0% found this document useful (0 votes)
21 views

Virtualization - MODULE 2 - Cloud Computing Btech

The document provides an introduction to virtualization, discussing key concepts like virtual machines, hypervisors, containers, and the advantages of virtualization. It covers different types of virtualization including desktop, application, server, storage and network virtualization. The document also discusses the types of hypervisors and advantages of using virtual machines.

Uploaded by

Iffat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Virtualization - MODULE 2 - Cloud Computing Btech

The document provides an introduction to virtualization, discussing key concepts like virtual machines, hypervisors, containers, and the advantages of virtualization. It covers different types of virtualization including desktop, application, server, storage and network virtualization. The document also discusses the types of hypervisors and advantages of using virtual machines.

Uploaded by

Iffat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 48

INTRODUCTION

TO
VIRTUALIZATION
Cloud Computing Technologies
There are certain technologies working behind the cloud computing platforms
making cloud computing flexible, reliable and usable. These technologies are listed
below:

➢ Virtualization
➢ Service-Oriented Architecture(SOA)
➢ Grid Computing
➢ Utility Computing
Virtualization is key enabler
Virtualization
➢ Virtualization is the process of running a virtual instance of a computer system in a layer
abstracted from the actual hardware. Most commonly, it refers to running multiple operating
systems on a computer system simultaneously.

➢ To the applications running on top of the virtualized machine, it can appear as if they are on
their own dedicated machine, where the operating system, libraries, and other programs are
unique to the guest virtualized system and unconnected to the host operating system which sits
below it.
Capability of server with and without
virtualization
Traditional Servers vs Virtualized
Servers
Single server running Virtualization
Some terminologies associated with
Virtualization

1.Hypervisor: It is an operating system, performing on the actual hardware, the virtual


counterpart is a subpart of this operating system in the form of a running process.

2.Virtual Machine (VM):It is a virtual computer, executing underneath a hypervisor.

3.Container: Some light-weighted VMs that are subpart of the same operating system
instance as its hypervisor are known as containers. They are a group of processes that runs
along with their corresponding namespace for process identifiers.
Some terminologies associated with
Virtualization

4. Virtualization Software: Either be a piece of a software application package or an


operating system or a specific version of that operating system, this is the software that
assists in deploying the virtualization on any computer device.

5. Virtual Network: It is a logically separated network inside the servers that could be
expanded across multiple servers.
Characteristics of Virtualization

1. Maximum resource utilization


2. Reduces hardware cost
3. Minimize the maintenance cost
4. Supports Dynamic Load Balancing
5. Server Consolidation
6. Disaster Recovery
7. Easy VM management
8. Maintaining Legacy application and can test Beta software
9. Sandboxing
10. Virtual Hardware
Pros n Cons Virtualization
Pros
1. Cost Reduction
2. Efficient Resource utilization
3. Optimization
4. Increased Return on Investment
5. Budgeting
6. Increased Flexibility
Pros n Cons Virtualization
Cons
1. Upfront Investment
2. Performance Issues
3. Licensing Issues
4. Difficulty in root cause analysis
Types of Virtualization

• Desktop Virtualization
• Application Virtualization
• Server Virtualization
• Storage Virtualization
• Network Virtualization
Hypervisors
A hypervisor is a form of virtualization software used in Cloud hosting to divide and
allocate the resources on various pieces of hardware. The program which provides
partitioning, isolation or abstraction is called virtualization hypervisor. The hypervisor is
a hardware virtualization technique that allows multiple guest operating systems (OS) to
run on a single host system at the same time. A hypervisor is sometimes also called a
virtual machine manager(VMM).

Types of Hypervisor
1. Type I Hypervisor – Bare Metal Structure

2. Type II Hypervisor – Hosted Structure


Type I Hypervisor – Bare Metal Structure
➢ The term bare metal refers to the fact that there is no operating system between the
virtualization software and the hardware.

➢ The virtualization software resides on the “bare metal” or the hard disk of the hardware,
where the operating system is usually installed.

➢ Bare metal isn’t only used to describe hypervisors. A bare metal server is a regular,
single-tenant server. However, it can be a host machine for virtual machines with the
addition of a hypervisor and virtualization software.

➢ A bare metal cloud refers to a customer renting the actual servers that host the public
cloud from a cloud service provider, in addition to renting the public cloud services.
Type I Hypervisor – Bare Metal Structure
Pros & Cons of Type-I Hypervisor

Pros:
Such kind of hypervisors are very efficient because they have direct access
to the physical hardware resources(like Cpu, Memory, Network, Physical
storage). This causes the empowerment the security because there is
nothing any kind of the third party resource so that attacker couldn’t
compromise with anything.

Cons:
One problem with Type-1 hypervisor is that they usually need a dedicated
separate machine to perform its operation and to instruct different VMs and
control the host hardware resources.
Type II Hypervisor – Hosted Structure

➢ A Host operating system runs on the underlying host system. It is also known as
‘Hosted Hypervisor”. Such kind of hypervisors doesn’t run directly over the
underlying hardware rather they run as an application in a Host
system(physical machine). Basically, software installed on an operating system.

➢ Hypervisor asks the operating system to make hardware calls. Example of Type
2 hypervisor includes VMware Player or Parallels Desktop.

➢ Hosted hypervisors are often found on endpoints like PCs.

➢ The type-2 hypervisor is are very useful for engineers, security analyst(for
checking malware, or malicious source code and newly developed applications).
Type II Hypervisor – Hosted Structure
Pros & Cons of Type-II Hypervisor

Pros:
Such kind of hypervisors allows quick and easy access to a guest Operating
System alongside the host machine running. These hypervisors usually come with
additional useful features for guest machine. Such tools enhance the coordination
between the host machine and guest machine.

Cons:
Here there is no direct access to the physical hardware resources so the efficiency
of these hypervisors lags in performance as compared to the type-1 hypervisors,
and potential security risks are also there an attacker can compromise the
security weakness if there is access to the host operating system so he can also
access the guest operating system.
Choosing the right hypervisor

The following factors should be examined before choosing a suitable hypervisor:

1. Understand your needs

2. The cost of a hypervisor

3. Virtual machine performance

4. Ecosystem

5. Test for yourself


Benefits of hypervisors

There are several benefits to using a hypervisor that hosts multiple virtual machines:

•Speed

•Efficiency

•Flexibility

•Portability
Virtual Machines

A Virtual Machine (VM) is a compute


resource that uses software instead of a
physical computer to
run programs and deploy apps. One or
more virtual “guest” machines run
on a physical “host” machine. Each
virtual machine runs its own operating
system and functions
separately from the other
VMs, even when they are
all running on the same host.
Advantages of Virtual Machines
Virtual machines are easy to manage and maintain, and they offer several advantages
over physical machines:

• VMs can run multiple operating system environments on a single physical


computer, saving physical space, time and management costs.

• Virtual machines support legacy applications, reducing the cost of migrating to a


new operating system. For example, a Linux virtual machine running a distribution
of Linux as the guest operating system can exist on a host server that is running a
non-Linux operating system, such as Windows.

• VMs can also provide integrated disaster recovery and application provisioning
options.
Disadvantages of Virtual Machines

While virtual machines have several advantages over physical machines, there are
also some potential disadvantages:

• Running multiple virtual machines on one physical machine can result in unstable
performance if infrastructure requirements are not met.

• Virtual machines are less efficient and run slower than a full physical
computer. Most enterprises use a combination of physical and virtual
infrastructure to balance the corresponding advantages and disadvantages.
Types of Virtual Machines

The two types of virtual machines


Users can choose from two different types of virtual
machines—Process VMs and System VMs:

1. Process virtual machine: allows a single process to run as


an application on a host machine, providing a platform-
independent programming environment by masking the
information of the underlying hardware or operating
system. An example of a process VM is the Java Virtual
Machine, which enables any operating system to run Java
applications as if they were native to that system.
Types of Virtual Machines

2.System virtual machine: is fully


virtualized to substitute for a physical machine. A
system platform supports the sharing of a host
computer’s physical resources between multiple
virtual machines, each running its own copy of the
operating system. This virtualization process relies
on a hypervisor, which can run on bare hardware,
such as VMware ESXi, or on top of an operating
system.
Container
➢ A container is a standard unit of software
that packages up code and all its
dependencies so the application runs
quickly and reliably from one computing
environment to another.

➢ Containers are small, fast, and portable


because unlike a virtual machine,
containers do not need include a guest
OS in every instance and can, instead,
simply leverage the features and
resources of the host OS.
Benefits of containers

The primary advantage of containers, especially compared to a VM, is providing a


level of abstraction that makes them lightweight and portable.

•Lightweight
•Portable and platform independent
•Supports modern development and architecture
•Improves utilization
Difference between VM and
Container
SNo. Virtual Machines(VM) Containers
1 VM is piece of software that allows you to install other software While a container is a software that allows different
inside of it so you basically control it virtually as opposed to functionalities of an application independently.
installing the software directly on the computer.
2. Applications running on VM system can run different OS. While applications running in a container environment share a
single OS.
3. VM virtualizes the computer system. While containers virtualize the operating system only.

4. VM size is very large. While the size of container is very light; i.e. a few megabytes.

5. VM takes minutes to run, due to large size. While containers take a few seconds to run.
6. VM uses a lot of system memory. While containers require very less memory.
7. VM is more secure. While containers are less secure.
8. VM’s are useful when we require all of OS resources to run various While containers are useful when we are required to maximize
applications. the running applications using minimal servers.
9. Examples of VM are: KVM, Xen, VMware. While examples of containers are:RancherOS, PhotonOS,
Containers by Docker.
Container vs hypervisor
Containers and hypervisors are both involved in making applications faster and more
efficient, but they achieve this in different ways.

Hypervisors:
•Allow an operating system to run independently from the underlying hardware through the use of
virtual machines.
•Share virtual computing, storage and memory resources.
•Can run multiple operating systems on top of one server (bare-metal hypervisor) or installed on top
of one standard operating system and isolated from it (hosted hypervisor).

Containers:
•Allow applications to run independently of an operating system.
•Can run on any operating system—all they need is a container engine to run.
•Are extremely portable since in a container, an application has everything it needs to run.
SERVICE ORIENTED
ARCHITECTURE
Service Oriented Architecture(SOA)

• Service-Oriented Architecture (SOA) is an architectural style.


Applications built using an SOA style deliver functionality as
services that can be used or reused when building applications or
integrating within the enterprise or trading partners.
Service Oriented Architecture(SOA)

What is a Service?
• A service is a reusable component that can be used as a building block to form
larger, more complex business-application functionality.

• A service may be as simple as “get me some person data,” or as complex as “process


a disbursement.”

• A service provides a discrete business function that operates on data. Its job is to
ensure that the business functionality is applied consistently, returns predictable
results, and operates within the quality of service required.
Service Oriented Architecture(SOA)

• Uses open standards to integrate software assets as services


• Standardizes interactions of services
• Services become building blocks that form business flows
• Services can be reused by other applications
Service Oriented Architecture(SOA)

The SOA Use cases


Service Oriented Architecture(SOA)

The SOA Use cases


Service Oriented Architecture(SOA)

The SOA Use cases


Service Oriented Architecture(SOA)

The SOA Framework


Discovery
Services

Find Service Publish Service


Description

Use Service
Service
Client Provider
Service Oriented Architecture(SOA)
Service Oriented Architecture(SOA)
Call flow to a service
2. Discovery 1. Publishing

3. YP Lookup
Registry

Client
4. Request
Service Providing
4. Request Peers

5. Async Reply
Service Oriented Architecture(SOA)
Characteristics of a Service
• Supports open standards for integration
• Loose coupling
• Stateless
• Location agnostic
• Abstraction
• Reusability
• Autonomy
• Discoverability
• Composability
Service Oriented Architecture(SOA)

Summary of SOA Elements


• Loose coupling: focus should be on high-level contractual relationships
• Implementation neutrality: the interface is what should matter
• Flexible configurability: late binding of components
• Long lifetime: components should exist long enough to be discovered, to be relied upon, and
to engender trust in their behavior
• Granularity: interactions and dependencies should occur at as high a level as possible
• Teams: computation in open systems should be conceptualized as business partners
working as a team
REST(Representational State
Transfer)
Basic Principles of REST architectural style:
• Separation of Client and Server Method Operation
• Resource Identification PUT Create a new Resource

• Controlled Interfaces GET


POST
Retrieve the current state of resource
Update or transfers a new state to a resource
• Self- Descriptive Messages DELETE Delete or destroy a resource
• Statelessness
Electronic Data Interchange(EDI)
Electronic Data Interchange(EDI)

Advantages of EDI:
There are several advantages to Electronic Data Interchange:

•The paper usage reduced


•Improved quality of Data
•Speed Increases
•Security
•Information accuracy
•Less Cost
Electronic Data Interchange(EDI)

Disadvantages of EDI:

•The initial setup of the EDI is very Time-consuming.

•EDI standards keep on changing after some amount of time.

•A very systematic and proper back up is required as the entire data relies on EDI.

•The setup and maintenance of the EDI is very Expensive.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy