Professional Documents
Culture Documents
Learning Objectives
At the end of this chapter you will be able to understand:
t INTRODUCTION
l Meaning and Level of Virtualization
t VIRTUALIZATION STRUCTURES AND MECHANISMS
l Hypervisor
l Type 1 Hypervisor
l Type 2 Hypervisor
t APPROACHES TO VIRTUALIZATION
t TYPES OF VIRTUALIZATION
l Server Virtualization
l Storage Virtualization
l Network Virtualization
l Operating System Virtualization
l Desktop (Client) Virtualization
l Application Server Virtualization
t VIRTUAL CLUSTERS AND RESOURCE MANAGEMENT
t VIRTUALIZATION FOR DATA-CENTER AUTOMATION
t CREATING A VIRTUAL MACHINE
l Installing VMware Workstation Player
l Creating a First VM
l Installing Windows on a Virtual Machine
t INSTALL LINUX- CentOS ON VMWARE PLAYER WORKSTATION
CLOUD COMPUTING
5-2 VIRTUALIZATION TECHNOLOGIES
5.1. INTRODUCTION
Virtualization is a technique which allows sharing a single physical instance of a resource or an application
among multiple customers and organizations. Virtualization is a computer architecture technology by
which multiple virtual machines (VMs) are multiplexed in the same hardware machine. The idea of VMs
can be dated back to the 1960s. The purpose of a VM is to enhance resource sharing by many users and
improve computer performance in terms of resource utilization and application flexibility. Hardware
resources such as CPU, Memory, I/O devices, etc. or software resources such as operating system and
software libraries can be virtualized in various functional layers. This virtualization technology has been
revitalized as the demand for distributed and cloud computing increased sharply in recent years. The idea
is to separate the hardware from the software to yield better system efficiency.
For example : Computer users gained access to much enlarged memory space when the concept of virtual
memory was introduced. Similarly, virtualization techniques can be applied to enhance the use of compute
engines, networks and storage. In this chapter we will discuss VMs and their applications for building
distributed systems. According to Gartner report virtualization, it was the top strategic technology poised
to change the computer industry. With sufficient storage any computer platform can be installed in another
host computer. Even if they use processors with different instruction sets and run with distinct operating
systems on the same hardware.
5. User Application Level. Virtualization at the application level virtualizes an application as a VM. On
a traditional OS an application often runs as a process. Therefore an application-level virtualization is
also known as process level virtualization. The most popular approach is to deploy high level language
(HLL) VMs. In this scenario the virtualization layer sits as an application program on top of the operating
system and the layer exports an abstraction of a VM that can run programs written and compiled to a
particular abstract machine definition. Any program written in the HLL and compiled for this VM will
be able to run on it. The Microsoft .NET CLR and Java Virtual Machine (JVM) are two good examples
of this class of VM. Other forms of application level virtualization are known as application isolation,
application sandboxing or application streaming. The process involves wrapping the application in a layer
that is isolated from the host OS and other applications. The result is an application that is much easier
to distribute and remove from user workstations. An example is the LANDesk application virtualization
platform which deploys software applications as self contained, executable files in an isolated environment
without requiring installation, system modifications or elevated security privileges.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-5
Table 5.1 Relative Merits of Virtualization at Various Levels
(More “X”’s Means Higher Merit with a Maximum of 5 X’s)
Level of Higher Application Implementation Application
Implementation Performance Flexibility Complexity Isolation
ISA X XXXXX XXX XXX
Hardware level virtualization XXXXX XXX XXXXX XXXX
OS level virtualization XXXXX XX XXX XX
Runtime library support XXX XX XX XX
User application level XX XX XXXXX XXXXX
5.2.1. Hypervisor
The term hypervisor goes way back to 1972 when IBM A hypervisor is a thin software layer that
updated the control program of its System/370 mainframe intercepts operating system calls to the
computing platform to support virtualization. The creation hardware. It is also called as the Virtual
of the hypervisor was a milestone in the evolution of Machine Monitor (VMM). It creates a virtual
platform on the host computer on top of which
computing because it provided a way to overcome the multiple guest operating systems are executed
architectural limitations and high cost of using mainframe and monitored.
computers. Hypervisors come in several different flavors.
They can be categorized for example by type that is by whether they run directly on the physical hardware
or within (hosted by) an operating system environment. Hypervisors can also be categorized by design
that is whether they are monolithic or microkernel.
A hypervisor is a virtualization platform that enables you to run multiple operating systems on a single
physical computer called the host computer. The main function of the hypervisor is to provide isolated
execution environments for each virtual machine and to manage access between the guest operating
CLOUD COMPUTING
5-8 VIRTUALIZATION TECHNOLOGIES
systems running in virtual machines and the underlying
hardware resources on the physical computer.
Latest hypervisors allow us to make better use of the faster
processors that regularly appear in the commercial market
and more efficient use of the larger and denser memory
offerings that come along with those newer processors. The
hypervisor is a layer of software that resides below the virtual
machines and above the hardware. The Fig. 5.5 illustrates Fig. 5.5. Where the hypervisor resides.
where the hypervisor resides.
There are two type of hypervisor namely : Type 1 Hypervisor and Type 2 Hypervisor.
Less processing overhead is required for a Type 1 Hypervisor, which means that more virtual machines
can run on each host. From a pure financial stand point a Type 1 Hypervisor would not require the cost
of a host operating system. Although from a practical point of view, the discussion would be much more
complex and involve all of the components and facets that comprise a total cost of ownership calculation.
Examples of Type 1 Hypervisors include VMware ESX, Microsoft Hyper-V and the many Xen variants.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-9
Example 1: VMware ESX
VMware was founded in 1998. It was the first company to develop a commercially available x86
virtualization solution. The following year the company released their first product Workstation 1.0 which
allowed developers to create and work with virtual machines on their Windows or Linux desktops. After
two years in 2001 both ESX 1.0 and GSX 1.0 were released. ESX was a Type 1 Hypervisor and GSX
was a Type 2 hypervisor. Both solutions are still around today and are still being enhanced and updated.
GSX, though has been renamed to VMware Server and is available to download at no cost.
The original architecture of ESX was made up of two parts, the actual hypervisor, which is responsible
for the virtualization work and a Linux based console module that acted as a management interface to
the hypervisor. VMware decided that this model was not sustainable for two reasons. The first was that
the service console was roughly thirty times the size of the hypervisor in ESX 3.5. For example : The
hypervisor was about 32 MB while the service console required closer to 900 MB. The second reason
was security. Linux is a well understood environment and there was concern that the hypervisor could be
compromised through the service console. ESXi was developed as the same hypervisor core but without
the service console. The hypervisor is managed through a command line interface (CLI) and has been
rearchitected to allow third-party integrations that had been done through agents in the service console.
VMware released two versions classic ESX and ESXi from version 3.5 in 2007 through version 4.1 in
2010. As of the 2011 release 5, only the ESXi architecture is available.
Eample 2: Microsoft Hyper-V
Microsoft began in the virtualization space with virtual server in 2005 after they had acquired the solution
from Connectix software company a few years ago. Like GSX Virtual Server was a Type-2 Hypervisor,
and it is still available today at no cost. Microsoft Hyper-V was released in 2008 as an installable part of
the Windows server 2008 operating system.
Hyper-V is a Type 1 Hypervisor because the hypervisor code lives directly on the hardware. The
nomenclature is slightly different though rather than guests the virtualized workloads are called partitions.
Similar to the Xen model it requires a special parent partition that has direct access to the hardware
resources like Domaino. The parent partition runs an operating system in this case Windows server 2008.
This partition creates and manages the child partitions and handles the system management functions
and device drivers. Because it utilizes a model similar to XenServer, it is subject to the same available
vulnerabilities regarding patching and contention.
Example 3: The Xen Architecture
Xen is an open source hypervisor program developed by Cambridge University. Xen is a microkernel
hypervisor which separates the policy from the mechanism. The Xen hypervisor implements all the
mechanisms leaving the policy to be handled by Domain 0. Xen does not include any device drivers
natively. It just provides a mechanism by which a guest OS can have direct access to the physical devices.
As a result, the size of the Xen hypervisor is kept rather small. Xen provides a virtual environment located
between the hardware and the OS. A number of vendors are in the process of developing commercial Xen
hypervisors. The few of them are Citrix XenServer and Oracle VM.
CLOUD COMPUTING
5-10 VIRTUALIZATION TECHNOLOGIES
5.3.2. Para-virtualization
This approach is also known as Partial Virtualization or OS Assisted Virtualization and provides partial
simulation of the underlying infrastructure. The main difference between the full virtualization and para-
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-13
virtualization is the guest OS knows that it is running in virtualized environment in paravirtualization.
But in full virtualization, this information is not known to the guest OS. Another difference is that the
para-virtualization replaces the translation of non virtualized OS requests with hyper calls. Hyper calls
are similar to system calls and used for the direct communication between OS and hypervisor. This
direct communication between the guest OS and hypervisor improves performance and efficiency. In full
virtualization, the guest OS will be used without any modification. But in paravirtualization the guest OS
needs to be modified to replace nonvirtualizable instructions with the hypercalls.
As shown in Fig. 5.11 the modified guest OS resides at Ring 0 and the user applications at Ring 3. As
the guest OS is at privileged position it can communicate directly to the virtualization layer without any
translation by means of hypercalls. Like in full virtualization the user applications are allowed to access
the underlying infrastructure directly.
CLOUD COMPUTING
5-14 VIRTUALIZATION TECHNOLOGIES
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-15
an example of hardware assisted virtualization as shown in Fig. 5.13. Intel calls the privilege level of x86
processors the VMX Root Mode. In order to control the start and stop of a VM and allocate a memory
page to maintain the CPU state for VMs a set of additional instructions is added. At the time of this
writing Xen, VMware and the Microsoft Virtual PC all implement their hypervisors by using the VT-x
technology. Generally hardware assisted virtualization should have high efficiency. However, since the
transition from the hypervisor to the guest OS incurs high overhead switches between processor modes.
It may sometimes cannot perform binary translation. Hence virtualization systems such as VMware now
use a hybrid approach in which a few tasks are offloaded to the hardware but the rest is still done in
software. In addition, para virtualization and hardware-assisted virtualization can be combined to improve
the performance further.
CLOUD COMPUTING
5-16 VIRTUALIZATION TECHNOLOGIES
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-17
The full device emulation approach is shown in Fig. 5.15. A single hardware device can be shared by
multiple VMs that run concurrently. However software emulation runs much slower than the hardware it
emulates. The para virtualization method of I/O virtualization is typically used in Xen. It is also known
as the split driver model consisting of a front end driver and a back end driver. The front end driver is
running in Domain U and the back end driver is running in Domain 0. They interact with each other via
a block of shared memory. The front end driver manages the I/O requests of the guest OSes and the back
end driver is responsible for managing the real I/O devices and multiplexing the I/O data of different
VMs. Although, para I/O virtualization achieves better device performance than full device emulation. It
comes with a higher CPU overhead. Direct I/O virtualization lets the VM access devices directly. It can
achieve close to native performance without high CPU costs. However, current direct I/O virtualization
implementations focus on networking for mainframes. There are a lot of challenges for commodity
hardware devices. For example : When a physical device is reclaimed for later reassignment, it may
have been set to an arbitrary state e.g., DMA to some arbitrary memory locations which can function
incorrectly or even crash the whole system. Since, software-based I/O virtualization requires a very high
overhead of device emulation. Hardware-assisted I/O virtualization is critical. Intel VT-d supports the
remapping of I/O DMA transfers and device generated interrupts. The architecture of VT-d provides the
flexibility to support multiple usage models that may run unmodified, special purpose, or virtualization
aware guest OSes.
Advantages:
(a) The block level storage systems offer a better performance/speed than file level storage systems.
(b) In each block or storage volume can be treated as an independent disk drive and are controlled by
external server OS.
(c) In each block or storage volume can be formatted with the file system required by the application
(NFS/NTFS/SMB, etc).
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-23
(d) The block level storage systems are very popular
with SAN.
(e) The block level storage systems are more reliable
and their transport systems are very efficient.
(f) The block level storage can be used to store files
and also provide the storage required for special
applications like Databases VMFS (Virtual
Machine File Systems), etc.
(g) They can support external booting of the systems
connected to them.
Virtualization on file level means that the virtualization entity provides virtual storage to the operating
systems or applications in the form of files and directories as shown in Fig. 5.20.
Advantages :
(a) The file level storage system is simple to implement and simple to use.
(b) It stores files and folders and is visible as such to both the systems storing the files and the systems
accessing it.
(c) The file level storage systems are generally inexpensive when compared to block level storage
systems.
(d) The systems are more popular with NAS based storage systems network attached storage.
(e) They can be configured with common file level protocols like NTFS (Windows), NFS (Linux), etc.
(f) The file level storage systems are well suited for bulk file storage.
(g) The file level storage device itself can generally handle operations like access control, integration
with corporate directories, etc.
Disadvantages :
(a) However DAS does not scale well. A storage device has a limited number of ports which restricts
the number of hosts that can directly connect to the storage.
(b) A limited bandwidth in DAS restricts the available I/O processing capability. When capacities
are being reached the service availability may be compromised and this has a ripple effect on the
performance of all hosts attached to that specific device or array.
(c) The distance limitations associated with implementing DAS because of direct connectivity
requirements can be addressed by using fibre channel connectivity.
(d) DAS does not make optimal use of resources due to its limited ability to share front end ports.
(e) In DAS environments unused resources cannot be easily re allocated, resulting in islands of over-
utilized and under utilized storage pools.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-25
2. Network Attached Storage (NAS). This is a machine that resides on our network and provides data
storage to other machines. It can be thought of as the first step toward storage virtualization. This approach
provides a single source of data facilitating data backup. By collecting our data in one place it also avoids
the problem of multiple servers needing to access data located on another server.
The NAS evolved from the networking industry where there are strong standards for connectivity, data
security and load balancing. NAS is a more mature technology and deployed in 1 of 2 enterprises today.
NAS is the best choice for the following types of applications: UNIX and Windows NT data sharing
applications, consolidated file serving applications, technical and scientific applications, Internet and
intranet applications, e-business and certain types of decision support (DSS) applications. The network-
attached storage network topology is shown in Fig. 5.22.
(a) The users running different types of machines (PC, Apple iMac etc.) and running different types of
operating systems (Windows, UNIX, Mac OS etc.) can share files.
(b) The NAS appliances are plug-and-play meaning that very little installation and configuration is
required beyond connecting them to the LAN.
(c) A less administration overhead than that required for a UNIX or NT file server.
(d) The centralized storage which makes it easier and cheaper to maintain, backup and administer
(comparable to DAS). Incidentally centralized storage is more expensive than local disks on byte
cost basis but users have to do tasks such as backups and restores on their own.
(e) A separate purchase of storage from the purchase of application servers.
(f) A fast response times for users since NAS are on LANs close to the users as opposed to being on
a backbone SAN marginally faster than DAS but slower than a local disk.
CLOUD COMPUTING
5-26 VIRTUALIZATION TECHNOLOGIES
Disadvantages :
(a) Heavy use of NAS will block up the shared LAN negatively affecting the users on the LAN.
Therefore NAS is not suitable for data transfer intensive applications (the same applies to DAS
but not to local disks in case of SAN it depends upon whether or not a LAN interface is involved).
(b) Something is inefficient since data transfer rides on top of standard TCP/IP protocol (as in case of
DAS). In contrast SAN uses protocols designed especially for data transfer (though the advantage
disappears if a server on the LAN is used to provide a file interface to a SAN).
(c) It can not offer any storage service guarantees for mission critical operations since NAS operates
in a shared environment. Only local disks and SANs (if they do not use a shared LAN) can be used
to provide some service guarantees.
(d) The NAS is shared storage as with other shared storage system administrators must enforce quotas
without which a few users may control all the storage at the expense of other users.
3. Storage Area Network (SAN). This ultra sophisticated approach deploys specialized hardware and
software to transform simple disk drives into a data storage solution that transfers data on its own high-
performance network. “The companies shift over to a SAN when they
The SAN evolved from the storage industry where recognize that corporate data is a key resource
that must be available 24/7 and needs to be
standards have been weak therefore SAN implementations conveniently managed. The price tag for this
are not standardized. SAN is deployed in one out of twenty approach is very high indeed.”
enterprises because of its current lack of standards SAN is
available only in proprietary configurations and the long term inter operability of these schemes is still
not apparent. Although, the SAN vision involves many benefits now available on NAS. There are certain
cooperation with existing enterprise operational and management tools that have led early adopters to
experiment with test deployments. The SAN topology is shown in Fig. 5.23.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-27
Advantages :
(a) The SAN architecture facilitates scalability allow any number of storage devices to be added to
store hundreds of terabytes.
(b) It reduces down time. We can upgrade our SAN, replace defective drives, backup our data without
taking any servers offline. A well-configured SAN with mirroring and redundant servers can bring
zero downtime.
(c) The sharing of SAN is possible. As SAN is not directly attached with any particular server or
network, a SAN can be shared by all.
(d) SAN provides long distance connectivity, with fiber channel capable of running up to 10 kilometers.
We can keep our data in a remote, physically secure location. Fiber channel switching also makes it
very easy to establish private connections with other SANs for mirroring, backup, or maintenance.
(e) SAN is truly versatile. A SAN can be single entity, a master grouping of several SANs and can
include SANs in remote locations.
Disadvantages :
(a) SANs are very expensive as fiber channel technology tends to be costly and maintenance requires
a higher degree of skill.
(b) Leveraging of existing technology investments tends to be much difficult. Though SAN facilitates
to make use of already existing legacy storage, lack of SAN-building skills has greatly diminished
deployment of homegrown SANs. So, currently pre-packaged SANs based on Fiber channel
technology are being used among the enterprises.
(c) Management of SAN systems has proved to be a real tough one due to various reasons. and also
have a SAN storage facility seems to be wasteful one.
(d) There are a few SAN product vendors due to its very high price and very few mega enterprises
need SAN set up.
Disadvantages :
(a) This is the most notable thing that it is similar to serve virtualization and it can bring forth a higher
degree of complexity in addition to performance overhead.
(b) It also tends to call for a higher skill set on the part of network administrators and users.
(c) The successful network virtualization requires thoughtful planning. This is primarily because it
has not been as widely deployed as traditional hardware virtualization a concept that dates back
to the 1960s.
(d) Many organizations elect to plan and implement the technology in phases. Often deciding to begin
with the non-essential aspects of the IT environment. This strategy is often used to minimize
disruptions and enable the organization to determine the value in virtualization before deploying
it across the entire network.
(a) High risk of virus issues because one infected system may spread a virus through the whole logical
network.
(b) Equipment limitations in very large networks because additional routers might be needed to control
the workload.
(c) More effective at controlling latency than a WAN but less efficient than a LAN.
2. Virtual SAN (VSAN). A VSAN provides similar services and features as a typical SAN, but because it
is virtualized it allows for the addition and relocation of subscribers without having to change the network’s
physical layout. It also provides flexible storage capacity that can be increased or decreased over time.
The use of multiple VSANs can make a system easier to configure and scale out. Subscribers can be added
or relocated without the need for changing the physical layout. If a problem occurs in one VSAN, that
problem can be handled with a minimum of disruption to the rest of the network. The independence of
VSANs minimizes the total system’s vulnerability security is improved. VSANs also offer the possibility
of data redundancy, minimizing the risk of catastrophic data loss.
The key benefits of implementing VSANs include:
(a) Consolidate separate physical SAN fabrics into one large fabric for ease of management and reduced
Total Cost of Ownership (TCO).
(b) Provide secure and reliable isolation of different storage islands.
(c) Share common infrastructure and resources like tape libraries to further reduce storage and network
expenditure.
(d) As hybrid storage systems, VSAN can accelerate the I/O operations destined for the hard disk tier,
providing many of the benefits of flash storage without all of the costs.
CLOUD COMPUTING
5-32 VIRTUALIZATION TECHNOLOGIES
5.4.4.1. Advantages and Disadvatnages of Operaing System Virtualization
Advantages:
1. Flexible provisioning. With OS virtualization you can easily connect different VDisks to a system.
The client can easily start another operating system or another role. The workstations or servers can be
assigned with a specific role when needed by assigning another virtual disk (also known as on-demand
capacity or hardware re-purposing).
2. Support of multiple images. The extended flexible provisioning may be taken a step further with the
possibility of assigning multiple images to one client simultaneously. When starting a boot menu, it can
be presented to the client, so that the end-user can choose which operating system (with a different role)
will be started. In this case a system could be used for several purposes within seconds.
3. Rapid software (OS/Apps) deployment. Adding a new server or workstation to your infrastructure
takes just a few minutes. Instead of installing and configuring the system manually or via a deployment
tool, taking at least a few hours and few steps the client is assigned to a virtual disk and can be used in
production.
4. System hundred % identical. Troubleshooting issues are concentrated on one machine because
something is different on that machine. Especially in terminal servers, it is crucial that all the servers
hosting the same role and are identical as explained in the article terminal server basics. This only applies
to shared virtual disks because in private disk changes are stored.
5. Easy rollback scenarios. Although the update or hotfix was tested thoroughly. During production the
behavior of this hotfix/update is not as expected. By assigning the previous virtual disk to those clients
and restarting them you can revert to the previous state easily and quickly.
6. Restarting the system is back to a clean state. This advantage only applies to shared images. If
your system is behaving strangely, often a complete re-installation is the only possible solution. With
OS virtualization (in combination with the shared disk) a machine only needs to be restarted to load the
default configuration again.
Disadvantages :
1. No work off-line capability. At the moment OS virtualization products must be connected with the
OS virtualization server to use the operating system on the virtual disk. When no network connection is
available the system cannot be used.
2. High-speed LAN recommended (>100Mb). It is because the virtual disk is connected from the OS
virtualization server via the network interface card a LAN is recommended. Over a WAN connection
there is probably not enough bandwidth available and/or not reliable enough to use the system smoothly.
3. Not all operating systems are supported. Although, many operating systems are supported there are
some Linux distributions which cannot run via the OS virtualization technique.
4. Imaging disadvantages applied to this technique. As described earlier, an image based technique
is used to create the virtual disk. All disadvantages that apply to imaging techniques are also valid for the
OS virtualization component. Think of an application which adds the computer name in the registry/files
or an application which creates a GUID/unique number during installation.
5.4.5. Desktop (Client) Virtualization
Virtualization abstracts the desktop environment available on a personal computer in order to provide
access to it using a client/server approach. Desktop virtualization provides the same outcome of hardware
virtualization but serves a different purpose. Similarly to hardware virtualization desktop virtualization
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-33
makes accessible a different system as though it were natively installed on the host but this system
is remotely stored on a different host and accessed through a network connection. Moreover desktop
virtualization addresses the problem of making the same desktop environment accessible from everywhere.
Although, the term desktop virtualization strictly refers to the ability to remotely access a desktop
environment. Generally the desktop environment is stored in a remote server or a data center that provides
a high-availability infrastructure and ensures the accessibility and persistence of the data. In this scenario,
an infrastructure supporting hardware virtualization is fundamental to provide access to multiple desktop
environments hosted on the same server. A specific desktop environment is stored in a virtual machine
image that is loaded and started on demand when a client connects to the desktop environment. This is a
typical cloud computing scenario in which the user leverages the virtual infrastructure for performing the
daily tasks on his computer. The advantages of desktop virtualization are high availability, persistence,
accessibility and ease of management.
‘‘The desktop virtualization provides a user
In the most common form of desktop virtualization, this with an operating environment that is separate
is provided on servers in the company’s data center. The from their local physical system. It consists
operating system, applications and user data which are of the servers, virtualization software on the
Servers and virtual image on the desktops.’’
normally loaded on to the user’s computer are now hosted
and rendered on servers in the Companies. The data center and the user can access his desktop environment
from anywhere as shown in Fig. 5.27. This is the purpose of desktop virtualization.
CLOUD COMPUTING
5-34 VIRTUALIZATION TECHNOLOGIES
3. The centralized operating system and application updates can be done regularly by a trained
technician at the data center collectively for a group of virtual desktops.
4. The desktop virtualization solutions are integrated with corporate directories like active directory etc.
and user access policies can be applied to all users based on their role, location, type of device, etc.
5. It enhances security as the administration is centralized – antivirus/ firewall policies can be applied
and monitored from the data center. The applications that can be accessed and run by the users can
be restricted and even tracked.
6. The faster, reliable and easier backup of all the user data is possible due to centralized hosting and
administration.
Disadvantages:
1. The desktop virtualization is cap-ex intensive. One needs to buy the desktop virtualization software,
licenses, servers, centralized storage infrastructure, upgrade network infrastructure to support more
bandwidth etc in addition to thin clients for each user.
2. There is no reduction in the number of end-user client machines that are needed in the network.
3. The licenses for operating systems, applications etc, still needs to be bought for each user and there
is no reduction of costs there.
4. The thin clients are sometimes as expensive as individual computers as with huge volumes computer
prices fluctuate drastically as they are manufactured and distributed in bulk quantities.
5. The network infrastructure needs to handle all that extra bandwidth that desktop virtualization
is going to introduce. Otherwise it has to be upgraded. The WAN links need to have sufficient
bandwidth to handle all those remote DV users as well.
6. If the bandwidth on the remote end is not sufficient or if there is congestion in LAN, the display
quality may not be as good as processing and viewing applications right from a desktop.
Latter method will support almost any user, with no installation requirement on almost any platform in
any location as shown in Fig. 5.28. But it only supports a limited set of applications.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-35
Disadvantages :
1. A new complexity layer. Most Windows application were not developed to run in a virtual
environment. This might cause unforeseen problems.
2. Vendor might deny support. If we tell our vendor that we are running their application in a virtual
environment they might deny support.
CLOUD COMPUTING
5-36 VIRTUALIZATION TECHNOLOGIES
3. Problematic applications. Some application especially those installing their own system drivers
do not work as virtualized applications.
4. Shell integration. One reason that applications are installed is because they have to be integrated
in the Windows shell. Since virtualized applications are not installed on the host, shell integration
has to be established by other means.
5. Changes to our infrastructure. Many things work differently with virtualized applications. For
example : We might not be able to use our current patch management solution anymore.
6. Single point of failure. The launching applications from a server have its advantages but network
outages or server problems increase the risk of system wide failures.
Fig. 5.29. Virtual clusters over three physical clusters shaded differently.
Three physical clusters are shown on the left side of Fig 5.29. Four virtual clusters are created on the right,
over the physical clusters. The physical machines are also called host systems. In contrast the VMs are
guest systems. The host and guest systems may run with different operating systems. Each VM can be
installed on a remote server or replicated on multiple servers belonging to the same or different physical
clusters. The boundary of a virtual cluster can change as VM nodes are added, removed or migrated
dynamically over time.
The Fig. 5.30 shows the concept of a virtual cluster based on application partitioning or customization.
The different colors in the figure represent the nodes in different virtual clusters. As a large number of
VM images might be present, the most important thing is to determine how to store those images in
the system efficiently. There are common installations for most users or applications, such as operating
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-37
systems or user-level programming libraries. These software packages can be preinstalled as templates
(called template VMs).
Fig. 5.31. The architecture of livewire for intrusion detection using a dedicated VM.
CLOUD COMPUTING
5-38 VIRTUALIZATION TECHNOLOGIES
In this case, the granularity of resource optimization is focused on the CPU, memory and network interfaces.
Therefore, it is common that most servers in data centers are underutilized. A large amount of hardware,
space, power, and management cost of these servers is wasted. Server consolidation is an approach to
improve the low utility ratio of hardware resources by reducing the number of physical servers. Among
several server consolidation techniques such as centralized and physical consolidation, virtualization
based server consolidation is the most powerful. Data centers need to optimize their resource management.
Yet these techniques are performed with the granularity of a full server machine, which makes resource
management far from well optimized. Server virtualization enables smaller resource allocation than a
physical machine.
Fig. 5.32. Parallax is a set of per-host storage appliances that share access to a common block device and presents virtual
disks to client VMs.
VM also allows functionality that is currently implemented within data center hardware to be pushed out
and implemented on individual hosts. This mechanism enables advanced storage features such as snapshot
facilities to be implemented in software and delivered above commodity network storage targets. Parallax
itself runs as a user-level application in the storage appliance VM. It provides virtual disk images (VDIs)
to VMs. A VDI is a single-writer virtual disk which may be accessed in a location transparent manner
from any of the physical hosts in the Parallax cluster. The VDIs are the core abstraction provided by
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-39
Parallax. Parallax uses Xen’s block tap driver to handle block requests and it is implemented as a tapdisk
library. This library acts as a single block virtualization service for all client VMs on the same physical
host. In the Parallax system, it is the storage appliance VM that connects the physical hardware device
for block and network access.
Nimbus VM creation, EC2 WS, WSRF, Xen, KVM EC2 Virtual networks
Linux, virtual CLI
Apache v2 clustor, www.
nimbusproject.
org/
Eucalyptus Virtual EC2 WS, CLI Xen, KVM EC2 Virtual networks
Linux, BSD networking www
eucalyptus.com/
OpenNebula Management XML-RPC, CLI, Xen, KVM EC2, Elastic Host Virtual networks,
Linux of VM host, Java Dynamic
Apache v2 virtual network, provisioning
and scheduling
tools www.
opennebula.org/
vSphere 4 Virtualizing OS CLI, GUI, Portal, VMware ESX, VMware vCloud Data protection
Linux for data centers WS ESXI partners vStorage VMFS,
Windows DRM, HA
proprietary
CLOUD COMPUTING
5-40 VIRTUALIZATION TECHNOLOGIES
Fig. 5.33. vSphere/4, a cloud operating system that manages compute, storage, and network resources over virtualized data
centers.
1. VMware Workstation.
2. VMware Player.
3. VMware Fusion (for Macintosh).
4. Parallels Desktop.
5. Virtual Box (open source).
6. Microsoft Windows Virtual PC.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-41
5.7.1. Installing VMware Workstation Player
To choose the virtualization workbench tools our choice will depend on several factors including what we
are running as a desktop operating system and what we are willing to pay for the tools. The examples in
this text use VMware player for most of the work and VMware workstation for some illustrative elements
that player does not have. Just as Adobe Acrobat Reader allows you to read PDF documents created by
other people. VMware Player allows you to play virtual machines.
VMware workstation player is a hosted hypervisor so you need to have a pre-installed OS before
continuing to install it.
1. It also allows you to create new VMs. The player is used in these examples for a number of reasons
the first and foremost is that it is available as a free download.
2. The second is that VMware has the lion’s share of the virtualization market, so it makes sense to
use a solution that would be more prevalent than a lesser-used application.
3. Also, if you are using this text as part of a university class many schools have agreements with
various software companies such as Microsoft, Red Hat, Cisco, and VMware to provide their
solutions at little or no cost to students. That means that VMware Workstation might be available
to students at a reduced cost or free.
In Fig. 5.34 (a), you can download VMware Player from the VMware website from a number of different
links including www.vmware.com/downloads. Read the release notes which are available via the link on
the page to make sure that your computer meets the requirements for the software. Usually, the resource
that your computer needs most is memory. If you recall that a Type-2 hypervisor sits on top of a native
operating system you will see that you need to provide memory for the host operating system i.e., VMware
Player as well as any VMs that you will be running because you will typically be running only one VM at
a time processor resources do not usually become a bottleneck. This could change if you do run multiple
VMs which is not unusual in a test or development environment.
CLOUD COMPUTING
5-42 VIRTUALIZATION TECHNOLOGIES
After downloading the player executable, as illustrated in Fig. 5.34 (b), install it by double-clicking the icon.
CLOUD COMPUTING
5-44 VIRTUALIZATION TECHNOLOGIES
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-45
As illustrated in Fig.5.42, at the completion of the installation, a last screen appears saying the installation
is completed and that you need to reboot your system as a final step. If you choose to retain the shortcut
option, a shortcut appears on the desktop. Select Restart Now to reboot Windows.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-47
CLOUD COMPUTING
5-48 VIRTUALIZATION TECHNOLOGIES
3. Note that the machine state is powered off. We need to tell the VM to boot from the ISO image, much
as a physical server needs the CD or DVD drive in the boot sequence so it can find the Windows
disks we would stage there. Select Edit Virtual Machine Settings, which is illustrated in Fig.5.51.
CLOUD COMPUTING
5-50 VIRTUALIZATION TECHNOLOGIES
5. We can see a number of choices regarding the CD/DVD devices. Under connection, choose Use
ISO Image File. This will allow us to have the VM use the ISO image we have staged. Use the
Browse button to locate and select the ISO image. Select OK to continue.
6. Now select Play Virtual Machine. We might get a message similar to that shown in Fig.5.53. It
means that you have additional hardware devices on your physical computer that could be added
to the virtual machine for use. Select OK to continue.
7. The virtual machine boots up and connects to the Windows 7 ISO image as if it were a DVD in
a disk drive. If we are prompted to Download VMware Tools for Windows 2000 and Later, we
can cancel the download and continue with Windows 7. The Install Windows screen appears, as
shown in Fig.5.54. Notice at the bottom of the screen, outside of the virtual machine is an alert bar
with some choices regarding the installation of VMware Tools. We will cover this separately after
the installation. Select Remind me later and the alert bar disappears.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-51
8. In the VM Window, click inside the Install Window and select your menu choices. Select Next
to continue.
9. The next screen, illustrated in Fig.5.55 allows you to get some installation information before
continuing. Select Install Now to continue.
CLOUD COMPUTING
5-52 VIRTUALIZATION TECHNOLOGIES
10. As with most software, we will need to accept the license terms. Select the checkbox as shown in
Fig. 5.56 and then select Next to continue.
11. Because this is a new installation, we will be doing a Custom installation rather than an Upgrade
of an existing system. As shown in Fig. 5.57 choose Custom to continue.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-53
12. The example VM was created with one 30 GB disk drive. If we select advanced options, you can
see in Fig. 5.58 some of what those options will allow with regard to disk storage. Select Next to
continue.
13. The Windows installation process will proceed with a number of steps, including formatting the
disk storage, creating a file system, and copying the files to the disk. This is usually the most time-
consuming step. We can see the steps and the progress in Fig. 5.59.
14. Windows will reboot a number of times during the process. It will then run through a number of first
time use initialization steps. The first of these, as shown in Fig. 5.60 prompts us to choose a user
name and a system name. Choose the appropriate values for both of these and select Next to continue.
CLOUD COMPUTING
5-54 VIRTUALIZATION TECHNOLOGIES
15. We will need to choose a password and a hint for that password for the user we just created. Fig.5.61
shows this screen. Create a password and a hint and then select Next to continue.
16. The Windows Product Key prompt is in the next screen illustrated in Fig. 5.62. If we have a
product key, enter it at this time. If we do not have a key, we can enter it later when we acquire one.
Windows will remind us if we do not Select Next to continue.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-55
17. The next screen, shown in Fig. 5.63 allows us to choose how to implement the Windows Updates.
Whichever method we choose, we can change it later. Select Use Recommended Settings to
continue.
18. In the next screen, illustrated in Fig. 5.64 we may set the correct date and time for our system. Select
the correct time zone, date, and time. Select Next to continue.
CLOUD COMPUTING
5-56 VIRTUALIZATION TECHNOLOGIES
19. The Fig. 5.65 shows the Network Setup screen. We will be able to make adjustments later when
we investigate virtual networking. Choose Home Network to continue. Windows will attempt to
connect to our network through the virtual machine and VMware Player.
20. As we can see in Fig.5.66 Windows will complete the one time setup and be ready to use.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-57
1. Select Virtual Machine from the menu at the top of the VMware Player window. Choose the Install
VMware Tools menu option. If we are presented with a Software Updates screen, like that shown
in Fig. 5.67 Select Download and Install.
CLOUD COMPUTING
5-58 VIRTUALIZATION TECHNOLOGIES
2. If we need to perform the download, as shown in Fig.5.68 the host operating system will ask if it
is okay for the application to update. We should choose Yes for the update to continue. When the
Update is completed, close the window to continue.
3. The AutoPlay screen, illustrated in Fig. 5.69 appears. Choose Run setup64.exe to continue. Again,
answer Yes to the allow changes screen.
4. The initial VMware tools installation screen appears, as illustrated in Fig.5.70. At the bottom of
the VMware Player window is a message stating that VMware Tools is installing. We can dismiss
the message. Choose Next to continue.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-59
5. The Fig. 5.71 shows the Setup Type selection window where there are short descriptions of the
three options. The default is typical which is sufficient for your needs. Choose Next to continue.
CLOUD COMPUTING
5-60 VIRTUALIZATION TECHNOLOGIES
6. The Install screen appears, as shown in Fig.5.72. If any changes need to be made, we can use the
Back button to scroll back through the preceding screens to make those changes. If we are ready
to continue, select Install.
7. The VMware Tools are installed, and we can mark the progress on the displayed Status screen. It is
typically a very short process, requiring only a few minutes. When it is completed, the final screen,
as shown in Fig.5.73 is displayed. Select Finish.
8. Finally, we will need to reboot the VM one more time. The system prompts us as shown in Fig.5.74.
Select Yes to restart the VM.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-61
Anyone application is enough for a virtual environment. We are going to use here VMware Workstation,
but the overall process of installation is the same for all virtual environment package.
Open VMware workstation application to start the installation of CentOS 7 operating system. We will get the
first screen in workstation as shown in Fig. 5.76 and here click on Create a New Virtual Machine button.
1. Installer disc.
2. Installer disc image file (iso).
3. We will install the operating system later.
CLOUD COMPUTING
5-66 VIRTUALIZATION TECHNOLOGIES
If we want to configure our virtual machine to connect directly with the network and get the IP address
from the main network device we should select Use bridged networking. If we want to configure our
networking with our host networking and NAT with the host IP address, we should select Use network
address translation(NAT). Choose Use host-only networking if we do not want to configure independent
networking on our virtual machine and use network from the host interface. The last option Do not use
a network connection is for if we do not want to use networking in our virtual machine. Now, we select
Use bridged networking as we are using my virtual machine network connectivity directly from the
network device without the intervention of the host network.
BusLogic is not available for the 64-bit arch operating system and we are using here Ubuntu 16.04 64-bit
operating system so it is in disabled mode. We are not using any SAS device also so not choosing LSI
Logic SAS option also, so we choose here LSI Logic option and click on the Next button for further
configuration (see Fig. 5.85).
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-67
1. IDE
2. SCSI
3. SATA
We suggest choosing the SCSI option which is most used by the virtual machine (see Fig. 5.86).
CLOUD COMPUTING
5-68 VIRTUALIZATION TECHNOLOGIES
Here, we will choose Create a new virtual disk as we are going to install a new virtual machine(see
Fig. 5.87).
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-69
CLOUD COMPUTING
5-70 VIRTUALIZATION TECHNOLOGIES
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-71
CLOUD COMPUTING
5-72 VIRTUALIZATION TECHNOLOGIES
Point to Remember
t Virtualization is a technique which allows sharing a single physical instance of a resource or an application
among multiple customers and organizations.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-73
t Virtualization is the creation of a virtual rather than actual version of something such as a server, a desktop, a
storage device, an operating system or network resources.
t The machine on which the virtual machine is created is known as host machine and virtual machine is referred
as a guest machine.
t At the ISA level virtualization is performed by emulating a given ISA by the ISA of the host machine.
t The idea is to virtualized a computer’s resources such as its processors, memory and I/O devices.
t Operating system level virtualization refers to an abstraction layer between traditional OS and user applications.
t An API is an interface or communication protocol between different parts of a computer program intended to
simplify the implementation and maintenance of software.
t Application level virtualization is also known as process level virtualization. The most popular approach is to
HLL VMs.
t Depending on the position of the virtualization layer there are several classes of VM architectures namely the
hypervisor architecture, para-virtualization and host based virtualization.
t The creation of the hypervisor was a milestone in the evolution of computing because it provided a way to
overcome the architectural limitations and high cost of using mainframe computers.
t The hypervisor is a layer of software that resides below the virtual machines and above the hardware.
t Type 1 Hypervisors run directly on the server hardware without an operating system beneath it.
t Aside from having better performance characteristics Type 1 Hypervisors are also considered to be more secure
than Type 2 Hypervisors.
t A Type 2 hypervisor itself is an application that runs a top a traditional operating system.
t Type 2 hypervisors are not as efficient as Type 1 Hypervisors because of this extra layer between the hypervisor
itself and the hardware.
t The protection rings in OSs are in hierarchical order from Ring 0 to Ring 3.
t In full virtualization the guest OS is completely abstracted from the underlying infrastructure.
t The main difference between the full virtualization and paravirtualization is the guest OS knows that it is running
in virtualized environment in para-virtualization but in full virtualization, this information is not known to the
guest OS.
t VMware Player provides an intuitive user interface for running preconfigured virtual machines created with
VMware Workstation, GSX Server and ESX Server.
t The last version using this name was Microsoft virtual server 2005 R2 SP1.
t The guest OS is not aware that it is virtualized and thinks it is running on the real hardware.
t Server virtualization is the partitioning of a physical server into several virtual servers. It is used to maximize
the server resources.
t All modern x86 CPUs include a memory management unit and a translation look aside buffer to optimize virtual
memory performance.
CLOUD COMPUTING
5-74 VIRTUALIZATION TECHNOLOGIES
t The I/O access requests of the guest OS are trapped in the VMM which interacts with the I/O devices.
t In block level storage system the raw volumes of storage are created and each block can be controlled as an
individual hard drive.
t The file level storage technology is common to storage system, which is found in hard drives, NAS systems and
so on.
t Network virtualization can aggregate different physical networks into a single logical network or provide network
like functionality to an operating system partition.
t With the help of OS virtualization nothing is pre-installed or permanently loaded on the local device and no-hard
disk is needed. Everything runs from the network using a kind of virtual disk
t A physical cluster is a collection of servers interconnected by a physical network such as a LAN. Virtual clusters
are built with VMs installed at distributed servers from one or more physical clusters.
t The desktop virtualization solutions integrate with corporate directories like active directory etc and user access
policies can be applied to all users based on their role, location, type of device, etc.
t The faster, reliable and easier backup of all the user data is possible due to centralized hosting and administration.
t The thin clients are sometimes as expensive as individual computers as with huge volumes computer prices
plummet drastically as they are manufactured and distributed in bulk quantities.
Solved Questions
Q.1. Define virtualization. Why virtualization is important in cloud computing?
(RGPV, Bhopal, B.E., May 2019)
Or
What is virtualization? Discuss the role and importance of virtualization and virtual appliance in
cloud computing. (GNDU, Amritsar, B.Tech., M.Sc. Dec. 2016)
Ans. In computing, virtualization means to create a virtual version of a device or resource, such as a server,
storage device, network or even an operating system where the framework divides the resource into one
or more execution environments. The usual goal of virtualization is to centralize administrative tasks
while improving scalability and overall hardware-resource utilization. Operating system virtualization
is the use of software to allow a piece of hardware to run multiple operating system images at the same
time. (Refer Article 5.1)
Q.2. What is virtualization? Explain its characteristics and benefit in cloud computing.
(PTU, Jalandhar, B.Tech., Dec. 2018, June 2019 ; Mumbai University, B.Tech. Dec. 2017, June 2019)
Or
What is virtualization? Explain the pitfall of virtualization. (DBATU, B.Tech., Dec. 2019)
Ans. Virtualization occurs when a virtual version of something is created instead of an actual version.
Virtualization has expanded into almost every form of digital life. From virtual machines that act like
a real computer to console emulation, many people take advantage of what virtualization can provide.
(Refer Article 5.1)
Q.3. Explain the taxonomy of virtual machines. (JNTU, ME, May 2019)
Or
What is virtualization? What are mechanisms used for virtualization.
(Mumbai University, B.Tech., Dec. 2017)
Or
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-75
How to implement virtualization in your organization and explain in detail.
(AKTU, Lucknow, MCA, Dec. 2018)
Ans. In general there are three typical classes of VM architecture. Before virtualization, the operating
system manages the hardware. After virtualization, a virtualization layer is inserted between the hardware
and the operating system. (Refer article 5.2)
Q.4. Why is virtualization so popular? How many types of virtualization are there?
Or
Explain the characteristics and types of virtualization in cloud computing.
(RGPV, Bhopal, B.E., Dec. 2016, Nov. 2018, Nov. 2019)
Or
What is virtualization? How many types of virtualization are there?
(GNDU, Amritsar, B.Tech., M.Sc, Dec. 2016)
Ans. The most important function of virtualization is the capability of running multiple operating systems
and applications on a single computer or server. Virtualization can usually improve overall application
performance due to technology that can balance resources, and provide only what the user needs. There
are different types of virtualization in computing they are as follows :
(a) OS Virtualization.
(b) Server Virtualization.
(c) Application Virtualization.
(d) Network Virtualization.
(e) Storage Virtualization.
(f) Hardware Virtualization.
(a) Any processor with an MMU can be used to implement a virtualization solution and some of the
common rich operating systems have been ported to run on top of them.
(b) There is also no requirement for additional hardware to implement a hypervisor.
(c) Security sensitive applications can be ported to run in a secure environment running on top of the
hypervisor, but outside of the view of the rich operating environment.
(d) The hypervisor can provide communications mechanisms which can be used to allow software
virtual machines to communicate.
Disadvantages:
(a) The isolation provided by virtualization technology is restricted to the processor implementing the
hypervisor.
(b) This is difficult to achieve without damaging the performance of the system.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-77
(c) The virtualization ignores the security issues associated with hardware attacks, such as threats that
use the debug or test infrastructure.
(a) Direct-Attached Storage (DAS). This is the traditional method used in data storage where hard
drives are attached to a physical server.
(b) Network-Attached Storage (NAS). This is a machine that resides on our network and provides
data storage to other machines.
(c) Storage Area Network (SAN). This ultra-sophisticated approach deploys specialized hardware
and software to transform mere disk drives into a data storage solution that transfers data on its
own high-performance network.
Q.12. Explain networking virtualization? What are the advantages and disadvantages of networking
virtualization?
What is network virtualization? Describe the various component of network virtualization.
(RTU, Kota, B.Tech., Dec. 2015)
Or
Mention the significance of network virtualization. (JNTU, ME, May 2019 ; DBATU, B.Tech., Dec. 2019)
Ans. The network virtualization is a method of combining the available resources in a network by splitting
up the available bandwidth into channels. Each of which is independent from the others and each of which
can be assigned to a particular server or device in real time.
Advantages :
(a) We can typically save a lot of money by reducing hardware costs when we use virtualization.
(b) Many organizations have found that going virtual has reduced their overall electricity consumption
for server computers by eighty percent.
(c) One of the biggest benefits of virtualization is not the cost savings, but the ability to quickly recover
from hardware failures.
Disadvantages:
(a) This perhaps the most notable thing that it is similar to server virtualization and it can bring forth
a higher degree of complexity in addition to performance overhead.
(b) It also tends to call for a higher skill set on the part of network administrators and users.
(c) The successful network virtualization requires thoughtful planning.
(d) Many organizations elect to plan and implement the technology in phases. Often deciding to begin
with the non-essential aspects of the IT environment.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-79
Q.13. What do you mean by server virtualization? Explain using example.
(RGPV, Bhopal, B.E., Dec. 2015, May 2019 ; AKTU, Lucknow, MCA, Dec. 2018 ;
JNTU, ME, June 2017 ; JNTU, ME, May 2019 ; Mumbai University, B.Tech., Dec 2017)
Ans. Server virtualization is the partitioning of a physical server into several virtual servers. It is used
to maximize the server resources. Virtual machine shares the resources of the physical computer across
multiple environments. (Refer Article 5.5)
Q.14. What is desktop or client virtualization? Explain the advantages and disadvantages of desktop
virtualization.
Ans. The desktop virtualization provides a user with an operating environment that is separate from their
local physical system.
Advantages :
(a) It can access our desktop environment from anywhere through LAN, WAN including broadband
from home, etc. at any time we want.
(b) Most of the desktop virtualization (DV) solutions support local USB drives, local printing and local
graphics acceleration.
(c) The centralized operating system and application updates can be done regularly by a trained
technician at the data center collectively for a group of virtual desktops.
(d) The desktop virtualization solutions integrate with corporate directories like active directory etc
and user access policies can be applied to all users based on their role, location, type of device, etc.
Disadvantages :
(a) There is no reduction in the number of end-user client machines that are needed in the network.
(b) The licenses for operating systems, applications etc., still needs to be bought for each user and there
is no reduction of costs there.
(c) The thin-clients are sometimes as expensive as individual computers as, with huge volumes computer
prices plummet drastically as they are manufactured and distributed in bulk quantities.
(d) The network infrastructure needs to handle all that extra bandwidth that desktop virtualization is
going to introduce. Otherwise, it has to be upgraded.
(e) There is a limit to the number of operating systems that can be supported by desktop virtualization
products.
Q.15. Describe application virtualization? What are its advantages and disadvantages?
Ans. In application virtualization an application can be installed and/or executed locally within a container
that controls how it interacts with other system and application components.
Advantages :
(c) No registry and system bloat. The more application we install on a desktop, the more bloated its
registry and system folder will get.
(d) Multiple runtime environments. We can deploy the runtime environment together with the
application. This enables us to run different versions of a runtime environment on a desktop.
(e) Simplified roaming. Some products allow us to store settings and data belonging to the app in the
virtual environment on a server or a memory stick.
Disadvantages :
(a) A new complexity layer. Most Windows application were not developed to run in a virtual
environment. This might cause unforeseen problems.
(b) Vendor might deny support. If we tell our vendor that we are running their application in a virtual
environment so they might deny support.
(c) Problematic applications. Some application especially those installing their own system drivers
do not work as virtualized applications.
(d) Bandwidth requirements. We just have to make sure that we always have the necessary bandwidth
available.
(e) Costs. The prices of application virtualization solutions range are very high.
Q.16. What is a virtual cluster? Write the steps to create a virtual machine cluster?
Ans. Virtual machine clustering is an effective technique that ensures high availability of servers and the
network. The virtual machine clusters are used in virtual machines which are installed at various services.
Each virtual machine in a cluster is interconnected by a virtual network. The procedure to create virtual
machine cluster are as following:
Q.17. What is data center virtualization? Explain Cloud versus data center?
Or
How performance does enhance by virtualizing the data center? (JNTU, B.Tech., May 2018)
Or
How virtualized data centre ensure trust management. (Mumbai University, B.Tech., Dec. 2017)
Ans. Data center virtualization is the process of designing, developing and deploying a data center on
virtualization and cloud computing technologies. It primarily enables virtualizing physical servers in a
data center facility along with storage, networking and other infrastructure devices and equipment.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-81
The main difference between the cloud and data center is that a data center refers to on-premise hardware
while the cloud refers to off-premise computing. The cloud stores your data in the public cloud, while a
data center stores your data on your own hardware. (Refer Article 5.6)
Q.18. Write and explain about virtual clusters. (JNTU, B.Tech April 2018 ; DBATU B.Tech. Dec. 2019)
Or
What is difference between physical and virtual clusters? (JNTU, ME, June 2017)
Or
Illustrate the design of a large scale virtual cluster system. (JNTU, ME, May 2019)
Or
How are virtualizations and cloud computing interrelated? Explain virtualization in cluster.
(RGPV, Bhopal, B.E., Dec. 2017)
Or
Explain resource virtualization system in details.
(AKTU, Lucknow, M.Tech., Dec. 2018 ; JNTU, ME, June 2017)
Ans. A physical cluster is a collection of servers interconnected by a physical network such as a LAN.
Virtual clusters are built with VMs installed at distributed servers from one or more physical clusters.
The VMs in a virtual cluster are interconnected logically by a virtual network across several physical
networks. (Refer Article 5.5)
Q.19. Define data center infrastructure? What is the difference between data center and server.
Ans. Data center infrastructure refers to the core physical or hardware-based resources and components
including all IT infrastructure devices, equipment and technologies that comprise a data center.
The main distinction is that server runs on a single node while data center allows you to run on multiple
nodes. When your server instances grow and your organization’s ability to build products and deliver
services puts an increasingly demanding load on them. You might need a better way to stay ahead.
Q.20. What is block level storage? Discuss its advantages.
Or
Write in brief about block and file level storage in virtualization. (RGPV, Bhopal B.E Dec- 2015)
Ans. In block level storage systems, raw blocks (storage volumes) are created and each block can be
controlled like an individual hard drive. Generally, these blocks are controlled by the server based
operating systems.
Advantages :
(a) The block level storage systems offer a better performance/speed than file level storage systems.
(b) In each block or storage volume can be treated as an independent disk drive and are controlled by
external server OS.
(c) The block level storage systems are more reliable and their transport systems are very efficient.
(d) The block level storage can be used to store files and also provide the storage required for special
applications like Databases, VMFS (Virtual Machine File Systems), etc.
A file level storage system is the most common storage system that we find with our hard-drives, NAS
systems etc. In this type of storage, the storage disk is configured with a particular protocol (Like NFS
etc) and files are stored and accessed from it as such in bulk.
CLOUD COMPUTING
5-82 VIRTUALIZATION TECHNOLOGIES
Advantages :
(a) The file level storage system is simple to implement and simple to use.
(b) It stores files and folders and is visible as such, to both the systems storing the files and the systems
accessing it.
(c) The file level storage systems are generally inexpensive, when compared to block level storage
systems.
(d) The systems are more popular with NAS based storage systems network attached storage.
(e) They can be configured with common file level protocols like NTFS, NFS , etc.
(f) The file level storage systems are well suited for bulk file storage.
(g) The file level storage device itself can generally handle operations like access control, integration
with corporate directories etc.
Q.21. What is virtual LAN(VLAN) and SAN (VSAN)? Explain its benefits.
Or
Explain virtual LAN and Virtual SAN in cloud computing. Write their benefits.
(RGPV, Bhopal, B.E., Dec. 2015)
Ans. A virtual local area network (VLAN) is a network technology used to logically separate large
broadcast domains using layer devices.
VLANs provide the following general benefits are :
(a) Improved Security. The different groups of users do not need to know of each other and should
not see each other’s data unless explicitly configured.
(b) Higher Performance. It divides the network into different virtual sub-networks reduces unnecessary
traffic and improves performance.
(c) Cost Reduction. The routers are usually considerably more expensive compared to switches.
(d) Simplified Network Management. It logically divides the network into virtual sub-networks
improves maintenance and manageability.
A virtual storage area network (VSAN) is a logical partition in a storage area network (SAN). VSANs
allow traffic to be isolated within specific portions of a storage area network. The benefits of VSANs are:
(a) Virtual SAN Islands. VSANs provide a way to consolidate what would amount to multiple costly
physical SAN islands onto a more cost-effective Virtual Fabrics.
(b) Transparent to End Devices. VSANs do not require any special awareness, configuration, or
software on the SAN end devices such as hosts/HBAs or disk subsystems.
(c) ISL Trucking. Trucking provide the capability for multiple virtual fabrics to share the same ISLs.
Multiple VSANs can share the bandwidth of ISLs for increased ISL utilization.
(d) Fabric Availability. Each virtual fabric includes separate instances of all Fabric services. This
provides for a much more stable Fabric as not only are fabric service failures isolated per VSAN
but Fabric level events such as Build Fabric or Reconfigure Fabric are also isolated per VSAN.
(e) Fabric Scalability. By deploying virtual fabrics the fiber channel addressing scheme is implemented
on a per VSAN basis.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-83
Q.22. Explain about virtualization for Linux, Windows and NT platform. (JNTU, B.Tech., April 2018)
Ans. In order to install Windows, or any operating system you need the source disks so that you can
execute from them. These disks can take the form of actual CDs, DVDs, or image files of the software
on those media. In the case of Windows, you can purchase a copy at a retail store and come home with
the disks. (Refer Article 5.8)
Q.23. How does an unauthorized access can be detected by the help of virtualization techniques?
(RGPV, Bhopal, B.E., Dec. 2016)
Ans. Virtualization can be used in many ways and requires appropriate security controls in each situation.
The following are the few ways that minimize risks and improve security using virtualization:
1. Sandboxing. Sandboxing is a security mechanism for separating running programs that is often used
to execute untested code or programs from unverified third parties, suppliers and websites. The main
goal of sandboxing is to improve virtualization security by isolating an application to protect it from
outside malware, harmful viruses, applications that stop execution, etc. If you have any application that
is unstable or untested, simply put it in a virtual machine so that it does not affect the rest of the system.
2. Server Virtualization. Server virtualization is the masking of server resources, which helps in
partitioning the physical server into smaller virtual servers to maximize resources. The administrator divides
the physical server into multiple virtual environments. These days, official records are often stolen from
servers by hackers. Server virtualization allows small virtual servers to run their own operating systems
and reboot independently of one another. Virtualized servers are used to identify and isolate applications
that are unstable, as well as compromised applications.
3. Network Virtualization. Network virtualization is the combination of hardware and software
network resources, and it combines network functionality into a single virtual network. With network
virtualization, virtual networks minimize the effect of the malware when infecting the system. Network
virtualization creates logical virtual networks from underlying network hardware to better integrate with
virtual environments. An important feature of network virtualization is isolation. It allows the dynamic
composition of multiple virtual networks that co-exist in isolation to deploy customized end-to-end services
on the fly. They are managed on those virtual networks for the users by sharing and using network resources
gained from infrastructure providers. The another main feature of network virtualization is segmentation,
in which the network is divided into sub-networks. A process that leads to boosting performance by
minimizing local traffic in the network and improving security by making the internal network structure
invisible from the outside. Network virtualization is also used to create a virtualized infrastructure to support
complex requirements by creating single instances of software applications serving multiple customers.
4. Hypervisor Security. There are some key security recommendations for hypervisors:
(a) Install the hypervisor updates released by the vendor. Most hypervisors will have automatic updating
of software and will install updates when found.
(b) Secure with thin hypervisors which makes deployment easy and efficient to run with minimal
computing overhead. It also reduces the chance of attack by malicious code that could reach the
hypervisor.
(c) Do not connect unused physical hardware to the host system, or unused NICs to any network.
Sometimes, disk drives are used to back up data, so unused devices should be disconnected when
they are not actively being used for backup.
(d) If you do not need file sharing service or any other service between the guest OS and the host OS.
It will disable any services that are not needed.
CLOUD COMPUTING
5-84 VIRTUALIZATION TECHNOLOGIES
(e) There must be security between guest operating systems in order for them to communicate.
Non-virtualized environments should be handled by security controls such as firewalls, network
appliances, etc.
Q.24. What types of cloud OS are used in virtualized data centers? (RGPV, Bhopal, B.E. Nov. 2018)
Ans. Data centers must be virtualized to serve as cloud providers. Table 5.3 summarizes four virtual
infrastructure (VI) managers and OSes. These VI managers and OSes are specially tailored for virtualizing
data centers which often own a large number of servers in clusters. Nimbus, Eucalyptus, and OpenNebula
are all open source software available to the general public. Only vSphere 4 is a proprietary OS for cloud
resource virtualization and management over data centers.
Table 5.3. VI Managers and Operating Systems for Virtualizing Data Centers.
Manager/ Resources Client API, Hypervisors Public Cloud Special
OS, Platforms Being Language Used Interface Features
License Virtualized,
Web Link
Nimbus VM creation, EC2 WS, WSRF, Xen, KVM EC2 Virtual networks
Linux, virtual CLI
Apache v2 clustor, www.
nimbusproject.
org/
Eucalyptus Virtual EC2 WS, CLI Xen, KVM EC2 Virtual networks
Linux, BSD networking
www eucalyptus.
com/
OpenNebula Management XML-RPC, CLI, Xen, KVM EC2, Elastic Host Virtual networks,
Linux of VM host, Java dynamic
Apache v2 virtual network, provisioning
and scheduling
tools www.
opennebula.org/
vSphere 4 Virtualizing OS CLI, GUI, Portal, VMware ESX, VMware vCloud Data protection
Linux for data centers WS ESXI partners vStorage VMFS,
Window www.vmware. DRM, HA
proprietary com/products/
vsphere
These VI managers are used to create VMs and aggregate them into virtual clusters as elastic resources.
Nimbus and Eucalyptus support essentially virtual networks. OpenNebula has additional features to
provision dynamic resources and make advance reservations. All three public VI managers apply Xen
and KVM for virtualization. vSphere 4 uses the hypervisors ESX and ESXi from VMware. Only vSphere
4 supports virtual storage in addition to virtual networking and data protection.
Q.25. Differentiate between system VMM and process VM. (JNTU, ME, May 2019)
Ans. A process virtual machine sometimes called an application virtual machine, runs as a normal
application inside a host OS and supports a single process. It is created when that process is started and
destroyed when it exits. Its purpose is to provide a platform-independent programming environment that
abstracts away details of the underlying hardware or operating system, and allows a program to execute in
the same way on any platform. For example : Wine software in Linux helps to run Windows application.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-85
A system virtual machine provides a complete system platform which supports the execution of a complete
operating system (OS) just like you said VirtualBox is one example. A host virtual machine is the server
component of a virtual machine which provides computing resources in the underlying hardware to support
guest virtual machine (guest VM). A system Virtual Machine gives a complete virtual hardware platform
with support for execution of a complete operating system (OS).
Q.26. What are the steps involved in live VM migration? (JNTU, B.Tech., May 2017)
Or
Explain the process of live migration of VM from one host to another.
(JNTU, B.Tech., April 2018 ; Mumbai University, B.Tech., Dec. 2017)
Ans. Live migration refers to the process of moving a running virtual machine or application between
different physical machines without disconnecting the client or application. Memory, storage and network
connectivity of the virtual machine are transferred from the original guest machine to the destination.
Here are simple steps:
To locate a virtual machine, select a datacenter-> folder->cluster-> resource pool, host or vApp. Click
the related objects tab and click Virtual Machines. Select Change both host and data store and click Next.
Select the destination resource for the virtual machine migration.
Q.27. Write a short note on emulation in virtual machines. (JNTU, ME, May 2019)
Ans. With virtualization, the virtual machine uses hardware directly. Although there is an overarching
scheduler. As such, no emulation is taking place, but this limits what can be run inside virtual machines
to operating systems that could otherwise run atop the underlying hardware. This method provides the
best overall performance of the two solutions.
With emulation, since an entire machine can be created as a virtual construct. There are a wider variety
of opportunities, but with the aforementioned emulation penalty but emulation makes it possible to. For
example : Run programs designed for a completely different architecture on an x86 PC. This approach is
common. For example : When it comes to running old games designed for obsolete platforms on today’s
modern systems because everything is emulated in software. There is a performance hit in this method.
Although today’s massively powered processors often cover for this.
Q. 28. Discuss the following:
(a) Xen virtualization technology (RTU, Kota, B.Tech., Dec 2015)
(b) VMware: Full virtualization (RTU, Kota, B.Tech., Dec. 2015)
(c) Operating System level virtualization (RTU, Kota, B.Tech., Dec. 2015)
(d) Programming language level virtualization (RTU, Kota, B.Tech., Dec. 2015)
(e) Application level virtualization (RTU, Kota, B.Tech., Dec. 2015)
(f) VMware hypervisor (RTU, Kota, B.Tech., Dec. 2016)
(g) KVM hypervisor (RTU, Kota B.Tech Dec-2016, JNTU, B.Tech May-2019)
(h) Virtual cluster and resource management (RTU, Kota, B.Tech., Dec. 2018)
(i) Virtualization of data-center (RTU, Kota, B.Tech., Dec. 2019)
Ans. (a) Refer Article 5.2.
(b) Refer Article 5.2.
(c) Refer Article 5.5.
(d) Refer Article 5.5.
(e) Refer Article 5.5.
CLOUD COMPUTING
5-86 VIRTUALIZATION TECHNOLOGIES
(f) Refer Article 5.2.
(g) Refer Article 5.2.
(h) Refer Article 5.5.
(i) Refer Article 5.6.
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-89
15. Which of the following is not true about hypervisor:
(A) The hypervisor is also known as the VMM (Virtual Machine Monitor)
(B) It is a type of web service provided by Google
(C) The creation of the hypervisor was a milestone in the evolution of computing because it provided
a way to overcome the architectural limitations and high cost of using mainframe computers.
(D) The hypervisor is a layer of software that resides below the virtual machines and above the
hardware.
16. Which of the following is not true:
(A) Type 1 Hypervisors cannot run directly on the server hardware without an operating system
beneath it.
(B) Without an intermediary the Type 1 Hypervisor can directly communicate with the hardware
resources in the stack below it, making it much more efficient than the Type 2 Hypervisor.
(C) Aside from having better performance characteristics, Type 1 Hypervisors are also considered
to be more secure than Type 2 Hypervisors.
(D) Type 2 Hypervisors are also less reliable because there are more points of failure.
17. Which of the following is a example of Type 1 Hypervisors are:
(A) Microsoft Hyper-V (B) VMware Player
(C) VMware Workstation (D) Microsoft Virtual Server.
18. Which of the following is not true:
(A) A Type 2 Hypervisor itself is an application that runs a top a traditional operating system.
(B) Type 2 Hypervisor benefit of this model is that it can support a large range of hardware because
that is inherited from the operating system it uses.
(C) Often Type 2 Hypervisors are easy to install and deploy because much of the hardware
configuration.
(D) Type 2 Hypervisors are more efficient than Type 1 Hypervisors because of this extra layer
between the hypervisor itself and the hardware.
19. Which of the following is a Example of Type 2 Hypervisors are:
(A) VMware ESX (B) Microsoft Hyper-V
(C) VMware Player (D) The Xen Architecture
20. Which of the ring contains the programs that are most privileged
(A) Ring 0 (B) Ring 1
(C) Ring 2 (D) Ring 3
21. Which of the following is the main difference between the full virtualization and para-virtualization
(A) The guest OS knows that it is running in virtualized environment in para-virtualization but in
full virtualization, this information is not known to the guest OS.
(B) The para-virtualization replaces the translation of non virtualized OS requests with hyper calls.
(C) In full virtualization, the guest OS will be used without any modification but in para virtualization,
the guest OS needs to be modified to replace non virtualized instructions with the hyper calls.
(D) Both are same
22. Advantages of server virtualization:
(A) Reduce the number of servers (B) Reduces IT cost
(C) More application can be run (D) Continuity in business
(E) All of the above
CLOUD COMPUTING
5-90 VIRTUALIZATION TECHNOLOGIES
23. Disadvantages of server virtualization:
(A) Slow (B) Storage space
(C) Migration of the data (D) All of the above
24. Which of the following is not a approach to server virtualization
(A) Virtual machines model (B) OS-level virtualization
(C) Para-virtual machine (D) Migration of the data
25. Advantages of storage virtualization :
(A) Migrations (B) Better workflows
(C) More than one type of storage array (D) Cheaper
(E) All of the above
26. Disadvantages of storage virtualization :
(A) Deal with multiple vendors (B) Make upgrades challenging to process
(C) Not always scale (D) Data security risks
(E) All of the above
27. Which of the following is types of storage virtualization
(A) Block level storage (B) Register level storage
(C) Virtual IO level (D) OS-level virtualization
28. Which of the following is not included in hardware assisted virtualization
(A) CPU Virtualization (B) OS Virtualization
(C) Memory Virtualization (D) I/O Virtualization
29. Which of the following is not storage virtualization approach
(A) Direct-attached storage (B) Storage area network
(C) Network-attached storage (D) VMware ESX
30. Advantages of operating system virtualization:
(A) Flexible provisioning (B) Support of multiple images
(C) Rapid software (OS/Apps) deployment (D) System 100% identical
(E) All of the above
31. Disadvantages of operating system virtualization:
(A) No work off-line capability
(B) High-speed LAN recommended (>100Mb)
(C) Not all operating systems are supported
(D) All of the above
32. Which of the following type of virtualization is also characteristic of cloud computing ?
(A) Storage (B) Application
(C) CPU (D) All of the above
33. Which of the following is another name for system virtual machine ?
(A) Hardware virtual machine (B) Software virtual machine
(C) Real machine (D) None of the mentioned
34. Which of the following provide system resource access to virtual machines ?
(A) VMM (B) VMC
(C) VNM (D) All of the mentioned
CLOUD COMPUTING
VIRTUALIZATION TECHNOLOGIES 5-91
Answers
Fill in the Blanks
1. 1960s 2. Virtual 3. Host machine
4. IBM 5. Application-level 6. Virtual Machine Monitor
7. Hypervisor 8. Protection 9. Hyper calls
10. Storage virtualization 11. Virtual LAN 12. Pre-installed
13. Hardware 14. Desktop 15. Block level storage
16. Application programming interface 17. VMware 18. Hyper-V
19. Type 1 20. Cambridge 21. Virtual machine
22. Operating systems 23. Windows Server 2003 24. Guest OS
25. Partial virtualization 26. Virtual memory 27. I/O virtualization
28. Server virtualization 29. Block level storage 30. File level storage
31. Direct-attached storage 32. Network-attached storage 33. Network virtualization
34. OS virtualization 35. Cluster 36. VMware
37. Virtual machines 38. Linux operating
Mutliple Choice Questions
1. (C) 2. (A) 3. (C) 4. (E) 5. (A) 6. (D) 7. (B) 8. (D)
9. (B) 10. (B) 11. (E) 12. (E) 13. (B) 14. (E) 15. (B) 16. (A)
17. (A) 18. (D) 19. (C) 20. (A) 21. (A) 22. (E) 23. (D) 24. (D)
25. (E) 26. (E) 27. (A) 28. (B) 29. (D) 30. (E) 31. (D) 32. (D)
33. (A) 34. (A)
Unsolved Questions
1. What are the basic concepts of virtualization? Describe the virtualization architecture.
2. What is virtualization? List its benefits and drawbacks.
3. What is the different level of virtualization? Explain the different benefits of virtualization.
4. Explain how virtualization changes the computing in the IT industry.
5. Briefly explain how hardware resources such as processor, memory, storage and networks can be
virtualized.
6. Write short notes on data virtualization and application virtualization.
7. What are protection rings? Explain how it is used in virtualization.
8. Explain the different approaches used to achieve virtualization with a neat diagram.
9. Differentiate full virtualization, para-virtualization and hardware-assisted virtualization techniques.
10. What is the role of hypervisor in virtualization? Briefly explain the different types of hypervisors
with a neat diagram.
11. Differentiate type 1 and type 2 hypervisors.
12. What is storage virtualization? Explain storage virtualization approaches.
13. Explain the different attacks targeted on hypervisors with a neat diagram.
14. Explain networking virtualization. What are the advantages and disadvantages of networking
virtualization?
15. Explain how cloud computing is different from virtualization.
16. Compare and contrast cloud computing and virtualization.
17. What is desktop or client virtualization? Explain the advantages and disadvantages of desktop
virtualization.
CLOUD COMPUTING
5-92 VIRTUALIZATION TECHNOLOGIES
18. Describe application virtualization. What are its advantages and disadvantages ?
19. Explain the server virtualization? Discuss the advantages and disadvantages of server virtualization.
20. Explain the different approaches of server virtualization.
21. What is block level storage? Discuss its advantages.
22. Describe file level storage. Discuss its advantages.
23. What are the infrastructure requirements for virtualization?
24. What is the difference between VLAN and VSAN ? Explain the different benefits of VLANs and
VSAN.
CLOUD COMPUTING