0% found this document useful (0 votes)
3 views

Virtual Ization

Client virtualization enables a single computer to run multiple virtual machines (VMs) with distinct operating systems and applications, enhancing resource efficiency and management. Key types include presentation virtualization, Virtual Desktop Infrastructure (VDI), and application virtualization, each offering unique benefits such as cost savings, improved security, and simplified management. Virtualization is crucial for modern IT, supporting cloud computing, disaster recovery, and operational scalability across various industries.

Uploaded by

spartan7846
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Virtual Ization

Client virtualization enables a single computer to run multiple virtual machines (VMs) with distinct operating systems and applications, enhancing resource efficiency and management. Key types include presentation virtualization, Virtual Desktop Infrastructure (VDI), and application virtualization, each offering unique benefits such as cost savings, improved security, and simplified management. Virtualization is crucial for modern IT, supporting cloud computing, disaster recovery, and operational scalability across various industries.

Uploaded by

spartan7846
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

client virtualization

Client virtualization, also known as desktop or endpoint virtualization, allows a


single computer to run multiple virtual machines (VMs), each with its own
operating system and applications. This is achieved through virtualization
software that abstracts the physical hardware, making it appear as if each VM
has its own dedicated computer.

The three types of client virtualization


Presentation virtualization
As hinted in the name, it is an application delivery method that delivers desktops or
applications from a shared server. This enables access to client applications from a
central server that is connected with clients. This initiates a presentation session
through a web portal while giving them access to a virtualized application instance on a
shared Windows Server OS. The only resources shared with the client is the graphical
user interface as well as the mouse/keyboard.
Benefits of this presentation virtualization range from reduced user resource needs to
simplicity, since applications are installed only once despite multiple users sharing the
same application instance and even server level administration since multiple users are
sharing the resources of the same system.
Virtual Desktop Infrastructure (VDI)
Sharing similarities with presentation virtualization, VDI solutions are also a remote
display protocol that hosts centrally-managed virtual machines (VMs) that client PCs are
connected to on a one-on-one network relationship. Also known as desktop
virtualization, this method utilizes a hypervisor that is in charge of hosting a dedicated
operating system VM for each client individually. Due to the fact that each client is
totally separate from one another on the server, this option allows for flexibility,
management and security.
Why VDI? Firstly, it saves you more money since it has smaller software licensing
requirements and it also reduces the need for staff to manage and troubleshoot
problems. It also allows for secure mobile access to applications by enabling hardware-
based GPU sharing through a secure connection from any device as well as better
desktop security thanks to customizable permissions and settings. Lastly, it allows for
easier maintenance – after logging off at the end of the day the desktop can be reset
wiping clean any downloaded software customizations.
Application virtualization
Application virtualization is capable of allowing applications to run in environments that
are foreign to the them, for example Wine allows some Microsoft Windows apps to run
on Linux. By establishing a common software baseline across multiple computers within
an organization, application virtualization also reduces system integration and
administration costs. Finally, it enables simplified operating system migrations, whereby
applications can be transferred to removable media or between computers without
having to install them: effectively becoming portable software.
Not only has virtualization revolutionized the world of IT and computing, but it also has
the potential to do the same for your business. Give us a call and find out which option
is best for you and your unique business requirements.

How Client Virtualization Works:


1. A client virtualization software (e.g., Parallels Desktop, VirtualBox) is installed on the
host computer.
2. The software creates and manages VMs.
3. Each VM can run a different operating system (e.g., Windows, Linux, macOS) and its
own applications.
4. The hypervisor allocates CPU, memory, and storage resources to the VMs as needed.
Benefits of Client Virtualization:
• Resource Efficiency: VMs share the host computer's resources, reducing hardware
requirements.
• Software Testing: Allows testing software in different operating systems without
needing multiple physical machines.
• Education/Training: Enables students to learn different operating systems and
software in a controlled environment.
• Remote Access: Some client virtualization solutions offer remote access to VMs,
allowing users to work from anywhere.
• Reduced IT Costs: Can reduce hardware, software licensing, and support costs.
• Enhanced Security: VMs can be isolated from the host operating system, preventing
malware from affecting the main system.
Client Virtualization vs. Server Virtualization:
• Client Virtualization: Runs VMs directly on the user's computer.
• Server Virtualization: Hosts VMs on a central server that can be accessed by multiple
clients.
• Virtualization is considered a game-changer in modern IT as it allows
organizations and businesses to do more with less by optimizing physical
resources and improving ongoing operations efficiently. This technology can run
on everything from personal computers to enterprise data centers and plays a
very important role in modern technologies such as cloud computing, disaster
recovery, and software development. Virtualization enables organizations to
reduce hardware costs, streamline IT operations, and scale up their infrastructure
easily.

• In this article, we’ll explain the concept of virtualization, its different applications
across industries, its benefits for today’s IT needs, and which companies offer
those solutions.

• What is virtualization?
• Virtualization is the process of creating a virtual version of physical resources
such as servers, storage devices, networks, or operating systems. This allows
several virtual machines (VMs) to run independently on a single physical
machine. Virtualization increases resource efficiency by separating hardware
from a software layer called a Hypervisor. This virtualization layer creates VMs
and assigns physical resources to each of them as needed.

• There are two types of hypervisors: Type-1 or bare-metal hypervisors,


like VMware ESXi and Microsoft Hyper-V, are installed directly on the hardware.
Type-2 or hosted hypervisors, like VMware Workstation, run within a host
operating system. Virtualization increases flexibility and scalability by allowing IT
administrators to run multiple operating systems and applications on the same
infrastructure, lowering hardware costs and enabling dynamic resource
allocation.

• This technology is widely used in IT departments utilizing cloud computing for


efficient server management and disaster recovery. Moreover, virtualization aids
the delivery of multi-tenanted cloud services, which means many users can be on
the same hardware without interrupting others.
• Examples of virtualization across
technologies
• Many different technologies can utilize virtualization, such as network, storage,
application, desktop, and data center management. Each type of virtualization is
tailored to meet a specific challenge, supporting organizations in optimizing
resources and increasing scalability. It is aimed at helping organizations better
manage and allocate resources and enhance flexibility and operational capacity.
The key areas where virtualization is widely used are mentioned below.

• Server virtualization
• Server virtualization is a process by which one physical server is divided into
several virtual servers or multiple virtual machines working independently though
running on the same hardware platform. This means organizations can group
workloads that would otherwise need different physical servers, greatly improving
hardware density and costs.

• Hypervisors are key elements of server virtualization because they can allocate
resources among virtual machines. Server virtualization reduces hardware
footprints while simplifying management by centralizing VM control via vSphere
and Proxmox Virtual Environment platforms. It also incorporates high availability
(HA), disaster recovery, and live VM migration, which makes operations smooth,
especially in the case of hardware failure or maintenance. This technology is
critical in modern data centers and supports private and public cloud
infrastructures.

• Network virtualization
• Network virtualization abstracts physical networking components such as routers,
switches, and firewalls into virtual networks. This allows several virtual networks
to run on the same hardware, hence improving resource utilization and security.
Using virtual switches and Software-Defined Networking (SDN), IT administrators
can easily segment traffic, automate network tasks, and manage complex
network environments.

• Network virtualization is broadly used in cloud computing and hybrid


infrastructures, necessitating flexible and dynamic networks. It improves
scalability, simplifies management, and allows workloads to migrate easily from
one environment to the other.

• Storage virtualization
• Storage virtualization combines multiple physical storage appliances, including
disks or arrays, into one logical storage space. This abstraction allows IT
administrators to manage storage as a single resource, which leads to increased
utilization and reduced bottlenecks.
• Both SAN (Storage Area Networks) and NAS (Network-Attached Storage) enable
organizations to provide storage dynamically according to workload requirements
without impacting performance. High availability is another strength of storage
virtualization because it supports redundancy and quick recovery from failures as
part of IT planning.

• Application virtualization
• Application virtualization encapsulates software applications in virtual containers;
hence, they do not depend on the operating system of the host platform. Unlike
traditional installations, virtualized applications do not require direct installation
on a system and instead run in isolated environments with all necessary
dependencies and configurations. This ensures that applications work across
multiple platforms and prevents conflicts between software versions or system
settings.

• This virtualization solution improves security because applications don’t run


directly on the host, reducing flaws and failures. Microsoft App-V and VMware
ThinApp are two application virtualization tools that help organizations avoid
unnecessary interruptions during application updates or environment changes.

• Desktop virtualization
• Desktop virtualization means virtual desktops can be hosted on centralized
servers and accessed remotely via any device. Virtual Desktop Infrastructure
(VDI) solutions, such as VMware Horizon and Citrix Workspace, facilitate
employees to securely access their work environments from any location.

• This technology decreases the requirement for physical hardware, increases


security by centralizing data, and meets the growing demand for remote and
hybrid work. Desktop virtualization also streamlines IT management by permitting
IT administrators to manage all user desktops from a single console, lowering
maintenance and hardware costs.

• These virtualization technologies help businesses operate more proficiently,


increase scalability, and better manage their IT resources. By virtualizing their
networks, storage, applications, and desktops, organizations can build dynamic
environments that adapt to changing demands while maintaining extraordinary
levels of performance and security.

• What are the benefits of virtualization?


• Virtualization offers several advantages to organizations. Below are the main
benefits of virtualization.

• Improved hardware utilization


• Virtualization allows multiple operating systems and applications to run on the
same physical machine, making better use of hardware. Instead of dedicating
servers to specific workloads, virtualization consolidates them, increasing
computing power and decreasing idle resources. This reduces the need for
additional hardware and lowers both capital and operating costs.

• Scalability and flexibility


• Virtualized environments allow you to quickly scale up or down resources
according to demand. IT administrators can make real-time adjustments, like
adding more virtual machines, expanding storage, or increasing network
capacity, without altering physical hardware. This adaptability is specifically
useful in dynamic environments like cloud infrastructure, where resource
requirements frequently change.

• Cost savings
• Virtualization decreases the number of physical servers required, saving
organizations money on hardware, energy, and space. Fewer servers mean
fewer maintenance and licensing costs, resulting in substantial long-term
savings. Businesses can also use virtualization to apply cloud or hybrid models,
further decreasing infrastructure costs.

• Enhanced disaster recovery and business


continuity
• Virtual machines enhance disaster recovery capabilities as they are easier to
backup, replicate, and restore than physical servers. Virtualization supports
organizations in taking snapshots of virtual environments, duplicating them to
secondary locations, and recovering from outages with the least downtime.

• Simplified management and automation


• Virtualized environments make it easier for IT teams to monitor, deploy, and
manage resources as they can be managed from a single platform.

• Using the IT channel to embrace


virtualization
• The IT channel, which includes vendors, managed service providers (MSPs),
cloud providers, and value-added resellers (VARs), is critical to helping
businesses seamlessly adopt virtualization. MSPs manage virtual infrastructure
for organizations, whereas cloud providers such as Google Cloud, AWS, and
Azure provide scalable virtualization-based services. VARs customize solutions
like VMware vSphere to meet specific business requirements, ensuring seamless
integration with existing systems.

• Companies can use the expertise of IT partners to implement hybrid models that
combine on-premises and cloud resources, reducing costs and increasing
scalability. The IT channel also introduces organizations to emerging
technologies such as containerization, which augments virtualization for cloud-
native applications. This collaborative approach allows businesses to maximize
the benefits of virtualization while reducing complexity and ensuring long-term
success.

• Which companies offer virtualization


products?
• Several companies offer virtualization solutions to support modern IT
environments, including server, network, desktop, and cloud virtualization
products. These providers assist businesses in maximizing resources, scaling
efficiently, and managing workloads across on-premises and cloud
infrastructures.

• VMware
• VMware by Broadcom is a leading virtualization industry company, with products
including vSphere for server virtualization, NSX for network virtualization, and
Horizon for virtual desktops (VDI). VMware’s solutions are widely used in
enterprise environments, supporting both private and hybrid cloud deployments
with robust management and automation capabilities.

• Microsoft
• Microsoft Hyper-V is a powerful hypervisor for on-premises server virtualization,
which is incorporated with Azure for cloud-based virtual machines and
infrastructure. Hyper-V is ideal for organizations that use Microsoft ecosystems,
while Azure Virtual Machines enable seamless hybrid and multi-cloud
management.

• Citrix
• Citrix focuses on desktop and application virtualization, offering Virtual Apps,
Desktops, and a Citrix Workspace. Because it can provide secure, remote
access to desktops and applications, Citrix is a prevalent choice for businesses
that support hybrid work environments.

• Nutanix
• Nutanix provides AHV, a native hypervisor incorporated into its hyper-converged
infrastructure (HCI) platform. It is well-known for streamlining IT operations, and
its solutions combine compute, storage, and virtualization into a particular
platform, making it a strong competitor for enterprises looking to revolutionize
their data centers with scalable infrastructure.
• Proxmox
• Proxmox is an open-source platform that supports both KVM and LXC containers
and offers virtualization by Proxmox Virtual Environment. It is a standard choice
for small to medium-sized businesses and IT laboratories, as it is very well-
known for its simple use, cost-effectiveness, and powerful management tools.

• Amazon Web Service (AWS)


• AWS provides Amazon EC2, an on-demand virtual machine, as part of its
scalable cloud services, which use virtualization via EC2 instances. AWS, a
public cloud industry leader, offers a comprehensive suite of virtualization-based
tools such as networking, storage, and serverless computing.

• Google Cloud Platform (GCP)


• Google Cloud offers virtualization with Compute Engine for virtual machines
and Google Kubernetes Engine for containerized workloads. Google’s emphasis
on hybrid and multi-cloud solutions enables businesses to deploy and manage
workloads across diverse infrastructures simply.

• These companies offer a variety of virtualization solutions tailored to particular


business requirements. These providers help organizations improve resource
efficiency, cut costs, and support agile IT operations through traditional
hypervisors, hyper-converged platforms, or cloud-based services.

• Bottomline: Virtualization is complex, but


exploring the opportunity is worth it
• Virtualization is important in modern IT environments for various reasons,
including maximizing hardware efficiency and enabling flexible cloud strategies.
Its ability to optimize resources, improve disaster recovery, and support remote
work makes it critical for businesses seeking to stay competitive and agile.

• Implementing virtualization requires careful planning, which includes choosing


the right tools, effectively managing workloads, and possibly retraining IT teams.
However, organizations can speed up adoption and enjoy the full benefits with
the right partners — whether managed services, cloud providers, or hyper-
converged platforms. In today’s digital landscape, where agility and scalability
are critical, researching virtualization is more than a choice — it is a strategic
essential for long-term growth and resilience.

• FAQs
• 1. What is virtualization in cloud computing?
• Virtualization is the foundation of cloud computing, allowing cloud providers to
create multiple virtual machines on the same physical infrastructure. Customers
can now access scalable computing resources on demand, eliminating the need
to invest in dedicated hardware.

• 2. What is the difference between virtualization and containerization?


• Virtualization creates virtual machines, each with its own operating system,
allowing multiple OS instances to run on the same physical server. In contrast,
containerization employs lightweight containers that share the host operating
system, making it more efficient for running microservices and cloud-native
applications.

• 3. Can virtualization work alongside cloud


computing?
• Yes, virtualization and cloud computing are closely associated. Various
organizations use virtualization to create private clouds, while public cloud
platforms such as AWS and Azure rely heavily on virtualized infrastructure to
provide scalable solutions. Collectively, they enable hybrid models that combine
the benefits of on-premises and cloud environments.

security virtualization in cloud computing:


Virtualization security in cloud computing involves safeguarding virtual
machines (VMs) and the virtualized environments they reside in, ensuring
data protection, access control, and isolation from threats. It leverages
security virtualization techniques to create isolated and secure
environments, protecting against malicious attacks and ensuring the
integrity of cloud resources.

What is virtualized security?

Virtualized security, or security virtualization, refers to security solutions that are


software-based and designed to work within a virtualized IT environment. This
differs from traditional, hardware-based network security, which is static and
runs on devices such as traditional firewalls, routers, and switches.
In contrast to hardware-based security, virtualized security is flexible and
dynamic. Instead of being tied to a device, it can be deployed anywhere in the
network and is often cloud-based. This is key for virtualized networks, in which
operators spin up workloads and applications dynamically; virtualized security
allows security services and functions to move around with those dynamically
created workloads.
Cloud security considerations (such as isolating multitenant environments in
public cloud environments) are also important to virtualized security. The
flexibility of virtualized security is helpful for securing hybrid and multi-
cloud environments, where data and workloads migrate around a complicated
ecosystem involving multiple vendors.
What are the benefits of virtualized
security?
Virtualized security is now effectively necessary to keep up with the complex
security demands of a virtualized network, plus it’s more flexible and efficient
than traditional physical security. Here are some of its specific benefits:
• Cost-effectiveness: Virtualized security allows an enterprise to maintain a
secure network without a large increase in spending on expensive proprietary
hardware. Pricing for cloud-based virtualized security services is often
determined by usage, which can mean additional savings for organizations
that use resources efficiently.
• Flexibility: Virtualized security functions can follow workloads anywhere,
which is crucial in a virtualized environment. It provides protection across
multiple data centers and in multi-cloud and hybrid cloud environments,
allowing an organization to take advantage of the full benefits of virtualization
while also keeping data secure.
• Operational efficiency:Quicker and easier to deploy than hardware-based
security, virtualized security doesn’t require IT teams to set up and configure
multiple hardware appliances. Instead, they can set up security systems
through centralized software, enabling rapid scaling. Using software to run
security technology also allows security tasks to be automated, freeing up
additional time for IT teams.
• Regulatory compliance:Traditional hardware-based security is static and
unable to keep up with the demands of a virtualized network, making
virtualized security a necessity for organizations that need to maintain
regulatory compliance.

How does virtualized security work?


Virtualized security can take the functions of traditional security hardware
appliances (such as firewalls and antivirus protection) and deploy them via
software. In addition, virtualized security can also perform additional security
functions. These functions are only possible due to the advantages of
virtualization, and are designed to address the specific security needs of a
virtualized environment.
For example, an enterprise can insert security controls (such as encryption)
between the application layer and the underlying infrastructure, or use
strategies such as micro-segmentation to reduce the potential attack surface.
Virtualized security can be implemented as an application directly on a bare
metal hypervisor (a position it can leverage to provide effective application
monitoring) or as a hosted service on a virtual machine. In either case, it can
be quickly deployed where it is most effective, unlike physical security, which
is tied to a specific device.

What are the risks of virtualized security?


The increased complexity of virtualized security can be a challenge for IT,
which in turn leads to increased risk. It’s harder to keep track of workloads
and applications in a virtualized environment as they migrate across servers,
which makes it more difficult to monitor security policies and configurations.
And the ease of spinning up virtual machines can also contribute to security
holes.
It’s important to note, however, that many of these risks are already present in
a virtualized environment, whether security services are virtualized or not.
Following enterprise security best practices (such as spinning down virtual
machines when they are no longer needed and using automation to keep
security policies up to date) can help mitigate such risks.

How is physical security different from


virtualized security?
Traditional physical security is hardware-based, and as a result, it’s inflexible
and static. The traditional approach depends on devices deployed at strategic
points across a network and is often focused on protecting the network
perimeter (as with a traditional firewall). However, the perimeter of a
virtualized, cloud-based network is necessarily porous and workloads and
applications are dynamically created, increasing the potential attack surface.
Traditional security also relies heavily upon port and protocol filtering, an
approach that’s ineffective in a virtualized environment where addresses and
ports are assigned dynamically. In such an environment, traditional hardware-
based security is not enough; a cloud-based network requires virtualized
security that can move around the network along with workloads and
applications.

What are the different types of virtualized


security?
There are many features and types of virtualized security, encompassing
network security, application security, and cloud security. Some virtualized
security technologies are essentially updated, virtualized versions of
traditional security technology (such as next-generation firewalls). Others are
innovative new technologies that are built into the very fabric of the virtualized
network.
Some common types of virtualized security features include:
• Segmentation, or making specific resources available only to specific
applications and users. This typically takes the form of controlling traffic
between different network segments or tiers.
• Micro-segmentation, or applying specific security policies at the workload
level to create granular secure zones and limit an attacker’s ability to move
through the network. Micro-segmentation divides a data center into segments
and allows IT teams to define security controls for each segment individually,
bolstering the data center’s resistance to attack.
• Isolation, or separating independent workloads and applications on the same
network. This is particularly important in a multitenant public
cloud environment, and can also be used to isolate virtual networks from the
underlying physical infrastructure, protecting the infrastructure from attack.
• Protection from Attacks:
Virtualization security aims to protect data centers and cloud resources from
various threats, including malware, ransomware, and other malicious attacks.
• Isolation and Segmentation:
VMs are isolated from each other, preventing compromised VMs from
affecting others and enhancing overall security.
• Access Control:
Secure access controls are implemented to manage who can access and
interact with virtualized resources, limiting potential threats.
• Hypervisor Security:
The hypervisor, the software that manages virtual machines, is also secured
to prevent vulnerabilities from being exploited by attackers.
• Software-Based Solutions:
Virtualization security often relies on software-based solutions, such as virtual
firewalls, intrusion detection systems, and antivirus protection, to enhance
security posture.
• Benefits of Virtualization for Security:
Virtualization can enhance security by allowing for easier deployment of
security policies, faster provisioning of secure environments, and improved
isolation of VMs from the underlying hardware.
• Challenges of Virtualization Security:
Challenges include managing VM sprawl, securing offline VMs, and ensuring
the security of cloud service provider APIs and underlying infrastructure.
• Best Practices:
Implementing best practices like regular updates, patch management, secure
configuration, access controls, and monitoring can further enhance
virtualization security in cloud environments.
In essence, virtualization security in cloud computing is crucial for ensuring
the confidentiality, integrity, and availability of virtualized resources while
leveraging the benefits of virtualization for security enhancements.

What is Network Virtualization?


Network virtualization as such, is an entirely new way of networking
compared to a traditional way of networking, introducing new methods that
are more efficient, scalable, and flexible in the deployment of network
resources. In this article, we will discuss types of network virtualization, the
benefits of network virtualization, and more.
What is Network Virtualization?
Network virtualization is a revolutionary technology that abstracts and
disjoints traditional networking functions from the underlying hardware, thus
enabling the creation of multiple virtual networks on a shared physical
infrastructure. This can be done by the efficient use of resources, more
flexibility in the network, and simplified network management. Through the
virtualization of network functions and services, organizations can create
virtualized environments that are tailored to their requirements without
physical restrictions.
This technology is a bedrock of modern computing since it offers rapid
deployment, scalability, and cost-effectiveness. Irrespective of the
application, it is either in data centers, cloud computing or software-defined
networking, network virtualization enables enterprises to optimize
connectivity, streamline operations, and adaptably respond to changing
demands.
Why Network Virtualization?
Network virtualization aims to cope with the growing complexity and the
increasing requirements of modern computing by offering a flexible and
efficient solution to traditional networking challenges. The primary reasons
for adopting network virtualization include.
• Resource Optimization: Virtualization is a technology that separates
network functions from physical hardware, thus allowing virtual networks
to be created and run on a common infrastructure. This way, the
resources are used more efficiently.
• Flexibility and Agility: Virtual networks provide unprecedented flexibility
which organizations can use to quickly respond to changing requirements
by dynamically allocating and adjusting resources according to the current
needs.
• Cost Efficiency: Through the separation of networking functions from
hardware, organizations can achieve higher resource utilization, which
results in cost savings by reducing hardware expenditure and better
operating efficiency.
• Isolation and Security: Virtualization of the network creates the isolation
of virtual networks, which makes security better by preventing
communication between different environments or user groups.
• Scalability: Virtualized networks can be dynamically scaled up or down
based on demand, leading to smooth growth without ongoing hardware
investments or disruptions.
• Centralized Management: Network virtualization makes network
management and control centralized which simplifies network
administration, monitoring, and troubleshooting irrespective of the
environment.
• Compatibility and Integration: It is the glue that holds together diverse
networking technologies, platforms, and protocols, forging interoperability
and compatibility in heterogeneous network environments.
Functions of Network Virtualization
Network virtualization is done through the abstraction of networking
resources from the underlying physical infrastructure and the creation of a
virtual layer that runs autonomously. Here are key points on how network
virtualization functions:
• Abstraction: Network virtualization decouples the physical devices, such
as switches, routers, and firewalls, into software-defined entities, referred
to as virtual network devices.
• Hypervisor or Controller: The hypervisor or a network controller is
central to this. It handles the network virtualization and manages the
virtualized network, including the creation, configuration, and monitoring
of virtual network components.
• Virtual Switching: Virtual switches are used to control the network traffic
within the virtualized network. They are software-controlled and provide
communication between virtual machines and other virtualized resources.
• Isolation: Virtual networks uses isolation mechanisms to create a
network, each virtual network operating separately. Thus, it ensures
privacy and improves security.
• Overlay Networks: Overlay networks are frequently employed with a
view to building logical connections on top of the physical infrastructure.
This is achieved by encapsulating and tunneling the data from virtual
devices, thus, a virtual network is created on top of the physical one.
Types of Network Virtualization
Network virtualization assumes different forms, each targeting a specific
application or occasion. Here are the main types of network virtualization:
• Software-Defined Networking (SDN): SDN is the form of network
virtualization which is a separation of the control and data plane (control
plane makes decisions as to where to send traffic, and data plane sends
the traffic). This division creates a viable opportunity for more centralized
and programmable network administration.
• Virtual LANs (VLANs): VLANs (Virtual Local Area Networks) represent a
way to provide virtualization of a network, which separates a physical
network to different logical ones. This segmentation process facilitates
blocking and translation and boosts network performance through division
of the devices into different broadcast domains.
• Virtual Routing and Forwarding (VRF): VRF creates an environment
wherein multiple instances of a routing table can be created within a
single router, which allows the router to host multiple virtual routers as
required. This is, for example, used for network isolation in service
provider environments.
• Network Function Virtualization (NFV): NFV is about virtualizing
network services that we have always used in hardware dedicated to
them, such as firewalls, load balancers, and intrusion detection units.
NFV, instead of relying on hardware to operate the functions, utilizes
software executed on virtualized infrastructure to achieve flexibility and
hardware independence.
• Overlay Networks:The virtual networks which are overlayed on the
physical infrastructure, are the logical networks that are created, which
provide the functionality to develop independent virtual networks that are
not inter-dependent with hardware. The technologies such as VXLAN
Virtual Extensible LAN or GRE Generic Routing Encapsulation are widely
used as a overlay virtualization.
• Virtual Private Networks (VPNs): VPNs are a way to secure users or
networks connecting through the internet. Encryption and tunneling
protocols give an ability to make virtual the network, thus creating
networks of private and secure communication channels.
• Multiprotocol Label Switching (MPLS): MPLS is a protocol applied in
telecommunications networks to make the data directed from one network
node to the next on the basis the labels which are not IP addresses. This
promotes the productivity of data transmission and provides the possibility
of logical switching paths within the network.
Benefits of Network Virtualization
Network virtualization is the driving force that has changed the whole way
networks are designed, deployed, and managed. Here are key advantages:
• Resource Optimization: Virtualization facilitates resource utilization with
network resources virtualization from physical hardware. This will result in
better utilization of the installed capacity and higher network efficiency.
• Flexibility and Agility: Virtualized networks are very flexible in nature,
thus they can easily adjust to changing demands. Network configurations
and resources can be redistributed to meet the new requirements at any
time, which makes the system more adaptive.
• Cost Efficiency: Through the separation of network functions from
hardware, organizations can have capital expenditures saved.
Virtualization suits the purpose of reducing the demand for considerable
physical infrastructure which leads to lower hardware costs and more cost
efficiency.
• Isolation and Security: Network virtualization strengthens security
because it gives virtual networks the isolation they need. It thus avoids
unauthorized access and interference, thus reducing the effect of attacks
on one part of the network on others.
• Scalability: The virtualized network makes it possible to scale easily.
Organizations can scale up and down according to the demand without a
significant change in the capital infrastructure, thus, promoting cost
effective growth.
• Centralized Management: Centralized management consoles or
controllers are quite helpful in the management of virtualized networks. It
simplifies configuration, monitoring, and troubleshooting, thereby
minimizing the complexity involved in conventional network management.
Network Virtualization Example
• VMware NSX: VMware NSX is a leading network virtualization platform
which allows building virtual networks, switches and routers. It is
hardware independent and due to this fact, it enables flexibility and
security.
• Microsoft Hyper-V Network Virtualization: The Network Virtualization
feature of Microsoft's Hyper-V platform allows for the creation of private
virtual networks, making multi-tenancy and migrations of virtual machines
much easier across different physical networks.
• Cisco ACI (Application Centric Infrastructure): Cisco ACI uses the
principles of network virtualization and a policy-driven networking
approach. It provides an automatic setting up and managing of network
resources that eventually leads to better performance and less manual
setups.
• OpenStack Neutron: Neutron is an open-source networking project
which abstracts the network as a service. It provides users with a
capability to create and manage virtualized networks in a virtual
environment with support for both conventional and software-defined
networking.
• Juniper Contrail Networking: Juniper Contrail Networking is a solution
that uses network virtualization and SDN. It automates service
provisioning and networking on a scalable basis for cloud environments.
• Docker Networking: Docker (a container platform) deploys network
virtualization to create isolated networking environments for the
containerized applications. Docker networking facilitates convenient
communication between containers.
Challenges of Network Virtualization
Network virtualization provides multiple benefits but at the same time there
are some challenges associated with it. Here are some key challenges
associated with network virtualization:
• Security Concerns: Virtualization of networks creates new security
concerns. Isolation between virtual networks needs to be solid to avert
unauthorized access, and vulnerabilities in the virtualization layer could
bring down the whole network.
• Performance Overheads: The abstraction and encapsulation processes
in network virtualization may lead to performance degradation due to the
introduction of overheads. This, however, may affect the overall
performance of the network in terms of speed and latency, especially for
the applications that are resource intensive.
• Complexity in Management: Managing virtualized networks can be
more complex than traditional networks, especially in scale-up
deployments. The need for centralized control and orchestration, though it
has benefits, can lead to management challenges.
• Integration with Legacy Systems: Integrating virtualized networks with
the existing legacy systems is a difficult thing. The coordination of
compatibility and seamless communication between virtualized and non-
virtualized components is a process that calls for care and consideration
in implementation.
• Lack of Standardization: A lack of standardized protocols and interfaces
for network virtualization may cause interoperability issues. There is a
possibility for vendors to have their own proprietary solutions and this
makes the creation of vendor-agnostic virtualized environments
challenging.
• Skill Gap: Implementation and management of virtualized networks are
very different from the traditional networking skillset. The lack of trained
personnel may be the cause of the skills gap and, therefore, the obstacle
to the successful introduction of network virtualization.
Conclusion
Network virtualization is an innovative technology that is redefining the world
of information technology, bringing the transformation of networking
infrastructure. Despite all the advantages of increased flexibility, resource
optimization, and centralized management, the network virtualization
adoption process is not without its problems. The adoption of this
paradigmatic change is the key to transforming how we imagine, implement,
and manage networks, providing a flexible and scalable platform for the
digital future.
https://www.simplilearn.com/virtualization-in-cloud-computing-
article

service virtualization
Service virtualization is the process of creating replicas of systems that new
applications depend on to test how well the application and systems
integrate. It is primarily used for integrating applications that depend on
cloud and service-oriented architectures or applications that communicate with
third-party data and APIs. Examples of these systems include customer
relationship management services such as Salesforce Service Cloud, enterprise
resource planning services such as SAP ECC, and internal systems that are still
in development.

Developers can implement a virtualized replica of the dependent system


so integration testers can see how well their application integrates. This lets
development teams save money and time by testing throughout the
development process. Otherwise, they would need to wait to test integration
until these dependent systems are available, which might take a long time
because a third party controls them or they are still in development.

Unlike server virtualization, service virtualization only replicates specific


interfaces, interactions and behaviors -- situations wherein a server might
interact with an application -- rather than a complete server.

How does service virtualization work?


Service virtualization tools monitor traffic between the dependent system and
the application. They use log data to build a model that can replicate the
dependent system's responses and behavior, using inputs such
as SQL statements for databases and XML, or Extensible Markup Language,
messages for web services. As developers test the new application, the
virtualized service produces the same responses that the real one would.

Developers use this simulation to test how a new application, service or


feature integrates with existing infrastructure. Service virtualization removes
a significant development bottleneck by ensuring testers don't have to wait to
begin testing. This allows teams to release products with fewer defects, on
time without disrupting service.

Testers can also build in special cases that simulate high traffic volume or
slow connections. Once the application is ready for integration, developers
can replace the simulation with the real thing.
Service virtualization vendors and products
Parasoft developed one of the first products with service virtualization
functionalities in 2003, but ITKO invented the term in 2007. Major players
have since developed or acquired their own service virtualization tools. IBM
acquired Greenhat, CA Technologies acquired ITKO and Hewlett Packet
Enterprises developed its own technology. Other companies that offer
service virtualization tools include Hoverfly, Traffic Parrot, WireMock and
SmartBear.

Benefits of service virtualization


Service virtualization benefits are most acute in rapid deployment
and continuous delivery scenarios. It let teams rapidly iterate on test results
throughout the development process, which is beneficial to DevOps
and Agile teams. Service virtualization helps these teams prevent bugs
during development, build better systems with fewer defects and share
responsibility for testing the quality of the product across departments.

Benefits of service virtualization also extend to companies outside of these


rapid workflows. For example, if an organization wants to upgrade its back-end
systems, it might risk downtime-causing integration problems once those
systems come back online. With service virtualization, developers can test
the back end as they improve it and test its interactions with the front end
before full integration.

Service virtualization lets developers keep up with application development


even when there are missing components. Before service virtualization,
testers needed to wait for applications that were nearly complete. Different
teams with different schedules, priorities and requirements would often need
to finish and assemble the application before the testers could access it.

The rapid, integrated testing that service virtualization enables helps


development teams meet their deadlines and get the product on the market
faster. Testers can catch a potentially disruptive problem earlier, which helps
development plans remain on schedule. Service virtualization also lets
organizations avoid setting up expensive testing labs.

Disadvantages of service virtualization

Disadvantages of service virtualization include cost and implementation.


Budgeting for service virtualization implementation can be difficult because
its usage crosses many different departments. It can be difficult to assess
who has ownership over testing and who should oversee service
virtualization.

Additionally, service virtualization doesn't replace full integration testing with


the actual dependent systems. Service virtualization enables integration
testing throughout the development process, which speeds the final testing,
but a final test process is still necessary.

Service virtualization vs. mocking and stubbing


Mocking and stubbing are like service virtualization, but they function on
smaller scales. Mocking and stubbing usually involve testing specific
behaviors in restricted contexts, whereas service virtualization replicates
systems at a production scale.

The growing popularity of service-oriented architecture and Agile


development exposes limitations to mocking and stubbing. Service
virtualization approaches testing at the infrastructure level and creates
models that different teams can reuse in different circumstances. Mocks and
stubs typically require manual development for each use case. Service
architectures typically require too many dependent variables for mocking and
stubbing to be practical, and Agile workflows demand a speed that these
methods struggle to meet.

Virtualization in Cloud Computing and Types


Virtualization is the technology that enables to create virtual environments
from a single physical machine.
In this article, you will learn what a virtual machine is, why it is important, the
different types of virtualization, how it works, and the benefits and
disadvantages associated with it.
Virtualization

Table of Content
• What is Virtualization?
• Why is Virtualization Important?
• How does Virtualization Work
• Types of Virtualization
• Benefits of Virtualization
• Drawback of Virtualization
• Characteristics of Virtualization
• How is Virtualization Different from Cloud Computing
• Virtualization vs Containerization
• Uses of Virtualization
What is Virtualization?
Virtualization is the process of creating a virtual representation of hardware
such as server, storage, network or other physical machines. It Supports
multiple copies of virtual machines(VMs) to execute on one physical machine
each with their own operating system and programs. This optimizes
hardware efficiency and flexibility and enables resources to be shared
between multiple customers or organizations.
Virtualization is a key to providing Infrastructure as a Service (IaaS) solutions
for cloud computing, whereby the user has access to remote computing
resources.
Why is Virtualization Important?
Virtualization is important because it let’s you get the most out of your
computer or server resources. Consider it like being able to use one physical
box as many smaller, independent “virtual” boxes. There are multiple virtual
boxes, each having its own program to run and data to store, but they use
the same physical box.
1. Better use of Resources
Instead of allowing for numerous unused machines, virtualization enables
you to host multiple programs or systems on one computer, which is more
effective.
2. Cost Utilization
Companies can save their money on hardware, power, and maintenance by
using less physical equipment.
3. Flexibility
Virtual machines can be easily installed, relocated and resized to suit
changing requirements. If a virtual machine requires more power, it can
obtain it rapidly without requiring new hardware.
4. Security
Virtualization isolates various applications or systems from each other, so if
one of them has an issue, it won’t affect others.
5. Simple Recovery
In case something goes wrong, it’s simple to back up or restore virtual
machines, allowing companies to return to work quickly after an issue.
Virtualization Example
Suppose there is a company that requires servers for four different purposes:
• Store customer data securely
• Host an online shopping website
• Process employee payroll systems
• Run Social media campaign software for marketing
All these tasks require different things:
• The customer data server requires a lot of space and a Windows
operating system.
• The online shopping website requires a high-traffic server and needs a
Linux operating system.
• The payroll system requires greater internal memory (RAM) and must use
a certain version of the operating system.
• The marketing software demands specialized software tools and needs
plenty of processing power.
In order to fulfill these requirements, the company initially configures four
individual physical servers, each for a different purpose. This implies that
the company needs to purchase four servers, keep them running, and
upgrade them individually, which is very expensive. The company also
cannot utilize the full capacity of each server, so it’s paying for more than it
requires, wasting some of the servers’ capabilities.
Now, by utilizing virtualization, the company can run these four applications
on a few physical servers through multiple virtual machines (VMs). Each VM
will behave as an independent server, possessing its own operating system
and resources. Through this means, the company can cut down on
expenses, conserve resources, and manage everything from a single
location with ease.
How does Virtualization Work
Virtualizations uses special software known as hypervisor, to create many
virtual computers (cloud instances) on one physical computer. The Virtual
Machines behave like actual computers but use the same physical machine.
Virtual Machines (Cloud Instances)
After installing virtualization software on your computer, you can set up one
or more virtual machines. The Virtual machines are similar to other
applications on your computer. The Actual computer is “Host” and the
Virtual Computers are “Guests”. You can have several guests on a single
host, and each guests can have its own operating system, which may be the
same or different from the host.
As a user you can see that every virtual machine behaves as a normal
computer. It has its own configurations, programs, and settings. The
resources, such as the processor (CPU), Memory (RAM), and storage, are
all accessed by the virtual machines, but they appear and function exactly
like they would in a real computer. You can update or modify the virtual
machine’s operating system and applications without touching the original
computer.
Hypervisors
A hypervisor is the software that gets virtualization to work. It serves as an
intermediary between the physical computer and the virtual machines. The
hypervisor controls the virtual machines’ use of the physical resources (such
as the CPU and memory) of the host computer.
For instance, if one virtual machine wants additional computing capability, it
requests it from the hypervisor. The hypervisor ensures the request is
forwarded to the physical hardware, and it’s accomplished.
There exist two categories of hypervisors:
Type 1 Hypervisor (Bare-Metal Hypervisor):
• The hypervisor is installed directly onto the computer hardware, without
an operating system sitting in between.
• It is highly efficient as it has a direct access to the resources of the
computer.
Type 2 Hypervisor:
• It is run over an installed operating system (such as Windows or macOS).
• It’s employed when you need to execute more than one operating system
on one machine.
Types of Virtualization
1. Application Virtualization
2. Network Virtualization
3. Desktop Virtualization
4. Storage Virtualization
5. Server Virtualization
6. Data virtualization
Types of Virtualization

1. Application Virtualization: Application virtualization enables remote


access by which users can directly interact with deployed applications
without installing them on their local machine. Your personal data and the
applications settings are stored on the server, but you can still run it locally
via the internet. It’s useful if you need to work with multiple versions of the
same software. Common examples include hosted or packaged apps.
Example: Microsoft Azure lets people use their applications without putting
them on their own computers. Once this application is setup in the cloud then
employees can use it from any device, like a laptop or tablet. It feels like the
application is on their computer, but it’s really running on Azure’s servers.
This makes things easier, faster, and safer for the company.
2. Network Virtualization: This allows multiple virtual networks to run on the
same physical network, each operating independently. You can quickly set
up virtual switches, routers, firewalls, and VPNs, making network
management more flexible and efficient.
Example: Google Cloud is an example of Network Virtualization. Companies
create their own networks using software instead of physical devices with the
help of Google Cloud. They can set up things like IP addresses, firewalls,
and private connections all in the cloud. This makes it easy to manage,
change, and grow their network without buying any hardware. It saves time,
money, and gives more flexibility.

Network Virtualization
3. Desktop Virtualization: Desktop virtualization is a process in which you
can create different virtual desktops that users can use from any device like
laptop, tablet. It’s great for users who need flexibility, as it simplifies software
updates and provides portability.
Example: GeeksforGeeks is a Edtech company which uses services
like Amazon WorkSpaces or Google Cloud (GCP) Virtual Desktops to
give its team members access to the same coding setup with all the tools
they required for the easy access of this team work. Now their team
members can easily log in from any device like a laptop, tablet, or even a
phone and use a virtual desktop that will run perfectly in the cloud. This
makes it easy for GeeksforGeeks company to manage, update, and keep
everything secure without requirement of physical computers for everyone.
4. Storage Virtualization: This combines storage from different servers into
a single system, making it easier to manage. It ensures smooth performance
and efficient operations even when the underlying hardware changes or fails.
Example: Amazon S3 is an example of storage virtualization because in S3
we can easily store any amount of data from anywhere. Suppose a MNC
have lots of files and data of company to store. By Amazon S3 company can
store all their files and data in one place and access these from anywhere
without any kind of issue in secure way.
5. Server Virtualization: This splits a physical server into multiple virtual
servers, each functioning independently. It helps improve performance, cut
costs and makes tasks like server migration and energy management easier.
Example: A startup company has a powerful physical server. This company
can use server virtualization software like VMware vSphere, Microsoft Hyper-
V or KVM to create more virtual machines(VMs) on that one server.
Each VM here is an isolated server, that runs on their own operating system(
like Windows and Linux) and run it’s own applications. For example, a
company might run A web server on one VM, A database server on another
VM, A file server on a third VM all on the same physical machine. This
reduces costs, makes it easier to manage and back up servers, and allows
quick recovery if one VM fails.
Server Virtualization

6. Data Virtualization: This brings data from different sources together in


one place without needing to know where or how it’s stored. It creates a
unified view of the data, which can be accessed remotely via cloud services.
Example: Companies like Oracle and IBM offer solutions for this.
Benefits of Virtualization
Here are some of the benefits of using Virtualization in Cloud Computing –
• More flexible and efficient allocation of resources.
• Enhance development productivity.
• It lowers the cost of IT infrastructure.
• Remote access and rapid scalability.
• High availability and disaster recovery.
• Pay peruse of the IT infrastructure on demand.
• Enables running multiple operating systems.
Drawback of Virtualization
Virtualization makes our work easy but there are some drawbacks of using
virtualization which are follows:
• High Initial Investment: Clouds have a very high initial investment, but it
is also true that it will help in reducing the cost of companies.
• Learning New Infrastructure: As the companies shifted from Servers to
Cloud, it requires highly skilled staff who have skills to work with the cloud
easily and for this, you have to hire new staff or provide training to current
staff.
• Risk of Data: Hosting data on third-party resources can lead to putting
the data at risk, it has the chance of getting attacked by any hacker or
cracker very easily.
Characteristics of Virtualization
The following are characteristics of virtualization:
• Increased Security: The ability to control the execution of a guest
program in a completely transparent manner opens new possibilities for
delivering a secure, controlled execution environment. All the operations
of the guest programs are generally performed against the virtual
machine, which then translates and applies them to the host programs.
• Managed Execution: In particular, sharing, aggregation, emulation, and
isolation are the most relevant features.
• Sharing: Virtualization allows the creation of a separate computing
environment within the same host.
• Aggregation: It is possible to share physical resources among several
guests, but virtualization also allows aggregation, which is the opposite
process.
How is Virtualization Different from Cloud Computing
Below is the table that shows the comparison between virtualization and
Cloud Computing:
Aspect Virtualization Cloud Computing

Creating multiple virtual Accessing computing resources


What it is versions of a physical (like storage, servers) via the
resource internet

Where it On physical machines or On remote servers provided by


runs servers cloud service providers

Efficient use of physical On-demand access to resources


Focus
resources over the internet

Running multiple virtual Storing data on Google Drive or


Example
machines on a single physical renting a virtual machine on AWS
Aspect Virtualization Cloud Computing

server

Cloud providers manage the


You have more control over
Control physical hardware; you manage
the virtual environment
only what you use

Virtualization vs Containerization
Below is a comparison table between Virtualization and Containerization
which shows how server virtualization is different from containerization:
Aspect Virtualization Containerization

Architecture Full OS per VM Shared host OS

Resource
High Low
Usage

Slightly slower due to Faster due to lightweight


Performance overhead design

Scalability Limited by heavier VMs Highly scalable

Portability Moderate Very high

Use Case Running multiple OS types Rapid deployment of apps

Uses of Virtualization
The following are the uses of virtualization:
• Resource Optimization: Maximizes hardware utilization by running
multiple virtual machines on a single server.
• Cost Reduction: Reduces hardware and maintenance costs by
consolidating servers.
• Scalability: Enables quick scaling of resources based on demand.
• Flexibility: Dynamically allocates resources to applications as needed.
• Disaster Recovery: Simplifies backup and recovery by easily restoring
virtual machines.
• Multi-Tenancy: Supports multiple users on a single server securely and
efficiently.
• Testing Environments: Provides isolated virtual environments for
development and testing.
• Efficient Deployment: Speeds up application deployment with pre-
configured virtual environments.
• Security Isolation: Keeps applications secure by isolating them in
separate virtual machines.
• Energy Efficiency: Reduces power consumption by running fewer
physical servers
porting application in cloud computing:

What is cloud portability?


Cloud portability refers to the ability to quickly move things – applications,
workloads, data – between cloud environments. It can mean moving from a
private cloud to a public cloud (or vice versa), or it can mean moving from
one public cloud provider to another.

For example, imagine an application is deployed to AWS, but the company


has decided to move to GCP. An application that has been architected with
cloud portability in mind would be able to make this shift relatively quickly
and seamlessly, with minimal downtime and minimal need to refactor code.
Migrating an application from one cloud to another is never going to be
painless, but cloud-portable architectures and tools help to minimize that
pain.

In contrast, an application that has not been architected with cloud portability
in mind will likely require significant time and effort to shift, as elements of
the application will need to be refactored and tools may need to be swapped
out to ensure compatibility with the services offered by the new cloud.
Depending on the size of the company and the application, this is likely to
require months or even years of effort.

This is because while the major public clouds look more or less feature-
identical in a “squint test,” each has its own idiosyncrasies when you get
down into the nuts and bolts. Google Cloud Functions, for example, may offer a
very similar end product to AWS Lambda, but swapping your application from
one to the other is still quite a bit more involved than simply copy-pasting
code.

The aim of cloud portability, then, is to make that sort of move as simple as

reasonably possible.

Cloud portability vs. cloud


interoperability
The term cloud portability is often used in tandem with cloud interoperability,
but they mean slightly different things.

Cloud interoperability refers to the ability of systems to work together across


multiple clouds. Cloud portability, again, is about moving something from one
cloud to another.

In other words, for example:

Cloud interoperability: “We want to be able to run our database on AWS and
our application on GCP.”
Cloud portability: “We want to be able to move our database from AWS to
GCP.”

In an ideal world, companies would have both, but maintaining


interoperability and portability across every level of an application is both
difficult and expensive. Interoperability, in particular, may not be needed
unless you aspire to build an application with a multi-cloud architecture such
that some of your services will need to communicate and coordinate
operations across multiple cloud deployments.

Multi-cloud interoperability is a different and complex topic; in this article, we’ll

focus on portability.

Why do companies want cloud


portability?
There are a number reasons why cloud portability is appealing, even to
companies who want to maintain a single-cloud deployment and are happy
with their current cloud provider:

Maintaining flexibility. Being cloud-portable means being able to shift


quickly in response to market forces, and take advantage of opportunities
such as better pricing or discounts on a competing cloud provider.

Mitigating risk. Without cloud portability, you are locked into a single
vendor, which represents a strategic risk to the business. If a cloud vendor
raises their prices, or makes changes to services or support that are critical
to the business, a company without cloud portability will not be able to
respond quickly.

Increasing leverage. Even if they don’t plan to change clouds, being


easily able to do so can give a company significant leverage when
negotiating contracts with their cloud vendor.

Fostering innovation. Maintaining cloud portability makes it easier to


experiment with new cloud products and services as they arrive so that you
can quickly determine whether they offer advantages for your business.

In truth, if you’re building a net-new application from the ground up, there are
very few reasons not to architect it with cloud portability in mind. However,
achieving cloud portability is more complex in the context of existing
applications. Let’s take a closer look at how a company with an existing
application can move towards cloud portability.

Portable applications are very beneficial in migration of infrastructure,


platform, and services from one cloud service provide to any other service
providers. But There are some major barriers occur at the time of portability
of cloud that are described below:
1. Portable applications in the cloud from a technology perspective is the
lack of standardized cloud APIs which can be utilize by cloud providers or
vendors in developing their technology-based products. API
interoperability allows users to execute applications on different cloud
using common APIs as a way forward.
2. Hard-to-port database schemas and uncertainty about rights of users to
get access and manage data stored in the cloud. Even if you can get
access to your data, you can’t essentially get it into another system
because application data schemas aren’t certainly compatible.
3. Formats of Files, like SQL, in relational database (RDB) are quite arduous
to port because relationship in the database should be constant when it is
being divided over multiple databases. Nowadays, portability having
certain structured database is still quite difficult to achieve. Non-structured
or non-SQL data is preferred standard of data encapsulation and storage.
4. Data access problems are another aspect of service-related data life-
cycle management.
Major Cloud portability tips in the meantime are described below:
1. Assure that the application and its supportive components, such as
databases and tools, not only trust an operating system and an underlying
cloud infrastructure.
2. Negotiate access to data and other services up-front. Once the contract is
made and data is migrated onto the vendors system, influence for
negotiation should be limited.
3. A platform for applications that can support must be found as much as is
possible nowadays, several cloud environments. This will only be of
value, however, if the cloud service vendor supports that particular
management platform.
4. Comprehend the technical services, such as APIs, which provide access
to the data stored by cloud providers.
5. Preserve decisions to host data in the cloud at top level of corporations,
rather than letting employees procure cloud-based systems without
sufficient review.

You might also like