0% found this document useful (0 votes)
26 views

Unit 2

Virtualization uses software to divide the hardware resources of a physical computer, such as processors, memory, and storage, among multiple virtual machines, each of which can run its own operating system. A hypervisor manages the virtual machines and coordinates their access to physical resources to improve hardware utilization and allow more flexible deployment of computing power. There are different types of virtualization including server, desktop, application, network, storage, and data virtualization that each provide benefits such as increased security, mobility, flexibility, and efficient management of resources.

Uploaded by

mmmoneyyyy2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Unit 2

Virtualization uses software to divide the hardware resources of a physical computer, such as processors, memory, and storage, among multiple virtual machines, each of which can run its own operating system. A hypervisor manages the virtual machines and coordinates their access to physical resources to improve hardware utilization and allow more flexible deployment of computing power. There are different types of virtualization including server, desktop, application, network, storage, and data virtualization that each provide benefits such as increased security, mobility, flexibility, and efficient management of resources.

Uploaded by

mmmoneyyyy2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

What is virtualization?

Virtualization is a process that allows for more


efficient utilization of physical computer
hardware and is the foundation of cloud
computing.
Virtualization uses software to create an
abstraction layer over computer hardware that
allows the hardware elements of a single
computer—processors, memory, storage and
more—to be divided into multiple virtual
computers, commonly called virtual machines
(VMs). Each VM runs its own operating
system (OS) and behaves like an independent
computer, even though it is running on just a
portion of the actual underlying computer
hardware.
It follows that virtualization enables more
efficient utilization of physical computer
hardware and allows a greater return on an
organization’s hardware investment.
Virtualization enables cloud providers to serve
users with their existing physical computer
hardware; it enables cloud users to purchase
only the computing resources they need when
they need it, and to scale those resources cost-
effectively as their workloads grow.

Hypervisors
A hypervisor is the software layer that
coordinates VMs. It serves as an interface
between the VM and the underlying physical
hardware, ensuring that each has access to the
physical resources it needs to execute. It also
ensures that the VMs don’t interfere with each
other by impinging on each other’s memory
space or compute cycles.
There are two types of hypervisors:
 Type 1 or “bare-metal”
hypervisors interact with the underlying
physical resources, replacing the
traditional operating system altogether.
They most commonly appear in virtual
server scenarios.
 Type 2 hypervisors run as an application
on an existing OS. Most commonly used
on endpoint devices to run alternative
operating systems, they carry a
performance overhead because they must
use the host OS to access and coordinate
the underlying hardware resources.
Virtual machines (VMs)
Virtual machines (VMs) are virtual
environments that simulate a physical
compute in software form. They normally
comprise several files containing the VM’s
configuration, the storage for the virtual
hard drive, and some snapshots of the VM
that preserve its state at a particular point
in time.
Types of virtualization
To this point we’ve discussed server
virtualization, but many other IT infrastructure
elements can be virtualized to deliver
significant advantages to IT managers (in
particular) and the enterprise as a whole.

Characteristics of Virtualization
 Increased Security: The ability to
control the execution of a guest program
in a completely transparent manner
opens new possibilities for delivering a
secure, controlled execution
environment. All the operations of the
guest programs are generally performed
against the virtual machine, which then
translates and applies them to the host
programs.
 Managed Execution: In particular,
sharing, aggregation, emulation, and
isolation are the most relevant features.
 Sharing: Virtualization allows the
creation of a separate computing
environment within the same host.
 Aggregation: It is possible to share
physical resources among several
guests, but virtualization also allows
aggregation, which is the opposite
process.

 1. Application Virtualization: Application


virtualization helps a user to have remote
access to an application from a server. The
server stores all personal information and
other characteristics of the application but
can still run on a local workstation
through the internet. An example of this
would be a user who needs to run two
different versions of the same software.
Technologies that use application
virtualization are hosted applications and
packaged applications.
 2. Network Virtualization: The ability to
run multiple virtual networks with each
having a separate control and data plan. It
co-exists together on top of one physical
network. It can be managed by individual
parties that are potentially confidential to
each other. Network virtualization
provides a facility to create and provision
virtual networks, logical switches,
routers, firewalls, load balancers, Virtual
Private Networks (VPN), and workload
security within days or even weeks.

 Network Virtualization

 3. Desktop Virtualization: Desktop


virtualization allows the users’ OS to be
remotely stored on a server in the data
center. It allows the user to access their
desktop virtually, from any location by a
different machine. Users who want
specific operating systems other than
Windows Server will need to have a
virtual desktop. The main benefits of
desktop virtualization are user mobility,
portability, and easy management of
software installation, updates, and
patches.
 4. Storage Virtualization: Storage
virtualization is an array of servers that
are managed by a virtual storage system.
The servers aren’t aware of exactly where
their data is stored and instead function
more like worker bees in a hive. It makes
managing storage from multiple sources
be managed and utilized as a single
repository. storage virtualization software
maintains smooth operations, consistent
performance, and a continuous suite of
advanced functions despite changes,
breaks down, and differences in the
underlying equipment.
 5. Server Virtualization: This is a kind of
virtualization in which the masking of
server resources takes place. Here, the
central server (physical server) is divided
into multiple different virtual servers by
changing the identity number, and
processors. So, each system can operate
its operating systems in an isolated
manner. Where each sub-server knows the
identity of the central server. It causes an
increase in performance and reduces the
operating cost by the deployment of main
server resources into a sub-server
resource. It’s beneficial in virtual
migration, reducing energy consumption,
reducing infrastructural costs, etc.

 Server Virtualization

 6. Data Virtualization: This is the kind of


virtualization in which the data is
collected from various sources and
managed at a single place without
knowing more about the technical
information like how data is collected,
stored & formatted then arranged that data
logically so that its virtual view can be
accessed by its interested people and
stakeholders, and users through the
various cloud services remotely. Many big
giant companies are providing their
services like Oracle, IBM, At scale, Cdata,
etc.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy