SlideShare a Scribd company logo
1 of 25
Download to read offline
Virtual System &
Services
Lecture No.1
Introduction of Virtualization
L
Virtualization
1
Introduction
● It is a large umbrella of technologies and
concepts.
● Virtualization levels :-
– Hardware level
– Operating system level
– Programming Language level
– Application level
● Types :- Hardware , Software & Networking
Virtualization
2
Virtualization gained interest :-
▪ Increased performance and computing capacity
PCs are having immense computing power.
▪ Underutilized hardware and software resources
Limited use of increased performance & computing
capacity.
▪ Lack of space
Continuous need for additional capacity.
▪ Greening initiatives
Reduce carbon footprints
Reducing the number of servers, reduce power
consumption.
▪ Rise of administrative costs
Power and cooling costs are higher then IT equipment.
Introduction (Cont..)
Virtualization
3
Architecture of Virtual Machines
● VM can support individual processes or a
complete system
● Virtualization can be from OS to
programming languages to processor
architecture.
● VMs enhance
– Software interoperability (to work together)
– System interoperability/Impregnability (having strength)
– Platform versatility
Virtualization
4
Abstraction and Virtualization
● Computer system is complex, and yet it
continue to evolve.
● Computer is designed as hierarchies of
well-defined interfaces that separate
level of abstraction
● Simplifying abstractions hide lower-level
implementation details
Virtualization
Concept of Abstraction
● Ex. Disk storage
● Hides hard-disk
addressing details (sectors
and tracks)
● It appears to application
software as a variable
sized files.
● User can create, write and
read files without knowing
the underneath details.
5
Virtualization
6
Pros and cons of Abstraction
● Well-defined interfaces permit
development of interacting computer
subsystems not only in different
organization but also at different time.
● Limitation of well-defined interfaces ,
designed specification to one interface
will not work for other.
Virtualization
Concept of Virtualization
● Virtualization of system or
components like –
processor, memory or an I/O
device – at a given
abstraction level.
● It transforms a entire
system or components of
the system
● Ex. disk storage
7
Virtualization
8
Virtual Machine
● Virtualization can be applied to entire machine.
● VM can be implemented by adding a software
layer to a real machine to support desired
architecture.
● VM implementation lie at architected
interfaces
Virtualization
9
Architected Interfaces
● Architecture, as applied to computer systems,
refer to a formal specification to an interface in
the system, including the logical behavior of
the resources managed via the interface.
● Implementation describes the actual
embodiment of an architecture.
● Abstraction levels correspond to
implementation layers, having its own
interface or architecture.
Virtualization
Computer System Architecture
Interfaces at or near the
H/w S/w boundary :-
▪ ISA – Instruction
Set Architecture.
▪ API – Application
Program Interface
▪ ABI – Application
Binary Interface
10
Virtualization
Virtualized Environments
● Three major components of Virtualized
Environments
– Guest – system component that interacts
with Virtualization Layer.
– Host – original environment where guest
runs.
– Virtualization Layer – recreate the same or
different environment where guest will run.
Virtualization
Virtualization Reference Model
Virtualization
Advantages of Virtualization
● Increased Security
– Ability to control the execution of a guest
– Guest is executed in emulated environment.
– Virtual Machine Manager control and filter the
activity of the guest.
– Hiding of resources.
– Having no effect on other users/guest
environment.
Virtualization
Advantages of Virtualization (Cont..)
● Managed Execution types :-
– Sharing
● Creating separate computing environment within the
same host.
● Underline host is fully utilized.
– Aggregation
● A group of separate hosts can be tied together and
represented as single virtual host.
– Emulation
● Controlling & Tuning the environment exposed to
guest.
– Isolation
● Complete separate environment for guests.
Virtualization
Managed Execution
Virtualization
Advantages of Virtualization (Cont..)
● Performance Tuning –
– control the performance of guest.
● Virtual Machine Migration –
– move virtual image into another machine.
● Portability –
– safely moved and executed on top of
different virtual machine.
– Availability of system is with you.
Virtualization
Taxonomy of Virtualization
Techniques
● Virtualization is mainly used to emulate execution
environment , storage and networks.
● Execution Environment classified into two :-
– Process-level – implemented on top of an
existing operating system.
– System-level – implemented directly on
hardware and do not or minimum requirement of
existing operating system
Virtualization
Taxonomy of virtualization
Virtualization
Machine Reference Model
● It defines the interfaces between the levels of
abstractions, which hide implementation
details.
● Virtualization techniques actually replace one
of the layers and intercept the calls that are
directed towards it.
Virtualization
Machine Reference Model (Cont..)
● Hardware is expressed in terms of the Instruction Set Architecture (ISA).
– ISA for processor, registers, memory and the interrupt management.
● Application Binary Interface (ABI) separates the OS layer from the
application and libraries which are managed by the OS.
– System Calls defined
– Allows probabilities of applications and libraries across OS.
Virtualization
Machine Reference Model (Cont..)
● API – it interfaces applications to libraries and/or
the underlying OS.
● Layered approach simplifies the development
and implementation of computing system.
● ISA has been divided into two security classes:-
– Privileged Instructions
– Nonprivileged Instructions
Virtualization
ISA: Security Classes
● Nonprivileged instructions
– That can be used without interfering with other
tasks because they do not access shared
resources. Ex. Arithmetic , floating & fixed point.
● Privileged instructions
– That are executed under specific restrictions
and are mostly used for sensitive operations,
which expose (behavior-sensitive) or modify
(control-sensitive) the privileged state.
● Behavior-sensitive – operate on the I/O
● Control-sensitive – alter the state of the CPU
register.
Virtualization
Privileged Hierarchy Security Ring
● Ring-0 is in most privileged level
, used by the kernel.
● Ring-1 & 2 used by the OS-level
services
● and , R3 in the least privileged
level , used by the user.
● Recent system support two
levels :-
– Ring 0 – supervisor mode
– Ring 3 – user mode
Virtualization
End..

More Related Content

Similar to Virtual System & Services Lecture No.1 Introduction to Virtualization

ServerVirtualization.pptx
ServerVirtualization.pptxServerVirtualization.pptx
ServerVirtualization.pptxSatyajeetGaur3
 
Lecture5_ServerVirtualization.pptx
Lecture5_ServerVirtualization.pptxLecture5_ServerVirtualization.pptx
Lecture5_ServerVirtualization.pptxUbaidURRahman78
 
IRJET-Virtualization Technique for Effective Resource Utilization and Dedicat...
IRJET-Virtualization Technique for Effective Resource Utilization and Dedicat...IRJET-Virtualization Technique for Effective Resource Utilization and Dedicat...
IRJET-Virtualization Technique for Effective Resource Utilization and Dedicat...IRJET Journal
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containersSelvaraj Kesavan
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...Neha417639
 
Embedded system
Embedded systemEmbedded system
Embedded systemmangal das
 
Embedded 100912065920-phpapp02
Embedded 100912065920-phpapp02Embedded 100912065920-phpapp02
Embedded 100912065920-phpapp02Atv Reddy
 
Vmm concepts
Vmm conceptsVmm concepts
Vmm conceptsLibin M
 
Unit-I_part-II_Virtualization.pptx
Unit-I_part-II_Virtualization.pptxUnit-I_part-II_Virtualization.pptx
Unit-I_part-II_Virtualization.pptxDARKKNIGHT116809
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud ComputingRishikese MR
 
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravym456
 
Comparison of Current Service Mesh Architectures
Comparison of Current Service Mesh ArchitecturesComparison of Current Service Mesh Architectures
Comparison of Current Service Mesh ArchitecturesMirantis
 
distributed-systemsfghjjjijoijioj-chap3.pptx
distributed-systemsfghjjjijoijioj-chap3.pptxdistributed-systemsfghjjjijoijioj-chap3.pptx
distributed-systemsfghjjjijoijioj-chap3.pptxlencho3d
 
Unit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxUnit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxNayanrai14
 
Operating system Definition Structures
Operating  system Definition  StructuresOperating  system Definition  Structures
Operating system Definition Structuresanair23
 

Similar to Virtual System & Services Lecture No.1 Introduction to Virtualization (20)

Overview.ppt
Overview.pptOverview.ppt
Overview.ppt
 
ServerVirtualization.pptx
ServerVirtualization.pptxServerVirtualization.pptx
ServerVirtualization.pptx
 
Lecture5_ServerVirtualization.pptx
Lecture5_ServerVirtualization.pptxLecture5_ServerVirtualization.pptx
Lecture5_ServerVirtualization.pptx
 
Chapter 3.4.pptx
Chapter 3.4.pptxChapter 3.4.pptx
Chapter 3.4.pptx
 
IRJET-Virtualization Technique for Effective Resource Utilization and Dedicat...
IRJET-Virtualization Technique for Effective Resource Utilization and Dedicat...IRJET-Virtualization Technique for Effective Resource Utilization and Dedicat...
IRJET-Virtualization Technique for Effective Resource Utilization and Dedicat...
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Embedded 100912065920-phpapp02
Embedded 100912065920-phpapp02Embedded 100912065920-phpapp02
Embedded 100912065920-phpapp02
 
lect 1TO 5.pptx
lect 1TO 5.pptxlect 1TO 5.pptx
lect 1TO 5.pptx
 
Vmm concepts
Vmm conceptsVmm concepts
Vmm concepts
 
Vmm concepts
Vmm conceptsVmm concepts
Vmm concepts
 
Unit-I_part-II_Virtualization.pptx
Unit-I_part-II_Virtualization.pptxUnit-I_part-II_Virtualization.pptx
Unit-I_part-II_Virtualization.pptx
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
 
Comparison of Current Service Mesh Architectures
Comparison of Current Service Mesh ArchitecturesComparison of Current Service Mesh Architectures
Comparison of Current Service Mesh Architectures
 
distributed-systemsfghjjjijoijioj-chap3.pptx
distributed-systemsfghjjjijoijioj-chap3.pptxdistributed-systemsfghjjjijoijioj-chap3.pptx
distributed-systemsfghjjjijoijioj-chap3.pptx
 
Unit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxUnit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptx
 
Operating system Definition Structures
Operating  system Definition  StructuresOperating  system Definition  Structures
Operating system Definition Structures
 

More from RiyaBatool

Legal Liabilities of a software product.pptx
Legal Liabilities of a software product.pptxLegal Liabilities of a software product.pptx
Legal Liabilities of a software product.pptxRiyaBatool
 
Shaikh Ahmad Sarhindi.pptx
Shaikh Ahmad Sarhindi.pptxShaikh Ahmad Sarhindi.pptx
Shaikh Ahmad Sarhindi.pptxRiyaBatool
 
Lecture5(VM).pptx
Lecture5(VM).pptxLecture5(VM).pptx
Lecture5(VM).pptxRiyaBatool
 
lecture3(VM).pptx
lecture3(VM).pptxlecture3(VM).pptx
lecture3(VM).pptxRiyaBatool
 
Lecture1(VM).pptx
Lecture1(VM).pptxLecture1(VM).pptx
Lecture1(VM).pptxRiyaBatool
 
lecture4(VM).ppt
lecture4(VM).pptlecture4(VM).ppt
lecture4(VM).pptRiyaBatool
 
Xen Hypervisor.pptx
Xen Hypervisor.pptxXen Hypervisor.pptx
Xen Hypervisor.pptxRiyaBatool
 
TeleCom Lecture 04.pptx
TeleCom Lecture 04.pptxTeleCom Lecture 04.pptx
TeleCom Lecture 04.pptxRiyaBatool
 
TeleCom Lecture 02.pptx
TeleCom Lecture 02.pptxTeleCom Lecture 02.pptx
TeleCom Lecture 02.pptxRiyaBatool
 
chapter 5.pptx
chapter 5.pptxchapter 5.pptx
chapter 5.pptxRiyaBatool
 
chapter 10,11,13.pptx
chapter 10,11,13.pptxchapter 10,11,13.pptx
chapter 10,11,13.pptxRiyaBatool
 
TeleCom Lecture 07.ppt
TeleCom Lecture 07.pptTeleCom Lecture 07.ppt
TeleCom Lecture 07.pptRiyaBatool
 
TeleCom Lecture 06.pptx
TeleCom Lecture 06.pptxTeleCom Lecture 06.pptx
TeleCom Lecture 06.pptxRiyaBatool
 
TeleCom Lecture 05.pptx
TeleCom Lecture 05.pptxTeleCom Lecture 05.pptx
TeleCom Lecture 05.pptxRiyaBatool
 

More from RiyaBatool (18)

Hashing.pptx
Hashing.pptxHashing.pptx
Hashing.pptx
 
Legal Liabilities of a software product.pptx
Legal Liabilities of a software product.pptxLegal Liabilities of a software product.pptx
Legal Liabilities of a software product.pptx
 
Shaikh Ahmad Sarhindi.pptx
Shaikh Ahmad Sarhindi.pptxShaikh Ahmad Sarhindi.pptx
Shaikh Ahmad Sarhindi.pptx
 
Lecture5(VM).pptx
Lecture5(VM).pptxLecture5(VM).pptx
Lecture5(VM).pptx
 
lecture3(VM).pptx
lecture3(VM).pptxlecture3(VM).pptx
lecture3(VM).pptx
 
Lecture1(VM).pptx
Lecture1(VM).pptxLecture1(VM).pptx
Lecture1(VM).pptx
 
lecture4(VM).ppt
lecture4(VM).pptlecture4(VM).ppt
lecture4(VM).ppt
 
Xen Hypervisor.pptx
Xen Hypervisor.pptxXen Hypervisor.pptx
Xen Hypervisor.pptx
 
TeleCom Lecture 04.pptx
TeleCom Lecture 04.pptxTeleCom Lecture 04.pptx
TeleCom Lecture 04.pptx
 
TeleCom Lecture 02.pptx
TeleCom Lecture 02.pptxTeleCom Lecture 02.pptx
TeleCom Lecture 02.pptx
 
part 3.pptx
part 3.pptxpart 3.pptx
part 3.pptx
 
VSS LEC5.pdf
VSS LEC5.pdfVSS LEC5.pdf
VSS LEC5.pdf
 
VSS-2.pdf
VSS-2.pdfVSS-2.pdf
VSS-2.pdf
 
chapter 5.pptx
chapter 5.pptxchapter 5.pptx
chapter 5.pptx
 
chapter 10,11,13.pptx
chapter 10,11,13.pptxchapter 10,11,13.pptx
chapter 10,11,13.pptx
 
TeleCom Lecture 07.ppt
TeleCom Lecture 07.pptTeleCom Lecture 07.ppt
TeleCom Lecture 07.ppt
 
TeleCom Lecture 06.pptx
TeleCom Lecture 06.pptxTeleCom Lecture 06.pptx
TeleCom Lecture 06.pptx
 
TeleCom Lecture 05.pptx
TeleCom Lecture 05.pptxTeleCom Lecture 05.pptx
TeleCom Lecture 05.pptx
 

Recently uploaded

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 

Recently uploaded (20)

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 

Virtual System & Services Lecture No.1 Introduction to Virtualization

  • 1. Virtual System & Services Lecture No.1 Introduction of Virtualization L
  • 2. Virtualization 1 Introduction ● It is a large umbrella of technologies and concepts. ● Virtualization levels :- – Hardware level – Operating system level – Programming Language level – Application level ● Types :- Hardware , Software & Networking
  • 3. Virtualization 2 Virtualization gained interest :- ▪ Increased performance and computing capacity PCs are having immense computing power. ▪ Underutilized hardware and software resources Limited use of increased performance & computing capacity. ▪ Lack of space Continuous need for additional capacity. ▪ Greening initiatives Reduce carbon footprints Reducing the number of servers, reduce power consumption. ▪ Rise of administrative costs Power and cooling costs are higher then IT equipment. Introduction (Cont..)
  • 4. Virtualization 3 Architecture of Virtual Machines ● VM can support individual processes or a complete system ● Virtualization can be from OS to programming languages to processor architecture. ● VMs enhance – Software interoperability (to work together) – System interoperability/Impregnability (having strength) – Platform versatility
  • 5. Virtualization 4 Abstraction and Virtualization ● Computer system is complex, and yet it continue to evolve. ● Computer is designed as hierarchies of well-defined interfaces that separate level of abstraction ● Simplifying abstractions hide lower-level implementation details
  • 6. Virtualization Concept of Abstraction ● Ex. Disk storage ● Hides hard-disk addressing details (sectors and tracks) ● It appears to application software as a variable sized files. ● User can create, write and read files without knowing the underneath details. 5
  • 7. Virtualization 6 Pros and cons of Abstraction ● Well-defined interfaces permit development of interacting computer subsystems not only in different organization but also at different time. ● Limitation of well-defined interfaces , designed specification to one interface will not work for other.
  • 8. Virtualization Concept of Virtualization ● Virtualization of system or components like – processor, memory or an I/O device – at a given abstraction level. ● It transforms a entire system or components of the system ● Ex. disk storage 7
  • 9. Virtualization 8 Virtual Machine ● Virtualization can be applied to entire machine. ● VM can be implemented by adding a software layer to a real machine to support desired architecture. ● VM implementation lie at architected interfaces
  • 10. Virtualization 9 Architected Interfaces ● Architecture, as applied to computer systems, refer to a formal specification to an interface in the system, including the logical behavior of the resources managed via the interface. ● Implementation describes the actual embodiment of an architecture. ● Abstraction levels correspond to implementation layers, having its own interface or architecture.
  • 11. Virtualization Computer System Architecture Interfaces at or near the H/w S/w boundary :- ▪ ISA – Instruction Set Architecture. ▪ API – Application Program Interface ▪ ABI – Application Binary Interface 10
  • 12. Virtualization Virtualized Environments ● Three major components of Virtualized Environments – Guest – system component that interacts with Virtualization Layer. – Host – original environment where guest runs. – Virtualization Layer – recreate the same or different environment where guest will run.
  • 14. Virtualization Advantages of Virtualization ● Increased Security – Ability to control the execution of a guest – Guest is executed in emulated environment. – Virtual Machine Manager control and filter the activity of the guest. – Hiding of resources. – Having no effect on other users/guest environment.
  • 15. Virtualization Advantages of Virtualization (Cont..) ● Managed Execution types :- – Sharing ● Creating separate computing environment within the same host. ● Underline host is fully utilized. – Aggregation ● A group of separate hosts can be tied together and represented as single virtual host. – Emulation ● Controlling & Tuning the environment exposed to guest. – Isolation ● Complete separate environment for guests.
  • 17. Virtualization Advantages of Virtualization (Cont..) ● Performance Tuning – – control the performance of guest. ● Virtual Machine Migration – – move virtual image into another machine. ● Portability – – safely moved and executed on top of different virtual machine. – Availability of system is with you.
  • 18. Virtualization Taxonomy of Virtualization Techniques ● Virtualization is mainly used to emulate execution environment , storage and networks. ● Execution Environment classified into two :- – Process-level – implemented on top of an existing operating system. – System-level – implemented directly on hardware and do not or minimum requirement of existing operating system
  • 20. Virtualization Machine Reference Model ● It defines the interfaces between the levels of abstractions, which hide implementation details. ● Virtualization techniques actually replace one of the layers and intercept the calls that are directed towards it.
  • 21. Virtualization Machine Reference Model (Cont..) ● Hardware is expressed in terms of the Instruction Set Architecture (ISA). – ISA for processor, registers, memory and the interrupt management. ● Application Binary Interface (ABI) separates the OS layer from the application and libraries which are managed by the OS. – System Calls defined – Allows probabilities of applications and libraries across OS.
  • 22. Virtualization Machine Reference Model (Cont..) ● API – it interfaces applications to libraries and/or the underlying OS. ● Layered approach simplifies the development and implementation of computing system. ● ISA has been divided into two security classes:- – Privileged Instructions – Nonprivileged Instructions
  • 23. Virtualization ISA: Security Classes ● Nonprivileged instructions – That can be used without interfering with other tasks because they do not access shared resources. Ex. Arithmetic , floating & fixed point. ● Privileged instructions – That are executed under specific restrictions and are mostly used for sensitive operations, which expose (behavior-sensitive) or modify (control-sensitive) the privileged state. ● Behavior-sensitive – operate on the I/O ● Control-sensitive – alter the state of the CPU register.
  • 24. Virtualization Privileged Hierarchy Security Ring ● Ring-0 is in most privileged level , used by the kernel. ● Ring-1 & 2 used by the OS-level services ● and , R3 in the least privileged level , used by the user. ● Recent system support two levels :- – Ring 0 – supervisor mode – Ring 3 – user mode