Unit-2 notes ppt
Unit-2 notes ppt
Prepared By
Prof. Dinesh Banabakode.
(Assistant Professor)
Artificial Intelligence Department
SYLLABUS
Introduction: Definition of Virtualization, Adopting Virtualization,
Types of Virtualization, Virtualization Architecture and Software,
Virtual Clustering, Virtualization Application, Pitfalls of
Virtualization. Grid, Cloud and Virtualization: Virtualization in
Grid, Virtualization in Cloud, Virtualization and Cloud Security.
Virtualization and Cloud Computing: Anatomy of Cloud
Infrastructure, Virtual infrastructures, CPU Virtualization, Network
and Storage Virtualization
Introduction
Virtualization in Cloud Computing
Virtualization is the "creation of a virtual (rather than actual)
version of something, such as a server, a desktop, a storage device,
an operating system or network resources".
Virtual network: This is defined as the network being separated logically and
is present inside the servers. Such networks can be expanded across multiple
servers.
1) Hardware Virtualization:
When the virtual machine software or virtual machine manager (VMM) is
directly installed on the hardware system is known as hardware virtualization.
The main job of hypervisor is to control and monitoring the processor,
memory and other hardware resources.
After virtualization of hardware system we can install different operating
system on it and run different applications on those OS.
Usage:
Hardware virtualization is mainly done for the server platforms, because
controlling virtual machines is much easier than controlling a physical server
Types of Virtualization
2) Operating System Virtualization:
When the virtual machine software or virtual machine manager (VMM) is
installed on the Host operating system instead of directly on the hardware
system is known as operating system virtualization.
Usage:
Operating System Virtualization is mainly used for testing the applications on
different platforms of OS.
Types of Virtualization
3) Server Virtualization:
When the virtual machine software or virtual machine manager (VMM) is
directly installed on the Server system is known as server virtualization.
Usage:
Usage:
Storage virtualization is mainly done for back-up and recovery purposes.
How does virtualization work in cloud computing?
Virtualization plays a very important role in the cloud computing technology,
normally in the cloud computing, users share the data present in the clouds like
application etc, but actually with the help of virtualization users shares the
Infrastructure.
The main usage of Virtualization Technology is to provide the applications
with the standard versions to their cloud users, suppose if the next version of
that application is released, then cloud provider has to provide the latest
version to their cloud users and practically it is possible because it is more
expensive.
To overcome this problem we use basically virtualization technology, By using
virtualization, all severs and the software application which are required by
other cloud providers are maintained by the third party people, and the cloud
providers has to pay the money on monthly or annual basis.
Virtualization Architecture and Software
Virtualization Architecture and Software
A virtualization architecture is a conceptual model specifying the
arrangement and interrelationships of the particular components
involved in delivering a virtual -- rather than physical -- version of
something, such as an operating system (OS), a server, a storage
device or network resources.
Virtualization Architecture and Software
Virtualization Architecture and Software
Virtualization is commonly hypervisor-based. The hypervisor isolates
operating systems and applications from the underlying computer
hardware so the host machine can run multiple virtual machines (VM) as
guests that share the system's physical compute resources, such as
processor cycles, memory space, network bandwidth and so on.
Type 1 hypervisors, sometimes called bare-metal hypervisors, run
directly on top of the host system hardware. Bare-metal hypervisors offer
high availability and resource management. Their direct access to system
hardware enables better performance, scalability and stability. Examples
of type 1 hypervisors include Microsoft Hyper-V, Citrix XenServer and
VMware ESXi.
Virtualization Architecture and Software
A type 2 hypervisor, also known as a hosted hypervisor, is installed on
top of the host operating system, rather than sitting directly on top of the
hardware as the type 1 hypervisor does. Each guest OS or VM runs
above the hypervisor. The convenience of a known host OS can ease
system configuration and management tasks. However, the addition of a
host OS layer can potentially limit performance and expose possible OS
security flaws. Examples of type 2 hypervisors include VMware
Workstation, Virtual PC and Oracle VM VirtualBox.
Virtualization Architecture and Software
Virtualization Architecture and Software
The main alternative to hypervisor-based virtualization is
containerization. Operating system virtualization, for example, is a
container-based kernel virtualization method. OS virtualization is similar
to partitioning. In this architecture, an operating system is adapted so it
functions as multiple, discrete systems, making it possible to deploy and
run distributed applications without launching an entire VM for each
one. Instead, multiple isolated systems, called containers, are run on a
single control host and all access a single kernel.
Software Virtualization
Software Virtualization is a technique that allows one computer server
to work with more than one virtual system.
The primary function of software Virtualization is to develop virtual
Software and make the work easier. It produces a simple virtual machine
on which the system can work as regularly.
Software Virtualization: It is precisely the same as the virtualization
bit. It is capable of abstracting the software installation procedure and
building virtual software installations.
Suppose the user wants to use Windows and Linux at the same time.
Virtualization can help build a virtual environment, and it will enable the
use of more than one Operating System.
Types of Software Virtualization
1. OS Virtualization
In OS Virtualization, more than the Operating system wants to work
individually to complete the task without affecting others. Thus, a particular
Operating system can perform its specified job.
2. Application Virtualization
Application Virtualization is the second Virtualization method where users can
remotely access their applications on the central server. It helps to run multiple
applications at the same time by building a virtual environment.
3. Service Virtualization
Service Virtualization is a technique to simulate the Behaviors of components
in the form of combination component-based applications.
Types of Software Virtualization
1. OS Virtualization
In OS Virtualization, more than the Operating system wants to work
individually to complete the task without affecting others. Thus, a particular
Operating system can perform its specified job.
2. Application Virtualization
Application Virtualization is the second Virtualization method where users can
remotely access their applications on the central server. It helps to run multiple
applications at the same time by building a virtual environment.
3. Service Virtualization
Service Virtualization is a technique to simulate the Behaviors of components
in the form of combination component-based applications.
Benefits of Software Virtualization
1. Time-Saving
Software Virtualization helps organizations to complete the task efficiently, and
also it helps to save time.
2. Quick Changes
The user is capable of making quick changes in the Software according to the
requirements. According to the demand, the Software can be altered and run.
3. High Security
The Software can be kept secure from any viruses and security attacks as the
firewall is available as a bodyguard and prevents from entering the viruses.
Thus the resided data remains highly secure. are minimal.
Benefits of Software Virtualization
4. Effective Utilization
With the help of Software Virtualization, the available resources are used best
by building a virtual environment. It results in making use of multiple
operating systems in one computer.
5. Easy Manage
Managing updates is a simple task. The user can update applications at one
location and deploy the updated virtual applications to all client systems.
6. Software Migration
In previous scenarios, getting switched from one platform to another was a
time-consuming and challenging task, impacting the end-user systems. But
with the help of Software Virtualization, the migration process is simplified.
Virtual Cluster in Cloud Computing
Virtual cluster is a many-to-one virtualization technology, which can form a
routing system from multiple common devices connected through a switching
network, while performing the same as a single logical router to all external
appearances.
Virtual clusters are built with VMs installed at distributed servers from one or
more physical clus-ters. The VMs in a virtual cluster are interconnected
logically by a virtual network across several physical networks. Figure 3.18
illustrates the concepts of virtual clusters and physical clusters. Each virtual
cluster is formed with physical machines or a VM hosted by multiple physical
clusters. The virtual cluster boundaries are shown as distinct boundaries
Virtual Cluster in Cloud Computing
The provisioning of VMs to a virtual cluster is done dynamically to have
the following interest-ing properties:
• The virtual cluster nodes can be either physical or virtual machines.
Multiple VMs running with different OSes can be deployed on the same
physical node.
•A VM runs with a guest OS, which is often different from the host OS, that
manages the resources in the physical machine, where the VM is implemented.
•The purpose of using VMs is to consolidate multiple functionalities on the
same server. This will greatly enhance server utilization and application
flexibility.
• VMs can be colonized (replicated) in multiple servers for the purpose of
promoting distributed parallelism, fault tolerance, and disaster recovery
Virtual Cluster in Cloud Computing
• The size (number of nodes) of a virtual cluster can grow or shrink dynamically, similar
to the way an overlay network varies in size in a peer-to-peer (P2P) network.
• The failure of any physical nodes may disable some VMs installed on the failing
nodes. But the failure of VMs will not pull down the host system.
Virtualization Application
Application virtualization is technology that allows users to access
and use an application from a separate computer than the one on
which the application is installed. Using application virtualization
software, IT admins can set up remote applications on a server and
deliver the apps to an end user’s computer. For the user, the
experience of the virtualized app is the same as using the installed
app on a physical machine
Virtualization Application
How does it works?
The most common way to virtualize applications is the server-based
approach. This means an IT administrator implements remote
applications on a server inside an organization’s datacenter or via a
hosting service. The IT admin then uses application virtualization
software to deliver the applications to a user’s desktop or other
connected device. The user can then access and use the application as
though it were locally installed on their machine, and the user’s actions
are conveyed back to the server to be executed.
Application virtualization is an important part of digital workspaces and
desktop virtualization.
Virtualization Application
Benefits of Application Virtualization :
1. Simplified Management
2. Scalability
3. Security
Pitfalls of Virtualization
1. Capacity and costs fail to meet expectations.
virtual environment.
virtualization.
For example, an enterprise can insert security controls (such as encryption) between the
application layer and the underlying infrastructure, or use strategies such as micro-segmentation
to reduce the potential attack surface.
Virtualized security can be implemented as an application directly on a bare metal hypervisor (a
position it can leverage to provide effective application monitoring) or as a hosted service on a
virtual machine. In either case, it can be quickly deployed where it is most effective, unlike
physical security, which is tied to a specific device.
How is physical security different from virtualized security?
Isolation, or separating independent workloads and applications on the same network. This is
particularly important in a multitenant public cloud environment, and can also be used to isolate
virtual networks from the underlying physical infrastructure, protecting the infrastructure from
attack.
Cloud Security
Cloud security, also known as cloud computing security, is a
collection of security measures designed to protect cloud-based
infrastructure, applications, and data. These measures ensure user
and device authentication, data and resource access control, and data
privacy protection. They also support regulatory data compliance.
Cloud security is employed in cloud environments to protect a
company's data from distributed denial of service (DDoS) attacks,
malware, hackers, and unauthorized user access or use.
Cloud Security
Planning of security in Cloud Computing :
• Resources that can be moved to the cloud and test its sensitivity risk are
picked.
• The type of cloud is to be considered.
• The risk in the deployment of the cloud depends on the types of cloud and
service models.
Types of Cloud Computing Security
There are 4 types of cloud computing security controls i.e.
1. Deterrent Controls : Deterrent controls are designed to block nefarious
attacks on a cloud system. These come in handy when there are insider
attackers.
2. Preventive Controls : Preventive controls make the system resilient to
attacks by eliminating vulnerabilities in it.
3. Detective Controls : It identifies and reacts to security threats and control.
Some examples of detective control software are Intrusion detection
software and network security monitoring tools.
4. Corrective Controls : In the event of a security attack these controls are
activated. They limit the damage caused by the attack.
Importance of Cloud Security
• Centralized security : Centralized security results in centralizing protection.
As managing all the devices and endpoints is not an easy task cloud security
helps in doing so. This results in enhancing traffic analysis and web filtering
which means less policy and software updates.
• Reliability : These are very reliable and the cloud can be accessed from
anywhere with any device with proper authorization.
Anatomy of Cloud Infrastructure
Cloud computing is changing itself to meet the demands of customers in terms
of software and hardware. These changes have benefitted developments in web-
based applications and facilitated decisions-making in business.
Thomas J. Watson of IBM has said ‘there may be a demand for five in world
market for computers.’ IBM designed computers for 20 companies, expecting to
get orders only from five companies. Surprisingly, IBM got order for 18
companies for the IBM 701 system. Operations in terms of hardware and data
are the main players and they are not cost effective. Cloud’s on-demand
infrastructure will make it cheaper and efficient.
Anatomy of Cloud Infrastructure
Microsoft and Google are the new players using cloud computing technology.
Microsoft’s Windows Azure platform will provide best results for C# and
ASP.Net development. Google’s App Engine and its Python language has
powered distributed web applications.
The most famous cloud computing provider is Amazon’s EC2. AMI (Amazon
Machine Image) is the block used in EC2 virtualization and is the point of
interaction to users of Amazon’s EC2.
Anatomy of Cloud Infrastructure
1. Cloud Stack :
Infrastructure stack for delivering web applications
by the providers of cloud computing. Figure shows
the managed cloud stack consisting of two parts:
first part consists of cache, dynamic code and
attached storage and logic for the dynamic code;
second part consists of stable and efficient OS,
security features and business logic written using
some programming language. Cloud computing
environment separates the computing environment
away from the developers and helps them focus on
improving their application.
Anatomy of Cloud Infrastructure
1. Cloud Stack :
Every cloud platform includes a virtual machine language and a gateway for
web services. Language functions are closely linked with parent OS and their
native libraries are taken away. External tools and ordinary compilers will not
function in the cloud language layer. Cloud services always bundles language
runtime dynamically for efficient interpretation across many application
instances.
Windows Azure, Salesforce’s Force.com and Google App Engine has strong
support for back office add-ons. Microsoft and Google support Exchange
Online and Google Apps, respectively. Force.com tied to the popular Salesforce
CRM application for sales and marketing teams.
3. There are two types of storage virtualization : block virtualization and file
virtualization.
Network and Storage Virtualization
2. Storage Virtualization :
• Block virtualization separates the logical storage from physical storage.
Accessing can be done without the knowledge of where the physical storage
is located and its nature (heterogeneous). Storage virtualization allows
storage administrators greater flexibility in managing the storage devices
and the users.
2. https://www.guru99.com/virtualization-cloud-computing.html
3. https://www.techtarget.com/whatis/definition/virtualization-architecture
4. https://www.brainkart.com/article/Virtual-Clusters-and-Resource-Management_11343/
5. https://gzipwtf.com/what-is-virtualization-in-grid-computing/
6. https://www.researchgate.net/publication/226151863_Grids_Clouds_and_Virtualization
7. https://indianjournals.com/ijor.aspx?target=ijor:ijst1&volume=13&issue=4&article=005
8. https://arxiv.org/ftp/arxiv/papers/1807/1807.11016.pdf
9. https://learning.oreilly.com/library/view/cloud-
computing/9789332537439/xhtml/chapter010.xhtml#ch10sec4-2
THANK YOU!!!
71