives a standard
app into believing that it
interfaces directly with an
operating system's capacities
when, in fact, it does not.
• This ruse requires a virtualization
layer inserted between the app
and the OS.
4) Server Virtualization
• Server virtualization is the
process of dividing a physical
server into multiple unique and
isolated virtual servers by means
of a software application. Each
virtual server can run its own
operating systems
independently.
5) Storage Virtualization
• Storage virtualization in Cloud
Computing is nothing but the
sharing of physical storage into
multiple storage devices which
further appears to be a single
storage device.
• Storage virtualization helps the
storage administrator to backup,
archive and recovery data more
efficiently, in less amount of time
by masking the actual complexity of
SAN (Storage Area Network).
Through the use of software hybrid
appliances, the storage
administrator can implement
virtualization.
Benefits Of Storage Virtualization
6) Network Virtualization
• Network Virtualization (NV) refers to
abstracting network resources that were
traditionally delivered in hardware to
software. NV can combine multiple
physical networks to one virtual,
software-based network, or it can divide
one physical network into separate,
independent virtual networks.
• Network virtualization software allows
network administrators to move virtual
machines across different domains
without reconfiguring the network.
• The software creates a network overlay
that can run separate virtual network
layers on top of the same physical
network fabric.
6) Network Virtualization
Reason for virtualization`
1. Virtualization helps to scale and manage complexity
2. Virtualization has a limited overhead on CPU and memory
utilization
3. Virtualization makes the safety case easier to demonstrate
4. Virtualization can increase security
5. Virtualization is complementary to OS partitioning
6. Virtualization supports hard real-time automotive
applications
7. Virtualization brings a lot more than separation
8. Virtualization enables low-cost solutions
Hypervisor
• What is Hypervisor?
• Uses of Hypervisor
• Benefits of Hypervisor
• How does Hypervisor
works?
• Security considerations
• Hypervisor vs Containers
Types Of Hypervisor
1. Native
Hypervisor
2. Hosted
Hypervisor
Virtualization And Containerization.pptx

More Related Content

Similar to Virtualization And Containerization.pptx

Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
NIKHILKUMAR SHARDOOR
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud Computing
Jamie Shoup
 
lecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxlecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptx
Anilkumarbehera16
 
6-Virtualizaiton-6.pptx
6-Virtualizaiton-6.pptx6-Virtualizaiton-6.pptx
6-Virtualizaiton-6.pptx
AnsarHasas1
 
Virtualization&cloud computing
Virtualization&cloud computingVirtualization&cloud computing
Virtualization&cloud computing
ssuser7b6236
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
hktripathy
 
Cloud computing 3 cloud and virtualisation
Cloud computing 3 cloud and virtualisationCloud computing 3 cloud and virtualisation
Cloud computing 3 cloud and virtualisation
Vaibhav Khanna
 
Introduction to Virtualization
Introduction to Virtualization Introduction to Virtualization
Introduction to Virtualization
Wellshop.pk
 
Cloud Computing vs Virtualization From Desktop to Server
Cloud Computing vs Virtualization From Desktop to ServerCloud Computing vs Virtualization From Desktop to Server
Cloud Computing vs Virtualization From Desktop to ServerFadly Rizal Ahmad Fadzil
 
Lecture1(VM).pptx
Lecture1(VM).pptxLecture1(VM).pptx
Lecture1(VM).pptx
RiyaBatool
 
Virtualization and its importance and implementation levels
Virtualization and its importance and implementation levelsVirtualization and its importance and implementation levels
Virtualization and its importance and implementation levels
MianMubeen3
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptx
Vivek Shelke
 
2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx
shruti533256
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
Sweta Kumari Barnwal
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of Virtualization
HTS Hosting
 
Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptx
Binod Rimal
 
virtualization system basic introduction
virtualization system basic introductionvirtualization system basic introduction
virtualization system basic introduction
BadriHjSidek1
 
Virtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.pptVirtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.ppt
MohammadArmanulHaque
 
Virtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudVirtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of Cloud
Nishant Munjal
 

Similar to Virtualization And Containerization.pptx (20)

Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud Computing
 
lecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxlecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptx
 
6-Virtualizaiton-6.pptx
6-Virtualizaiton-6.pptx6-Virtualizaiton-6.pptx
6-Virtualizaiton-6.pptx
 
Virtualization&cloud computing
Virtualization&cloud computingVirtualization&cloud computing
Virtualization&cloud computing
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
Cloud computing 3 cloud and virtualisation
Cloud computing 3 cloud and virtualisationCloud computing 3 cloud and virtualisation
Cloud computing 3 cloud and virtualisation
 
Introduction to Virtualization
Introduction to Virtualization Introduction to Virtualization
Introduction to Virtualization
 
Cloud Computing vs Virtualization From Desktop to Server
Cloud Computing vs Virtualization From Desktop to ServerCloud Computing vs Virtualization From Desktop to Server
Cloud Computing vs Virtualization From Desktop to Server
 
Lecture1(VM).pptx
Lecture1(VM).pptxLecture1(VM).pptx
Lecture1(VM).pptx
 
lect 1TO 5.pptx
lect 1TO 5.pptxlect 1TO 5.pptx
lect 1TO 5.pptx
 
Virtualization and its importance and implementation levels
Virtualization and its importance and implementation levelsVirtualization and its importance and implementation levels
Virtualization and its importance and implementation levels
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptx
 
2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of Virtualization
 
Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptx
 
virtualization system basic introduction
virtualization system basic introductionvirtualization system basic introduction
virtualization system basic introduction
 
Virtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.pptVirtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.ppt
 
Virtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudVirtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of Cloud
 

More from SMIT PAREKH

EDR(End Point Detection And Response).pptx
EDR(End Point Detection And Response).pptxEDR(End Point Detection And Response).pptx
EDR(End Point Detection And Response).pptx
SMIT PAREKH
 
Visa immigration for canada final 2020 21
Visa immigration for canada final 2020 21Visa immigration for canada final 2020 21
Visa immigration for canada final 2020 21
SMIT PAREKH
 
Final by smit parekh
Final  by smit  parekhFinal  by smit  parekh
Final by smit parekh
SMIT PAREKH
 
Entropy
EntropyEntropy
Entropy
SMIT PAREKH
 
Green house effect
Green house effectGreen house effect
Green house effect
SMIT PAREKH
 
Pollution
PollutionPollution
Pollution
SMIT PAREKH
 
Innovation and you
Innovation and youInnovation and you
Innovation and you
SMIT PAREKH
 
Pollution
PollutionPollution
Pollution
SMIT PAREKH
 

More from SMIT PAREKH (8)

EDR(End Point Detection And Response).pptx
EDR(End Point Detection And Response).pptxEDR(End Point Detection And Response).pptx
EDR(End Point Detection And Response).pptx
 
Visa immigration for canada final 2020 21
Visa immigration for canada final 2020 21Visa immigration for canada final 2020 21
Visa immigration for canada final 2020 21
 
Final by smit parekh
Final  by smit  parekhFinal  by smit  parekh
Final by smit parekh
 
Entropy
EntropyEntropy
Entropy
 
Green house effect
Green house effectGreen house effect
Green house effect
 
Pollution
PollutionPollution
Pollution
 
Innovation and you
Innovation and youInnovation and you
Innovation and you
 
Pollution
PollutionPollution
Pollution
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Virtualization And Containerization.pptx

  • 1. Dharmsinh Desai University (M.C.A Dept.) SEMINAR ON : VIRTUALIZATION AND CONTAINERIZATION PRESENTED BY : NAME: SMIT PAREKH MCA – SEM 2 ROLL NO: MA034 STUDENT ID: 21MAPOG004
  • 2. KEY POINTS 1. Introduction To Virtualization And Containerization 2. What Is Virtualization? 3. Types Of Virtualization 4. Reason For Virtualization 5. Partial, Para, Operation System Level Virtualization 6. Hypervisor 7. Hardware Assisted Virtualization 8. Emulator 9. Migration 10. Operation system virtualization
  • 3. KEY POINTS 11. Application virtualization 12. Memory virtualization 13. Storage virtualization 14. Network virtualization 15. What is containerization ? 16. Application containerization 17. Benefits of containerization 18. Types of containerization 19. Micro services and containerization 20. Security due to containerization
  • 4. 1. Introduction to virtualization and containerization? • Virtualization and containerization are the two most frequently used mechanisms to host applications in a computer system. • Virtualization uses the notion of a virtual machine as the fundamental unit. • Containerization, on the other hand, uses the concept of a container. • Both of these technologies play a crucial role and have their merits and demerits.
  • 5. 2. What Is Virtualization? • Virtualization, In computing refers to the act of creating a virtual version rather than the actual version of something, including but not limited to a virtual computer i.e. hardware platform, OS, storage devices, computer network resources. • Virtualization relies on software to simulate hardware functionality and create a virtual computer system.
  • 6. Types of virtualization 1) Hardware virtualization 2) Desktop virtualization 3) Application virtualization 4) Server virtualization 5) Storage virtualization 6) Network virtualization
  • 7. 1) Hardware Virtualization ✔ Hardware virtualization refers to the technology of consolidating multiple small physical servers into a large physical server for the efficient usage of the processor. ✔ This involves the embedding of virtual machine software into a server’s hardware component. ✔ The virtual machines can interact with hardware without requiring any intermediary action from the host operating system. ✔ Hardware virtualization is essentially used for performance optimization utilizing the multiple virtual machines that interact with the same hardware platform.
  • 8. 2) Desktop Virtualization • Virtual Desktop Infrastructure (VDI) is an end user computing model enabling clients to connect remotely to their desktop operating system environment through a central server, which can host multiple of these desktops for many users at once. • From their endpoint device, the user can operate and interact with their virtual desktop as if they were sitting at the PC, and accomplish tasks on their network even from very far away and without the required resources present locally. • For this reason virtual desktops are vital for empowering remote work and productivity.
  • 9. How Does Desktop Virtualization Works?
  • 10. No matter what kind of VDI deployment is in use, they do have some common characteristics: • Centralization: Virtual desktop infrastructure is always enabled by virtual machines on a centralized server, whether locally managed or in the cloud. • OS Image: VDI always includes an image of a specific operating system such as Windows – the most common OS to be virtualized. • Hosting: Because each desktop is host- based (through its server), many instances are stored and used at the same time. • Constant Connectivity: Endpoints are unable to display a virtual desktop if they aren’t connected to the central server, so users must remain connected at all times when taking advantage of VDI. • VDI Broker: An extra layer in the process involves what’s called a connection broker, which orchestrates the acquisition of a virtual desktop for each user when they connect, from the server’s available resources. • Hypervisor: The hypervisor is a tool that manages the various virtual machines on the host server, and ensures that desktops accessing them have the resources they require.
  • 11. 3) Application Virtualization • Application virtualization is a process that deceives a standard app into believing that it interfaces directly with an operating system's capacities when, in fact, it does not. • This ruse requires a virtualization layer inserted between the app and the OS.
  • 12. 4) Server Virtualization • Server virtualization is the process of dividing a physical server into multiple unique and isolated virtual servers by means of a software application. Each virtual server can run its own operating systems independently.
  • 13. 5) Storage Virtualization • Storage virtualization in Cloud Computing is nothing but the sharing of physical storage into multiple storage devices which further appears to be a single storage device. • Storage virtualization helps the storage administrator to backup, archive and recovery data more efficiently, in less amount of time by masking the actual complexity of SAN (Storage Area Network). Through the use of software hybrid appliances, the storage administrator can implement virtualization.
  • 14. Benefits Of Storage Virtualization
  • 15. 6) Network Virtualization • Network Virtualization (NV) refers to abstracting network resources that were traditionally delivered in hardware to software. NV can combine multiple physical networks to one virtual, software-based network, or it can divide one physical network into separate, independent virtual networks. • Network virtualization software allows network administrators to move virtual machines across different domains without reconfiguring the network. • The software creates a network overlay that can run separate virtual network layers on top of the same physical network fabric.
  • 17. Reason for virtualization` 1. Virtualization helps to scale and manage complexity 2. Virtualization has a limited overhead on CPU and memory utilization 3. Virtualization makes the safety case easier to demonstrate 4. Virtualization can increase security 5. Virtualization is complementary to OS partitioning 6. Virtualization supports hard real-time automotive applications 7. Virtualization brings a lot more than separation 8. Virtualization enables low-cost solutions
  • 18. Hypervisor • What is Hypervisor? • Uses of Hypervisor • Benefits of Hypervisor • How does Hypervisor works? • Security considerations • Hypervisor vs Containers
  • 19. Types Of Hypervisor 1. Native Hypervisor 2. Hosted Hypervisor