Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 79

Virtualization

Cloud Computing

School of Computer Engineering


3
Virtualisation: Concept
 virtualization technologies have a long trail in the
history of computer science and have been available in
many flavors by providing virtual environments at the
operating system level, the programming language
level, and the application level
 It is a broad concept that refers to the creation of a
virtual version of something, whether hardware, a
software environment, storage, or a network.
 Mainly Virtualization means, running multiple operating
systems on a single machine but sharing all the
hardware resources.
 And it helps us to provide the pool of IT resources so
that we can share these IT resources in order to get
benefits
Virtualisation: Concept
3

 In a virtualized environment there are three major


components: guest, host, and virtualization layer.
 The guest represents the system component that
interacts with the virtualization layer rather than
with the host
 The host represents the original environment where
the guest is supposed to be managed.
 The virtualization layer is responsible for recreating
the same or a different environment where the guest
will operate
Virtualisation in Cloud
3 Computing
 Virtualization is a technique, which allows to share
a single physical instance of a resource or an
application among multiple customers and
organizations.
 It does by assigning a logical name to a physical
storage and providing a pointer to that physical
resource when demanded.

 Virtualization in cloud computing allows you to


run multiple applications and OS on the same
server, thereby providing for efficient resource
utilization and reducing costs.
Virtualization Architecture
4
Virtualization

With the help of Virtualization multiple operating


systems and applications can run on same Machine and
its same hardware at the same time increasing the
utilization and flexibility of hardware.

The machine on which the virtual machine is


going to be build is known as Host Machine
and
that virtual machine is referred as a Guest
Machine.
Virtualization Reference Model
The virtualization model consists of
a host or physical resources in the first layer
virtualization tool in the second layer and
 a guest in the third layer
Advantages of Virtualization
 Allows any network-enabled device to access any
network application over any network.
 Maintains isolation of one workload from another
application to enhance security in the environment.
Virtualization of an application allows users to be
comfortable with different versions of the operating
system.
can support and allow application with multiple
instances to run on various machines concurrently.
Optimizes the use of a single system.
Enhances the reliability or availability of an application
through redundancy.
Server/Compute Virtualization
In cloud computing, it refers to making a virtual edition of a
device or resource, such as a server, storage device, network, or
an operating system where the structure splits the resources as
one or more environments for execution.
The following are the advantages of server/compute
virtualization:
1. Consistency
2. Energy efficiency
3. Enhanced disaster recovery
4. Cost savings
A virtual machine is a reasonable computing system like a
physical machine which governs an application and operating
system (OS).
Server/Compute Virtualization
A virtual machine (VM) can be configured with the
following virtual components:
• Virtual central processing unit (vCPU)
• Virtual random access memory (vRAM)
• Virtual disk
• Virtual network adaptor (vNIC)
• Virtual DVD/CD-ROM and floppy drives
• Virtual SCSI (Small Computer System Interface)
controller
• Virtual USB controllers
• Virtual machine console
Server/Compute Virtualization
Server/Compute Components
The logical components of a server/compute system
comprise the following:
• File system
• Operating system
• Volume manager
• Device drivers
Hypervisor
5
 The hypervisor is a firmware or low-level program
that acts as a Virtual Machine Manager(VMM).
 Hypervisor is a form of virtualization software
used in Cloud hosting to divide and allocate the
resources on various pieces of hardware.
 The program which provide partitioning, isolation
or abstraction is called virtualization hypervisor.
 Hypervisor is a hardware virtualization technique
that allows multiple guest operating systems (OS)
to share/run on a single host system at the same
time.
Hypervisor Taxonomy

Hypervisor is a compute virtualization software


which facilitates manifold operating systems to
operate on physical machines simultaneously.
The hypervisor is the main constituent of the data
center consolidation.
Hypervisor has two main constituents—virtual
machine monitor (VMM) and kernel.
There are two types of hypervisor:
Type 1 and Type 2
Types of Hypervisors
6

 Type 1 hypervisors run directly on the


system hardware. It dose not require any base
server operating system. It has direct access to
hardware resources

 Type 2 hypervisors run on a host operating


system that provides virtualization services,
such as I/O device and memory management.
Basically a software installed on an operating
system.
Type-1 Hypervisor
7
Hypervisors
Features of Type-1 and 2 Hypervisor
9

Type-1 Hypervisor:
 provides better performance
 provides greater flexibility
 Servers that run Type 1 hypervisors are often single-purpose servers
that offer no other function.
 Type 1 hypervisors are production hypervisors or hypervisors that run
VMs offering services to users.
 support hardware virtualization.
Type-2 Hypervisor:
 Less efficient
 Less flexible
 offer a series of different services.
 rarely used in production.
 perform software virtualization.
Virtualization
Types of Virtualization
11
 Hardware Virtualization

 Software Virtualization

 Memory Virtualization
 Storage Virtualization

 Data Virtualization
 Network Virtualization

 Desktop Virtualization
 Application Virtualization
Hardware Virtualization
12

Hardware virtualization also known as server virtualization runs on


the concept that an individual independent segment of hardware or
a physical server, may be made up of multiple smaller segments of
hardware or servers, essentially consolidating multiple servers into
virtual servers that run on a single primary physical server.
In hardware virtualization, software called hypervisor is used. With
the help of hypervisor virtual machine, software embedded into
the hardware component of the server. The work of hypervisor is
that it manages the physical hardware resource which is shared
between the customer and the provider.
Hardware Virtualization
12

When the virtual machine software or virtual machine


manager (VMM) is directly installed on the hardware
system is known as hardware virtualization.
The main job of hypervisor
is to control and monitoring the processor, memory and other
hardware resources.
After virtualization of hardware system we can install different
operating system on it and run different applications on those OS.
Usage:Hardware virtualization is mainly done for the server
platforms, because controlling virtual machines is much easier than
controlling a physical server.
Server Virtualization

When the virtual machine software or virtual machine


manager (VMM) is directly installed on the Server
system is known as server virtualization.

Usage:
Server virtualization is done because a single physical server
can be divided into multiple servers on the demand basis and
for balancing the load.
Hardware
13
Virtualization:
Subtype
 Full Virtualizations–
• The underlying hardware is fully simulated.
• Guest software does not require any modifications.
 Para-virtualization –
• The hardware is not simulated instead the guest
software run their own isolated domains.
 Emulation Virtualization –
• The virtual machine simulates the hardware and
becomes independent of it.
• Guest software does not require any modifications.
Full virtualization
Full virtualization is a common and cost-effective type
of virtualization, which is basically a method by which
computer service requests are separated from the
physical hardware that facilitates them.

With full virtualization, operating systems and their


hosted software are run on top of virtual hardware.

It differs from other forms of virtualization (like


paravirtualization and hardware-assisted virtualization)
in its total isolation of guest operating systems from
their hosts.
Full virtualization
Full virtualization is fulfilled by
the use of both binary
translation and direct execution.

In full virtualization, guest OS


is completely isolated by the
virtual machine from the
virtualization layer and
hardware.

Microsoft and Parallels systems


are examples of full
virtualization..
Para virtualization

In para virtualization, the hardware is not simulated

the guest software runs its isolated system.

It is not necessary to simulate the hardware, but it


utilizes an API which modifies the guest operating
system.
Para-virtualization

Paravirtualization is the
category of CPU virtualization
which uses hypercalls for
operations to handle
instructions at compile time.

In paravirtualization, guest OS
is not completely isolated but
it is partially isolated by the
virtual machine from the
virtualization layer and
hardware.

VMware and Xen are some


examples of
paravirtualization..
Emulation virtualization

In emulation virtualization, hardware is simulated by


the virtual machine and it is independent.

Here, the guest operating system does not require any


other modification.

In this virtualizations, computer hardware as


architectural support builds and manages a fully
virtualized VM.
Full Virtualization Vrs.
Paravirtualization
1. virtual machines permit the 1. a virtual machine does not
execution of the instructions with implement full isolation of OS but
the running of unmodified OS in rather provides a different API which
an entirely isolated is utilized when OS is subjected to
alteration.
2. Full Virtualization is less secure 2. PV is more secure than the FV
3. FV uses binary translation and a 3. PV uses hypercalls at compile time
direct approach as a technique for for operations
operations.
4. FV is slow than PV in operation 4. PV is faster in operation as
compared to FV
5. FV is more portable and 5. Paravirtualization is less portable
compatible and compatible
6. Examples of full virtualization 6. Examples of paravirtualization are
are Microsoft and Parallels Microsoft Hyper-V, Citrix Xen, etc.
systems.
Full Virtualization Vrs.
Paravirtualization 7. The guest operating system
7. It supports all guest
operating systems without has to be modified and only a
modification. few operating systems support
it.
8. The guest operating system 8. Using the drivers, the guest
will issue hardware calls. operating system will directly
communicate with the
9. It is less streamlined hypervisor
compared to para-
virtualization. 9. It is more streamlined.
10. It provides the best isolation
10.It provides less isolation
compared to full virtualization.
Hardware
14
Virtualization:
Subtypes

Full Virtualization Para Virtualization Emulation


Software Virtualization
15

• Software Virtualization involves the


creation and operation of multiple virtual
environments on the host machine.
• It is used to enable a complete computer
system in order to allow the guest operating
system to run.
• For instance, letting LINUX OS to run as a
guest that is natively using a Microsoft
Windows OS.
Software
16
Virtualization :Subtypes
 Operating System Virtualization –
hosting multiple OS on the
native OS
 Application Virtualization –
hosting individual applications
in a virtual environment separate from the native
OS
 Service Virtualization –
hosting specific services
related to a particular application.
Operating System
16 Virtualization
 Operating System Virtualization –
hosting multiple OS on the
native OS
 When the virtual machine software or virtual

machine manager (VMM) is installed on the


Host operating system instead of directly on the
hardware system is known as operating system
virtualization.
 Usage:
 Operating System Virtualization is mainly used for
testing the applications on different platforms of OS.
Memory Virtualization
17
•P hy s i c a l m e m o r y a c ro s s d i ff e r e n t s e r ve r s i s aggregated
into a single virtualized memory pool.
•It provides the benefit of an enlarged contiguous working
memory.
•For instance, as some OS such as Microsoft Windows OS
allows a portion of your storage disk to serve as an extension of
your RAM.
Memory Virtualization:
18
Subtypes
 Application-level control – Applications access the
memory pool directly.

 Operating system level control – Access to the


memory pool is provided through an operating
system.
Storage Virtualization
•19

•Multiple physical storage devices are


grouped together, which then appear as a single
storage device.

•This provides various advantages such as


homogenization of storage across storage devices
of multiple capacity and speeds, reduced downtime,
load balancing and better optim izatio n of
performance and speed.

•Partitioning your hard drive into multiple


partitions is an example of this virtualization.
Storage Virtualization
•19

•Storage virtualization is the process of grouping


the physical storage from multiple network storage
devices so that it looks like a single storage device.

•Storage virtualization is also implemented by


using software applications.

•Usage:
•Storage virtualization is mainly done for back-
up and recovery purposes.
Storage Virtualization:
Subtypes 20

1. Block
Virtualization –
Virtualisation on block
level means that
storage capacity is
made available to the
operating system or
the applications in the
form of virtual disks.
Storage Virtualization:
Subtypes
2. File Virtualization

Virtualisation on file level


means that the
virtualisation entity
provides virtual storage to
the operating systems or
applications in the form of
files and directories
Data Virtualization
1

•It lets us to easily


manipulate data, as the
data is pr es e nt ed as
an ab s tract l ayer
co m pl etel y
independent of data
structure and
database systems.
•Decreases data input and
formatting errors.
Network Virtualization
22

 In network virtualization, multiple sub-networks


can be created on the same physical network,
which may or may not is authorized to
communicate with each other.
 This enables restriction of file movement across

networks and enhances security, and


allows better monitoring and identification of data
usage.
 It also increases reliability as a disruption in one

network doesn’t affect other networks, and the


diagnosis is easier.
Exploring Network Virtualization
In network virtualization, multiple virtual networks run
with the help of a physical
network as shown in Fig.
Network virtualization comprises
rationally grouping and segmenting
physical network(s) into distinct rational
units known as ‘virtual network(s)’ and
forming them to act as one or multiple
separate network(s).
 It permits multiple virtual networks to
share network resources.
Exploring Network Virtualization
In virtual data center (VDC), network virtualization comprises
virtualization of both VM and physical networks.
The physical network may consist of network routers, hubs, switches,
repeaters, adapters, and bridges.
A VM network exists within a physical server.
A computer on which a hypervisor runs one or more virtual machines
is called a host machine, and each virtual machine is called a guest
machine.
Network virtualization permits a manager to construct multiple
virtual networks in the data center (DC).
A virtual network offers alignment of all the nodes which belong to a
similar working unit in an enterprise.
Benefits of Network Virtualization

Reduction of hardware expense


 Energy expenses
 Recoverability
 Disaster recuperation
Features of Network Components
Virtual Switches
 Virtual LAN
Virtual Switches:
Virtual switches act as an interface between virtual
ethernet and the physical ethernet. Virtual switches
develop VM network and support the ethernet protocol .
They manage storage, administration, and VM migration
traffic to and from the hypervisor kernel.
A virtual switch can have multiple port groups.
Features of Network Components

The IBM system Networking Distributed Virtual


Switch 5000V is a superior, feature rich distributed
virtual switch for VMware environments along
with policy-based VM associatively. The IBM
Distributed Virtual Switch (DVS) 5000V allows
network managers accustomed with IBM System.
Features of Network Components

Virtual LAN allows one to have separate LANs among ports on the same switch.
VLAN trunking allows traffic from multiple VLANs to traverse a single network
connection.
VLAN membership can be defined in several ways:
(a) Port-based
(b) Protocol-based
(c) MAC-layer grouping
(d) Network-layer grouping
(e) Multicast grouping
(f) Policy grouping
Network
23
Virtualization :Subtypes
 Internal network:
Enables a single system to
function like a network

External network:
Consolidation of
multiple networks
into a single one, or
segregation of a
single network into
multiple ones
Desktop Virtualization
•24

•This is perh a p s t h e m o s t c o m m o n f o r m
o f virtualization for any regular IT employee.
•The user’s desktop is stored on a remote server,
allowing the user to access his desktop from any
device or location.
•Employees can work conveniently from the
comfort of their home. Since the data transfer takes
place over secure protocols, any risk of data theft is
minimized.
Desktop virtualization

Desktop virtualization is actually a type of illusion provided to the user using


different techniques.
It involves encapsulating and delivering either access to an entire information
system environment or the environment itself to a remote client device.
For IT organizations, desktop administration is expensive, manual, and time-
consuming.
As compared to desktop virtualization, server virtualization makes datacenters
more quick and effective by advanced levels of accessibility, quicker application
delivery, and enhanced utilization.
Desktop Virtualization

Desktop virtualization is a type of software technology used to


separate the desktop and its connected application software from the
physical device used by the client.
Remote desktop virtualization works in a manner similar to client–
server model in which applications can be executed on any remote
desktop with different operating systems and with the help of the
protocol of remote display, a user can interact with the application as
shown in Fig. 8.1.
In a virtualized desktop, virtualization breaks the connection between
hardware and the elements facilitate the IT staff to alter, update, and
organize these elements independently for greater business quickness
and improved response time.
Desktop Virtualization
Advantages of Desktop
Virtualization

Simpler provisioning of new desktops


Installation of new applications at cheap rates
Desktop image-management capabilities
Increased data security
Longer time given for customer desktop infrastructure
Protected reserved access to a business’ desktop settings
Advantages of Desktop
Virtualization

Facilitation of thin clients


Improved security
Better business continuity and disaster recovery
Abridged PC repairs
Suppleness of access
Improved deployment and management
Features of Desktop Virtualization
Drivers

Reduction in cost of desktops


Reduction in management cost of desktop
Easy setting of desktops
Reduced cost to refresh desktops
Techniques used for Desktop
Virtualization

The two desktop virtualization techniques basically used


for providing services to users are as follows:
• Remote desktop services (RDS)
• Virtual desktop infrastructure (VDI)

VDI and RDS are designed for providing services to users as


per their requirement.
Differences between RDS and VDI
Remote Desktop Services

Remote desktop services (RDS) is customarily called


terminal services. It is a blanket term for characteristics of
Microsoft Windows server which permits consumers to
distantly access Windows applications and graphical
desktops.
The advantages of RDS are as follows:
Data recovery in tragedy
Operation from anyplace
Economical
Remote Desktop Services

The disadvantages of RDS are as follows:


Requirement of powerful RDS
Requirement of RDS monitoring
Requirement of reliable network
Requirement of right adjustment in network
Knowledgeable administrator
Virtual Desktop Infrastructure

Virtual desktop infrastructure (VDI) refers to the hosting of


a desktop OS running in a VM on a server in the virtual
data center (VDC).
VDI allows a user to access a remote desktop environment
from an endpoint device via a remote desktop delivery
protocol.
The VDI architecture consists of several components that
work together to provide an end-to-end solution.
Virtual Desktop Infrastructure

Advantages of VDI are:


Low price in buying desktop computers
Centralized client operating system management
Swift client implementation
Reduction in the costs of desktop
Reduction in the cost of electricity
Enhanced security of data
Protected remote access
Lesser applications compatibility troubles
Virtual Desktop Infrastructure

Disadvantages of VDI are:


Printing normally involves third-party appends
Scanning is natively unsupported
Bi-directional audio is natively unsupported
Exhibit protocols are unsuitable for graphic design
Needs low-latency association between the virtual
infrastructure and customer
Needs enterprise class server hardware and storage areas
network for VMs permanently delivered to particular users
Needs trained IT staff
Components for Desktop
Virtualization

The VDI architecture consists of several components that


work together to
provide an end-to-end solution. The main components
are:
• Endpoint devices
• A connection broker
• VM hosting
Application Virtualization

Application Virtualization technology offers skills to


install applications without altering or making any variation
to the file system, underlying OS, or registry of the
computing platform in which they are installed as shown in
Figure

© Oxford University Press 2018. All rights reserved


Application Virtualization
Technology categories that fall under application
virtualization include the following:
• Streaming of application: Before startup, rather than
delivering the whole application, portions of the
application’s code, settings, and data are delivered
according to their requirement.
• VDI or desktop virtualization: The application is
introduced in blade PC or VM which also comprises the
operating system (OS). This makes management of
infrastructure and formation of virtual desktops easy to
grant access of virtual desktops. VDI may normally fill up
the gaps wherever applications’ streaming fails.
Application Virtualization

Advantages of Application Virtualization:


Improved workload management
Reduced hardware cost
Increased flexibility for working remotely
Simplified application deployment: Applications are never
installed on to an operating System; hence the deployment
of the applications is greatly simplified. Furthermore,
complete removal of all application bits from a PC during
retirement is assured.
Application Virtualization

Simplified operating system image management: Since


applications are completely different from the OS,
managing OS images is simpler, especially during OS
patches and upgrades. It helps to create a more dynamic
desktop environment, in which the desktop is an
aggregation of separately managed components.
Elimination of resource conflicts: Since each application
has its own virtual OS resources, resource and application
conflict issues are eliminated.
Application Virtualization

Limitations of Application Virtualization:


All software cannot be virtualized. For example,
applications that require a device driver or 16-bit
applications that require shared memory space cannot be
virtualized.
Some types of software cannot be virtualized, such as anti-
virus packages and applications that require heavy OS
integration.
Tools used for Application
Virtualization

The tools for application virtualization include:


Microsoft Application Virtualization (App-V)
VMWare ThinApp
Flexera Software Supporting Application Virtualization
Types of Virtualization: At
25
a Glanc
e
Benefits of Virtualization
26

 Easily outsource your hardware and eliminate any energy


costs associated with its operation.
 the efficiency, security and cost advantages.
 Run operating systems where the physical
hardware is unavailable.
 Easier to create new machines, backup machines, etc.
 Software testing using “clean” installs of operating systems
and software
 Emulate more machines than are physically available.
 Timeshare lightly loaded systems on one host.
 Easy migration of virtual machines (shutdown needed or not).
Storage Area Network
Storage area network (SAN) refers to the LAN design for
managing huge amounts of data transfer.
It uses interconnection technology for supporting data storage,
retrieval, and replication. NAS works on TCP/IP, whereas SAN for
disk blocks transformation works on low-level network protocols.
Storage area networks are actually designed for data
management. It is a rapid storage device network and can be
connected with servers.
SAN is helpful for transferring data from one storage device to
another without disturbing other devices.
SAN also supports fast backup as CPU cycles of server are not
involved in the backup process. At the time of recovery, SAN plays
an important role.
Storage Area Network
Network Attached Storage

Network-attached storage (NAS) is actually a dedicated


file storage device for providing local area network
nodes with file-based shared storage using a standard
ethernet connection.
NAS has its own IP address and each NAS exists on the
LAN as an independent network node.
Some examples of NAS devices include Seagate Central, Seagate
Business Storage NAS, and 8-Bay Rackmounts. All NAS products
provide a secure and centralized location for the files.
Accessing of NAS system storage data is easy—it can be
accessed from anywhere, whether one is in own house, on
another computer, or through mobile, Wi-fi technology, etc.
Network Attached Storage

NAS has the following benefits:


Broad access to information
Better efficiency
Better flexibility
Centralized storage
Simplified management
Scalability
High availability
Security
Network Attached Storage

NAS has the following components:


NAS head (CPU and memory)
Network interface cards (NICs) for providing connectivity
Operating system for handling NAS functionality
Network file system (NFS) and common Internet file system (CIFS)
protocols for file sharing. NFS mainly supports UNIX-based
operating environments, whereas CIFS is supported by Microsoft
Windows-based operating environments. Supported file sharing
protocols facilitate users to share files with different operating
platforms.
Storage protocols to connect and manage physical disk resources
Storage array
Comparison between SAN and NAS:

 Comparison between SAN and NAS:


• Storage area network (SAN) supports
networking, whereas network-attached
storage (NAS) is a storage device, in a
network.
• Operating systems consider SAN as a
disk, whereas a NAS device is a file
server.
• SAN supports block-level storage for
servers, whereas NAS devices support
file-level storage. For saving files such
as word documents or MS Excel
spreadsheets, NAS is generally used.

You might also like