Mod2 Cloud
Mod2 Cloud
Virtualization Concept
Creating a virtual machine over existing operating system and
hardware is referred as Hardware Virtualization. Virtual Machines
provide an environment that is logically separated from the underlying
hardware.
HYPERVISOR
Page 1|5
Type 2 hypervisor is a software interface that emulates the devices
with which a system normally interacts. Containers, KVM, Microsoft
Hyper V, VMWare Fusion, Virtual Server 2005 R2, Windows Virtual PC
and VMWare workstation 6.0 are examples of Type 2 hypervisor. The
following diagram shows the Type 2 hypervisor.
Page 2|5
Types of Hardware Virtualization
FULL VIRTUALIZATION
Page 3|5
PARAVIRTUALIZATION
EMULATION VIRTUALIZATION
Page 5|5
VIRTUALIZATION IN CLOUD COMPUTING
TYPES OF VIRTUALIZATION
1. Hardware Virtualization.
2. Operating system Virtualization.
3. Server Virtualization.
4. Storage Virtualization.
1) HARDWARE VIRTUALIZATION:
1|Page
virtualization.The main job of hypervisor is to control and monitoring
the processor, memory and other hardware resources. After
virtualization of hardware system we can install different operating
system on it and run different applications on those OS.
3) SERVER VIRTUALIZATION:
2|Page
4) STORAGE VIRTUALIZATION:
3|Page
Mainly Virtualization means, running multiple operating systems on a
single machine but sharing all the hardware resources. And it helps us
to provide the pool of IT resources so that we can share these IT
resources in order get benefits in the business.
4|Page
HOW VIRTUALIZATION WORKS?
1|Page
It can be also explained in a way that with the help of Hypervisor
which is software the cloud customer can access server. A hypervisor
is connectivity between the server and the virtual environment and
distributes the resources between different virtual environments.
Benefits of Virtualization
2|Page
SECURITY
FLEXIBLE OPERATIONS
ECONOMICAL
3|Page
ELIMINATES THE RISK OF SYSTEM FAILURE
While performing some task there are chances that the system might
crash down at the wrong time. This failure can cause damage to the
company but the virtualizations help you to perform the same task in
multiple devices at the same time. The data can store in the cloud it
can retrieve anytime and with the help of any device. Moreover, there
is two working server side by side which makes the data accessible
every time. Even if a server crashes with the help of the second server
the customer can access the data.
The data can transfer to the virtual server and retrieve anytime. The
customers or cloud provider don’t have to waste time finding out hard
drives to find data. With the help of virtualization, it will very easy to
locate the required data and transfer them to the allotted authorities.
This transfer of data has no limit and can transfer to a long distance
with the minimum charge possible. Additional storage can also provide
and the cost will be as low as possible.
PROS OF VIRTUALIZATION
4|Page
2. It can reduce IT costs
5|Page
6. It greatly helps with development
6|Page
3. It puts data at risk
While virtualization is very easy to deploy, there is always the risk that
new servers would be added even if they are not necessary. For
instance, instead of having 10 virtual servers that you really need, you
might have 20 or more.
Most of the time, the terms availability and scalability are intertwined
when it comes to networking, as both are relevant to server
virtualization after all. Availability would become a problem if
virtualized servers go offline and every website they host would also
fail. Scalability is even trickier, considering that virtualization offers a
means for several small businesses to share the costs associated with
hosting. As you can see, while a business may start out small, there is
always the possibility that it could grow big and easily dominate a
virtualized server, robbing resources from other websites.
8|Page
Virtualization - Xen: Paravirtualization
1|Page
Above figure describes the Xen Architecture and its mapping onto a
classic x86 privilege model. A Xen based system is handled by Xen
hypervisor, which is executed in the most privileged mode and
maintains the access of guest operating system to the basic hardware.
Guest operating system are run between domains, which represents
virtual machine instances.
Here, Ring 0 represents the level having most privilege and Ring 3
represents the level having least privilege. Almost all the frequently
used Operating system, except for OS/2, uses only two levels i.e. Ring
0 for the Kernel code and Ring 3 for user application and non-privilege
OS program. This provides a chance to the Xen to implement
paravirtualization. This enables Xen to control unchanged the
Application Binary Interface (ABI) thus allowing a simple shift to Xen-
virtualized solutions, from an application perspective.
2|Page
Due to the structure of x86 instruction set, some instructions allow
code execution in Ring 3 to switch to Ring 0 (Kernel mode). Such an
operation is done at hardware level, and hence between a virtualized
environment, it will lead to a TRAP or a silent fault, thus preventing
the general operation of the guest OS as it is now running in Ring 1.
3|Page
OS are designed to be virtualized, the problem is getting resolved and
new hardware supports x86 virtualization.
The major benefit of this approach is that guests can run unmodified in
a virtualized environment, which is an important feature for operating
system whose source code does not existed. Binary translation is
portable for full virtualization. As well as translation of instructions at
5|Page
runtime presents an additional overhead that is not existed in other
methods like paravirtualization or hardware-assisted virtualization.
Contradict, binary translation is only implemented to a subset of the
instruction set, while the others are manged through direct execution
on the primary hardware. This depletes somehow the impact on
performance of binary translation.
7|Page