Chapter-2
Chapter-2
• Type-2 Hypervisor
• Type 2 hypervisors or hosted hypervisors run on top of a
conventional (main/host) operating system and monitor Type-2 Hypervisor
the guest operating systems.
• Full Virtualization
• In full virtualization, the virtualization layer completely decouples the guest OS from the
underlying hardware. The guest OS requires no modification and is not aware that it is being
virtualized. Full virtualization is enabled by direct execution of user requests and binary
translation of OS requests.
• Para-Virtualization
• In para-virtualization, the guest OS is modified to enable communication with the hypervisor to
improve performance and efficiency. The guest OS kernel is modified to replace non-virtualizable
instructions with hyper-calls that communicate directly with the virtualization layer hypervisor.
• Persistence Approaches
• Sticky sessions
• Session Database
• Browser cookies
• Sticky sessions
• All the requests belonging to a user session are routed to the same server.
• Session management is simple.
• If a server fails all sessions belonging to that server are lost.
• Session Database
• All the session information is stored externally in a separate session
database.
• Additional overhead of storing the session information.
• Allows automatic failover.
• Browser cookies
• Session information is stored on the client side in the form of cookies.
• Least overhead
Deployment Refinement
Horizontal Scaling
Performance Measurement
Vertical Scaling
Application workload
Alternative server interconnections
Utilization of servers (CPU, memory, disk)
Alternative load balancing & replication
strategies
• To verify whether the application meets the performance requirements with the
deployment.
• Involves monitoring the workload on the application and measuring various
workload parameters such as response time and throughput.
• Utilization of servers (CPU, memory, disk, I/O, etc.) is also monitored.
Performance Measurement
Application workload
• Replication is used to create and maintain multiple copies of the data in the cloud.
• Cloud enables rapid implementation of replication solutions for disaster recovery for
organizations.
• With cloud-based data replication organizations can plan for disaster recovery without
making any capital expenditures on purchasing, configuring and managing secondary
site locations.
• Types:
• Array-based Replication
• Network-based Replication
• Host-based Replication
• Array - data storage system that uses multiple disk drives to store data
• Automatically copy data from local array to remote array
• An appliance is used that sits on the network & intercepts the packets sent from hosts &
storage arrays. These packets are replicated to a secondary location.
• Requires single point of management
• Relationship to SDN
• NFV is complementary to SDN as NFV can provide the infrastructure on which SDN can run.
• NFV and SDN are mutually beneficial to each other but not dependent.
• Network functions can be virtualized without SDN, similarly, SDN can run without NFV.
• NFV comprises of network functions implemented in software that run on virtualized resources in the
cloud.
• NFV enables a separation the network functions which are implemented in software from the underlying
hardware.
• The authentication and authorization of users to provide secure access to cloud resources.
• Organizations with multiple users can use IDAM services provided by the cloud service provider
for management of user identifiers and user permissions.
• IDAM services allow organizations to centrally manage users, access permissions, security
credentials and access keys.
• Organizations can enable role-based access control to cloud resources and applications using
the IDAM services.
• IDAM services allow creation of user groups where all the users in a group have the same
access permissions.
Exception Description
ArithmeticError Raised when an error occurs in numeric calculations
KeyError Raised when a key does not exist in a dictionary
NameError Raised when a variable does not exist