CC Unit-II
CC Unit-II
All of the above resources are made available to end user via server
virtualization. Moreover, these resources are accessed by the customers as if they own
them.
Benefits
IaaS allows the cloud provider to freely locate the infrastructure over the Internet in a cost-
effective manner. Some of the key benefits of IaaS are listed below:
IaaS allows the customer to access computing resources through administrative access to
virtual machines in the following manner:
It is possible to maintain legacy between applications and workloads between IaaS clouds.
For example, network applications such as web server or e-mail server that normally runs
on customer-owned server hardware can also run from VMs in IaaS cloud.
Issues
IaaS shares issues with PaaS and SaaS, such as Network dependence and browser based
risks. It also has some specific issues, which are mentioned in the following diagram:
Compatibility with legacy security vulnerabilities
Because IaaS offers the customer to run legacy software in provider's infrastructure, it
exposes customers to all of the security vulnerabilities of such legacy software.
The VM can become out-of-date with respect to security updates because IaaS allows the
customer to operate the virtual machines in running, suspended and off state. However, the
provider can automatically update such VMs, but this mechanism is hard and complex.
The customer uses virtual machines that in turn use the common disk resources provided
by the cloud provider. When the customer releases the resource, the cloud provider must
ensure that next customer to rent the resource does not observe data residue from
previous customer.
Characteristics
Virtualization Concept
Creating a virtual machine over existing operating system and hardware is referred as
Hardware Virtualization. Virtual Machines provide an environment that is logically
separated from the underlying hardware.
Firmware
Firmware is software that provides basic machine instructions that allow the hardware to
function and communicate with other software running on a device. Firmware provides
low-level control for a device's hardware. For this reason, it is sometimes called "software
for hardware." Another distinguishing feature is that firmware is not generally designed to
be user friendly.
Software
Software is designed for users to interact with to accomplish specific tasks. It sits above the
firmware, abstracted from the hardware, and uses the firmware to communicate with the
underlying hardware. Software is more complex and not as bound to the underlying
hardware.
Examples of software include computer programs such as OSes. Applications for word
processing, video conferencing and listening to music are also examples of software. A
software program can usually be changed out without replacing a hardware component,
whereas firmware often can't.
Firmware that is embedded in flash memory chips can be updated more easily than
firmware written to ROM or EPROM. As flash memory plays a bigger role in the enterprise,
admins must learn about the types of flash and their use cases.
Hypervisor
The hypervisor is a firmware or low-level program that acts as a Virtual Machine Manager.
There are two types of hypervisor:
Type 1 hypervisor executes on bare system. LynxSecure, RTS Hypervisor, Oracle VM, Sun
xVM Server, VirtualLogic VLX are examples of Type 1 hypervisor. The following diagram
shows the Type 1 hypervisor.
The type1 hypervisor does not have any host operating system because they are installed
on a bare system.
Type 2 hypervisor is a software interface that emulates the devices with which a system
normally interacts. Containers, KVM, Microsoft Hyper V, VMWare Fusion, Virtual Server
2005 R2, Windows Virtual PC and VMWare workstation 6.0 are examples of Type 2
hypervisor. The following diagram shows the Type 2 hypervisor.
Full Virtualization
Emulation Virtualization
Paravirtualization
Full Virtualization
In full virtualization, the underlying hardware is completely simulated. Guest software
does not require any modification to run.
Emulation Virtualization
In Emulation, the virtual machine simulates the hardware and hence becomes
independent of it. In this, the guest operating system does not require modification.
Paravirtualization
In Paravirtualization, the hardware is not simulated. The guest software run their own
isolated domains.
VMware vSphere is highly developed infrastructure that offers a management
infrastructure framework for virtualization. It virtualizes the system, storage and
networking hardware.
1. Desktop. Allows multiple virtual machines to run cloud-based desktops on the same physical or virtual
server.
2. Application. Creates a virtual instance of the applications needed for core business operations, which
keeps app software off of local operating systems.
3. Server. Creates a virtual server in place of the physical one, allowing for management of the server
through the cloud.
4. Storage. Stores the enterprise’s data in a secure cloud, removing the need for physical data storage and
potentially reducing the costs associated with space in a data center.
5. Network. Uses physical and virtual components to create a hybrid network, allowing administration of
the network through software switches.
DESKTOP VIRTUALIZATION
Creating a virtual desktop infrastructure, or VDI, makes it possible to work and store files in
locations that everyone in your team can easily access no matter where they work.
Desktop virtualization allows people to access multiple applications and operating systems (OS)
on a single computer because the applications and OSs are installed on virtual machines that run
on a server in the data center.
A virtual machine (VM) is essentially a physical computer, like at your desk, but in software
form. VMs are organized using hypervisors, which help the physical computer and the VMs run
as intended.
When it comes to desktop virtualization, there are two main methods: local and remote.
Local and remote desktop virtualization are both possible depending on the business needs.
However, local desktop virtualization has many limitations, including the inability to use a
mobile device to access the network resources. Remote desktop virtualization is more robust and
popular in the marketplace, with users running operating systems and applications accessed from
a server located inside a secure data center.
For enterprise-level businesses, virtualizing desktops allows employees to log in remotely in case
of a natural disaster or health issue that keeps them from coming into the office to work.
Having a virtual desktop setup can be a vital part of the business disaster recovery plan or
response to any unexpected event that stops workers from coming into the office. Top solutions
providers in this space include VMware and Citrix.
APPLICATION VIRTUALIZATION
Through application virtualization, users can access a remote version of an application that isn’t
installed on their individual machine.
App virtualization is a key part of enabling remote work on a large scale, as seen during the
Covid-19 pandemic, along with desktop virtualization.
Virtualizing an app allows for seamless use for the end-user, making it possible for the employee
to work remotely with the same key programs installed in the office.
When virtualized, apps work in what is called a sandbox, an environment that runs separately
from the operating system. While operating in this sandbox, any changes will appear to run in the
operating system, though the app is pulling operating power from the sandbox.
1. Remote
2. Streaming
Remote applications run on a server that mimics the user desktop and can be accessed by
authorized users regardless of their location.
Streaming apps run just one instance on the server and provide local access to the app.
Remote app streaming is the more popular approach, thanks to the extended reach it grants.
With just one instance of the app to manage and fix, an organization’s IT professionals can save
time and effort through app virtualization compared to installing the app on each user’s
computer.
Any patches or updates only have to be done once instead of potentially hundreds or thousands
of times. Large enterprises can find the savings generated by app virtualization substantial as
employees can access virtualized apps through cost-effective computers.
SERVER VIRTUALIZATION
Virtualizing a server allows for a better division of resources, as it lets the administrator divide
one physical server into multiple virtual servers. These virtual servers can then be used to run a
distinct operating system and any applications needed. By doing this, businesses can decrease
operational costs while enjoying faster deployment times and better application performance.
Virtual servers share CPU, memory, storage, and networking capabilities, which are pulled from
the hypervisor of the physical server the virtual one is built on.
Among the types of virtualization discussed here, server virtualization has the highest adoption
rate in the current landscape. Over 90% of businesses have already moved to a virtual server in
place of a physical one. This virtual server typically includes a virtual machine equipped with
CPU, RAM, and virtual hardware to mimic a traditional server in the cloud.
Virtualization allows the system administrator to quickly add more virtual machines, eliminating
the time and cost associated with the traditional method of purchasing a new physical machine.
STORAGE VIRTUALIZATION
Storage virtualization is a game-changer for companies that create a lot of data daily. Instead of
using physical storage space, virtual storage uses software to store the data in the cloud. All of a
company’s storage disk arrays are placed in the same virtual pool, made into virtual disks, and
sent to the host server for storage.
With the data remotely stored, you can pull from any of the virtual storage sources within the
data center and group them together, customizing how and when key data is stored. The pooling
of storage resources into one virtual area allows for one administrator to manage them remotely.
1. Internal
2. External
Internal storage virtualization is only available within a vendor’s software, limiting the reach of
the data. External storage virtualization is typically also powered by a vendor but has fewer
limitations on where data can be pulled from and stored.
NETWORK VIRTUALIZATION
Network virtualization blends the physical and virtual network, using components from both to
create an environment that is much easier to administrate than a strictly physical one.
Using software, network virtualization disconnects the virtual network from the physical
hardware, making it possible to use switches to direct network traffic and manage resources
through traffic surges.
Network virtualization is key to developing new programs and apps. By testing newly developed
apps on a virtual network before releasing them to the public, developers can catch any potential
flaws or bugs and optimize the performance of the app based on how it performs in the virtual
environment.
Implementing each of these types of virtualization can benefit the enterprise in different ways,
but as a whole, moving from a traditional to a virtual approach helps your company be agile and
easy to scale.
In addition, virtualization streamlines the needs of your employees and prevents issues before
they can occur, freeing your IT department to work on more complex tasks.
But what’s the best approach to virtualizing your IT infrastructure or refining your current
landscape?
While there are several factors, including virtualization service providers, proprietary software
and so on, much of it comes back to training, skills, and certifications to carry out a virtualization
strategy at your organization.
Resource Virtualization- Server, Storage, Network, Hypervisors, Machine Image, Virtual Machine(VM),
Hypervisors:-
A hypervisor is a form of virtualization software used in Cloud hosting to divide and
allocate the resources on various pieces of hardware. The program which provides
partitioning, isolation, or abstraction is called a virtualization hypervisor. The hypervisor
is a hardware virtualization technique that allows multiple guest operating systems (OS)
to run on a single host system at the same time. A hypervisor is sometimes also called a
virtual machine manager(VMM).
Types of Hypervisor –
Typt-1Hypervisor:-
The hypervisor runs directly on the underlying host system. It is also known as a “Native
Hypervisor” or “Bare metal hypervisor”. It does not require any base server operating
system. It has direct access to hardware resources. Examples of Type 1 hypervisors
include VMware ESXi, Citrix XenServer, and Microsoft Hyper-V hypervisor.
Pros: Such kinds of hypervisors are very efficient because they have direct access to the
physical hardware resources(like Cpu, Memory, Network, and Physical storage). This
causes the empowerment of the security because there is nothing any kind of the third
party resource so that attacker couldn’t compromise with anything.
Cons: One problem with Type-1 hypervisors is that they usually need a dedicated
separate machine to perform their operation and to instruct different VMs and control the
host hardware resources.
TYPE-2 Hypervisor:
A Host operating system runs on the underlying host system. It is also known as ‘Hosted
Hypervisor”. Such kind of hypervisors doesn’t run directly over the underlying hardware
rather they run as an application in a Host system(physical machine). Basically, the
software is installed on an operating system. Hypervisor asks the operating system to
make hardware calls. An example of a Type 2 hypervisor includes VMware Player or
Parallels Desktop. Hosted hypervisors are often found on endpoints like PCs. The type-2
hypervisor is very useful for engineers, and security analysts (for checking malware, or
malicious source code and newly developed applications).
Pros & Cons of Type-2 Hypervisor:
Pros: Such kind of hypervisors allows quick and easy access to a guest Operating System
alongside the host machine running. These hypervisors usually come with additional
useful features for guest machines. Such tools enhance the coordination between the host
machine and the guest machine.
Cons: Here there is no direct access to the physical hardware resources so the efficiency
of these hypervisors lags in performance as compared to the type-1 hypervisors, and
potential security risks are also there an attacker can compromise the security weakness if
there is access to the host operating system so he can also access the guest operating
system.
Type 1 hypervisors offer much better performance than Type 2 ones because there’s
no middle layer, making them the logical choice for mission-critical applications and
workloads. But that’s not to say that hosted hypervisors don’t have their place – they’re
much simpler to set up, so they’re a good bet if, say, you need to deploy a test
environment quickly. One of the best ways to determine which hypervisor meets your
needs is to compare their performance metrics. These include CPU overhead, the amount
of maximum host and guest memory, and support for virtual processors. The following
factors should be examined before choosing a suitable hypervisor:
1. Understand your needs: The company and its applications are the reason for the data
center (and your job). Besides your company’s needs, you (and your co-workers in IT)
also have your own needs. Needs for a virtualization hypervisor are:
a. Flexibility
b. Scalability
c. Usability
d. Availability
e. Reliability
f. Efficiency
g. Reliable support
2. The cost of a hypervisor: For many buyers, the toughest part of choosing a hypervisor
is striking the right balance between cost and functionality. While a number of entry-level
solutions are free, or practically free, the prices at the opposite end of the market can be
staggering. Licensing frameworks also vary, so it’s important to be aware of exactly what
you’re getting for your money.
3. Virtual machine performance: Virtual systems should meet or exceed the
performance of their physical counterparts, at least in relation to the applications within
each server. Everything beyond meeting this benchmark is profit.
4. Ecosystem: It’s tempting to overlook the role of a hypervisor’s ecosystem – that is, the
availability of documentation, support, training, third-party developers and consultancies,
and so on – in determining whether or not a solution is cost-effective in the long term.
5. Test for yourself: You can gain basic experience from your existing desktop or laptop.
You can run both VMware vSphere and Microsoft Hyper-V in either VMware
Workstation or VMware Fusion to create a nice virtual learning and testing environment.
HYPERVISOR REFERENCE MODEL :
There are 3 main modules coordinates in order to emulate the underlying hardware:
1. DISPATCHER:
The dispatcher behaves like the entry point of the monitor and reroutes the
instructions of the virtual machine instance to one of the other two modules.
2. ALLOCATOR:
The allocator is responsible for deciding the system resources to be provided to the
virtual machine instance. It means whenever a virtual machine tries to execute an
instruction that results in changing the machine resources associated with the virtual
machine, the allocator is invoked by the dispatcher.
3. INTERPRETER:
The interpreter module consists of interpreter routines. These are executed, whenever
a virtual machine executes a privileged instruction.
1.Virtualization :
Virtualization, as name suggests, is a software that allows OS instances to run
concurrently on single computer. Its type includes CPU virtualization, memory
virtualization, device and I’O virtualization. It is applied in existing parts of system, so it
always results in better efficiency and performance. It overall improves performance as
due to technology that can balance resources.
2.Hypervisor :
Hypervisor, as name suggests, is a software, hardware, or firmware that generally make
virtualization possible. It simply creates virtualization layers that separates
CPU/processors, RAM and all other physical resources from virtual machines that we
create. Its type includes Native hypervisor and Hosted hypervisor. It is used to allocate
each VM resources such as CPU, memory, storage, and network to simply run guest OS
and applications.
It uses software to create virtual version of It is software used to create and run virtual
something rather than actual one. machines.
Its main function is to manage workloads Its main function is to allocate system
by transforming tradition computing resources properly to each virtual machine
radically simply to make it more scalable. that it manages.
STaaS was originally designed for SMEs who lacked the in-house expertise to develop and maintain an on-
prem storage solution, but who nevertheless needed a robust and extensive storage platform. Today, STaaS is
used by all kinds of business, and can be integrated with some of the best storage management software that
the market now has to offer.
In this article, we’ll define StaaS, its relationship to cloud computing, and explain the advantages and
disadvantages of this model.
In a typical situation, a company will decide that instead of conducting maintenance on a huge tape library of
back-ups and archival data, they will subcontract management of these data to a STaaS provider.
They will then sign a service level agreement (SLA) which defines how much storage space will be required to
house the data, the frequency at which it will be backed up, and (ideally) legal responsibility in case these data
are lost or stolen. In this way, STaaS providers agree to rent out storage space and the customer can greatly
simplify their storage infrastructure.
For most companies, STaaS will offer a storage solution that is lower cost, less complex, and more secure than
attempting to store huge amounts of data in-house. STaaS is available from a wide range of vendors, including
Dell EMC, Hewlett Packard Enterprise (HPE), NetApp and IBM, as well as cloud-based services such as
Amazon Web Services (AWS), Microsoft Azure, and Google Cloud.
Storage costs will typically be lower, especially for SMEs that are unable to afford the hardware required
for on-prem storage.
Files are synced between local and cloud storage easily and frequently, so you’ll always have access to the
most up-to-date data.
Quality STaaS providers will also offer disaster recovery plans and capabilities that will help you get back
to business quickly.
STaaS solutions are also inherently scalable, and you only need to pay for the resources utilized.
As long as you or your STaaS provider are using a secure cloud data system, STaaS can be a more secure
solution than an on-prem storage system. However, the level of security offered by cloud providers can
vary significantly, so make sure that you understand the level of protection they will afford your data.
If you exceed the amount of storage that is described in your contract, you could run into extra costs, and
these may be significant.
Potential downtime can also be a problem – since you do not have control of the servers which store your
data, you will be reliant on your STaaS provider.
Limited customization, since cloud infrastructure is owned and managed by the service provider.
Examples like Amazon EC2-Renting, EC2 Compute Unit, Platform and Storage, pricing, customers.
Virtualization In Cloud Computing and Types :-
Virtualization is a technique of how to separate a service from the underlying physical
delivery of that service. It is the process of creating a virtual version of something like
computer hardware. It was initially developed during the mainframe era. It involves using
specialized software to create a virtual or software-created version of a computing
resource rather than the actual version of the same resource. With the help of
Virtualization, multiple operating systems and applications can run on same machine and
its same hardware at the same time, increasing the utilization and flexibility of hardware.
In other words, one of the main cost effective, hardware reducing, and energy saving
techniques used by cloud providers is virtualization. Virtualization allows to share a
single physical instance of a resource or an application among multiple customers and
organizations at one time. It does this by assigning a logical name to a physical storage
and providing a pointer to that physical resource on demand. The term virtualization is
often synonymous with hardware virtualization, which plays a fundamental role in
efficiently delivering Infrastructure-as-a-Service (IaaS) solutions for cloud computing.
Moreover, virtualization technologies provide a virtual environment for not only
executing applications but also for storage, memory, and networking.
The machine on which the virtual machine is going to be built is known as Host Machine
and that virtual machine is referred as a Guest Machine.
BENEFITSOFVIRTUALIZATION
BENEFITS OF VIRTUALIZATION
1.More flexible and efficient allocation of resources.
2. Enhance development productivity.
3. It lowers the cost of IT infrastructure.
4. Remote access and rapid scalability.
5. High availability and disaster recovery.
6. Pay peruse of the IT infrastructure on demand.
7. Enables running multiple operating systems.
Types of Virtualization:
1.Application Virtualization.
2.Network Virtualization.
3.Desktop Virtualization.
4.Storage Virtualization.
5.Server Virtualization.
6.Data virtualization.
1.Application Virtualization:
Application virtualization helps a user to have remote access of an application from a
server. The server stores all personal information and other characteristics of the
application but can still run on a local workstation through the internet. Example of this
would be a user who needs to run two different versions of the same software.
Technologies that use application virtualization are hosted applications and packaged
applications.
2. Network Virtualization:
The ability to run multiple virtual networks with each has a separate control and data
plan. It co-exists together on top of one physical network. It can be managed by
individual parties that potentially confidential to each other.
Network virtualization provides a facility to create and provision virtual networks—
logical switches, routers, firewalls, load balancer, Virtual Private Network (VPN), and
workload security within days or even in weeks.
3. Desktop Virtualization:
Desktop virtualization allows the users’ OS to be remotely stored on a server in the data
centre. It allows the user to access their desktop virtually, from any location by a different
machine. Users who want specific operating systems other than Windows Server will
need to have a virtual desktop. Main benefits of desktop virtualization are user mobility,
portability, easy management of software installation, updates, and patches.
4. Storage Virtualization:
Storage virtualization is an array of servers that are managed by a virtual storage system.
The servers aren’t aware of exactly where their data is stored, and instead function more
like worker bees in a hive. It makes managing storage from multiple sources to be
managed and utilized as a single repository. storage virtualization software maintains
smooth operations, consistent performance and a continuous suite of advanced functions
despite changes, break down and differences in the underlying equipment.
5. Server Virtualization:
This is a kind of virtualization in which masking of server resources takes place. Here,
the central-server(physical server) is divided into multiple different virtual servers by
changing the identity number, processors. So, each system can operate its own operating
systems in isolate manner. Where each sub-server knows the identity of the central
server. It causes an increase in the performance and reduces the operating cost by the
deployment of main server resources into a sub-server resource. It’s beneficial in virtual
migration, reduce energy consumption, reduce infrastructural cost, etc.
6. Data virtualization:
This is the kind of virtualization in which the data is collected from various sources and
managed that at a single place without knowing more about the technical information like
how data is collected, stored & formatted then arranged that data logically so that its
virtual view can be accessed by its interested people and stakeholders, and users through
the various cloud services remotely. Many big giant companies are providing their
services like Oracle, IBM, At scale, Cdata, etc.
It can be used to performing various kind of tasks such as:
Data-integration
Business-integration
Service-oriented architecture data-services
Searching organizational data
Pros and cons of Virtualization in Cloud Computing
Virtualization is the creation of Virtual Version of something such as server, desktop,
storage device, operating system etc.
Thus, Virtualization is a technique which allows us to share a single physical instance of
a resource or an application among multiple customers and an organization.
Virtualization often creates many virtual resources from one physical resource.
Host Machine –
The machine on which virtual machine is going to create is known as Host Machine.
Guest Machine –
The virtual machines which are created on Host Machine is called Guest Machine.
Why Virtualization in Cloud Computing ?
Virtualization is very important concept in cloud computing. In cloud computing, a cloud
vendor who will provide cloud services have all physical resources like server, storage
device, network device etc. and these physical services are rented by cloud vendors so
that user’s will not worry about these physical services.
But it is very costly to provide physical services per customer on rent because firstly it
becomes very costly and also user’s will not use the fully services. So this problem can
be solved by Virtualization. It is very cool approach for not only efficient use of Physical
services but also reduce costs of vendors. Thus cloud vendor’s can vitalize their single
big server and provide smaller spec server to multiple customer’s
Pros of Virtualization in Cloud Computing :
Utilization of Hardware Efficiently –
With the help of Virtualization Hardware is Efficiently used by user as well as Cloud
Service Provider. In this the need of Physical Hardware System for the User is
decreases and this results in less costly.In Service Provider point of View, they will
vitalize the Hardware using Hardware Virtualization which decrease the Hardware
requirement from Vendor side which are provided to User is decreased. Before
Virtualization, Companies and organizations have to set up their own Server which
require extra space for placing them, engineer’s to check its performance and require
extra hardware cost but with the help of Virtualization the all these limitations are
removed by Cloud vendor’s who provide Physical Services without setting up any
Physical Hardware system.
Availability increases with Virtualization –
One of the main benefit of Virtualization is that it provides advance features which
allow virtual instances to be available all the times. It also has capability to move
virtual instance from one virtual Server another Server which is very tedious and risky
task in Server Based System. During migration of Data from one server to another it
ensures its safety. Also, we can access information from any location and any time
from any device.
Disaster Recovery is efficient and easy –
With the help of virtualization Data Recovery, Backup, Duplication becomes very
easy. In traditional method , if somehow due to some disaster if Server system
Damaged then the surety of Data Recovery is very less. But with the tools of
Virtualization real time data backup recovery and mirroring become easy task and
provide surety of zero percent data loss.
Virtualization saves Energy –
Virtualization will help to save Energy because while moving from physical Servers
to Virtual Server’s, the number of Server’s decreases due to this monthly power and
cooling cost decreases which will Save Money as well. As cooling cost reduces it
means carbon production by devices also decreases which results in Fresh and
pollution free environment.
Quick and Easy Set up –
In traditional methods Setting up physical system and servers are very time-
consuming. Firstly Purchase them in bulk after that wait for shipment. When
Shipment is done then wait for Setting up and after that again spend time in installing
required software etc. Which will consume very time. But with the help of
virtualization the entire process is done in very less time which results in productive
setup.
Cloud Migration becomes easy –
Most of the companies those who already have spent a lot in the server have a doubt
of Shifting to Cloud. But it is more cost-effective to shift to cloud services because all
the data that is present in their server’s can be easily migrated into the cloud server
and save something from maintenance charge, power consumption, cooling cost, cost
to Server Maintenance Engineer etc.
Cons of Virtualization :
Data can be at Risk –
Working on virtual instances on shared resources means that our data is hosted on
third party resource which put’s our data in vulnerable condition. Any hacker can
attack on our data or try to perform unauthorized access. Without Security solution
our data is in threaten situation.
Learning New Infrastructure –
As Organization shifted from Servers to Cloud. They required skilled staff who can
work with cloud easily. Either they hire new IT staff with relevant skill or provide
training on that skill which increase the cost of company.
High Initial Investment –
It is true that Virtualization will reduce the cost of companies but also it is truth that
Cloud have high initial investment. It provides numerous services which are not
required and when unskilled organization will try to set up in cloud they purchase
unnecessary services which are not even required to them.
Difference between Cloud Computing and Virtualization
Cloud computing: Cloud computing is a bundle of principles and approaches
to deliver compute, network, and storage infrastructure resources, services,
platforms and applications to users on-demand across any network. These
infrastructure resources, services, and applications are sourced from clouds,
which are pools of virtual resources orchestrated by management and
automation software so they can be accessed by users on-demand through
self-service portals supported by automatic scaling and dynamic resource
allocation.
Virtualization: Virtualization is a technology that allows creating multiple
simulated environments or dedicated resources from a single, physical
hardware system. Software called hypervisors connects directly to that
hardware and allows you to split 1 system into separate, distinct, and secure
environments known as Virtual machines(VMs). These VMs rely on the
hypervisor’s ability to separate the machine’s resources from the hardware and
distribute them appropriately.
Below is a table of differences between Cloud Computing and Virtualization:
Dedicated
hardware Multiple Single can also work
Number of Server Cloud computing has Few Fog computing has Large number of
Nodes number of server nodes. server nodes.
Feature Cloud Computing Fog Computing
Geographical
Distribution It is centralized. It is decentralized and distributed.
Dependence on the
quality of core
network Requires strong network core. Can also work in Weak network core.
Specific assigned
Resource Specific assigned resources are not resources are not
2. Sharing shareable. shareable.
In Cluster
Computing there is
In cloud computing there is homogeneous
3. Resource type heterogeneous resource type. resource type.
Security
7. Requirement Very low Very high
More hardware
No hardware requirement requirement
9. Hardware physically. physically.
In Cluster
In Cloud Computing User chosen Computing Cluster
13. Architecture architecture. oriented architecture
In cluster computing
Software In cloud computing application application domain
15. Dependent domain independent software. dependent software.
Sony PlayStation
16. Example Dropbox, Gmail clusters
Difference between Cloud Computing and Traditional
Computing
1. Cloud Computing :
Cloud Computing, as name suggests, is collective combination of configurable system
resources and advanced service that can be delivered quickly using internet. It simply
provides lower power expenses, no capital costs, no redundancy, lower employee costs,
increased collaboration, etc. It makes us more efficient, more secure, and provide greater
flexibility.
2. Traditional Computing :
Traditional Computing, as name suggests, is a possess of using physical data centers for
storing digital assets and running complete networking system for daily operations. In
this, access to data, or software, or storage by users is limited to device or official
network they are connected with. In this computing, user can have access to data only on
system in which data is stored.
Difference between Cloud Computing and Traditional Computing :
Cloud Computing Traditional Computing
It is ability to access data anywhere at User can access data only on system in which
any time by user. data is stored.
Cloud service is served by provider’s It requires own team to maintain and monitor
support team. system that will need a lot of time and efforts.
Its main goal is to provide magnitude Its main goal is to attain economic
improvement in cost effective, dynamic viability and improve way of how
provisioning of IT services. computing devices are used.
It allows company to diversity its network and It allows companies to improve disposal
server infrastructure. and recycling procedures.