AJITVirtualization
AJITVirtualization
net/publication/303854444
CITATIONS READS
0 5,389
2 authors, including:
Srinarayan Sharma
Indian Institute of Management Kashipur
33 PUBLICATIONS 449 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Srinarayan Sharma on 08 June 2016.
Abstract
Virtualization is seen as one of the green ITs which can help reduce
infrastructure and maintenance costs. It is regarded to be a cost-
effective way to dramatically reduce downtime, increase flexibility, use
hardware effectively, reduce overall system complexity, and lower
carbon emission. Though the popular business literature is replete with
anecdotal evidence of green benefits of virtualizing servers, storage,
operating systems, and in some cases entire IT infrastructure, there is
little academic research on this topic in the MIS area. In this paper we
provide a review of its principles, underlying technologies, major
applications, and costs and benefits. We also provide implications for
both practice and research, and identify some directions for future
research.
INTRODUCTION
an average annual rate of 27% through 2011 is similar (Lai & Thibodeau,
2008). According to a recent CA (2008) survey of 300 IT executives,
eighty eight percent of the respondents’ companies in the United States are
using some form of virtualization, while the same is true of fifty-nine
percent of respondents’ in Europe and forty-six percent in the Asia Pacific
region. Many more companies are planning to invest in virtualization in
the near future (CA, 2008).
What is Virtualization?
4
AJIT Vol. 1, No. 1, May 2011
5
AJIT Vol. 1, No. 1, May 2011
FIGURE 1:
Virtualization Architecture (Adapted from VMware, 2007)
Virtualization Layer
Host Hardware
1
VMware makes a distinction between hypervisor and VMM, though these two are used
interchangeably in general.
6
AJIT Vol. 1, No. 1, May 2011
Hypervisor
Host OS
Host Hardware
7
AJIT Vol. 1, No. 1, May 2011
8
AJIT Vol. 1, No. 1, May 2011
operating system and its applications can consume all physical memory,
and resource consumption management and performance isolation is
difficult (Crosby & Brown, 2007). If the physical machine uses a CPU
which was designed with operating system virtualization in mind,
emulated virtualization works fine. For others, providing emulated or full
virtualization becomes problematic and creates “virtualization holes”
(Crosby & Brown, 2007). It also degrades overall performance when
dealing with update-intensive operations such as creating a new
application process (Barham, et al., 2003).
Host Hardware
9
AJIT Vol. 1, No. 1, May 2011
Paravirtualization
Host Hardware
z
10
AJIT Vol. 1, No. 1, May 2011
11
AJIT Vol. 1, No. 1, May 2011
FIGURE 6:
Hardware Supported Virtualization in x86
(Adopted from VMware, 2007)
12
AJIT Vol. 1, No. 1, May 2011
Modification of Both OS and guest Modifies OS, but Both OS and guest
OS and guest applications guest applications applications
unmodified unmodified unmodified
13
AJIT Vol. 1, No. 1, May 2011
APPLICATIONS OF VIRTUALIZATION
Server Virtualization
14
AJIT Vol. 1, No. 1, May 2011
Hypervisor
Host Hardware
Network Virtualization
15
AJIT Vol. 1, No. 1, May 2011
Virtualization Layer
Host OS
Host Hardware
16
AJIT Vol. 1, No. 1, May 2011
Si Si Si Si Si Si
Virtualization Layer
Si Si
Physical Network
Si Si
Partner Network
Security Network
Communications Network
Wireless Network
17
AJIT Vol. 1, No. 1, May 2011
Storage Virtualization
The rapid growth of stored data has created a demand for storage systems
that can be expanded without shutting down systems or without regard to
the number of physical disks supporting the storage system (Treese, 2005).
Storage virtualization is ideally suited to meet this demand. Storage
virtualization combines physical storage from multiple network devices so
that they appear to be a single gigantic virtual storage device (Gruman,
2007; Waters, 2007). It creates an abstraction or virtualization layer
between storage clients or hosts and physical storage that hides the
idiosyncrasies of individual storage devices (Norall, 2007) (see Figure 11).
In another words, it abstracts logical storage from physical storage so they
can be shared among a number of servers and applications.
18
AJIT Vol. 1, No. 1, May 2011
Application Virtualization
19
AJIT Vol. 1, No. 1, May 2011
Fiber
iSCSI
Channel
Pooled Storage
FIGURE 12:
Architecture of an Application Virtualization
(Adopted from Microsoft, 2007b)
R+W
R+W Read
-only
20
AJIT Vol. 1, No. 1, May 2011
21
AJIT Vol. 1, No. 1, May 2011
providing each end user an isolated virtual desktop and help to eliminate
the availability and performance problems associated with shared
application technologies (Miller & Pegah, 2007; VMware, 2008b).
Unfortunately, because of end user licensing agreement clauses, for some
operating systems such as Mac OS X, there is no desktop virtualization
available (Miller & Pegah, 2007).
BENEFITS OF VIRTUALIZATION
22
AJIT Vol. 1, No. 1, May 2011
Virtual
Application
Server
Locally Locally
Cached Cached
Applications Applications
23
AJIT Vol. 1, No. 1, May 2011
FIGURE 14:
Desktop Virtualization Architecture (Adopted from Sun
Microsystems, 2008)
Desktop Clients
running remote display software
Servers Servers
Business Agility
24
AJIT Vol. 1, No. 1, May 2011
Better Security
25
AJIT Vol. 1, No. 1, May 2011
COSTS OF VIRTUALIZATION
Overhead
Though, virtualization breaks the link between the hardware and the
common requirement that applications run on dedicated servers, adding a
virtualization layer adds processing overhead that can range from a few
percentage points into double digits (up to 15% by some estimates)
(Babcock, 2006; Mitchell, 2005). Virtualization can result into significant
administrative overhead as a simple virtual machine requires as much
configuration work as a separate physical machine does (Bellovin, 2006).
Careful attention needs to be paid to process configurations to ensure that
system administration does not become worse than it is in the non-virtual
26
AJIT Vol. 1, No. 1, May 2011
Increased Complexity
27
AJIT Vol. 1, No. 1, May 2011
Security
Vendor Support
Virtual Sprawl
28
AJIT Vol. 1, No. 1, May 2011
IMPLICATIONS
Is Virtualization a Fad?
29
AJIT Vol. 1, No. 1, May 2011
For practitioners, who may have heard a good deal about virtualization in
various forums and may have thought of adopting it, this paper provides a
basic understanding of virtualization and its underlying principles. It also
provides an understanding of the different types of virtualization
technologies and their pros and cons. Furthermore it describes most
common applications of virtualization. The paper also makes practitioners
aware of not only the benefits of virtualization, but also the associated
costs, which are downplayed in most forums. It is hoped that this
awareness will help them focus their efforts in terms of their virtualization
needs for more detailed exploration and examination later.
30
AJIT Vol. 1, No. 1, May 2011
CONCLUSIONS
31
AJIT Vol. 1, No. 1, May 2011
REFERENCES
32
AJIT Vol. 1, No. 1, May 2011
Crosby, S. & Brown, D. (2007) The Virtualization reality. ACM Queue, Vol. 4, No. 10,
December/January 2006-2007, 34-41.
Crosman, P. (2008) "Virtual Sprawl -- Rapid server virtualization has set the stage for a
new malady known as 'virtual sprawl.' Here's what Wall Street firms are doing
about it," Wall Street & Technology (26) 9, pp. 20.
DMTF. (2007) DMTF Creates Open Standard for System Virtualization Management.
DMTF Press Releases, Nov. 27, 2007. Retrieved Mar. 22, 2009 from
http://www.dmtf.org/newsroom/pr/view?item_key=70d5d3ba78d39488626f838
397a3d1e9812e5d40.
Dennis, P. (2008) "Virtualization brings testing out of lab," Network World (25), 26.
Drepper, U. (2008) "The cost of virtualization," Queue (6) 1, 28-35.
Detar, J. (2007) Virtualization Real Opportunity In Chips. Investor’s Business Daily,
December 17.
Dubie, D. (2008) "Vendors scramble to manage virtualization," Network World (25) 35,
pp. 1.
Dubie, D. (2007a) Q&A: Virtualization invites management nightmare, Says Yankee
Group analyst. Network World, Retrieved Feb. 13, 2009 from
http://www.networkworld.com/news/2007/032707-qa-virtualization-
nightmare.html,
Dubie, D. (2007b) 10 questions to test your virtualization readiness. Network World,
posted 07/03/07. Retrieved March. 13, 2009 from
http://www.networkworld.com/news/2007/070307-test-virtualization-
readiness.html.
Foxwell, H.J. & Rozenfeld, I. (2008) Slicing and Dicing Servers: A Guide to
Virtualization and Containment Technologies. Technical white paper, October
2005. Retrieved Sep. 29, 2008 from http://www.sun.com/blueprints/1005/819-
3734.pdf.
Franko, M. (2008) "THE VIRTUAL SECURITY REALITY," Communications News
(45) 4, 39.
Gartner, Inc. (2009a). Gartner Perspective: IT Spending 2010.
Gartner, Inc. (2009b) Gartner Says Worldwide Virtualisation Software Revenue to
Increase 43 Per Cent in 2009. 2009 press releases. Retrieved Feb. 13, 2009 from
http://www.gartner.com/it/page.jsp?id=883312.
Gartner, Inc. (2008) Gartner Identifies the Top 10 Strategic Technologies for 2009.
2008 PRESS RELEASES. Retrieved Feb. 13, 2009 from
http://www.gartner.com/it/page.jsp?id=777212.
Gruman, G. (2007) How To Do Storage Virtualization Right. CIO. Retrieved Feb. 12,
2009 from
http://www.cio.com/article/136600/How_To_Do_Storage_Virtualization_Right/
1, Sep. 11, 2007.
Hernick, J. (2008) "Securing VMware," InformationWeek 1193, 31.
Hernick, J. & L. Garey (2008) "Tame Runaway VM Sprawl," InformationWeek 1199,.
40.
33
AJIT Vol. 1, No. 1, May 2011
34
AJIT Vol. 1, No. 1, May 2011
35
AJIT Vol. 1, No. 1, May 2011
36
AJIT Vol. 1, No. 1, May 2011
Waters, J.K. (2007) ABC: An introduction to Virtualization. CIO, March 15, 2007.
Retrieved Mar. 2, 2009 from http://www.cio.com/article/40701.
Womack, B. (2008) Studies Say Feds Can Save $1 Bil by Going Green. Investor’s
Business Daily, January 22.
Yoshida, H. (2008) Reinventing storage virtualization. Network World, 10/01/2008.
Retrieved Mar. 12, 2009 from
http://www.networkworld.com/news/tech/2008/100108-tech-update.html.
37