Professional Documents
Culture Documents
Chapter6 21110477 TrinhThiThanhHuyen
Chapter6 21110477 TrinhThiThanhHuyen
Chapter6 21110477 TrinhThiThanhHuyen
CHAPTER 6
1. What is virtualization? List its benefits and drawbacks.
- Virtualization is a technology that enables the single physical infrastructure
to function as a multiple logical infrastructure or resources.
- Virtualization is the process of abstracting the physical resources to the pool
of virtual resources that can be given to any virtual machines (VMs).
- Virtualization’s Benefits
•Better Resource Utilization
•Increases ROI
•Dynamic Data Center
•Supports Green IT
•Eases administration
•Improve disaster recovery
- Virtualization’s Drawbacks
•Single point of failures
•Demand high – end and powerful infrastructure
•May lead to lower performance
•Requires specialized skill set.
2. Explain how virtualization changes the computing in the IT industry.
Virtualization has fundamentally transformed the IT industry by enabling multiple virtual
instances to operate on a single physical server. This innovation improves resource
utilization, scalability, and flexibility while reducing hardware costs. It simplifies disaster
recovery, enhances testing and development, and extends the life of legacy applications.
Moreover, it streamlines resource management, fosters green computing practices, and
supports desktop virtualization and cloud computing. Security is also bolstered through
isolation of workloads. Overall, virtualization has become a cornerstone technology in IT,
optimizing operations, cutting costs, and boosting adaptability to ever-evolving business
requirements.
3. Briefly explain how hardware resources such as processor, memory, storage, and
networks can be virtualized.
Processor Virtualization:
CPU Virtualization: Hypervisors (e.g., VMware, Hyper-V) create virtual
CPUs (vCPUs) that share physical CPU cores, allowing multiple virtual
machines (VMs) to run concurrently on a single physical processor.
CPU Time Slicing: Time-sharing techniques allocate CPU time slices to
each VM, ensuring fair and efficient utilization.
Memory Virtualization:
Memory Overcommitment: Hypervisors can allocate more virtual
memory to VMs than physically available by using techniques like memory
ballooning and page sharing.
Memory Ballooning: The hypervisor can reclaim memory from idle or
low-priority VMs and allocate it to more critical VMs when needed.
Storage Virtualization:
Storage Area Network (SAN) Virtualization: SANs use technologies like
RAID and logical unit number (LUN) masking to pool and virtualize
storage resources across multiple disks or arrays.
File-Level Virtualization: Network-attached storage (NAS) devices can
virtualize file systems, making it easier to manage and scale storage.
Network Virtualization:
Virtual LANs (VLANs): VLANs segment physical networks into virtual
subnetworks, allowing for network isolation and improved security.
Software-Defined Networking (SDN): SDN technologies decouple
network control from physical infrastructure, enabling centralized network
management and programmability.
4. Write short notes on data virtualization and application virtualization.
Data Virtualization:
Integrates and presents data from various sources as a unified view.
Doesn't physically move or copy data.
Supports real-time access and federated queries.
Abstracts underlying data complexities.
Enhances data agility.
Application Virtualization:
Runs applications in isolated environments.
Ensures compatibility and portability.
Optimizes resource usage.
Enhances security by isolating applications.
Simplifies software distribution and updates.
5. What are protection rings? Explain how it is used in virtualization.
Protection rings, also known as privilege levels or protection modes, are a computer
hardware mechanism used to segregate and control access to system resources and
services in modern computer architectures. They are essential for ensuring the security
and stability of an operating system and its applications. Protection rings are typically
implemented as hierarchical levels of privilege, with Ring 0 being the highest privilege
level and Ring 3 being the lowest.
Here's how protection rings are used in virtualization:
Ring 0 (Kernel Mode):
Ring 0 is the most privileged level, typically reserved for the host operating
system's kernel.
In virtualization, the hypervisor or virtual machine monitor (VMM) runs in
Ring 0. It has direct access to the physical hardware and controls the
execution of virtual machines (VMs).
The hypervisor manages VMs by intercepting and emulating privileged
instructions that would normally execute in Ring 0.
Ring 1 and Ring 2 (Less Privileged Rings):
These intermediate privilege levels are not commonly used in modern
operating systems.
In some historical virtualization implementations, Ring 1 or Ring 2 could
be used for running certain components of the hypervisor or providing a
higher level of privilege for specific tasks. However, this approach is less
common today.
Ring 3 (User Mode):
Ring 3 is the least privileged level, where user-mode applications run.
Virtual machines run their guest operating systems and applications in Ring
3.
When a VM attempts to execute a privileged instruction (e.g., accessing
hardware resources or changing processor control registers), the hypervisor
traps and handles this event, ensuring that the VM cannot directly interfere
with the host or other VMs.
6. Explain the different approaches used to achieve virtualization with a neat
diagram.