0% found this document useful (0 votes)
23 views

Cloud Computing

cloud computing report writing

Uploaded by

BIKRAM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Cloud Computing

cloud computing report writing

Uploaded by

BIKRAM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Virtualization in Cloud Computing

DEPARTMENT OF COMPUTER APPLICATION


CONTAI COLLEGE OF LEARNING & MANAGEMENT
SCIENCE

NAME: Bikram Adak


UNIVERSITY ROLL NO.: 34001222017
STREAM: BCA
SEMESTER: 5th
PAPER: CLOUD COMPUTING
PAPER CODE: BCAD501A
SESSION:2022-2025
ABSTRACT
Cloud Computing is the fundamental change happening in the field
ofInformation Technology. It is a representation of a movement towards
the intensive, large scale specialization. Virtualization is the key
component of cloud computing. With the use of virtualization, cloud
computing brings about not only convenience and efficiency benefits,
but also great challenges in the field of data security and privacy
protection. For example, it maybe bind different tenants’ virtual
resources to the same physical resource, then the user data will be
accessed by other users. To solve this problem, the paper analyses and
discusses several ways to improve the safety of cloud computing.

INTRODUCTION
Cloud computing has improved computation’s efficiency while reducing
its cost for users[1].Virtualization is the key component of cloud
computing for providing computing and storage services. Although most
readers should be familiar with sharing CPU and storage facilities, the
memory leak and hard disk leak have not been described as well. This
paper introduces cloud computing, virtualization technologies, and
discusses the relationship between them, and presents risk of security
by the use of the virtualization technology and the ways to bring down
the danger. Virtualization is a core technology in cloud computing,
enabling the abstraction of physical hardware to create virtual
environments where multiple operating systems and applications can
run simultaneously. It allows cloud providers to optimize resources by
consolidating multiple workloads on a single physical server, reducing
hardware costs, improving scalability, and enhancing flexibility. By
isolating environments, virtualization increases security and stability,
ensuring that each application functions independently. This technology
is essential for the efficient delivery of cloud services, supporting
everything from infrastructure management to application deployment
in modern IT infrastructures.
LITERATURE REVIEW
Virtualization:
Virtualization is the "creation of a virtual (rather than actual) version of
something, such as a server, a desktop, a storage device, an operating
system or network resources".
In other words, Virtualization is a technique, which allows to share a
single physical instance of a resource or an application among multiple
customers and organizations. It does by assigning a logical name to a
physical storage and providing a pointer to that physical resource when
demanded.

The concept behind the Virtualization:


Creation of a virtual machine over existing operating system and
hardware is known as Hardware Virtualization. A Virtual machine
provides an environment that is logically separated from the underlying
hardware.
The machine on which the virtual machine is going to create is known as
Host Machine and that virtual machine is referred as a Guest Machine.
Types of Virtualization:
1. Application Virtualization
2. Network Virtualization
3. Desktop Virtualization
4. Storage Virtualization
5. Server Virtualization
6. Data virtualization

1. Application Virtualization: Application virtualization helps a user to


have remote access to an application from a server. The server stores all
personal information and other characteristics of the application but can
still run on a local workstation through the internet. An example of this
would be a user who needs to run two different versions of the same
software. Technologies that use application virtualization are hosted
applications and packaged applications.
2. Network Virtualization: The ability to run multiple virtual networks
with each having a separate control and data plan. It co-exists together
on top of one physical network. It can be managed by individual parties
that are potentially confidential to each other. Network virtualization
provides a facility to create and provision virtual networks, logical
switches, routers, firewalls, load balancers, Virtual Private Networks
(VPN), and workload security within days or even weeks.
3. Desktop Virtualization: Desktop virtualization allows the users’ OS to
be remotely stored on a server in the data center. It allows the user to
access their desktop virtually, from any location by a different machine.
Users who want specific operating systems other than Windows Server
will need to have a virtual desktop. The main benefits of desktop
virtualization are user mobility, portability, and easy management of
software installation, updates, and patches.
4. Storage Virtualization: Storage virtualization is an array of servers
that are managed by a virtual storage system. The servers aren’t aware
of exactly where their data is stored and instead function more like
worker bees in a hive. It makes managing storage from multiple sources
be managed and utilized as a single repository. storage virtualization
software maintains smooth operations, consistent performance, and a
continuous suite of advanced functions despite changes, breaks down,
and differences in the underlying equipment.
5. Server Virtualization: This is a kind of virtualization in which the
masking of server resources takes place. Here, the central server
(physical server) is divided into multiple different virtual servers by
changing the identity number, and processors. So, each system can
operate its operating systems in an isolated manner. Where each sub-
server knows the identity of the central server. It causes an increase in
performance and reduces the operating cost by the deployment of main
server resources into a sub-server resource. It’s beneficial in virtual
migration, reducing energy consumption, reducing infrastructural costs,
etc.
6. Data Virtualization: This is the kind of virtualization in which the data
is collected from various sources and managed at a single place without
knowing more about the technical information like how data is collected,
stored & formatted then arranged that data logically so that its virtual
view can be accessed by its interested people and stakeholders, and
users through the various cloud services remotely. Many big giant
companies are providing their services like Oracle, IBM, At scale, Cdata,
etc.

Work of Virtualization in Cloud Computing :


Virtualization plays a very important role in the cloud computing
technology, normally in the cloud computing, users share the data
present in the clouds like application etc, but actually with the help of
virtualization users shares the Infrastructure. The main usage of
Virtualization Technology is to provide the applications with the standard
versions to their cloud users, suppose if the next version of that
application is released, then cloud provider has to provide the latest
version to their cloud users and practically it is possible because it is
more expensive.
To overcome this problem we use basically virtualization technology, By
using virtualization, all severs and the software application which are
required by other cloud providers are maintained by the third party
people, and the cloud providers has to pay the money on monthly or
annual basis.
Benefits of Virtualization
 More flexible and efficient allocation of resources.
 Enhance development productivity.
 It lowers the cost of IT infrastructure.
 Remote access and rapid scalability.
 High availability and disaster recovery.
 Pay peruse of the IT infrastructure on demand.
 Enables running multiple operating systems.

Drawback of Virtualization
 High Initial Investment: Clouds have a very high initial investment,
but it is also true that it will help in reducing the cost of companies.
 Learning New Infrastructure: As the companies shifted from
Servers to Cloud, it requires highly skilled staff who have skills to
work with the cloud easily, and for this, you have to hire new staff
or provide training to current staff.
 Risk of Data: Hosting data on third-party resources can lead to
putting the data at risk, it has the chance of getting attacked by any
hacker or cracker very easily.
CONCLUSION
Virtualization in cloud computing is a foundational technology that
enables the creation of virtual versions of physical hardware, such as
servers, storage, and networks. It allows multiple operating systems and
applications to run on a single physical machine, optimizing resource
use and reducing costs. Virtualization enhances flexibility, scalability, and
efficiency, as it enables rapid provisioning of resources and simplifies
management. This technology is key to the cloud’s ability to offer on-
demand services, improve disaster recovery, and support dynamic
workloads, making it essential for modern cloud infrastructure

REFERENCES

Luo, Y.: Network I/O Virtualization for Cloud Computing in Plastics. IT
Professional 12, 536–541 (2010)

 Xue, J.: The research of security mechanism in the cloud computing


platform based on virtualization technology, Master’s degree paper,
vol. 2 (2010)

 Peng, L.: Cloud Computing. Publishing House of Electronic Industry,


Beijing (2010) (in Chinese)

 Peter, M., Timothy, G.: The NIST Definition of Cloud Computing


(Draft).NIST Special Publication 800-145, 6–7

 Shuai, Z.: Cloud Computing Research and Development Trend. In:


2010 Second International Conference on Future Networks, pp. 93–97.
IEEE Computer Society, Piscataway (2010)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy