Cloud Computing Unit3
Cloud Computing Unit3
(10 Hrs.)
• Introduction to Virtualization,
• different types of Virtualization,
• Implementation Levels of Virtualization
Structures,
• Benefits of virtualization,
• server virtualization,
• virtualization software,
• Types of Hypervisor, and Load balancing,
• Infrastructure requirement for virtualization
Introduction to Virtualization,
• Virtualization is a technique, which allows to
share single physical instance of an application
or resource among multiple organizations or
tenants (customers).
Full Virtualization
• In full virtualization, the underlying hardware is
completely simulated.
• Guest software does not require any modification to
run.
Emulation Virtualization
• In Emulation, the virtual machine simulates the
hardware and hence becomes independent of it.
• In this, the guest operating system does not
require modification.
Paravirtualization
• In Paravirtualization, the hardware is not
simulated.
• The guest software run their own isolated
domains.
Types of Virtualization
• OS Virtualization—aka Virtual Machines
• Application-Server Virtualization
• Application Virtualization
• Administrative Virtualization
• Network Virtualization
• Hardware Virtualization
• Storage Virtualization
1. OS Virtualization—aka Virtual
Machines
• Virtualizing an operating system environment is
the most common form of virtualization.
• It involves putting a second instance or multiple
instances of an operating system, like Windows, on
a single machine.
• This empowers businesses to reduce the amount of
physical hardware required to run their software by
cutting down the number of actual machines.
• It saves companies cash on energy, cabling,
hardware, rack space, and more, while still allowing
them to run the same quantity of applications.
2. Application-Server Virtualization
• Application-server virtualization is another large presence
in the virtualization space, and has been around since the
inception of the concept.
• It is often referred to as ‘advanced load balancing,’ as it
spreads applications across servers, and servers across
applications.
• This enables IT departments to balance the workload of
specific software in an agile way that doesn’t overload a
specific server or underload a specific application in the
event of a large project or change.
• In addition to load balancing it also allows for easier
management of servers and applications, since you can
manage them as a single instance.
• Additionally, it gives way to greater network security, as
only one server is visible to the public while the rest are
hidden behind a reverse proxy network security appliance.
3. Application Virtualization
• Application virtualization is often confused
with application-server virtualization.
• What it means is that applications operate on
computers as if they reside naturally on the
hard drive, but instead are running on a server.
• The ability to use RAM and CPU to run the
programs while storing them centrally on a
server, like through Microsoft Terminal
Services and cloud-based software, improves
how software security updates are pushed, and
how software is rolled out.
4. Administrative Virtualization
• Administrative virtualization is one of the least-
known forms of virtualization, likely due to the
fact that it’s primarily used in data centers.
• The concept of administration, or ‘management,’
virtualization means segmented admin roles
through group and user policies.
• For example, certain groups may have access to
read specific servers, infrastructure, application
files, and rules, but not to change them.
5. Network Virtualization
• Network virtualization involves virtually managing IPs,
and is accomplished through tools like routing tables,
NICs, switches, and VLAN tags.
6. Hardware Virtualization
• Hardware virtualization is one of the rarer forms of
virtualization, and when simply explained it is similar to
OS virtualization (it is, in fact, often required for OS
virtualization).
• Except, instead of putting multiple software instances on a
single machine, chunks of a machine are partitioned off to
perform specific tasks.
7. Storage Virtualization
• Storage virtualization is an array of servers that are
managed by a virtual storage system.
• The servers aren’t aware of exactly where their data is, and
instead function more like worker bees in a hive.
1. Instruction Set Architecture Level
• At the ISA level, virtualization is performed by
emulating a given ISA by the ISA of the host
machine.
• For example, MIPS binary code can run on an x86-
based host machine with the help of ISA emulation.
With this approach, it is possible to run a large
amount of legacy binary code writ-ten for various
processors on any given new hardware host
machine.
• Instruction set emulation leads to virtual ISAs
created on any hardware machine.
2. Hardware Abstraction Level
• Hardware-level virtualization is performed right on top of
the bare hardware.
• On the one hand, this approach generates a virtual
hardware environment for a VM.
• On the other hand, the process manages the underlying
hardware through virtualization. The idea is to virtualize a
computer’s resources, such as its processors, memory, and
I/O devices.
• The intention is to upgrade the hardware utilization rate by
multiple users concurrently.
• The idea was implemented in the IBM VM/370 in the
1960s.
• More recently, the Xen hypervisor has been applied to
virtualize x86-based machines to run Linux or other guest
OS applications.
3. Operating System Level
• This refers to an abstraction layer between traditional
OS and user applications.
• OS-level virtualiza-tion creates isolated containers on a
single physical server and the OS instances to utilize
the hard-ware and software in data centers.
• The containers behave like real servers. OS-level
virtualization is commonly used in creating virtual
hosting environments to allocate hardware resources
among a large number of mutually distrusting users.
• It is also used, to a lesser extent, in consolidating server
hardware by moving services on separate hosts into
containers or VMs on one server.
4. Library Support Level
• Most applications use APIs exported by user-level
libraries rather than using lengthy system calls by the
OS.
• Since most systems provide well-documented APIs,
such an interface becomes another candidate for
virtualization.
• Virtualization with library interfaces is possible by
controlling the communication link between
applications and the rest of a system through API
hooks. T
• he software tool WINE has implemented this approach
to support Windows applications on top of UNIX hosts.
Another example is the vCUDA which allows
applications executing within VMs to leverage GPU
hardware acceleration.
5. User-Application Level
• Virtualization at the application level virtualizes an
application as a VM. On a traditional OS, an application
often runs as a process. Therefore, application-level
virtualization is also known as process-level virtualization.
• The most popular approach is to deploy high level language
(HLL)
• VMs. In this scenario, the virtualization layer sits as an
application program on top of the operating system, and the
layer exports an abstraction of a VM that can run programs
written and compiled to a particular abstract machine
definition.
• Any program written in the HLL and compiled for this VM
will be able to run on it.
• The Microsoft .NET CLR and Java Virtual Machine
(JVM) are two good examples of this class of VM.
Benefits of virtualization
• By adopting virtualization in their cloud environment, organizations can
realize the following security benefits.
1. Flexibility
Organizations have the flexibility to share systems without essentially having
to share critical information or data across the systems.
2. Data Protection
They can prevent loss or damage to critical data, in cases where the system is
compromised owing to malicious activities.
3. Security against attacks
They have the ability to reduce the risk of multiple attacks in case of an
exposure by methodically isolating applications and virtual machines.
4. Cost Effectiveness
It improves the physical security of organizations by reducing hardware
requirements, thereby leading to fewer data centers.
5. Better Access Control
• A higher level of access control is offered to system and network
administrators, which separates responsibilities and improves the system’s
efficiency.
Server virtualization
• Server Virtualization is the process of dividing
a physical server into several individuals and
isolated virtual servers with software
applications.
• Every virtual server can run its own operating
systems individually
• Server Virtualization is one of the most cost-
effective methods to offer Web hosting
services and uses the existing resources
effectively in IT Infrastructure.
• If there is no server Virtualization, the servers will
only use a tiny section of their processing power.
It will result in idle servers because the workload
is divided into one portion of the network servers.
• Data centers have become overcrowded with
unutilized servers, resulting in wasting resources
and heavy power consumption.
• By having every physical server divided into
multiple virtual servers, server virtualization will
authorize each virtual server to behave as a unique
device.
• Every Virtual Server is capable of running its own
application and operating systems.
Benefits
• Key Benefits of Server Virtualization
• Server Virtualization contains higher server
capability
• Organizations experience cheaper operational
cost
• It eliminates the complexity of the server
• It helps in developing the application
performance
• With Software Virtualization, users can deploy
their workload swiftly
Working
• In Server Virtualization, the virtual servers are
wholly dedicated to performing a specific task.
• Each virtual server behaves like a physical device
that is capable of running its Operating System.
• The administrator of the software is capable of
converting one physical server into various virtual
servers.
• Later these several servers are capable of using
the processing power of all machines.