0% found this document useful (0 votes)
16 views31 pages

Part II Cloud Virtualization (1)

The document discusses cloud data centers and virtualization, emphasizing their importance in data processing, storage, and communication for enterprises. It outlines various types of virtualization, including application, network, desktop, storage, server, and data virtualization, along with their benefits and implementation levels. Additionally, it explains the role of hypervisors in managing virtual machines and the advantages of virtualization in optimizing resource utilization and enhancing operational efficiency.

Uploaded by

mohammedmamie44
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views31 pages

Part II Cloud Virtualization (1)

The document discusses cloud data centers and virtualization, emphasizing their importance in data processing, storage, and communication for enterprises. It outlines various types of virtualization, including application, network, desktop, storage, server, and data virtualization, along with their benefits and implementation levels. Additionally, it explains the role of hypervisors in managing virtual machines and the advantages of virtualization in optimizing resource utilization and enhancing operational efficiency.

Uploaded by

mohammedmamie44
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Subject:

Part II: Cloud Data Centre and


Virtualization
1
Mock-up Questions
 What Will Happen If Enterprise/ Business Have No Data
Centre?
 Which Enabling Infrastructure Will you Recommending
to Facilitate Effective Data Processing, Storage, And
Communication?
Cloud Data Centre
 Data centre : is a facility made up of networked computers,
storage systems, and computing infrastructure that
businesses and other organizations use to organize,
process, store large amounts of data and to broadcast.
 A business typically relies heavily on applications,
services, and data within a data centre, making it a focal
point and critical asset for everyday operations.
 Enterprise data centres increasingly incorporate cloud
computing resources and facilities to secure and protect in-
house, onsite resources.
 As enterprises increasingly turn to cloud computing, the
boundaries between cloud providers' data centres and
enterprise data centres become less clear.
Cont’d….
 A data center facility enables an organization
to assemble its resources and infrastructure for
data processing, storage, and communication,
including:
 systems for storing, sharing, accessing, and
processing data across the organization;
 physical infrastructure to support data
processing and data communication; And
 Utilities such as cooling, electricity,
network access, and uninterruptible power
supplies (UPS).
Virtualization Basics
 A virtual machine is a software computer that, like a physical
computer, runs an operating system and applications.
 Each virtual machine contains its own virtual, or software-based,
hardware, including a virtual CPU, memory, hard disk, and network
interface card.
 Virtualization is a technique of how to separate a service from the
underlying physical delivery of that service.
 It is the process of creating a virtual version of something like
computer hardware.
 With the help of Virtualization, multiple operating systems and
applications can run on same machine and its same hardware at the
same time, increasing the utilization and flexibility of hardware.
 One of the main cost effective, hardware reducing, and energy
saving techniques used by cloud providers is virtualization
Cont’d…..
 Virtualization allows to share a single physical instance of a
resource or an application among multiple customers and
organizations at one time.
 It does this by assigning a logical name to a physical storage and
providing a pointer to that physical resource on demand.
 The term virtualization is often synonymous with hardware
virtualization, which plays a fundamental role in efficiently
delivering Infrastructure-as-a-Service (IaaS) solutions for cloud
computing.
 Moreover, virtualization technologies provide a virtual
environment for not only executing applications but also for
storage, memory, and networking.
 The machine on which the virtual machine is going to be built is known as Host
Machine and that virtual machine is referred as a Guest Machine.
Cloud Hypervisor
 A hypervisor, also known as a virtual machine monitor or VMM,
is software that creates and runs virtual machines (VMs).
 A hypervisor allows one host computer to support multiple guest
VMs by virtually sharing its resources, such as memory and
processing.
 The key is to enable hypervisor virtualization. In its simplest
form, a hypervisor is specialized firmware or software, or both,
installed on a single hardware that will allow you to host multiple
virtual machines.
 This allows physical hardware to be shared across multiple
virtual machines. The computer on which the hypervisor runs one
or more virtual machines is called the host machine.
 Virtual machines are called guest machines. The hypervisor
allows the physical host machine to run various guest machines.
 It helps to get maximum benefit from computing resources such
as memory, network bandwidth and CPU cycles.
Advantages of Hypervisor
 Although virtual machines operate on the same physical hardware, they are
isolated from each other.
 It also denotes that if one virtual machine undergoes a crash, error, or
malware attack, it does not affect other virtual machines.
 Another advantage is that virtual machines are very mobile because they do
not depend on the underlying hardware. Since they are not connected to
physical hardware, switching between local or remote virtualized servers
becomes much easier than with traditional applications.
Cont’d….
Benefits of Virtualization

 More flexible and efficient allocation of resources.


 Enhance development productivity.
 It lowers the cost of IT infrastructure.
 Remote access and rapid scalability.
 High availability and disaster recovery.
 Pay peruse of the IT infrastructure on demand.
 Enables running multiple operating systems.
Types of Virtualization
1. Application Virtualization
• Application virtualization helps a user to have remote
access of an application from a server.
• The server stores all personal information and other
characteristics of the application but can still run on a local
workstation through the internet.
• Application virtualization software allows users to access
and use an application from a separate computer than the
one on which the application is installed.
• Using application virtualization software, IT admins can
set up remote applications on a server and deliver the apps
to an end user’s computer.
• For the user, the experience of the virtualized app is the
same as using the installed app on a physical machine.
2. Network Virtualization
 The ability to run multiple virtual networks with each
has a separate control and data plan.
 It co-exists together on top of one physical network. It
can be managed by individual parties that potentially
confidential to each other.
 Network virtualization provides a facility to create and
provision virtual networks—logical switches, routers,
firewalls, load balancer, Virtual Private Network (VPN),
and workload security within days or even in weeks.
 Network Virtualization is a process of logically
grouping physical networks and making them operate as
single or multiple independent networks called Virtual
Networks.
3. Desktop Virtualization
 Desktop virtualization allows the users’ OS to be remotely
stored on a server in the data centre.
 It allows the user to access their desktop virtually, from any
location by a different machine.
 Users who want specific operating systems other than
Windows Server will need to have a virtual desktop.
 Main benefits of desktop virtualization are user mobility,
portability, easy management of software installation,
updates, and patches.
 Desktop virtualization is technology that lets users simulate a
workstation load to access a desktop from a connected
device.
 It separates the desktop environment and its applications
from the physical client device used to access it.
4. Storage Virtualization
 Storage virtualization is an array of servers that are managed by a
virtual storage system.
 The servers aren’t aware of exactly where their data is stored, and
instead function more like worker bees in a hive.
 It makes managing storage from multiple sources to be managed
and utilized as a single repository.
 Storage virtualization is the pooling of physical storage from
multiple storage devices into what appears to be a single storage
device or pool of available storage capacity that is managed from
a central console.
 The technology relies on software to identify available storage
capacity from physical devices and to then aggregate that capacity
as a pool of storage that can be used by traditional architecture
servers or in a virtual environment by virtual machines
5. Server Virtualization
• Server virtualization is the process of dividing a physical server into multiple
unique and isolated virtual servers by means of a software application.
• Each virtual server can run its own operating systems independently.
• This is a kind of virtualization in which masking of server resources takes
place.
• Here, the central-server(physical server) is divided into multiple different
virtual servers by changing the identity number, processors. So, each system
can operate its own operating systems in isolate manner.
• Where each sub-server knows the identity of the central server.
• It causes an increase in the performance and reduces the operating cost by the
deployment of main server resources into a sub-server resource.
• It’s beneficial in virtual migration, reduce energy consumption, reduce
infrastructural cost, etc
6. Data Virtualization
 Data is collected from various sources and managed that at a
single place without knowing more about the technical
information like how data is collected, stored & formatted then
arranged that data logically so that its virtual view can be
accessed by its interested people and stakeholders, and users
through the various cloud services remotely.
 Many big giant companies are providing their services like
Oracle, IBM, Cdata, etc.
 It can be used to performing various kind of tasks such as:
 Data-integration
 Business-integration
 Service-oriented architecture data-services
 Searching organizational data
Components of Modern Virtualization
Three main components of modern virtualization come together to create the
virtual machines and associated infrastructure that power the modern world.
1- Virtual Compute
 When we talk about virtualized compute resources, we mean the CPU
– the “brain” of the computer.
 In a virtualized system, the Hypervisor software creates virtual CPUs
in software, and presents them to its guests for their use.
 The guests only see their own virtual CPUs, and the Hypervisor
passes their requests on to the physical CPUs
• The benefits of Virtual Compute are immense.
 Because the Hypervisor can create more virtual CPUs (often creating
many more than the number of physical CPUs), the physical CPUs
spend far less time in an idle state, making it possible to extract much
more performance from them.
 In a non-virtualized architecture, many CPU cycles (and therefore
electricity and other resources) are wasted because most applications
do not run a modern physical CPU at full tilt all the time.
Cont’d….
2-Virtual Storage
 In the beginning, there were disk drives.
 Later, there was RAID (Redundant Array of Independent Disks). RAID allowed us
to combine multiple disks into one, gaining additional speed and reliability.
 Later still, the RAID arrays that used to live in each server moved into specialized,
larger storage arrays which could provide virtual disks to any number of servers
over a specialized high-speed network, known as a SAN (Storage Area Network).
 All of these methods are simply different ways to virtualize storage.
 Over the years, the trend has been to abstract away individual storage devices,
consolidate them, and distribute work across them. The ways we do this have gotten
better, faster, and become networked – but the basic concept is the same
3- Virtual Networking
 Network virtualization uses software to abstract away the physical network from
the virtual environment.
 The Hypervisor may provide its guest systems with many virtual network devices
(switches, network interfaces, etc.) that have little to no correspondence with the
physical network connecting the physical servers.
 Within the Hypervisor’s configuration, there is a mapping of virtual to physical
network resources, but this is invisible to the guests.
 If two virtual computers in the same environment need to talk to each other over
the network, that traffic may never touch the physical network at all if they are on
the same host system.
Implementation Levels Of Virtualization
 Talking of the Implementation levels of
virtualization in cloud computing, there are a total
of five levels that are commonly used.
1. Instruction Set Architecture Level (ISA)
2. Hardware Abstraction Level (HAL)
3. Operating System Level
4. Library Level
5. Application Level
1Instruction Set Architecture Level (ISA)
 ISA virtualization can work through ISA emulation. This is
used to run many legacy codes that were written for a different
configuration of hardware.
 These codes run on any virtual machine using the ISA. With
this, a binary code that originally needed some additional layers
to run is now capable of running on the x86 machines.
 It can also be tweaked to run on the x64 machine.
 For the basic emulation, an interpreter is needed, which
interprets the source code and then converts it into a hardware
format that can be read.
 This then allows processing. This is one of the five
implementation levels of virtualization in cloud computing.
2Hardware Abstraction Level (HAL)
 True to its name HAL lets the virtualization perform at the level
of the hardware. This makes use of a hypervisor which is used
for functioning.
 At this level, the virtual machine is formed, and this manages
the hardware using the process of virtualization.
 It allows the virtualization of each of the hardware components,
which could be the input-output device, the memory, the
processor, etc.
 Multiple users will not be able to use the same hardware and
also use multiple virtualization instances at the very same time.
This is mostly used in the cloud based infrastructure.
 Virtualization at the HAL exploits the similarity in architectures
of the guest and host platforms to cut down the interpretation
latency.
 Virtualization technique helps map the virtual resources to
physical resources and use the native hardware for
computations in the VM.
3Operating System Level
 At the level of the operating system, the virtualization model is
capable of creating a layer that is abstract between the operating
system and the application.
 This is an isolated container that is on the operating system and
the physical server, which makes use of the software and
hardware. Each of these then functions in the form of a server.
 When there are several users, and no one wants to share the
hardware, then this is where the virtualization level is used.
 Every user will get his virtual environment using a virtual
hardware resource that is dedicated. In this way, there is no
question of any conflict.
 Operating system virtualization (OS virtualization) is a
server virtualization technology that involves tailoring a
standard operating system so that it can run different
applications handled by multiple users on a single computer
at a time
4Library Level
• The operating system is cumbersome, and this is
when the applications make use of the API that is
from the libraries at a user level.
• These APIs are documented well, and this is why
the library virtualization level is preferred in these
scenarios.
• API hooks make it possible as it controls the link of
communication from the application to the system.
5Application Level
The application-level virtualization is used when there is a desire to
virtualize only one application and is the last of the implementation
levels of virtualization in cloud computing. One does not need to
virtualize the entire environment of the platform.
 This is generally used when you run virtual machines that use high-
level languages. The application will sit above the virtualization layer,
which in turn sits on the application program.
 It lets the high-level language programs compiled to be used in the
application level of the virtual machine run seamlessly.
 Application virtualization is a process that deceives a standard app
into believing that it interfaces directly with an operating system's
capacities when, in fact, it does not. This ruse requires a
virtualization layer inserted between the app and the OS.
CPU Virtualization
 A VM is a duplicate of an existing computer system
in which a majority of the VM instructions are
executed on the host processor in native mode.
 Thus, unprivileged instructions of VMs run directly
on the host machine for higher efficiency.
 The critical instructions are divided into three
categories: privileged instructions, control-sensitive
instructions, and behavior-sensitive instructions.
 Privileged instructions execute in a privileged mode
and will be trapped if executed outside this mode.
 Control-sensitive instructions attempt to change the
configuration of resources used.
 Behavior-sensitive instructions have different
behaviors depending on the configuration of
resources, including the load and store operations
over the virtual memory.
Memory Virtualization
 Virtual memory virtualization is similar to the virtual
memory support provided by modern operating systems.
 In a traditional execution environment, the operating system
maintains mappings of virtual memory to machine memory
using page tables, which is a one-stage
mapping from virtual memory to machine memory.
 All modern x86 CPUs include a memory management unit
(MMU) and a translation look a side buffer (TLB) to
optimize virtual memory performance.
 However, in a virtual execution environment, virtual
memory virtualization involves sharing the physical system
memory in RAM and dynamically allocating
it to the physical memory of the VMs.
I/O Virtualization
 I/O virtualization involves managing the routing of I/O
requests between virtual devices and the shared physical
hardware.
 There are three ways to implement I/O virtualization:
1. Full Device Emulation
2. Para-virtualization, And
3. Direct I/O.
 Full device approach emulates well-known, real-world
devices.
 All the functions of a device or bus infrastructure, such as
device enumeration, identification, interrupts, and DMA, are
replicated in software.
 This software is located in the VMM and acts as a virtual
device.
 The I/O access requests of the guest OS are trapped in the
VMM which interacts with the I/O devices.
Cont’d…..

The full device emulation approach


Cloud Computing Design Challenges
 Data Security and Privacy
 Cost Management
 Multi-Cloud Environments
 Performance Challenges
 Interoperability and Flexibility
 High Dependence on Network
 Lack of Knowledge and Expertise
Any Questions ??

Next Part III will Continue….

You might also like