The document discusses cloud data centers and virtualization, emphasizing their importance in data processing, storage, and communication for enterprises. It outlines various types of virtualization, including application, network, desktop, storage, server, and data virtualization, along with their benefits and implementation levels. Additionally, it explains the role of hypervisors in managing virtual machines and the advantages of virtualization in optimizing resource utilization and enhancing operational efficiency.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
16 views31 pages
Part II Cloud Virtualization (1)
The document discusses cloud data centers and virtualization, emphasizing their importance in data processing, storage, and communication for enterprises. It outlines various types of virtualization, including application, network, desktop, storage, server, and data virtualization, along with their benefits and implementation levels. Additionally, it explains the role of hypervisors in managing virtual machines and the advantages of virtualization in optimizing resource utilization and enhancing operational efficiency.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31
Subject:
Part II: Cloud Data Centre and
Virtualization 1 Mock-up Questions What Will Happen If Enterprise/ Business Have No Data Centre? Which Enabling Infrastructure Will you Recommending to Facilitate Effective Data Processing, Storage, And Communication? Cloud Data Centre Data centre : is a facility made up of networked computers, storage systems, and computing infrastructure that businesses and other organizations use to organize, process, store large amounts of data and to broadcast. A business typically relies heavily on applications, services, and data within a data centre, making it a focal point and critical asset for everyday operations. Enterprise data centres increasingly incorporate cloud computing resources and facilities to secure and protect in- house, onsite resources. As enterprises increasingly turn to cloud computing, the boundaries between cloud providers' data centres and enterprise data centres become less clear. Cont’d…. A data center facility enables an organization to assemble its resources and infrastructure for data processing, storage, and communication, including: systems for storing, sharing, accessing, and processing data across the organization; physical infrastructure to support data processing and data communication; And Utilities such as cooling, electricity, network access, and uninterruptible power supplies (UPS). Virtualization Basics A virtual machine is a software computer that, like a physical computer, runs an operating system and applications. Each virtual machine contains its own virtual, or software-based, hardware, including a virtual CPU, memory, hard disk, and network interface card. Virtualization is a technique of how to separate a service from the underlying physical delivery of that service. It is the process of creating a virtual version of something like computer hardware. With the help of Virtualization, multiple operating systems and applications can run on same machine and its same hardware at the same time, increasing the utilization and flexibility of hardware. One of the main cost effective, hardware reducing, and energy saving techniques used by cloud providers is virtualization Cont’d….. Virtualization allows to share a single physical instance of a resource or an application among multiple customers and organizations at one time. It does this by assigning a logical name to a physical storage and providing a pointer to that physical resource on demand. The term virtualization is often synonymous with hardware virtualization, which plays a fundamental role in efficiently delivering Infrastructure-as-a-Service (IaaS) solutions for cloud computing. Moreover, virtualization technologies provide a virtual environment for not only executing applications but also for storage, memory, and networking. The machine on which the virtual machine is going to be built is known as Host Machine and that virtual machine is referred as a Guest Machine. Cloud Hypervisor A hypervisor, also known as a virtual machine monitor or VMM, is software that creates and runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest VMs by virtually sharing its resources, such as memory and processing. The key is to enable hypervisor virtualization. In its simplest form, a hypervisor is specialized firmware or software, or both, installed on a single hardware that will allow you to host multiple virtual machines. This allows physical hardware to be shared across multiple virtual machines. The computer on which the hypervisor runs one or more virtual machines is called the host machine. Virtual machines are called guest machines. The hypervisor allows the physical host machine to run various guest machines. It helps to get maximum benefit from computing resources such as memory, network bandwidth and CPU cycles. Advantages of Hypervisor Although virtual machines operate on the same physical hardware, they are isolated from each other. It also denotes that if one virtual machine undergoes a crash, error, or malware attack, it does not affect other virtual machines. Another advantage is that virtual machines are very mobile because they do not depend on the underlying hardware. Since they are not connected to physical hardware, switching between local or remote virtualized servers becomes much easier than with traditional applications. Cont’d…. Benefits of Virtualization
More flexible and efficient allocation of resources.
Enhance development productivity. It lowers the cost of IT infrastructure. Remote access and rapid scalability. High availability and disaster recovery. Pay peruse of the IT infrastructure on demand. Enables running multiple operating systems. Types of Virtualization 1. Application Virtualization • Application virtualization helps a user to have remote access of an application from a server. • The server stores all personal information and other characteristics of the application but can still run on a local workstation through the internet. • Application virtualization software allows users to access and use an application from a separate computer than the one on which the application is installed. • Using application virtualization software, IT admins can set up remote applications on a server and deliver the apps to an end user’s computer. • For the user, the experience of the virtualized app is the same as using the installed app on a physical machine. 2. Network Virtualization The ability to run multiple virtual networks with each has a separate control and data plan. It co-exists together on top of one physical network. It can be managed by individual parties that potentially confidential to each other. Network virtualization provides a facility to create and provision virtual networks—logical switches, routers, firewalls, load balancer, Virtual Private Network (VPN), and workload security within days or even in weeks. Network Virtualization is a process of logically grouping physical networks and making them operate as single or multiple independent networks called Virtual Networks. 3. Desktop Virtualization Desktop virtualization allows the users’ OS to be remotely stored on a server in the data centre. It allows the user to access their desktop virtually, from any location by a different machine. Users who want specific operating systems other than Windows Server will need to have a virtual desktop. Main benefits of desktop virtualization are user mobility, portability, easy management of software installation, updates, and patches. Desktop virtualization is technology that lets users simulate a workstation load to access a desktop from a connected device. It separates the desktop environment and its applications from the physical client device used to access it. 4. Storage Virtualization Storage virtualization is an array of servers that are managed by a virtual storage system. The servers aren’t aware of exactly where their data is stored, and instead function more like worker bees in a hive. It makes managing storage from multiple sources to be managed and utilized as a single repository. Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage device or pool of available storage capacity that is managed from a central console. The technology relies on software to identify available storage capacity from physical devices and to then aggregate that capacity as a pool of storage that can be used by traditional architecture servers or in a virtual environment by virtual machines 5. Server Virtualization • Server virtualization is the process of dividing a physical server into multiple unique and isolated virtual servers by means of a software application. • Each virtual server can run its own operating systems independently. • This is a kind of virtualization in which masking of server resources takes place. • Here, the central-server(physical server) is divided into multiple different virtual servers by changing the identity number, processors. So, each system can operate its own operating systems in isolate manner. • Where each sub-server knows the identity of the central server. • It causes an increase in the performance and reduces the operating cost by the deployment of main server resources into a sub-server resource. • It’s beneficial in virtual migration, reduce energy consumption, reduce infrastructural cost, etc 6. Data Virtualization Data is collected from various sources and managed that at a single place without knowing more about the technical information like how data is collected, stored & formatted then arranged that data logically so that its virtual view can be accessed by its interested people and stakeholders, and users through the various cloud services remotely. Many big giant companies are providing their services like Oracle, IBM, Cdata, etc. It can be used to performing various kind of tasks such as: Data-integration Business-integration Service-oriented architecture data-services Searching organizational data Components of Modern Virtualization Three main components of modern virtualization come together to create the virtual machines and associated infrastructure that power the modern world. 1- Virtual Compute When we talk about virtualized compute resources, we mean the CPU – the “brain” of the computer. In a virtualized system, the Hypervisor software creates virtual CPUs in software, and presents them to its guests for their use. The guests only see their own virtual CPUs, and the Hypervisor passes their requests on to the physical CPUs • The benefits of Virtual Compute are immense. Because the Hypervisor can create more virtual CPUs (often creating many more than the number of physical CPUs), the physical CPUs spend far less time in an idle state, making it possible to extract much more performance from them. In a non-virtualized architecture, many CPU cycles (and therefore electricity and other resources) are wasted because most applications do not run a modern physical CPU at full tilt all the time. Cont’d…. 2-Virtual Storage In the beginning, there were disk drives. Later, there was RAID (Redundant Array of Independent Disks). RAID allowed us to combine multiple disks into one, gaining additional speed and reliability. Later still, the RAID arrays that used to live in each server moved into specialized, larger storage arrays which could provide virtual disks to any number of servers over a specialized high-speed network, known as a SAN (Storage Area Network). All of these methods are simply different ways to virtualize storage. Over the years, the trend has been to abstract away individual storage devices, consolidate them, and distribute work across them. The ways we do this have gotten better, faster, and become networked – but the basic concept is the same 3- Virtual Networking Network virtualization uses software to abstract away the physical network from the virtual environment. The Hypervisor may provide its guest systems with many virtual network devices (switches, network interfaces, etc.) that have little to no correspondence with the physical network connecting the physical servers. Within the Hypervisor’s configuration, there is a mapping of virtual to physical network resources, but this is invisible to the guests. If two virtual computers in the same environment need to talk to each other over the network, that traffic may never touch the physical network at all if they are on the same host system. Implementation Levels Of Virtualization Talking of the Implementation levels of virtualization in cloud computing, there are a total of five levels that are commonly used. 1. Instruction Set Architecture Level (ISA) 2. Hardware Abstraction Level (HAL) 3. Operating System Level 4. Library Level 5. Application Level 1Instruction Set Architecture Level (ISA) ISA virtualization can work through ISA emulation. This is used to run many legacy codes that were written for a different configuration of hardware. These codes run on any virtual machine using the ISA. With this, a binary code that originally needed some additional layers to run is now capable of running on the x86 machines. It can also be tweaked to run on the x64 machine. For the basic emulation, an interpreter is needed, which interprets the source code and then converts it into a hardware format that can be read. This then allows processing. This is one of the five implementation levels of virtualization in cloud computing. 2Hardware Abstraction Level (HAL) True to its name HAL lets the virtualization perform at the level of the hardware. This makes use of a hypervisor which is used for functioning. At this level, the virtual machine is formed, and this manages the hardware using the process of virtualization. It allows the virtualization of each of the hardware components, which could be the input-output device, the memory, the processor, etc. Multiple users will not be able to use the same hardware and also use multiple virtualization instances at the very same time. This is mostly used in the cloud based infrastructure. Virtualization at the HAL exploits the similarity in architectures of the guest and host platforms to cut down the interpretation latency. Virtualization technique helps map the virtual resources to physical resources and use the native hardware for computations in the VM. 3Operating System Level At the level of the operating system, the virtualization model is capable of creating a layer that is abstract between the operating system and the application. This is an isolated container that is on the operating system and the physical server, which makes use of the software and hardware. Each of these then functions in the form of a server. When there are several users, and no one wants to share the hardware, then this is where the virtualization level is used. Every user will get his virtual environment using a virtual hardware resource that is dedicated. In this way, there is no question of any conflict. Operating system virtualization (OS virtualization) is a server virtualization technology that involves tailoring a standard operating system so that it can run different applications handled by multiple users on a single computer at a time 4Library Level • The operating system is cumbersome, and this is when the applications make use of the API that is from the libraries at a user level. • These APIs are documented well, and this is why the library virtualization level is preferred in these scenarios. • API hooks make it possible as it controls the link of communication from the application to the system. 5Application Level The application-level virtualization is used when there is a desire to virtualize only one application and is the last of the implementation levels of virtualization in cloud computing. One does not need to virtualize the entire environment of the platform. This is generally used when you run virtual machines that use high- level languages. The application will sit above the virtualization layer, which in turn sits on the application program. It lets the high-level language programs compiled to be used in the application level of the virtual machine run seamlessly. Application virtualization is a process that deceives a standard app into believing that it interfaces directly with an operating system's capacities when, in fact, it does not. This ruse requires a virtualization layer inserted between the app and the OS. CPU Virtualization A VM is a duplicate of an existing computer system in which a majority of the VM instructions are executed on the host processor in native mode. Thus, unprivileged instructions of VMs run directly on the host machine for higher efficiency. The critical instructions are divided into three categories: privileged instructions, control-sensitive instructions, and behavior-sensitive instructions. Privileged instructions execute in a privileged mode and will be trapped if executed outside this mode. Control-sensitive instructions attempt to change the configuration of resources used. Behavior-sensitive instructions have different behaviors depending on the configuration of resources, including the load and store operations over the virtual memory. Memory Virtualization Virtual memory virtualization is similar to the virtual memory support provided by modern operating systems. In a traditional execution environment, the operating system maintains mappings of virtual memory to machine memory using page tables, which is a one-stage mapping from virtual memory to machine memory. All modern x86 CPUs include a memory management unit (MMU) and a translation look a side buffer (TLB) to optimize virtual memory performance. However, in a virtual execution environment, virtual memory virtualization involves sharing the physical system memory in RAM and dynamically allocating it to the physical memory of the VMs. I/O Virtualization I/O virtualization involves managing the routing of I/O requests between virtual devices and the shared physical hardware. There are three ways to implement I/O virtualization: 1. Full Device Emulation 2. Para-virtualization, And 3. Direct I/O. Full device approach emulates well-known, real-world devices. All the functions of a device or bus infrastructure, such as device enumeration, identification, interrupts, and DMA, are replicated in software. This software is located in the VMM and acts as a virtual device. The I/O access requests of the guest OS are trapped in the VMM which interacts with the I/O devices. Cont’d…..
The full device emulation approach
Cloud Computing Design Challenges Data Security and Privacy Cost Management Multi-Cloud Environments Performance Challenges Interoperability and Flexibility High Dependence on Network Lack of Knowledge and Expertise Any Questions ??