Virtualization
Cloud Computing
School of Computer Engineering
3
Virtualisation:
Concept
virtualization technologies have a long trail in the
history of computer science and have been available in
many flavors by providing virtual environments at the
operating system level, the programming language
level, and the application level
It is a broad concept that refers to the creation of a
virtual version of something, whether hardware, a
software environment, storage, or a network.
Mainly Virtualization means, running multiple operating
systems on a single machine but sharing all the
hardware resources.
And it helps us to provide the pool of IT resources so
that we can share these IT resources in order to get
benefits
Virtualisation:
3
Concept
In a virtualized environment there are three major
components: guest, host, and virtualization layer.
The guest represents the system component that
interacts with the virtualization layer rather than
with the host
The host represents the original environment where
the guest is supposed to be managed.
The virtualization layer is responsible for recreating
the same or a different environment where the guest
will operate
Virtualisation in Cloud
3 Computing
Virtualization is a technique, which allows
to share a single physical instance of a
resource or an application among multiple
customers and organizations.
It does by assigning a logical name to a
physical storage and providing a pointer
to that physical resource when
demanded.
Virtualization in cloud computing allows
you to run multiple applications and OS
on the same server, thereby providing for
Virtualization
4
Architecture
Virtualization
With the help of Virtualization multiple
operating systems and applications can run
on same Machine and its same hardware at
the same time increasing the utilization and
flexibility of hardware.
The machine on which the virtual
machine is going to be build is
known as Host Machine
and
that virtual machine is referred as a
Virtualization Reference Model
The virtualization model consists of
a host or physical resources in the first layer
virtualization tool in the second layer and
a guest in the third layer
Advantages of Virtualization
Allows any network-enabled device to access any
network application over any network.
Maintains isolation of one workload from another
application to enhance security in the environment.
Virtualization of an application allows users to be
comfortable with different versions of the operating
system.
can support and allow application with multiple
instances to run on various machines concurrently.
Optimizes the use of a single system.
Enhances the reliability or availability of an application
through redundancy.
Server/Compute Virtualization
In cloud computing, it refers to making a virtual edition of a
device or resource, such as a server, storage device, network, or
an operating system where the structure splits the resources as
one or more environments for execution.
The following are the advantages of server/compute
virtualization:
1. Consistency
2. Energy efficiency
3. Enhanced disaster recovery
4. Cost savings
A virtual machine is a reasonable computing system like a
physical machine which governs an application and operating
system (OS).
Server/Compute Virtualization
A virtual machine (VM) can be configured with the
following virtual components:
• Virtual central processing unit (vCPU)
• Virtual random access memory (vRAM)
• Virtual disk
• Virtual network adaptor (vNIC)
• Virtual DVD/CD-ROM and floppy drives
• Virtual SCSI (Small Computer System Interface)
controller
• Virtual USB controllers
• Virtual machine console
Server/Compute Virtualization
Server/Compute Components
The logical components of a server/compute system
comprise the following:
• File system
• Operating system
• Volume manager
• Device drivers
Hypervisor
5
The hypervisor is a firmware or low-level
program that acts as a Virtual Machine
Manager(VMM).
Hypervisor is a form of virtualization
software used in Cloud hosting to
divide and allocate the resources on
various pieces of hardware.
The program which provide partitioning,
isolation or abstraction is called
virtualization hypervisor.
Hypervisor is a hardware virtualization
technique that allows multiple guest
Types of
6
Hypervisors
Type 1 hypervisors run directly
on the system hardware. It dose
not require any base server
operating system. It has direct
access to hardware resources
Type 2 hypervisors run on a host
operating system that provides
virtualization services, such as I/O
device and memory management.
Type-1 Hypervisor
7
Hypervisors
Features of Type-1 and 2
9
Hypervisor
Type-1 Hypervisor:
provides better performance
provides greater flexibility
Servers that run Type 1 hypervisors are often single-
purpose servers that offer no other function.
Type 1 hypervisors are production hypervisors or
hypervisors that run VMs offering services to users.
support hardware virtualization.
Type-2 Hypervisor:
Less efficient
Less flexible
offer a series of different services.
rarely used in production.
perform software virtualization.
Virtualization
Types of
11
Virtualization
Hardware Virtualization
Software Virtualization
Memory Virtualization
Storage Virtualization
Data Virtualization
Network Virtualization
Desktop Virtualization
Application Virtualization
Hardware
12
Virtualization
Hardware virtualization also known as server
virtualization runs on the concept that an individual
independent segment of hardware or a physical
server, may be made up of multiple smaller
segments of hardware or servers, essentially
consolidating multiple servers into virtual servers
that run on a single primary physical server.
In hardware virtualization, software called hypervisor is used. With
the help of hypervisor virtual machine, software embedded into
the hardware component of the server. The work of hypervisor is
that it manages the physical hardware resource which is shared
between the customer and the provider.
Hardware
12
Virtualization
When the virtual machine software or virtual
machine manager (VMM) is directly installed
on the hardware system is known as
hardware virtualization.
The main job of hypervisor
is to control and monitoring the processor,
memory and other hardware resources.
After virtualization of hardware system we can install
different operating system on it and run different
applications on those OS.
Usage:Hardware virtualization is mainly done for the
Server Virtualization
When the virtual machine software or virtual
machine manager (VMM) is directly installed
on the Server system is known as server
virtualization.
Usage:
Server virtualization is done because a single physical server
can be divided into multiple servers on the demand basis and
for balancing the load.
Hardware
1
Virtualization:
Subty
3
pes
Full Virtualization –
• The underlying hardware is fully simulated.
• Guest software does not require any
modifications.
Para-virtualization –
• The hardware is not simulated instead
the guest software run their own isolated
domains.
Emulation Virtualization –
• The virtual machine simulates the
hardware and becomes independent of it.
Full virtualization
Full virtualization is a common and cost-
effective type of virtualization, which is
basically a method by which computer
service requests are separated from the
physical hardware that facilitates them.
With full virtualization, operating systems
and their hosted software are run on top of
virtual hardware.
It differs from other forms of virtualization
(like paravirtualization and hardware-
Full virtualization
Full virtualization is
fulfilled by the use of
both binary translation
and direct execution.
In full virtualization,
guest OS is completely
isolated by the virtual
machine from the
virtualization layer and
hardware.
Microsoft and Parallels
systems are examples of
Para virtualization
In para virtualization, the hardware is not
simulated
the guest software runs its isolated system.
It is not necessary to simulate the hardware,
but it utilizes an API which modifies the
guest operating system.
Para-virtualization
Paravirtualization is the
category of CPU virtualization
which uses hypercalls for
operations to handle
instructions at compile time.
In paravirtualization, guest OS
is not completely isolated but
it is partially isolated by the
virtual machine from the
virtualization layer and
hardware.
VMware and Xen are some
examples of
paravirtualization..
Emulation virtualization
In emulation virtualization, hardware is simulated by
the virtual machine and it is independent.
Here, the guest operating system does not require any
other modification.
In this virtualizations, computer hardware as
architectural support builds and manages a fully
virtualized VM.
Full Virtualization Vrs.
Paravirtualization
1. virtual machines permit 1. a virtual machine does not
the execution of the implement full isolation of OS
instructions with the but rather provides a different
running of unmodified OS API which is utilized when OS
in an entirely isolated is subjected to alteration.
2. PV is more secure than the
2. Full Virtualization is less FV
secure 3. PV uses hypercalls at
3. FV uses binary translation compile time for operations
and a direct approach as a
technique for operations. 4. PV is faster in operation as
4. FV is slow than PV in compared to FV
operation 5. Paravirtualization is less
portable and compatible
5. FV is more portable and 6. Examples of
compatible paravirtualization are Microsoft
6. Examples of full Hyper-V, Citrix Xen, etc.
Full Virtualization Vrs.
Paravirtualization7. The guest operating
7. It supports all guest
operating systems system has to be
without modification. modified and only a few
operating systems
8. The guest operating support it.
system will issue 8. Using the drivers, the
hardware calls. guest operating system
will directly communicate
9. It is less streamlined with the hypervisor
compared to para-
virtualization. 9. It is more streamlined.
10.It provides the best
isolation 10.It provides less
isolation compared to full
virtualization.
Hardware
14
Virtualization:
Subtypes
Full Para Emulatio
Virtualization Virtualization n
Software
15
Virtualization
• Software Virtualization involves
the creation and operation of
multiple virtual environments on
the host machine.
• It is used to enable a complete
computer system in order to allow
the guest operating system to run.
• For instance, letting LINUX OS to
run as a guest that is natively
using a Microsoft Windows OS.
Software
16
Virtualization :Subtypes
Operating System Virtualization –
hosting multiple OS on
the native OS
Application Virtualization –
hosting individual
applications in a virtual environment
separate from the native OS
Service Virtualization –
hosting specific
services related to a particular
Operating System
16 Virtualization
Operating System Virtualization –
hosting multiple OS on
the native OS
When the virtual machine software or
virtual machine manager (VMM) is
installed on the Host operating
system instead of directly on the
hardware system is known as
operating system virtualization.
Usage:
Operating System Virtualization is mainly
Memory
1
7 Virtualization
•P hy s i c a l
m e m o r y a c ro s s d i ff e re n t
s e r ve r s i
s aggregated into a single virtualized memory pool.
•It provides the benefit of an enlarged contiguous
working memory.
•For instance, as some OS such as Microsoft
Windows OS allows a portion of your storage disk to
serve as an extension of your RAM.
Memory Virtualization:
18
Subtypes
Application-level control – Applications access
the memory pool directly.
Operating system level control – Access to
the memory pool is provided through an
operating system.
Storage
Virtualization
•19
•Multiple physical storage devices are
grouped together, which then appear
as a single storage device.
•This provides various advantages
such as homogenization of storage
across storage devices of multiple
capacity and speeds, reduced downtime,
load balancing and be tte r
o ptim izatio n o f performance and
speed.
Storage
Virtualization
•19
•Storage virtualization is the process of
grouping the physical storage from
multiple network storage devices so that
it looks like a single storage device.
•Storage virtualization is also
implemented by using software
applications.
•Usage:
•Storage virtualization is mainly done
for back-up and recovery purposes.
Storage Virtualization:
Subtypes 20
1. Block
Virtualization –
Virtualisation on
block level means
that storage
capacity is made
available to the
operating system
or the
applications in
the form of virtual
Storage Virtualization:
Subtypes
2. File
Virtualization
Virtualisation on file
level means that the
virtualisation entity
provides virtual
storage to the
operating systems or
applications in the
form of files and
directories
Data Virtualization
21
•It lets us to easily
manipulate data,
as the data is
presented as a n
a b stract l ayer
co m pl etel y
independent of
data structure
and database
systems.
•Decreases data
input and formatting
Network
Virtualization
22
In network virtualization, multiple sub-
networks can be created on the same
physical network, which may or may not
is authorized to communicate with each
other.
This enables restriction of file
movement across networks and
enhances security, and
allows better monitoring and
identification of data usage.
It also increases reliability as a
disruption in one network doesn’t affect
Exploring Network Virtualization
In network virtualization, multiple virtual networks run
with the help of a physical
network as shown in Fig.
Network virtualization comprises
rationally grouping and segmenting
physical network(s) into distinct rational
units known as ‘virtual network(s)’ and
forming them to act as one or multiple
separate network(s).
It permits multiple virtual networks to
share network resources.
Exploring Network Virtualization
In virtual data center (VDC), network virtualization comprises
virtualization of both VM and physical networks.
The physical network may consist of network routers, hubs, switches,
repeaters, adapters, and bridges.
A VM network exists within a physical server.
A computer on which a hypervisor runs one or more virtual machines
is called a host machine, and each virtual machine is called a guest
machine.
Network virtualization permits a manager to construct multiple
virtual networks in the data center (DC).
A virtual network offers alignment of all the nodes which belong to a
similar working unit in an enterprise.
Benefits of Network Virtualization
Reduction of hardware expense
Energy expenses
Recoverability
Disaster recuperation
Features of Network Components
Virtual Switches
Virtual LAN
Virtual Switches:
Virtual switches act as an interface between virtual
ethernet and the physical ethernet. Virtual switches
develop VM network and support the ethernet protocol .
They manage storage, administration, and VM migration
traffic to and from the hypervisor kernel.
A virtual switch can have multiple port groups.
Features of Network Components
The IBM system Networking Distributed Virtual
Switch 5000V is a superior, feature rich distributed
virtual switch for VMware environments along
with policy-based VM associatively. The IBM
Distributed Virtual Switch (DVS) 5000V allows
network managers accustomed with IBM System.
Features of Network Components
Virtual LAN allows one to have separate LANs among ports on the same switch.
VLAN trunking allows traffic from multiple VLANs to traverse a single network
connection.
VLAN membership can be defined in several ways:
(a) Port-based
(b) Protocol-based
(c) MAC-layer grouping
(d) Network-layer grouping
(e) Multicast grouping
(f) Policy grouping
Network
23
Virtualization :Subtypes
Internal network:
Enables a single
system to function
like a network
External
network:
Consolidation of
multiple
networks into a
single one, or
Desktop
•24
Virtualization
•This is perh a p s t h e m o s t c o m m
o n f o r m o f virtualization for any
regular IT employee.
•The user’s desktop is stored on a remote
server, allowing the user to access his
desktop from any device or location.
•Employees can work conveniently from
the comfort of their home. Since the data
transfer takes place over secure
protocols, any risk of data theft is
minimized.
Desktop virtualization
Desktop virtualization is actually a type of illusion provided to the user using
different techniques.
It involves encapsulating and delivering either access to an entire information
system environment or the environment itself to a remote client device.
For IT organizations, desktop administration is expensive, manual, and time-
consuming.
As compared to desktop virtualization, server virtualization makes datacenters
more quick and effective by advanced levels of accessibility, quicker application
delivery, and enhanced utilization.
Desktop Virtualization
Desktop virtualization is a type of software technology used to
separate the desktop and its connected application software from the
physical device used by the client.
Remote desktop virtualization works in a manner similar to client–
server model in which applications can be executed on any remote
desktop with different operating systems and with the help of the
protocol of remote display, a user can interact with the application as
shown in Fig. 8.1.
In a virtualized desktop, virtualization breaks the connection between
hardware and the elements facilitate the IT staff to alter, update, and
organize these elements independently for greater business quickness
and improved response time.
Desktop Virtualization
Advantages of Desktop
Virtualization
Simpler provisioning of new desktops
Installation of new applications at cheap rates
Desktop image-management capabilities
Increased data security
Longer time given for customer desktop infrastructure
Protected reserved access to a business’ desktop settings
Advantages of Desktop
Virtualization
Facilitation of thin clients
Improved security
Better business continuity and disaster recovery
Abridged PC repairs
Suppleness of access
Improved deployment and management
Features of Desktop Virtualization
Drivers
Reduction in cost of desktops
Reduction in management cost of desktop
Easy setting of desktops
Reduced cost to refresh desktops
Techniques used for Desktop
Virtualization
The two desktop virtualization techniques basically used
for providing services to users are as follows:
• Remote desktop services (RDS)
• Virtual desktop infrastructure (VDI)
VDI and RDS are designed for providing services to users as
per their requirement.
Differences between RDS and VDI
Remote Desktop Services
Remote desktop services (RDS) is customarily called
terminal services. It is a blanket term for characteristics of
Microsoft Windows server which permits consumers to
distantly access Windows applications and graphical
desktops.
The advantages of RDS are as follows:
Data recovery in tragedy
Operation from anyplace
Economical
Remote Desktop Services
The disadvantages of RDS are as follows:
Requirement of powerful RDS
Requirement of RDS monitoring
Requirement of reliable network
Requirement of right adjustment in network
Knowledgeable administrator
Virtual Desktop Infrastructure
Virtual desktop infrastructure (VDI) refers to the hosting of
a desktop OS running in a VM on a server in the virtual
data center (VDC).
VDI allows a user to access a remote desktop environment
from an endpoint device via a remote desktop delivery
protocol.
The VDI architecture consists of several components that
work together to provide an end-to-end solution.
Virtual Desktop Infrastructure
Advantages of VDI are:
Low price in buying desktop computers
Centralized client operating system management
Swift client implementation
Reduction in the costs of desktop
Reduction in the cost of electricity
Enhanced security of data
Protected remote access
Lesser applications compatibility troubles
Virtual Desktop Infrastructure
Disadvantages of VDI are:
Printing normally involves third-party appends
Scanning is natively unsupported
Bi-directional audio is natively unsupported
Exhibit protocols are unsuitable for graphic design
Needs low-latency association between the virtual
infrastructure and customer
Needs enterprise class server hardware and storage areas
network for VMs permanently delivered to particular users
Needs trained IT staff
Components for Desktop
Virtualization
The VDI architecture consists of several components that
work together to
provide an end-to-end solution. The main components
are:
• Endpoint devices
• A connection broker
• VM hosting
Application Virtualization
Application Virtualization technology offers skills to
install applications without altering or making any variation
to the file system, underlying OS, or registry of the
computing platform in which they are installed as shown in
Figure
© Oxford University Press 2018. All rights reserved
Application Virtualization
Technology categories that fall under application
virtualization include the following:
• Streaming of application: Before startup, rather than
delivering the whole application, portions of the
application’s code, settings, and data are delivered
according to their requirement.
• VDI or desktop virtualization: The application is
introduced in blade PC or VM which also comprises the
operating system (OS). This makes management of
infrastructure and formation of virtual desktops easy to
grant access of virtual desktops. VDI may normally fill up
the gaps wherever applications’ streaming fails.
Application Virtualization
Advantages of Application Virtualization:
Improved workload management
Reduced hardware cost
Increased flexibility for working remotely
Simplified application deployment: Applications are never
installed on to an operating System; hence the deployment
of the applications is greatly simplified. Furthermore,
complete removal of all application bits from a PC during
retirement is assured.
Application Virtualization
Simplified operating system image management: Since
applications are completely different from the OS,
managing OS images is simpler, especially during OS
patches and upgrades. It helps to create a more dynamic
desktop environment, in which the desktop is an
aggregation of separately managed components.
Elimination of resource conflicts: Since each application
has its own virtual OS resources, resource and application
conflict issues are eliminated.
Application Virtualization
Limitations of Application Virtualization:
All software cannot be virtualized. For example,
applications that require a device driver or 16-bit
applications that require shared memory space cannot be
virtualized.
Some types of software cannot be virtualized, such as anti-
virus packages and applications that require heavy OS
integration.
Tools used for Application
Virtualization
The tools for application virtualization include:
Microsoft Application Virtualization (App-V)
VMWare ThinApp
Flexera Software Supporting Application Virtualization
Types of
2
Virtualization:
Glan At a
5
ce
Benefits of Virtualization
26
Easily outsource your hardware and eliminate
any energy costs associated with its operation.
the efficiency, security and cost advantages.
Run operating systems where the
physical hardware is unavailable.
Easier to create new machines, backup
machines, etc.
Software testing using “clean” installs of
operating systems and software
Emulate more machines than are physically
available.
Timeshare lightly loaded systems on one host.
Storage Area Network
Storage area network (SAN) refers to the LAN design for
managing huge amounts of data transfer.
It uses interconnection technology for supporting data storage,
retrieval, and replication. NAS works on TCP/IP, whereas SAN for
disk blocks transformation works on low-level network protocols.
Storage area networks are actually designed for data
management. It is a rapid storage device network and can be
connected with servers.
SAN is helpful for transferring data from one storage device to
another without disturbing other devices.
SAN also supports fast backup as CPU cycles of server are not
involved in the backup process. At the time of recovery, SAN plays
an important role.
Storage Area Network
Network Attached Storage
Network-attached storage (NAS) is actually a dedicated
file storage device for providing local area network
nodes with file-based shared storage using a standard
ethernet connection.
NAS has its own IP address and each NAS exists on the
LAN as an independent network node.
Some examples of NAS devices include Seagate Central, Seagate
Business Storage NAS, and 8-Bay Rackmounts. All NAS products
provide a secure and centralized location for the files.
Accessing of NAS system storage data is easy—it can be
accessed from anywhere, whether one is in own house, on
another computer, or through mobile, Wi-fi technology, etc.
Network Attached Storage
NAS has the following benefits:
Broad access to information
Better efficiency
Better flexibility
Centralized storage
Simplified management
Scalability
High availability
Security
Network Attached Storage
NAS has the following components:
NAS head (CPU and memory)
Network interface cards (NICs) for providing connectivity
Operating system for handling NAS functionality
Network file system (NFS) and common Internet file system (CIFS)
protocols for file sharing. NFS mainly supports UNIX-based
operating environments, whereas CIFS is supported by Microsoft
Windows-based operating environments. Supported file sharing
protocols facilitate users to share files with different operating
platforms.
Storage protocols to connect and manage physical disk resources
Storage array
Comparison between SAN and NAS:
Comparison between SAN and NAS:
• Storage area network (SAN) supports
networking, whereas network-attached
storage (NAS) is a storage device, in a
network.
• Operating systems consider SAN as a
disk, whereas a NAS device is a file
server.
• SAN supports block-level storage for
servers, whereas NAS devices support
file-level storage. For saving files such
as word documents or MS Excel
spreadsheets, NAS is generally used.