You are on page 1of 15

118A1075

TEJAS SAWANT
BE-CE-D

EXPERIMENT-2

VIRTUALIZATION
Virtualization is the "creation of a virtual (rather than actual) version of something, such as a
server, a desktop, a storage device, an operating system or network resources".

In other words, Virtualization is a technique, which allows to share a single physical instance
of a resource or an application among multiple customers and organizations. It does by
assigning a logical name to a physical storage and providing a pointer to that physical resource
when demanded.

Creation of a virtual machine over existing operating system and hardware is known as
Hardware Virtualization. A Virtual machine provides an environment that is logically
separated from the underlying hardware.

The machine on which the virtual machine is going to create is known as Host Machine and
that virtual machine is referred as a Guest Machine.

HOW DOES VIRTUALIZATION WORK ?

Figure 1: How virtualization works.

Software called hypervisors separate the physical resources from the virtual environments—
the things that need those resources. Hypervisors can sit on top of an operating system (like
on a laptop) or be installed directly onto hardware (like a server), which is how most
enterprises virtualize. Hypervisors take your physical resources and divide them up so that
virtual environments can use them. Resources are partitioned as needed from the physical
environment to the many virtual environments. Users interact with and run computations
within the virtual environment (typically called a guest machine or virtual machine). The
virtual machine functions as a single data file. And like any digital file, it can be moved from
one computer to another, opened in either one, and be expected to work the same.

PARAVIRTUALIZATION is virtualization in which the guest operating system (the one being
virtualized) is aware that it is a guest and accordingly has drivers that, instead of issuing
hardware commands, simply issue commands directly to the host operating system. This also
includes memory and thread management as well, which usually require unavailable
privileged instructions in the processor.

FULL VIRTUALIZATION is virtualization in which the guest operating system is unaware that it
is in a virtualized environment, and therefore hardware is virtualized by the host operating
system so that the guest can issue commands to what it thinks is actual hardware, but really
are just simulated hardware devices created by the host.

PARTIAL VIRTUALIZATION is virtualization in which the virtual machine simulates multiple


instances of much of an underlying hardware environment, particularly address spaces. A key
form of partial virtualization is address space virtualization, in which each virtual machine
consists of an independent address space.

TYPES OF VIRTUALIZATION

1. DATA VIRTUALIZATION

Figure 2: Data Virtualization.

Data that’s spread all over can be consolidated into a single source. Data virtualization
allows companies to treat data as a dynamic supply—providing processing capabilities
that can bring together data from multiple sources, easily accommodate new data
sources, and transform data according to user needs.
2. DESKTOP VIRTUALIZATION

Figure 3: Desktop Virtualization.

Easily confused with operating system virtualization—which allows you to deploy multiple
operating systems on a single machine—desktop virtualization allows a central
administrator (or automated administration tool) to deploy simulated desktop
environments to hundreds of physical machines at once.

3. SERVER VIRTUALIZATION

Figure 4: Server virtualization.

Servers are computers designed to process a high volume of specific tasks really well so
other computers—like laptops and desktops—can do a variety of other tasks. Virtualizing
a server lets it to do more of those specific functions and involves partitioning it so that
the components can be used to serve multiple functions.
4. OPERATING SYSTEM VIRTUALIZATION

Figure 5: Operating System Virtualization.

Operating system virtualization happens at the kernel—the central task managers of


operating systems. It’s a useful way to run Linux and Windows environments side-by-side.
Enterprises can also push virtual operating systems to computers, which: Reduces bulk
hardware costs, since the computers don’t require such high out-of-the-box capabilities,
increases security, since all virtual instances can be monitored and isolated limits time
spent on IT services like software updates.

5. NETWORK FUNCTIONS VIRTUALIZATION

Figure 6: Network Functions Virtualization.

Network functions virtualization (NFV) separates a network's key functions (like directory
services, file sharing, and IP configuration) so they can be distributed among
environments. Once software functions are independent of the physical machines they
once lived on, specific functions can be packaged together into a new network and
assigned to an environment.
FEATURES
1. INCREASED SECURITY
The ability to control the execution of a guest program in a completely transparent
manner opens new possibilities for delivering a secure, controlled execution
environment. All the operations of the guest programs are generally performed against
the virtual machine, which then translates and applies them to the host programs.

2. MANAGED EXECUTION
In particular, sharing, aggregation, emulation, and isolation are the most relevant
features.

Figure 7: Functions enabled by a managed execution.

3. SHARING
Virtualization allows the creation of a separate computing environment within the same
host. This basic feature is used to reduce the number of active servers and limit power
consumption.

4. AGGREGATION
It is possible to share physical resources among several guests, but virtualization also
allows aggregation, which is the opposite process. A group of separate hosts can be tied
together and represented to guests as a single virtual host. This functionality is
implemented with cluster management software, which harnesses the physical
resources of a homogeneous group of machines and represents them as a single
resource.
5. EMULATION
Guest programs are executed within an environment that is controlled by the
virtualization layer, which ultimately is a program. Also, a completely different
environment with respect to the host can be emulated, thus allowing the execution of
guest programs requiring specific characteristics that are not present in the physical
host.

6. ISOLATION
Virtualization allows providing guests—whether they are operating systems, applications,
or other entities—with a completely separate environment, in which they are executed.
The guest program performs its activity by interacting with an abstraction layer, which
provides access to the underlying resources. The virtual machine can filter the activity of
the guest and prevent harmful operations against the host.

7. PORTABILITY
The concept of portability applies in different ways according to the specific type of
virtualization considered. In the case of a hardware virtualization solution, the guest is
packaged into a virtual image that, in most cases, can be safely moved and executed on
top of different virtual machines. In the case of programming-level virtualization, as
implemented by the JVM or the .NET runtime, the binary code representing application
components (jars or assemblies) can run without any recompilation on any
implementation of the corresponding virtual machine.

ADVANTAGES
1. USES HARDWARE EFFICIENTLY
Most businesses spend a lot of capital setting up their systems and servers but eventually
use only a fraction of it effectively. Instead, if they opt for virtualization, they can create
multiple instances on the same hardware and extract the maximum value out of it.

2. AVAILABLE AT ALL TIMES


One significant advantage of virtualization is the advanced features that it provides;
allowing virtual instances to be available at all times. The biggest advantage here is the
capability to move the virtual instance from one server location to another. It can be done
without having to close and restart the processes that are already running.

3. RECOVERY IS EASY
With virtual instances on remote servers, duplication, backup, and recovery are also
easier.
4. QUICK AND EASY SETUP
Setting up physical systems and servers is a time-consuming affair. You need to raise a
purchase order and wait for it to be processed. Once done, then await the products to be
shipped and set up, which can take hours. Overall, it is a long wait worth days or even
weeks for the entire setting-up process. On the flipside, with virtualization, you can simply
get started within minutes have a productive setup.

5. CLOUD MIGRATION IS EASIER


Many organizations are using old school methodologies even today. With the current
digital transformation wave, organizations are looking to move to the cloud for various
advantages. Virtualization would have made the task much easier because most of the
data would already be available on a server.

DISADVANTAGES
1. HIGH INITIAL INVESTMENT
As helpful virtualization is, it does have some flaws, and the high initial investment is one
of the major one. Virtualization indeed helps the business reduce operational costs. But
the initial setup cost of servers and storage is higher than a regular setup. Hence,
companies need years before they break even and then realize savings and higher
profitability with virtualization. It is a bad bet for companies opting for a large set up at
the beginning. They could instead opt for a regular desktop setup and then gradually
make a move to desktop virtualization.

2. DATA CAN BE AT RISK


Working on virtual instances on shared hardware resources entails your data is hosted
on a third-party resource. It can leave your data vulnerable to attacks or unauthorized
access. This is a challenge if your service provider does not have proper security solutions
to safeguard your virtual instance and data. It is true, specifically in the case of storage
virtualization.

3. QUICK SCALABILITY IS A CHALLENGE


Scaling on virtualization is a breeze, but not so much if it has to be done in a short period
of time. In case of physical setup, one can quickly set up new hardware and scale, even
if it entails some initial setting up complications. With virtualization, having to ensure all
the requisite software, security, enough storage, and resource availability can be a
tedious task. It consumes more time than one might expect since a third-party provider
is involved. Moreover, the additional cost involved in increased resource use is another
challenge to manage.
4. PERFORMANCE WITNESSES A DIP
It is true that virtualization allows the optimum use of all resources. However, it is also
a challenge when you need that additional boost sometimes, but it is not available.
Resources in virtualization are shared. As the complexity of tasks increases, so does the
need for performance from the system. It results in a substantially higher time required
to complete the task.

5. UNINTENDED SERVER SPRAWL


Unintended server sprawl is a major cause of concern for many server admins and users
alike. Many issues that service desk persons raise is of server sprawls. Setting up a physical
server consumes time and resources, whereas a virtual server can be created in a matter
of minutes. Every time, instead of reusing the same virtual server, users tend to create
new servers since it allows them the chance to make a fresh start. The server
administrator who should be handling five or six servers has to handle over 20 virtual
servers. This can cause a major complication in the smooth operations, and forced
termination of certain servers can also cause loss of data.

HYPERVISOR
A hypervisor, also known as a virtual machine monitor or VMM, is software that creates and
runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest
VMs by virtually sharing its resources, such as memory and processing.

There are several benefits to using a hypervisor that hosts multiple virtual machines:

1. Speed: Hypervisors allow virtual machines to be created instantly, unlike bare-metal


servers. This makes it easier to provision resources as needed for dynamic workloads.
2. Efficiency: Hypervisors that run several virtual machines on one physical machine’s
resources also allow for more efficient utilization of one physical server. It is more
cost- and energy-efficient to run several virtual machines on one physical machine
than to run multiple underutilized physical machines for the same task.
3. Flexibility: Bare-metal hypervisors allow operating systems and their associated
applications to run on a variety of hardware types because the hypervisor separates
the OS from the underlying hardware, so the software no longer relies on specific
hardware devices or drivers.
4. Portability: Hypervisors allow multiple operating systems to reside on the same
physical server (host machine). Because the virtual machines that the hypervisor runs
are independent from the physical machine, they are portable. IT teams can shift
workloads and allocate networking, memory, storage and processing resources across
multiple servers as needed, moving from machine to machine or platform to platform.
When an application needs more processing power, the virtualization software allows
it to seamlessly access additional machines.
TYPES OF HYPERVISORS
1. TYPE-1 HYPERVISOR:

Figure 8: Type-1 Hypervisor.

The hypervisor runs directly on the underlying host system. It is also known as “Native
Hypervisor” or “Bare metal hypervisor”. It does not require any base server operating system.
It has direct access to hardware resources. Examples of Type 1 hypervisors include VMware
ESXi, Citrix XenServer and Microsoft Hyper-V hypervisor.

Pros & Cons of Type-1 Hypervisor:

Pros: Such kind of hypervisors are very efficient because they have direct access to the
physical hardware resources (like Cpu, Memory, Network, Physical storage). This causes the
empowerment the security because there is nothing any kind of the third-party resource so
that attacker couldn’t compromise with anything.

Cons: One problem with Type-1 hypervisor is that they usually need a dedicated separate
machine to perform its operation and to instruct different VMs and control the host hardware
resources.
2. TYPE-2 HYPERVISOR:

Figure 9: Type-2 Hypervisor.

A Host operating system runs on the underlying host system. It is also known as ‘Hosted
Hypervisor”. Such kind of hypervisors doesn’t run directly over the underlying hardware
rather they run as an application in a Host system (physical machine). Basically, software
installed on an operating system. Hypervisor asks the operating system to make hardware
calls. Example of Type 2 hypervisor includes VMware Player or Parallels Desktop. Hosted
hypervisors are often found on endpoints like PCs. The type-2 hypervisor is are very useful
for engineers, security analyst

Pros & Cons of Type-2 Hypervisor:

Pros: Such kind of hypervisors allows quick and easy access to a guest Operating System
alongside the host machine running. These hypervisors usually come with additional useful
features for guest machine. Such tools enhance the coordination between the host machine
and guest machine.

Cons: Here there is no direct access to the physical hardware resources so the efficiency of
these hypervisors lags in performance as compared to the type-1 hypervisors, and potential
security risks are also there an attacker can compromise the security weakness if there is
access to the host operating system so he can also access the guest operating system.
Figure 10: Type 1 Hypervisor v/s Type 2 Hypervisor.
INSTALLATION

Figure 11: Creating a new machine.

Figure 12: Machine name and Memory size.


Figure 13: Create Virtual Hard disk.

Figure 14: Storage and location.


Figure 15: Ubuntu .iso image and Ubuntu Installation.

Figure 16: Ubuntu Installed.

CONCLUSION
In conclusion, virtualization is the technique of creating a virtual version of a computer
hardware platform, storage device or a network resource. Virtualization can increase IT
agility, flexibility and scalability while creating significant cost savings.

We have also demonstrated and installed Ubuntu on Virtual Box.


REFERENCES
[1] https://www.javatpoint.com/virtualization-in-cloud-computing
[2] https://www.redhat.com/en/topics/virtualization/what-is-virtualization
[3] https://www.geeksforgeeks.org/characteristics-of-virtualization/
[4] https://www.hitechnectar.com/blogs/pros-cons-virtualization/
[5] https://pediaa.com/what-is-the-difference-between-type-1-and-type-2-hypervisor/
[6] https://www.geeksforgeeks.org/hypervisor/
[7] “Inkscape graphic showing a Hypervisor type 1″ By HennR
[8] “Inkscape graphic showing a Hypervisor type 2″ By HennR
[9] https://www.quora.com/What-is-full-virtualization-partial-virtualization-and-
paravirtualization

You might also like