0% found this document useful (0 votes)
5 views

Unit IV for Students

The document outlines the course structure and content for 'Introduction to Cloud Computing,' focusing on virtualization technologies. It discusses the need for virtualization, types of hypervisors, benefits, limitations, and various forms of virtualization including server, storage, network, and data virtualization. Key concepts such as virtual machines, hypervisors, and the advantages and challenges of virtualization in cloud computing are also covered.

Uploaded by

namrata.mankar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Unit IV for Students

The document outlines the course structure and content for 'Introduction to Cloud Computing,' focusing on virtualization technologies. It discusses the need for virtualization, types of hypervisors, benefits, limitations, and various forms of virtualization including server, storage, network, and data virtualization. Key concepts such as virtual machines, hypervisors, and the advantages and challenges of virtualization in cloud computing are also covered.

Uploaded by

namrata.mankar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 120

Subject Name : Introduction to Cloud Computing

Subject Code : BDA20030

Unit No. : IV

Unit Name : Virtualization


Dr. Sumit Gupta
Department of Computer Science & Applications
1
Course Structure

2
Assessment Structure

3
Course Outcomes
4

Course Contents
5

Course Contents
6
Resources

Content – Unit 4
 Cloud Computing enabling technologies
 Need for Virtualization
 Pros and Cons of Virtualization
 Type of Virtualization
 Virtual Machine
 VM monitoring services
 Hypervisors

Cloud Computing Enabling Technologies


 Cloud Computing can be possible only when we use some technologies that
make it compatible for end user and service provider.

 These technologies are –


Virtualization
Service Orientated Architecture (SOA)
Utility computing
Web 2.0

• Virtualization is the "creation of a virtual (rather than actual) version of

something, such
as a server, a desktop, a storage device, an operating

• A virtual machine (VM) is created on a


system or network resources".

physical host device. The VM behaves exactly like


a
• In other
physical device would and can run different OSs from the host.

words, Virtualization is a technique, which allows to share a single

physicalinstance of a resource or an application among multiple

customers and organizations. Itdoes by assigning a logical name to a

physical storage and providing a pointer to that


physical resource when

demanded.

Basics of Virtualization
• VMs are also named guest machines. Multiple guest VMs can run on a
host device and
each VM behave like independent device.
Basic Terminologies of Virtualization
• Host machine: The machine on which the virtual machine is going to be
built is known as Host Machine.
• Virtual machine: The virtual machine is referred to as a Guest Machine.

Avirtual machine can be defined as the computer of

a virtual type that operates


over a hypervisor.
Basics of Virtualization
• Hypervisor (Virtual Machine Monitor/Manager

(VMM)): This can bedefined as the software or program that creates &

runs the virtual machines


software used to create virtualization on physical
machines .
 Enhance Performance  Access to more resources  Shortage of
space
 Eco-friendly initiatives
Need of Virtualization
• Virtualization works by partitioning the host device's resources between

VMs. Thispartitioning is performed by software known

as a hypervisor. There are two kinds ofhypervisors:

bare-metal ones that are installed directly on the host

hardware and hosted ones


that need some kind of OS
• A hypervisor acts as the intermediary between the
to run on the host.

VMs and the host device. When a VM iscreated, the hypervisor allocates

some host resources, like the CPU and memory, to it. If the
VM needs

more resources while operating, the hypervisor allocates more host


• Similarly, the disk storage of the host device is simulated as
resources.

virtual storage on the VM.When the VM tries to locate any files in its

virtual storage, the hypervisor translates this


request to locate the files in

the actual physical storage of the host.How does Virtualization


work?

Type of Virtualization
• Type 1 hypervisor : A type 1 hypervisor, or bare-metal hypervisor, is a

hypervisorprogram installed directly on the computer’s hardware instead

of the operating system.Therefore, type 1 hypervisors have better

performance and are commonly used byenterprise

applications. KVM uses the type 1 hypervisor to host

multiple virtual machines


on the Linux operating

• Type 2 hypervisor: Also known as a hosted hypervisor, the type


system.
2 hypervisor is installed
on an operating system. Type 2 hypervisors are

• The hypervisor pulls resources from


suitable for end-user computing.

the layers below and partitions them into virtualinstances. For this reason,

the hypervisor is also known as the virtualization layer. GuestOSs operate

on top of the hypervisor. Often, the guest OSs aren't aware of themselves

andbehave like independent devices. Applications are hosted on each

guest OS on a VM. This


layer is known as the application layer.Type of
Virtualization
• Flexibility: More flexible and efficient allocation of resources. • Enhance
development productivity.
• Economical: It lowers the cost of IT infrastructure. • Remote access and
rapid scalability.
• High availability and disaster recovery.
• Pay peruse of the IT infrastructure on demand. •
Enables running multiple operating systems •
Eliminate the risk of system failure

Benefits of Virtualization
• Time-intensive process: The transition of the existing hardware setup to
virtualized setup requires an extensive time investment, and hence this
a

can be • High Initial Investment:


regarded as a time-intensive process.

Clouds have a very high initial investment, but it is

also
true that it will help in reducing the cost of

• Learning New Infrastructure: As the companies shifted from


companies.

Servers to Cloud, itrequires highly skilled staff who have skills to work

with the cloud easily and for


this, you have to hire new staff or provide
training to current staff.

Limitations of Virtualization
• Risk of Data: Hosting data on third-party resources can lead to putting
the data at
risk, it has the chance of getting attacked by any hacker or
cracker very easily.
Full virtualization
• Full virtualization refers to the ability to run a program, most likely an
operating system, directly on top of a virtual machine and without any
modification, as though it were run on the raw hardware.
• To make this possible, virtual machine managers are required to provide
a complete emulation of the entire underlying
hardware.
Types of Virtualization
Full virtualization
• The principal advantage of full virtualization is complete isolation - leads
to enhanced security, ease of emulation of different architectures, and
coexistence of different systems on the same platform.
• Whereas it is a desired goal for many virtualization solutions, full
virtualization poses important concerns related to
performance and technical implementation.

Types of Virtualization
Full virtualization
• A physical host server’s resources are
divided up to create multiple virtualmachines that are completely

separated from each other and act independently


without any knowledge

• The hypervisor for this type is often called


of the other VMs on the host.

a bare-metal hypervisor because it isinstalled directly onto the physical

hardware and acts as a layer between the


hardware and the VMs and

• The only possible downside to this type


their unique operating systems.

is that the all-important hypervisor comes


with its own resource needs and
can sometimes cause a slowdown in performance. • With full
virtualization, the host server does not need to have an operating

system.Types of Virtualization

Types of Virtualization
• In this type, VMs aren’t completely unaware of each other on the host
server. While the VMs are isolated to a degree, they still work together
across the network.
• Because the VMs do some of the work of allocating resources
themselves, the hypervisor requires less
processing power to manage the entire system.

Types of Virtualization Para-virtualization

• Para-virtualization requires the host


server to have an operating system and it
must work together with the hypervisor
through hypercall commands, which then
allows the hypervisor to create and
manage the VMs.
performance
• This type emerged in response to the

issues experienced by early bare


metal

hypervisors. Instead of being installed directly


onto the bare physical hardware of the host
server, the hypervisor becomes a layer
between the host server’s OS and the VMs.

Types of Virtualization Today,


para-virtualization is less commonly
Para-virtualization
used because modern servers are now being
designed to more effectively support and work with bare-metal
hypervisors.

Types of Virtualization
 Partial virtualization provides a partial emulation of the underlying

hardware, thus
not allowing the complete execution of the guest operating
 Partial virtualization allows many applications to
system i.e. incomplete

run transparently, but not all the


features of the

operating system can be supported, as happens


with full virtualization.

Types of Virtualization

Partial virtualization

isolation.

Types of Virtualization
Reference : Understanding Virtualization: A Comprehensive Guide
Virtualization comes in various forms, each designed to address specific challenges and
Server virtualization: Server virtualization is a process that partitions a
requirements in modern IT

physical server into multiple virtual servers. It isan efficient and cost-effective way to use server

resources and deploy IT services in an organization. Without server


virtualization, physical servers

use only a small amount of their processing capacities, which leave


Consider a company that needs servers for three
devices idle.

functions: (1) Store business email securely (2) Run a

customer-facing Each of these functions has


application (3) Run internal business applications

different configuration requirements: (1) The email application requires more storage capacityand

a Windows operating system. (2) The customer-facing application requires a Linux operating

system and highprocessing power to handle large volumes of website traffic. (3) The internal
business application requires iOS and more
internal memory (RAM).

Types of Virtualization
To meet these requirements, the company sets up three different dedicated physical servers for

each application. Thecompany must make a high initial investment and perform ongoing

maintenance and upgrades for one machine at a time.The company also cannot optimize its

computing capacity. It pays 100% of the servers’ maintenance costs but uses only a
fraction of

their storage and processing capacities.environments.

Server Virtualization Before server virtualization


After server virtualization
Server Virtualization
Server Virtualization
Server Virtualization

Advantages:
Server Virtualization
Disadvantages:
Storage virtualization :
 Storage virtualization uses all your physical data storage and creates a large unit of virtual

storage that you can assign  Storage virtualization


and control by using management software.

combines the functions of physical storage devices such as network attached storage (NAS)

and
storage area network (SAN).  You can pool the storage hardware in your data center, even if

 IT administrators can
it is from different vendors or of different types.

streamline storage activities, such as archiving, backup, and recovery,

because they can combine


multiple network storage devices virtually

into a single storage device.

Types of Virtualization
 A Storage Area Network (SAN) is a high-speed network that connects servers to storage
devices, enabling efficient datatransfer and centralized management. SANs are ideal for large

enterprises with demanding storage needs. They useprotocols like Fibre Channel or iSCSI for fast

data transfer and operate separately from regular networks to avoid traffic Key
congestion

Components of SAN: Node ports, Cables, Interconnect devices (Hubs,

switches, directors), Storage arrays & SAN How


management software

SAN Works: SANs link servers to storage devices, allowing multiple

servers to share and access storage resourcesefficiently. This setup offers improved performance,

scalability, and centralized management of storage, making it suitable


for demanding applications

 Network Attached Storage (NAS) is a simpler system that


and extensive storage needs.
connects to your network, allowing multiple devices toeasily share and access files. NAS is more

affordable and user-friendly, making it a great choice for smaller businesses Key
and home setups

Components of NAS: Head unit(CPU, Memory), Network Interface Card (NIC), Optimized

operating system, Storage


protocols (ATA, SCSI, FC).

Types of Virtualization
How NAS Works: NAS devices house storage drives and connect to the network via an Ethernet

port. They operate withtheir own system designed to handle file management and network

connections, supporting various file-sharing protocols


like SMB, NFS, or AFP
In NAS (Network Attached Storage), data is identified by file name as In SAN (Storage Area Network), data is
well as byte offset.

identified by disk block.In NAS (Network Attached Storage), file system is managed by Head In SAN
unit(CPU, Memory).

(Storage Area Network), the file system is managed by


SAN (Storage Area Network) is more costly.NAS (Network Attached

Storage) is less expensive than SAN. SAN(Storage Area Network) is more complex than NAS. NAS (Network Attached
Protocols used in NAS are File server, CIFS (Common Internet File Protocols
Storage) is less complex than SAN. System), etc.

used in SAN are SCSI, SATA, etc. For backups and recovery in SAN, Block
For backups and recovery in NAS, Files are used.

by block copying technique


is used. Types of
Virtualization

Storage Area Network (SAN) Network Attached Storage (NAS)

SAN gives high performance in high-speed effort high-speed While NAS is not suitable for that environment which has high

trafficSAN needs more time and efforts in organizing and


speedNAS is easy to manage and provides a
controlling.SAN does not depend on the LAN and uses a
simple interface for organizingand controlling.NAS
high-speed fiber channelMostly used in enterprise

environments.It has lower latency.SAN supports needs TCP/IP networks and depends on the
virtualization.
The working of SAN is not affected by network LAN.Applications include small-sized organizations
traffic bottlenecks.
high-speed and homes.Compared to SAN, NAS
has higher latency.NAS does not support

virtualization.
The working of NAS is affected by

network traffic bottlenecks.

servers.

systems. traffic.

network.
Network virtualization :
 Any computer network has hardware elements such as switches, routers, and firewalls. An

organization with offices in


multiple geographic locations can have several different network

 Network virtualization is a process that


technologies working together to create its enterprise
combines all of these network resources to centralize administrative tasks.Administrators can

adjust and control these elements virtually without touching the physical components, which

greatly Key Principles and Functions: Network virtualization


simplifies network management.

involves logically grouping physical networks to operate as single


or multiple independent networks

Resource Sharing: Virtual networks can


called virtual networks. The primary functions include:

share network resources, enhancing utilization and performance. Resources canbe pooled

together and allocated more efficiently. This allows for better utilization of hardware, reducing the

need for
physical devices and lowering costs.

Types of Virtualization
Isolation: Each virtual network operates separately, ensuring privacy and security. Virtual networks
can be isolated and
segmented to prevent unauthorized access, reducing the risk of data

Centralized Management: Configuration and management of virtual networks can be


breaches.

done from a centralized workstation


using management software.network.

The following are two approaches to network virtualization Software-defined networking:

Software-defined networking (SDN) controls traffic routing by taking over routingmanagement from

data routing in the physical environment. For example, you can program your system to prioritize

your
video call traffic over application traffic to ensure consistent call quality in all online meetings.

Network function virtualization : Network function virtualization technology combines the functions

of networkappliances, such as firewalls, load balancers, and traffic

analyzers that work together, to improve network


performance.
Advantages of Network Virtualization : Improves manageability Reduces CAPEX

Improves utilization
Enhances performance
Enhances security
Types of Virtualization
Disadvantages of Network Virtualization : It needs to manage IT in the abstract. It needs to coexist
with physical devices in a cloud-integrated hybrid environment. Increased complexity.
Upfront cost.
Possible learning curve.
Data virtualization:
 Modern organizations collect data from several sources and store it in different formats. They
might also store data in different places, such as in a cloud infrastructure and an on-premises data
center.
 Data virtualization is a data management technique in cloud computing that integrates data
from different sources into a single virtual layer. It creates a single, logical, and virtual view of data.
 The virtual view of data can be access by applications such as web portals, dashboards,
e-commerce, mobile apps, etc.
 Data virtualization allows users to retrieve and manipulate data without knowing how and where
it is stored.
 Data virtualization creates a software layer between this data and the applications that need it.
 Data virtualization tools process an application’s data request and return
Types of Virtualization
solutions to increase
results in a suitable format. Thus, organizations use data virtualization

flexibility for data integration and support cross


functional data analysis.

The data virtualization works in the following manner:


1. Data Abstraction: The process starts by pulling data from different sources—like databases,

cloud storage or APIs—andcombining it into a single virtual layer. This layer makes everything

look unified and easy to access without worrying about 2. Data Integration:
where the data stores.

Instead of copying or moving data, the platform integrates it. It combines data from various
systems into
a single view, so you can work with it all in one place, even if it’s coming from

3. Querying and Transformation: Users can query the data using


completely different sources.

familiar tools like SQL or APIs. The platform handles anytransformations or joins in real time,

pulling everything together seamlessly—even if the data comes from multiple systems.
Layers of

1.
Data Virtualization: Following are the working layers in data virtualization architecture

Connection Layer: This layer is all about connecting the virtualization platform to the different data

sources you need.


Whether the data is structured, like databases, or unstructured, like files or

APIs, this layer handles it.

Types of Virtualization
2. Abstraction Layer: This is where the magic happens. The abstraction layer creates a virtual
version of your data, making
it look clean and unified, no matter how messy or complex the

3. Consumption Layer: This is the user-facing layer that provides access to the
sources are.

unified data. It’s designed to make it easy


for tools, applications and people to work with the data.

Advantages of Data Virtualization: There are different benefits and advantages of the data

virtualization, some are


discussed as follows –  Data virtualization integrates all your data

sources and creates a single view and allows real-time access.  It provides applications with
real-time access to multiple data sources in a single view regardless of data source and It
provides best resource utilization by running multiple virtual instances on a single physical server.
 Data virtualization solutions increase flexibility for data integration and support cross-functional
data analysis.  It reduces costs by creating multiple virtual instances
onto fewer physical servers.
 It provided user friendly interface to analyze and manipulate data.
 It reduces latency as it eliminates the complex data movement.
 It used metadata and advance data query optimization to retrieve data from sources. It reduces

the data integration cost.Disadvantages of Data Virtualization: With several advantages, the data

virtualization come with some drawbacks or


disadvantages also. We have discussed some of them
ass follows-
Types of Virtualization
 It creates flexibility and portability issue as organizations may become dependent on third party
providers.  It requires high implementation cost.
 It causes issues with availability and scalability as it depends on third-party providers.  It may
introduce new security risks.
format.
Industries using Data Virtualization: The data virtualization is used in many industries. The

following is a list of industries


where data virtualization ins used − Data Virtualization Tools: The
following are some data virtualization tools used by different organizations −
 IBM Cloud Pak for Data
 TIBCO Data Virtualization
Types of Virtualization
 CData Software
 Red Hat JBoss Data Virtualization
 Stone Bond Technologies
 Healthcare
 Finance
 Telecommunications
 Government
 Manufacturing
 Retail

 Informatica

 AtScale
Types of Virtualization – Application Virtualization What is
application virtualization?
• A core concept of application virtualization is application streaming, or

the ability tostream applications from a central point to multiple PCs.

Similar to video or audiostreaming, application streaming buffers content

when an application is launched by auser and begins playing the selected

content as soon as enough content is available. Therest of the application

content is then delivered in the background. The beauty of


application

• Application
streaming is that the process is transparent to the end users.
virtualization is the process of abstracting (or separating) an

application •
from the underlying computer hardware it is stored on.

Virtualizing an application allows an organization’s employees to access

that application
from almost any device and any location as long as they

• While users don’t have to physically install


have an internet connection.

the application on their devices, they can still


interact with the application

almost as if they did have it installed.


Types of Virtualization – Application Virtualization
Need for application virtualization
 Before virtualization, organizations had to install applications manually on every

user’s device. Twenty or


thirty years ago, that might not have been the burden because

 Today, however, the number of


organizations were using fewer applications.

applications has exploded and hundreds of millions of applications aredeveloped every

year. There’s no way an organization would be able to manage and maintain all of

their  Manually
applications today without virtualization and/or cloud-based services.

installing software also affects the end user experience. Even if installation is

self-service, they needto take the time to download and install the app on their device.
And most people have several devices theymight want to work from, such as a

smartphone, tablet, laptop, or desktop computer. Application virtualization


makes app

access so easy and efficient for end users, with no need to install or download or
 Local installation and management of applications would be too
manage or update.

time-consuming for IT today. The only way an


organization can work with so many

 Application
applications is by virtualizing them and making them available remotely.

virtualization enables fast, easy delivery of critical applications to practically any

endpoint anemployee wishes to use. Managing and updating that application is much

faster and more streamlined for ITbecause they only have to manage and update that
app once at the host server (not thousands of times on each
individual device).

Types of Virtualization – Application Virtualization• ThinApp:


Developed by VMware, ThinApp encapsulates application files and registries into a
single packet that can be easily deployed, managed, and updated independent of the
underlying OS. With
this approach, applications can be run on a physical PC, a shared network drive, a
virtual desktop without installing them on the local machine. This technique provides
several features, including portability, reduced help desk costs, ease of updating,
stronger endpoint security, and the ability to run multiple versions of the application on
the same machine. This capability is now offered by a number
of vendors and provides considerable cost savings, along with
improved management and control.
Examples:
Types of Virtualization – Application VirtualizationRemote
Desktop Services:
• RDS (formerly Terminal Services) is the most commonly used method of
application virtualization. This method presents applications to connected
users. The application actually runs in a session on the server in the data
center while it appears to be running on the local desktop. This is a cost
effective and reliable method of deploying applications to an enterprise.
Examples:
Types of Virtualization – Application
Virtualization
• Simple installation and deployment – An application is

only installed once on the host server and


then
• Easy,
deployed remotely through the distribution of an .exe file to user devices.

centralized management – IT can oversee many applications for thousands of

users from a • Increased flexibility and scalability –


single centralized location.

Eliminate the time and effort spent installing applicationsmany times to hundreds

or thousands of end devices. As new employees are onboarded, they


simply

• Mobility support –
need to be given remote access to already installed apps.

Virtualized applications supports mobility and portability; in fact, some

devices
can’t handle a full remote desktop environment, but almost every device
• Graphics-intensive apps might be glitchy – Latency in these
can handle a virtualized

types of applications can cause some stuttering • Device


during the rendering process.

drivers could affect use of peripherals – Any application that requires a device driver that

is OS
specific could make it difficult to use equipment such as printers or scanners.

Benefits:

app.
Limitations:

Types of Virtualization – OS Virtualization • Various virtual


cases of a working framework might be made on a single

physicalcomputer because of working framework (operating system)

virtualization. The kernel,


libraries, and system files of the host OS are

• Operating system
shared by each virtual instance, or container.

virtualization (OS virtualization) is a server

virtualization technologythat includes customizing a


conventional operating system to run numerous programs for
many users

on the same machine simultaneously.

Types of Virtualization – OS Virtualization Linux Operating


System virtualization Linux supports two most notable types of OS
virtualization, and they are Kernel-based Virtual Machine (KVM) and • KVM: This
is a full virtualization solution for Linux on x86 hardware containing virtualization
extensions. It turns the Linux kernel into a hypervisor, allowing the host machine
to run multiple, isolated virtual environments called guests or Virtual Machines
(VMs). Each VM has private virtualized hardware, including a network card, disk,
graphics adapter, etc., and they run independently of one
another.
• Containerization (e.g., Docker, LXC): Containers are a lighter form of
virtualization. Instead of emulating the entire operating system, containerization
allows multiple isolated user-space instances (containers) to run on a single
system without the overhead of simulating hardware or a full-fledged OS.
containerization.
Types of Virtualization – OS Virtualization Windows
Operating System Virtualizations Windows also provides robust
virtualization features through Hyper-V, which is available in Windows
Server.
• Hyper-V: This is a hardware virtualization product that allows users to
create and run a software version of a computer, called a virtual machine.
Each virtual machine behaves like a complete computer, running an
operating system and programs. Hyper-V creates a virtual layer between
the hardware of the host computer and the virtual machine, effectively
partitioning the system resources.
• VMware Workstation Player Operating System: VMware Workstation
Player is a virtualization software that allows users to run multiple
operating systems on a single physical computer. It supports a wide
range of operating systems as both host and guest systems.

Types of Virtualization – OS Virtualization • Flexible


provisioning: It is very simple and easy to connect different virtual disks to a system

through OS
virtualization. Starting another operating system or any other application can
• Rapid software deployment: Adding a new server or
be done easily by the client.

workstation happens within few seconds. Usingdeployment tools to install and configure

the system or doing it manually takes at least a few hours, with a

few
steps the client is allocated to a virtual disk and can be used in

• Easy and efficient implanting updates and hot fixes of the operating system
production.

and applications: In OS
virtualization, it is enough to add an update to the virtual disk

image and not to all servers. • Easy rollback scenarios: Rollback to previous state is
• No work off-line capability: OS virtualization products must be
easy in OS virtualization.

connected to the virtualization server for using •


the operating system virtually.
High-speed LAN recommended: A high-speed LAN is needed as the virtual disk is

connected to the OS • Limited numbers of


virtualization server through the network.

operating systems are supported: Limited number of OS supports virtualization.

Some
Linux distributions do not support the OS virtualization technique.

Benefits
• Imaging disadvantages apply to this technique: Virtual disk is created using image

based techniques. All


disadvantages of imaging techniques are also applicable for the
OS virtualization component.Limitations
Desktop virtualization: Most organizations have nontechnical staff that use desktop systems to run

common business
applications. For instance, you might have the following staff-  A customer

service team that requires a desktop computer with Windows 10 and customer-relationship
management A marketing team that requires Windows Vista for sales applications
You can use desktop virtualization to run these different desktop operating systems on virtual

machines, which your teamscan access remotely. This type of

virtualization makes desktop management efficient and secure, saving

money on desktop
hardware. The following are types of desktop

 Virtual desktop infrastructure: Virtual desktop infrastructure runs virtual desktops


virtualization-

on a remote server. Your users can


access them by using client devices.

Types of Virtualization
 Local desktop virtualization: In local desktop virtualization, you run the hypervisor on a local

computer and create avirtual computer with a different operating system. You can switch between

your local and virtual environment in the


same way you can switch between applications.software
 Virtualization is a computer architecture technology by which multiple

virtual machines 
(VMs) are multiplexed in the same hardware machine.

The purpose of a VM is to enhance resource sharing by many users and

improve
computer performance in terms of resource

 Hardware
utilization and application flexibility.

resources (CPU, memory, I/O devices, etc.) or software

resources
(operating system and software libraries) can be virtualized in
 The idea is to separate the hardware from the
various functional layers.

software to yield better systemefficiency. For example, computer users

gained access to much enlarged memory


space when the concept of

virtual memory was introduced. Similarly, virtualization

Implementation Level of Virtualization techniques can be


applied to enhance the use of compute engines, networks andstorage.
 A traditional computer runs with host operating system specially
 After virtualization, different user applications
tailored for its hardware

managed by their own operating


systems (guest OS) can run on the same
hardware, independent of the host OS.

Implementation Level of Virtualization

architecture.
 This is often done by adding additional software, called a virtualization

layer. Thisvirtualization layer is known as hypervisor or virtual machine


monitor (VMM).TheVMs are shown in the upper boxes, where

applications run with their own guest OS over


the

 The
virtualized CPU, memory, and I/O resources.

main function of the software layer for virtualization is to virtualize the

physical
hardware of a host machine into virtual resources to be used by

 The virtualization software creates the abstraction


the VMs, exclusively.

of VMs by interposing a virtualization


layer at various levels of a computer
system.  Common virtualization layers include
 Instruction Set Architecture (ISA) level,
Implementation Level of Virtualization  Hardware level,
 Operating System level,
 Library Support level, and
 Application level

Implementation Level of

Virtualization
Instruction Set Architecture (ISA) level:
• At the ISA level, virtualization is performed by emulating a given ISA by

the ISA of the


host machine. • Instruction set emulation leads to virtual

• The basic emulation method is


ISAs created on any hardware machine.

through code interpretation. An interpreter programinterprets the source

instructions to target instructions one by one. One Source


instruction may

its
require tens or hundreds of native target instructions to perform

function. Obviously, this process is relatively slow. For better


performance, • This approach
dynamic binary translation is desired.

translates basic blocks of dynamic source instructions to

targetinstructions. The basic blocks can also be extended to program

traces or super blocks to


increase translation efficiency. Instruction set

emulation requires binary translation

Implementation Level of Virtualization and optimization. A


virtual instruction set architecture (V-ISA) thus requires
adding a

processor-specific software translation layer to the compiler.


Hardware Abstraction Layer (HAL) level:
• Hardware-level virtualization is performed right on top of the bare
• The idea is to virtualize a computer’s resources, such as its
hardware.

processors, memory, and • The intention is to upgrade the


I/O devices.

hardware utilization rate by multiple users

concurrently. • This
Operating System (OS) level:

refers to an abstraction layer between traditional OS

and user applications. OS-levelvirtualization creates isolated containers


on a single physical server and the OS
instances to utilize the hardware

and software in datacenters.

Implementation Level of Virtualization • The containers


behave like real servers.
• OS-level virtualization is commonly used in creating virtual hosting

environments to
allocate hardware resources among a large number of
mutually users.
Library Level:
• Most applications use APIs exported by user level libraries. Since most

systems
provide well documented APIs, such an interface becomes
• API hooks make it possible as it controls the link of
another candidate for

communication from the application • An API (Application


to the system.

Programming Interface) is a set of rules and protocols thatallows different

software applications to communicate with each other. APIs enable

theexchange of data, features, and functionality between applications,

simplifying and
accelerating software development.
Implementation Level of Virtualization virtualization.

Application Level:
• The application-level virtualization is used when there is a desire to

virtualize only one


application and is the last of the implementation levels

of virtualization in Cloud• One does not need to virtualize the entire


• This is generally used
environment of the platform.
when you run virtual machines that use high-level languages.

The
application will sit above the virtualization layer, which in turn sits on

• It lets the high-level language programs compiled to be


the application

used at the application level of


the virtual machine run seamlessly.

Implementation Level of Virtualization

Computing.
program.
 Load balancing is an essential technique used in cloud computing to

optimize resource
utilization and ensure that no single resource is

 It is a process of distributing workloads


overburdened with traffic.

across multiple computing resources, such

as
servers, virtual machines, or containers, to
 Load balancing is the
achieve better performance, availability, and

method of distributing network traffic equally across a pool of


resources

 Load balancing can be implemented at


that support an application.

various levels, including the network layer,


application layer, and database

layer.

Load Balancing in Cloud Computing  Load balancing helps

to improve the overall performance and reliability of


cloud-based
applications by ensuring that resources are used efficiently.

 It helps to scale applications on demand and provides high availability

and fault
tolerance to handle spikes in traffic or server failures.scalability.

The most common load balancing techniques used in cloud computing


 Network Load Balancing: This technique is used to balance the
are:

network traffic acrossmultiple servers or instances. It is implemented at

the network layer and ensures that the


incoming traffic is distributed

 Application
evenly across the available servers.
Load Balancing: This technique is used to balance the workload

acrossmultiple instances of an application. It is implemented at the

application layer and


ensures that each instance receives an equal share

of the incoming requests.


 Database Load
Load Balancing in Cloud Computing
Balancing: This technique is used to balance the workload acrossmultiple

database servers. It is implemented at the database layer and ensures

that the
incoming queries are distributed evenly across the available
database servers.
 Improved Performance: Load balancing helps to distribute the

workload acrossmultiple resources, which reduces the load on each

resource and improves the overall  High


performance of the system.

Availability: Load balancing ensures that there is no

single point of failure in the


system, which provides

 Scalability:
high availability and fault tolerance to handle server failures.

Load balancing makes it easier to scale resources up or down as


needed, 
which helps to handle spikes in traffic or changes in demand.

Efficient Resource Utilization: Load balancing ensures that resources are

used
efficiently, which reduces wastage and helps to optimize costs.

Load Balancing in Cloud Computing Advantages:

 Complexity: Implementing load balancing in cloud computing can be

complex,especially when dealing with large-scale systems. It requires

careful planning and


configuration to ensure that it
 Cost: Implementing load balancing can add to the
works effectively.

overall cost of cloud computing,


especially when using specialized

 Single Point of Failure: While load balancing


hardware or software.

helps to reduce the risk of a single point


of failure, it can also become a

 Security: Load
single point of failure if not implemented correctly.

balancing can introduce security risks if not implemented correctly,

such
as allowing unauthorized access or exposing sensitive data.
Load Balancing in Cloud Computing

Disadvantages:
 VPC – Stands for Virtual Private Cloud, It is a secured cloud space

created within apublic cloud, where you can run the code, store your files,

host websites, and can do


anything else they could do in an ordinary

 Amazon Virtual Private Cloud is a


private cloud.

service that allows its users to launch their


virtual
machines in a protected as well as isolated virtual environment

 You have complete control over your VPC, from


defined by them.

creation to customization and evendeletion. It’s applicable to

organizations where the data is scattered and needs to be


managed well.

 VPC can be referred to as the private cloud inside the cloud. It is a

logical grouping ofservers in a specified network. The servers that you are

going to deploy in the VirtualPrivate Cloud(VPC) will be completely


isolated from the other servers that are deployedin the Amazon Web

Services. You can have complete control of the IP address to the


virtual

machines and route tables and gateways to the VPC.Network

Peering in Cloud Computing


 VPC Peering - It is an AWS networking function that provides safe and

direct  By using the VPC


communication between different VPCs.

peering feature, organizations can establish private connections


thatfacilitate the secure and smooth transfer of resources and data across

various VPCs in  Amazon peering provides an effective


the AWS Cloud.

way of linking Virtual Private Clouds (VPCs) and


offers strong networking

capabilities inside AWS.Network Peering in Cloud Computing


 AWS VPC Peering Architecture - The following architecture diagram

illustrates onusage of VPC peering connections to connect VPCs in your

account with a VPC in the


third-party account.
Network Peering in Cloud Computing
 AWS VPC Peering Connection Lifecycle - The lifecycle of AWS VPC
peering
connection involves with serval key stages. Those are as follow:

 Initiation: The life cycle process starts with initiating a request to peer

two VPCs.
This request involves with specifying


the VPCs to be peered and their respective

Approval: After the request is raised, the administrator of the receiving

VPC have toaccept that peering connection. This step involves both the

parties to agrees the  Establishment: One


connection establishment.
Both approved the peering connection, the VPC peeringconnection is

established. This enables the communication between two VPCs, ifthey

were within same network, i.e., allowing instances in one VPC to

communicate
with other VPC’s instance using private IP address.

Network Peering in Cloud Computing settings.


 Configuration: After once, the connection is established, administrator

may ensureconfiguring the route tables and security groups to control

flow of the traffic betweenpeered VPCs. This steps ensure the

communication should be done in secured

and  Utilization:
follow with desired network paths.

With this peered connections, the resources within

the peered VPCs cancommunicate with each other seamlessly. This


provides various use cases such as
data replication, resource sharing and

 Monitoring And
application integration across multiple VPCs.

Maintenance: Administrators continuously monitor theperformance and

security of the VPC peering connection. They may also perform

themaintenance tasks such as updating route tables or adjusting security

group rules as
needed to optimize the connection’s performance and

ensuring its reliability.

Network Peering in Cloud Computing  Termination (


Optional ): If need arises, the adminstrators can look for terminatingthe

VPC peering connection. This effectively serves as the network link

between the
VPCs and prevents further communication between them.
 Hypervisor is a key component that enables cloud computing. It allows

multiple virtual
machines to run simultaneously on a single physical server,

 A hypervisor, also called a virtual machine


maximizing hardware

monitor (VMM), is a software program that


creates

and runs virtual machines (VMs) on a host machine.


 Acting as a layer between the hardware and virtual machines,

hypervisors allow multiple


operating systems to share the resources of a

 This virtualization enables businesses to better


single physical server.

utilize server capacity, reduce hardware


costs, and simplify operations.

Hypervisor in Cloud Computing


 A Cloud Hypervisor is software that creates and runs virtual machines.

Hypervisors are a
crucial part of the technology that makes Cloud

Computing Virtualization possible.utilization.


Types of Hypervisor –
 TYPE-1 Hypervisor: The hypervisor runs directly on the underlying

host system. It is
also known as a “Native Hypervisor” or “Bare metal

hypervisor”.  It does not require any base server operating system. It


 Examples of Type 1 hypervisors include
has direct access to hardware

VMware ESXi, Citrix Xen Server, and

Microsoft  Pros of Type-1


Hyper-V hypervisor.

Hypervisor: Such kinds of hypervisors are very efficient because theyhave


direct access to the physical hardware resources (like Cpu, Memory,

Network, andPhysical storage). This causes the empowerment of the

security because there is nothing


any kind of the third party resource so

that attacker couldn’t compromise with anything.

Hypervisor in Cloud Computing


 Cons of Type-1 Hypervisor: : One problem with Type-1 hypervisors is

that they usuallyneed a dedicated separate machine to perform their

operation and to instruct different


VMs and control the host hardware

resources.resources.
A Host operating system runs on the underlying host
 TYPE-2 Hypervisor:

system. It is alsoknown as ‘Hosted Hypervisor”. Such kind of hypervisors doesn’t

run directly over the underlyinghardware rather they run as an application in a

physical machine. Basically, the software is installed


on an operating system.

Hypervisor asks the operating system to make hardware


 An example of a Type 2 hypervisor includes KVM,
calls.

VirtualBox, and VMware Workstation. The type-2hypervisor

is very useful for engineers, and security analysts for checking malware, or
malicious
source code and newly developed applications.  Pros of Type-2

Such kind of hypervisors allows quick and easy access to a


Hypervisor:

guestOperating System alongside the host machine running. These hypervisors

usually come withadditional useful features for guest machines. Such tools

enhance the coordination between the host


machine and the guest machine.

Hypervisor in Cloud Computing


There is no direct access to the physical
 Cons of Type-2 Hypervisor :
hardware resources so theefficiency of these hypervisors lags in performance as
compared to the type-1 hypervisors, andpotential security risks are also there an
attacker can compromise the security weakness if there is
access to the host
operating system so he can also access the guest operating system.
 Type 1 hypervisors offer much better performance than Type 2 ones

because there’s no
middle layer, making them the logical choice for

 But that’s not to say


mission-critical applications and

that hosted hypervisors don’t have their place – they’re

much simpler to
set up, so they’re a good but if, you

 One of the best ways to


need to deploy a test environment quickly.

determine which hypervisor meets your needs is to compare


theirperformance metrics. These include CPU overhead, the amount of

maximum host and guest


memory, and support for virtual processors.

Hypervisor in Cloud Computing

Choosing the right hypervisor :

workloads.
The following factors should be examined before choosing a suitable
1. Understand your needs: The company and its applications
hypervisor:
are the reason for your job.Besides your company’s needs, you and your

co-workers in IT also have your own needs.


Needs for

a virtualization hypervisor are: a. Flexibility


b. Scalability
c. Usability
d. Availability
Hypervisor in Cloud Computing
e. Reliability
f. Efficiency
Choosing the right hypervisor :
g. Reliable support
2. The cost of a hypervisor: For many buyers, the toughest part of
choosing a hypervisor isstriking the right balance between cost and

functionality. While a number of entry-levelsolutions

are free, or practically free, the prices at the opposite

end of the market can bestaggering. Licensing

frameworks also vary, so it’s important to be aware of exactly what


you’re

3. Virtual machine performance: Virtual systems


getting for your money.

should meet or exceed the performance oftheir physical counterparts, at

least in relation to the applications within each server. Everything


beyond
meeting this benchmark is profit.
Hypervisor in Cloud Computing

Choosing the right hypervisor :


4. Ecosystem: It’s tempting to overlook the role of a hypervisor’s

ecosystem – that is, theavailability of documentation, support, training,

third-party developers and consultancies, and


so on – in determining

whether or not a solution is cost-effective in the long


5. Test for yourself: You can gain basic
term.
experience from your existing desktop or laptop. Youcan run both

VMware vSphere and Microsoft Hyper-V in either VMware Workstation

or
VMware Fusion to create a nice virtual learning and testing

environment.

Hypervisor in Cloud Computing

Choosing the right hypervisor :


Containers and hypervisors both facilitate sharing physical infrastructure through
virtualization, but containersoperate at the application layer while hypervisors work at
the hardware layer, allowing multiple operating
systems per server. Here is the following
comparison to help you understand better:
Containers Vs Hypervisor
In the world of cloud computing, hypervisors act as architects, optimizing resources and

promoting flexibility.
Let’s find their advantages, encouraging businesses toward

 Resource Optimization: Hypervisors efficiently manage


efficiency and adaptability.

resources, allowing multiple virtual machines


(VMs) to run on a single physical server.

This optimization maximizes server use, reducing costs and


 Flexibility and Scalability: They offer the flexibility to
energy

scale resources up or down based on demand. This


flexibility is

vital for businesses, as it allows them to adapt to changing needs without investing in
 Isolation and Security: Hypervisors create isolated environments for each
additional
VM, preventing issues in one VMfrom affecting others. This isolation enhances security

by, reducing the risk of data breaches and ensuring a  Hardware


more stable system.

Consolidation: By consolidating multiple VMs onto a single server, hypervisors save

physical
space and reduce hardware requirements. This consolidation streamlines

management and maintenance

Advantage of Hypervisor
 Testing and Development: They provide a safe playground for testing new software or

applications without
impacting the live environment. Developers can experiment without
risking the stability of the production
consumption.

hardware.
efforts.

environment.
While hypervisors offer immense benefits in cloud computing, they also come with

potential drawbacks, from


performance considerations to management complexities.

 Performance Overhead: Running multiple virtual


Let’s explore these disadvantages.

machines on a single physical server can lead toperformance overhead. This additional

layer of virtualization may slightly slow down operations


compared to  Resource Consumption: While hypervisors
running directly on hardware.

optimize resource usage, there’s still a need for sufficient


hardware resources to support


multiple virtual machines. This could require an initial investment in hardware.

Complexity in Management: Managing several virtual machines on a single server can

become complex. It
requires specialized skills and adds an additional layer of complexity

 Licensing Costs: Depending on the hypervisor and


to IT infrastructure management.

its features, there might be licensing costs involved,


especially for enterprise-level

functionalities, adding to the overall expenses.

Disadvantage of Hypervisor
 Single Point of Failure: If the hypervisor itself encounters issues or fails, it can impact
all the VMs running
on that server, leading to downtime and potential data loss.
QA - Hypervisor
 Do hypervisors impact system performance?
While there might be slight performance overhead due to virtualization, modern

hypervisors aim for minimal


impact, providing efficient resource allocation for optimal

Hypervisors enforce isolation between virtual machines, preventing one


performance.

VM’s issues from affecting others, thus Yes, several


enhancing overall system security.

free and open-source hypervisors, like KVM, Xen, and VirtualBox, offer reliable

functionalities,
available to different needs without additional
Yes, hypervisors can host multiple operating systems simultaneously on
licensing costs.

a single physical server, allowing


diverse environments to operate independently.

 How do hypervisors enhance security in cloud environments?

 Are there free hypervisor options available?

 Can a hypervisor run different operating systems on the same server?


Installing a virtual machine (VM) involves setting up virtualization software and creating

a virtual environment
where you can run another operating system (OS). Here’s a

step-by-step guide: Step 1: Choose a Virtualization Software : Popular options include:


 VirtualBox (free, open-source, good for beginners)
 VMware Workstation Player (free for personal use, more performance optimization)
 Microsoft Hyper-V (built into Windows Pro & Enterprise)
 Parallels Desktop (for macOS users)
Step 2: Download and Install Virtualization Software
 Download the chosen software from its official website.
 VMware Workstation Player
 Run the installer and follow on-screen instructions.
 Enable virtualization in BIOS/UEFI if needed (for Intel VT-x or AMD-V).
Installation of VM
Step 3: Download an Operating System (OS)
 Choose an ISO file of the OS you want to install (e.g., Windows, Linux).  You can
download official ISOs from:
 Windows: Microsoft
 VirtualBox
 Linux: Ubuntu, Fedora

You might also like