You are on page 1of 42

CLOUD

V I RT U A L I Z AT I O N

S U B J E C T T E A C H E R : S H AV E T A K A L S I , A S S I S T A N T P R O F E S S O R ( C S E )

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR


WHAT IS VIRTUALIZATION
• Virtualization is a technique of splitting a physical resource into as many as logical resource as
we want. eg. CPU, Memory, storage. It is the process of creating a virtual version of something
like computer hardware. It involves using specialized software to create a virtual or software-
created version of a computing resource rather than the actual version of the same resource.
With the help of Virtualization, multiple operating systems and applications can run on same
machine and its same hardware at the same time, increasing the utilization and flexibility of
hardware.
• In other words, Virtualization allows to share a single physical instance of a resource or an
application among multiple users and organizations at one time. It does this by assigning a
logical name to a physical storage and providing a pointer to that physical resource on demand.
Moreover, virtualization technologies provide a virtual environment for not only executing
applications but also for storage, memory, and networking.
• Over an existing OS & hardware, we generally create a virtual machine that and above it, we
run other operating systems or applications. The system or machine is the host & the Virtual
machine is the guest machine. This virtual environment is managed by firmware, which is
termed as a hypervisor. Hypervisor is also known as VMM (Virtual Machine Manager).

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
The machine on which the Virtual Machine is going to be build is known as Host
Machine and that Virtual Machine is referred as a Guest Machine.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
FEATURES OF VIRTUALIZATION
1. Increased Security: It increases the hosts ability to control the execution of guest programs in
a transparent manner which helps open up new possibilities to allow the delivery of a secure and
controlled execution environment. All the operations of the guest programs are generally
performed against the virtual machine, which then translates and applies them to the host
programs. A virtual machine manager can control and filter the activity of the guest programs,
thus preventing some harmful operations from being performed. Resources exposed by the host
can then be hidden or simply protected from the guest. Increased security is a requirement when
dealing with untrusted code.
2. Sharing: It is a key feature of virtualization as through this process one can create a separate
computing environment within the same host. This allows them to reduce the number of active
serves and minimizes power consumption.
3. Aggregation: Not only it is possible to share physical resource among several guests, but
virtualization also allows aggregation, which is the opposite process. A group of separate hosts
can be tied together and represented to guests as a single virtual host. This functionality is
implemented with cluster management software, which harnesses the physical resources of a
homogeneous group of machines and represents them as a single resource.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
4. Availability: Virtualization platforms assure the continuous uptime by balancing load
automatically that runs an excessive number of servers across multiple host machines in order to
prevent interruption services.
5. Isolation: Virtualization allows providing guest programs with completely separated and
isolated environments for them to be executed in, be it an operating system, application etc. The
program performs its activity by interaction with an abstraction layer that provides access to the
underlying resources. The virtual machine filters the activity of the guest and prevents harmful
operations against the host. It also enables tuning. Tuning helps finely tune the properties of the
resources exposed through the virtual environment, making it easier to control the performance of
the guest program. This online environment not only defends sensitive knowledge but also allows
guest users to remain-connected.
6. Emulation: Guest programs are executed within an environment that is controlled by the
virtualization layer, which ultimately is a program. Also, a completely different environment with
respect to the host can be emulated, thus allowing the execution of guest programs requiring
specific characteristics that are not present in the physical host.
7. Resource Distribution: Either be a single computer or a network of connected servers,
virtualization allows users to make a unique computer environment from one host machine that
lets users to restrict the participants as active users, scale down power consumption and easy
control.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
BENEFITS OF VIRTUALIZATION
1. Security: The security is served through firewalls that prevent from any unreliable access and
preserve the data safe and confidential. In addition to that, the firewalls provide extra security
from any sort of cyber threats and virus attacks, the protocols consist of end to end encryption,
saving data automatically from other risky threads, and users can virtualize their data and make
backups of the same data on another server when needed.
2. Flexible Operations: With the deployment of virtualization, users can work efficiently as the
working process is very streamlined and agile. Presently, the employed network switch is easy to
use, flexible and saves time. Virtualization is also helpful in troubleshooting technical errors,
occurring in any of the connected devices. It eradicates the issues of retaining or recovering lost
data due to corrupted or crashed devices.
3. Economical: This is the most prime reason to choose virtualization rapidly as with this
technique companies can manage additional expenditure on physical devices and servers. Being
active with a virtual environment, data can be gathered on virtual servers. It also reduces the
rigorous use of electricity (that has been a concern if several physical devices and services are
being used at the same time), lowering bills while executing the numerous components of an
operating system and applications over the users and company’s network.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
4. Flexible data transfer: The data can be transferred to virtual servers anytime and also be
retrieved due to this users or cloud providers need not to waste time in finding out hard drives to
discover data. With the implementation of virtualization, it has become easy to allocate the
required data and transfer them to the appropriate authorities. Moreover, there is no limitation of
data transfer and can be transferred to a far distance with minimal charges.
5. Remove system failure risks: While performing any function, it often happens that the system
might malfunction in critical timing such that this system failure could be adverse for a company’s
resources and also deteriorate its reputation. This system failure can be protected with
virtualization as users could perform the same task simultaneously over multiple devices, and the
accumulated data can also be retrieved anytime with any device. Along with it, the server has the
two working sides that makes data accessible at any point of time, if one primary server goes
down, the secondary server is there to deliver access to the users when they demand to retrieve
data for their use
6. Enhance development productivity. i.e., if one VM is not working, it will not affect other VM’s.
7. Remote access and rapid scalability.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
TYPES OF VIRTUALIZATION

Operating Application/
Hardware Data
System Software
Virtualization Virtualization
Virtualization Virtualization

Memory Storage Network Desktop


Virtualization Virtualization Virtualization Virtualization

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
1) Hardware Virtualization: When the virtual machine software or virtual machine manager
(VMM) is directly installed on the hardware system is known as hardware virtualization. The
main job of hypervisor is to control and monitoring the processor, memory and other hardware
resources. After virtualization of hardware system, different operating systems are installed on it
which run different applications on those OS.
2) Operating System Virtualization: When the virtual machine software or virtual machine
manager (VMM) is installed on the Host operating system instead of directly on the hardware
system is known as operating system virtualization. It is mainly used for testing the applications
on different platforms of OS.
3) Memory Virtualization: Memory Virtualization separates memory and servers. It decouples
volatile RAM resources from individual systems in the data center, and it aggregates those
resources into a virtualized memory pool accessible by any computer in the cluster.
4) Storage Virtualization: Storage virtualization is the process of grouping the physical storage
from multiple network storage devices so that it looks like a single storage device. The servers
aren’t aware of exactly where their data is stored. It makes managing storage from multiple
sources to be managed and utilized as a single repository. It is implemented by using software
applications. It is mainly done for back-up and recovery purposes. Using this technique gives the
user an ability to pool the hardware storage space from several interconnected storage devices into
a simulated single storage device that is managed from one single command console.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Application Virtualization: It helps a user to have remote access of an application from a server.
The server stores all personal information and other characteristics of the application but can still
run on a local workstation through the internet. Example of this would be a user who needs to run
two different versions of the same software.
Data Virtualization: In this, the data is collected from various sources and managed that at a
single place without knowing more about the technical information like how data is collected,
stored & formatted and then arranged that data logically so that its virtual view can be accessed by
its interested users through the various cloud services remotely. Many big companies are
providing their services like Oracle, IBM, At scale, Cdata etc.
Network Virtualization: It is a method of combining the available resources in a network by
splitting up the available bandwidth into different channels, each being separate and distinguished.
They can be either assigned to a particular server or device or stay unassigned completely all in
real time. The idea is that the technology disguises the true complexity of the network by
separating it into parts that are easy to manage, much like your segmented hard drive makes it
easier for you to manage files.
Desktop Virtualization: This model enables you to emulate a workstation load. It allows the
user to access the desktop remotely. Since the workstation is essentially running in a data center
server, access to it can be more secure and portable. Users who want specific Operating System’s
other than Windows Server will need to have a virtual desktop.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
HARDWARE VIRTUALIZATION
• The hypervisor manages sharing the physical resources of the hardware between the
guest operating systems and host operating system. The physical resources become
abstracted versions in standard formats regardless of the hardware platform. The
abstracted hardware is represented as actual hardware.
• Hardware virtualization is accomplished by abstracting the physical hardware layer by
use of a hypervisor or VMM (Virtual Machine Monitor). When the virtual machine
software or virtual machine manager (VMM) or hypervisor software is directly
installed on the hardware system is known as hardware virtualization.
• The main job of hypervisor is to control and monitoring the processor, memory and
other hardware resources.
• After virtualization of hardware system, we can install different operating system on it
and run different applications on those OS.
• Hardware virtualization is mainly done for the server platforms, because controlling
virtual machines is much easier than controlling a physical server.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Advantages of Hardware Virtualization
1) More efficient Resource Utilization:
Physical resources can be shared among virtual machines. Although the unused resources can be
allocated to a virtual machine and that can be used by other virtual machines if the need exists.
2) Lower overall costs because of Server Consolidation:
Now it is possible for multiple operating systems can co-exist on a single hardware platform, so
that the number of servers and power consumption drops significantly.
3) Increased uptime because of advanced Hardware Virtualization features:
The modern hypervisors provide highly orchestrated operations that maximize the abstraction of
the hardware and help to ensure the maximum uptime. These functions help to migrate a running
virtual machine from one host to another dynamically, as well as maintain a running copy of
virtual machine on another physical host in case the primary host fails.
4) Increased IT Flexibility:
Hardware virtualization helps for quick deployment of server resources in a managed and
consistent ways. That results in IT being able to adapt quickly and provide the business with
resources needed in good time.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Disadvantages of Hardware Virtualization
1. Hardware-based virtualization requires explicit support in the host CPU, which may not
available on all processors.
2. A “pure” hardware-based virtualization approach, including entire unmodified guest operating
system, involves many VM traps, and thus rapid increase in CPU overhead occurs which limits
the scalability and efficiency of server consolidation.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
DATA VIRTUALIZATION
• In this, the data is collected from various sources and managed that at a single place
without knowing more about the technical information like how data is collected,
stored & formatted and then arranged that data logically so that its virtual view can be
accessed by its interested users through the various cloud services remotely.
• It collects heterogeneous data from different resources and allows data users across the
organization to access this data according to their work requirements.
• Many big companies are providing their services like Oracle, IBM, At scale, Cdata etc.
• This heterogeneous data can be accessed using any application such as web portals,
web services, E-commerce, Software as a Service (SaaS), and mobile applications.
• We can use Data Virtualization in the field of data integration, business intelligence,
and cloud computing.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Advantages of Data Virtualization
• It allows users to access the data without worrying about where it resides on the memory.
• It offers better customer satisfaction, retention, and revenue growth.
• It provides various security mechanism that allows users to safely store their personal and
professional information.
• It reduces costs by removing data replication.
• It provides a user-friendly interface to develop customized views.
• It increases business user efficiency by providing data in real-time.
• It is used to perform tasks such as data integration, business integration and enterprise search.

Disadvantages of Data Virtualization


• It creates availability and scalability issues, because availability is maintained by third-party
providers.
• It required a high implementation cost.
• Although it saves time during the implementation phase of virtualization, but it consumes more
time to generate the appropriate result.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
STORAGE VIRTUALIZATION
• Storage virtualization is the pooling of physical storage from multiple storage devices into what
appears to be a single storage device -- or pool of available storage capacity -- that is managed
from a central console. The technology relies on software to identify available storage capacity
from physical devices and to then aggregate that capacity as a pool of storage that can be used
by traditional architecture servers or in a virtual environment by virtual machines (VMs).
• Storage virtualization creates a layer of abstraction between the operating system and the
physical disks used for data storage. For example, the storage virtualization software or device
creates a logical space, and then manages metadata that establishes a map between the logical
space and the physical disk space.
• The controllers configure the local storage in RAID groups and present the storage to the
operating system depending upon the configuration.
• The virtual storage software intercepts input/output (I/O) requests from physical or virtual
machines and sends those requests to the appropriate physical location of the storage devices
that are part of the overall pool of storage in the virtualized environment. To the user, the
various storage resources that make up the pool are unseen, so the virtual storage appears like a
single physical drive.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Methods of Storage Virtualization
1. File-based Storage Virtualization
In File virtualization, it basically removes the dependencies caused in accessing the data at file
level to that of the location where they are actually present. This basically helps in overcoming the
challenges faced with network-attached Storage (NAS) and they also help in optimizing the
storage usage. It also provides a benefit of better handling file migration in the background which
improves the performance.
2. Block-based Virtual Storage
The Block based virtual storage is more widely used than the virtual storage system as the virtual
storage system is sometimes used for a specific purpose. The block-based virtual storage system
uses logical storage such as drive partition from the physical memory in a storage device.
In block virtualization, we basically separate our logical storage from that of the physical so that
the user/administrator can access without having to access the physical storage, basically doing
this way helps the administrator in giving a lot of flexibility in managing different storage.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Advantages of Storage Virtualization
1. Easy Retrieval and Upload of Data: In storage virtualization, the data quickly retrieve from
virtual storage. It is as easy as accessing a file on the local computer. The data store very easily
with the help of some application and an internet connection which is an easy task.
2. Better Management: The data can be migrated based upon the utilization such as the data
which is frequently used can be stored on a high-performance storage system. However, the data
which is rarely used can be placed on a bit slower system. This is an example of a battery
management system and the customer won’t face any issue regarding storage.
3. Security: In storage virtualization, the data stores in different place and secure with maximum
security. If any disaster takes place the data can be retrieved from some other place and it won’t
affect the customer. The security has the ability to meet the real utilization necessities rather than
providing additional storage. Data is stored in the more convenient locations away from the
specific host. In the case of a host failure, the data is not compromised necessarily. The storage
devices can perform advanced functions like replication, reduplication, and disaster recovery
functionality.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Disadvantages of Storage Virtualization
• It requires you to deal with multiple vendors. With storage virtualization, most consumers
purchase their software from one vendor and their storage needs from another. If a problem
occurs, you must troubleshoot with both organizations instead of one.
• It can make upgrades challenging to process. Although must upgrades happen without a hitch,
there is the possibility that the failover node will hang for some reason if the update fails. That
would lead to problems with the applications that were using the storage provisioned for them
at the time.
• It does not always scale to some areas. There are hard limits in place with this technology, so as
you continue to grow and add more servers, you may find that you’ll start running out of
storage room.
• It does not eliminate data security risks.
• It may create availability issues.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
MEMORY VIRTUALIZATION
• Memory Virtualization involves sharing the physical system memory in RAM and
dynamically allocating it to the physical memory of the VMs.
• That means a two-stage mapping process should be maintained by the guest OS and
the VMM, respectively: virtual memory to physical memory and physical memory to
machine memory. The operating system maintains these mappings using page tables in
a typical execution environment.
• The programs running on top of the operating system can access the memory pool. A
CPU or GPU program can use the distributed memory pool as a high-speed cache, a
message layer, or a vast, shared memory resource.
• Memory Virtualization enables networked, and hence distributed, servers to share a
pool of memory to bypass physical memory constraints, a common bottleneck in
software performance.
• Nodes can connect to the memory pool using software on the memory pool nodes
(servers) to donate memory and store and retrieve data.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
APPLICATION VIRTUALIZATION
• Application Virtualization is technology that allows users to access and use an
application from a separate computer than the one on which the application is
installed.
• Using application virtualization software, IT admins can set up remote
applications on a server then deliver the apps to an end user’s computer. For the
user, the experience of the virtualized app is the same as using the installed app
on a physical machine.
• Application Virtualization is a software technology that encapsulates computer
programs from the underlying operating system on which they are executed. A
fully virtualized application is not installed in the traditional sense, although it
is still executed as if it were. The application behaves at runtime like it is
directly interfacing with the original operating system and all the resources
managed by it, but can be isolated or sandboxed to varying degrees.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Advantages of Application Virtualization
1. App Management: Application Virtualization makes it much easier for IT departments to manage
and maintain applications across an organization. Rather than manually installing applications to every
user’s machine, app virtualization lets IT admins install an app once on a central server and then deploy
the app as needed on user devices. Besides saving installation time, this also makes it simpler to update
or patch applications because IT only has to do so on a single server.
2. Scalability: This lets IT admins deploy virtual applications to all kinds of connected devices,
regardless of those devices operating systems or storage space. This allows thin client provisioning in
which users access an application on a low-cost machine while centralized servers handle all the
computing power necessary to run that application. As a result, the organization spends much less on
computing hardware because employees only require basic machines to access the apps they need for
work. App virtualization also allows users to access applications that normally would not work on their
machines operating system, because the app is actually running on the centralized server.
3. Security: Application Virtualization software gives IT admins central control over which users can
access applications. If a user’s app permissions within an organization change, the IT admin can simply
remove that user’s access to an application. Without app virtualization, the IT admin would have to
physically uninstall the app from the user’s device. This central control over app access is especially
important if a user’s devices are lost or stolen.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Disadvantages of Application Virtualization
• Not all computer programs can be virtualized. Some examples include applications that require
a device driver (a form of integration with the OS) and 16-bit applications that need to run in
shared memory space. Anti-virus programs and applications that require heavy OS integration,
such as WindowBlinds or StyleXP are difficult to virtualize.
• In software licensing, Application Virtualization bears great licensing pitfalls mainly because
both the application virtualization software and the virtualized applications must be correctly
licensed.
• While application virtualization can address compatibility issues between legacy applications
and newer operating systems, applications that don't manage the heap correctly will not execute
on Windows Vista as they still allocate memory in the same way, regardless of whether they are
virtualized. For this reason, specialist application compatibility fixes may still be needed, even
if the application is virtualized.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
OS VIRTUALIZATION
• Operating System Virtualization helps to create virtualized layer of software on the top of host
operating system that resides above the hardware layer. Unlike other virtualization, they create
an OS interfaces for applications to run, giving the feeling of a complete OS for the
applications. Each virtualized environment has its own file system, system libraries, process
tables and network configuration. Since they create a self-contained environment, they are also
known as “container”. Therefore, creating the software emulation of an entire OS in a physical
server is the essence of OS virtualization.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
• It is virtualization technology which work on OS layer. Here the kernel of an OS allows more
than one isolated user-space instances to exist. OS kernel will run a single operating system &
provide that operating system's functionality to replicate on each of the isolated partitions.
• Operating system virtualizations includes a modified form than a normal operating system so
that different users can operate its end-use different applications.
• In OS virtualizations, the environment accepts command from any of the user operating it and
performs different task on the same machine by running different applications.
• In operating system virtualization, the application does not interfere with another one even
though they are functioning in the same computer.

❖Types of OS Virtualization
1. Linux Operating System virtualization
VMware Workstation software is used to virtualize Linux systems. In addition, to install any
software by the means of virtualization the user will need VMware software to install first.
2. Windows Operating System virtualizations
This type of virtualization is also similar to the above to install any software there is a need to
install VMware software firstly.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Advantages of OS Virtualization
• OS Virtualization is capable of live migration.
• It can also use dynamic load balancing of containers between nodes and a cluster.
• The file level copy-on-write (CoW) mechanism is possible on OS virtualization which makes
easier to back up files, more space-efficient and simpler to cache.
• Operating system virtualization eliminates the use of physical space which utilizes by the IT
system. As everything is virtual it will require less space and hence it will save money.
• As there is no hardware required the maintenance will be less and therefore it will save both
time and money.

Disadvantage of OS Virtualization
• They support only one operating system as base and guest OS in a single server. You have to
choose a single OS such as either Windows and Linux. All the OS in the container should be
same version and should have same patch level of the base OS. If the base OS crash, all the
virtual container become unavailable.
• It take lots of system resources (RAM, CPU, disk space).
• It has lower performance.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
NETWORK VIRTUALIZATION
• Network Virtualization can combine multiple physical networks to one virtual, software-based
network, or it can divide one physical network into separate, independent virtual networks. It is
the process of combining hardware network resources and software network resources into a
single administrative unit.
• Network virtualization software allows network administrators to move virtual machines across
different domains without reconfiguring the network.
• Network virtualization decouples network services from the underlying hardware and allows
virtual provisioning of an entire network. It makes it possible to programmatically create,
provision, and manage networks all in software. Physical network resources, such as switching,
routing, firewalling, load balancing, virtual private networks (VPNs), and more, are pooled,
delivered in software, and require only Internet Protocol (IP) packet forwarding from the
underlying physical network.
• Network and security services in software are distributed to a virtual layer (hypervisors) and
“attached” to individual workloads, such as your virtual machines (VMs) or containers, in
accordance with networking and security policies defined for each connected application. When
a workload is moved to another host, network services and security policies move with it.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Advantages of Network Virtualization
• Lower hardware costs: Overall hardware costs are reduced, while providing a bandwidth that
is more efficient. Also, thanks to automation and centralized control, most operational processes
that are required to manage the network are reduced, allowing for reduced operational costs.
• Dynamic network control: Network virtualization offers centralized control over network
resources and allows for dynamic provisions and reconfiguration. Also, computer resources and
applications can communicate with virtual network resources directly. This also allows for
optimization of application support and resource utilization.
• Rapid scalability: Network virtualization created an ability to scale the network rapidly either
up or down to manage and create new networks on demand. This is a valuable tool/resource as
enterprises move their IT resources to the cloud and shift their model to an ‘as a service’.

Disadvantages of Network Virtualization


• It needs to coexist with physical devices in a cloud-integrated hybrid environment.
• Increased complexity.
• Cost required to purchase all the resources.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
DESKTOP VIRTUALIZATION
• Desktop Virtualization is a method of simulating a user workstation so it can be accessed from a
remotely connected device. By abstracting the user desktop in this way, organizations can allow
users to work from virtually anywhere with a network connecting, using any desktop laptop,
tablet, or smartphone to access enterprise resources without regard to the device or operating
system employed by the remote user.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Example of Desktop Virtualization
• A user logs-in to the network using his Corporate Directory user-name and password in his
Computer – He gets his desktop. He then goes to the conference room with his laptop. Since
there is some time for the conference to begin, he logs-in to the network using his user-name
and password – He still gets his desktop. He goes home, but since a client is asking for an
important piece of information, he needs to access his desktop. He connects his home PC to the
Internet, establishes an encrypted session back to the company network and logs-in with his
user-name and password – He gets his desktop with all his applications and data.
• Desktop Virtualization provides users with an environment that is separate from their local
physical system. In the most common form of Desktop Virtualization, this is provided on
servers in the company’s Data Center. The Operating System, Applications & User Data which
are normally loaded on to the user’s computer, are now hosted and rendered on servers in the
company’s Data Center and the user can access his desktop environment from anywhere.
• So, Desktop Virtualization solution consists of the Servers, Virtualization Software on the
Servers & Virtual Image on the desktops, Laptops, smart phones. Generally, you pay for the
Virtualization Software as well as license costs for the total (maximum) number of concurrent
virtual desktop sessions expected at any point of time in the organization.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Advantages of Desktop Virtualization
• Resource Utilization: Desktop virtualization allows organizations to issue lower-cost computers and
devices to end users because most of the intensive computing work takes place in the data center. By
minimizing how much computing is needed at the endpoint devices for end users, IT departments can save
money by buying less costly machines. IT organizations can thus deploy less powerful and less expensive
client devices since they are only used for input and output.
• Remote work: Desktop virtualization helps IT admins support remote workers by giving IT central
control over how desktops are virtually deployed across an organization’s devices. Rather than manually
setting up a new desktop for each user, desktop virtualization allows IT to simply deploy a ready-to-go
virtual desktop to that user’s device. Now the user can interact with the operating system and applications
on that desktop from any location and the employee experience will be the same as if they were working
locally.
• Security: Desktop virtualization software provides IT admins centralized security control over which
users can access which data and which applications. If a user’s permissions change because they leave the
company, desktop virtualization makes it easy for IT to quickly remove that user’s access to their
persistent virtual desktop and all its data—instead of having to manually uninstall everything from that
user’s devices. And because all company data lives inside the data center rather than on each machine, a
lost or stolen device does not post the same data risk. If someone steals a laptop using desktop
virtualization, there is no company data on the actual machine and hence less risk of a breach.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Disadvantages of Desktop Virtualization
• Desktop Virtualization is intensive. One needs to buy the Desktop Virtualization
Software/Licenses, Servers, Centralized Storage infrastructure, Upgrade Network infrastructure
to support more bandwidth, etc in addition to buying computers/ thin-clients for each user.
• There is no reduction in the number of end-user client machines (computers) that are needed in
the network.
• The licenses for Operating Systems, applications etc, still needs to be bought for each user
(mostly) and there is no reduction of costs there.
• The network infrastructure needs to handle all that extra bandwidth that Desktop Virtualization
is going to introduce. Otherwise, it has to be upgraded. The WAN links need to have sufficient
bandwidth to handle all those remote DV users, as well. If the bandwidth on the remote end is
not sufficient/ if there is congestion in LAN, the display quality may not be as good (when
images are streamed from server) as processing and viewing applications right from a desktop.
• Its difficult to handle graphics/ high-definition video with Desktop Virtualization.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt
Hypervisors
• A Hypervisor is also called a
Virtual Machine Monitor (VMM).
The hardware on which it is
installed is labeled as the host
machine. The virtual resources,
created and managed by the
hypervisor, are known as virtual or
guest machines.
• There are two types of
Hypervisors:
• 1. Type 1 Hypervisor (also called
bare metal or native)
• 2. Type 2 Hypervisor (also known
as hosted or embedded
hypervisors)

Shaveta Kalsi,
DAV
DAV INSTITUTE OFINSTITUTE OF ENGINEERING
ENGINEERING & TECHNOLOGY,
& TECHNOLOGY, JALANDHAR JALANDHAR Shaveta Kalsi, CSE Deptt
CSE Deptt
• Type 1 or Bare-Metal Hypervisors are installed directly on the
physical hardware of the host machine, providing a layer TYPE 1
between the hardware and an OS. On top of this layer, you can HYPERVISOR
install many virtual machines. The machines are not connected in
any way and can have different instances of operating systems
and act as different application servers.
• System administrators and advanced users control the hypervisor
remotely through an interface called a management console.
• With it, you can connect to and manage instances of operating
systems. You can also turn servers on and off, transfer operating
systems from one server to another (in case of downtime or
malfunction) and perform many other operations.
• A type 1 hypervisor is highly secure since it doesn’t have an
attack surface of an underlying operating system (host). Also, it
controls and assigns the resources allocated to each virtual
machine based on its usage to avoid wasting resources.
• Examples of type 1 hypervisors include VMware ESXi, KVM,
Oracle VM, Citrix XenServer, Microsoft Hyper-V etc.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSEKalsi,


Shaveta DepttCSE Deptt
• Unlike type 1, a type 2 hypervisor is installed on top of an existing
Operating System. This allows users to utilize their personal TYPE 2
computer or server as a host for virtual machines. Therefore, you
have the underlying hardware, an operating system serving as a host,
HYPERVISOR
a hypervisor and a guest operating system.
• The guest machine is not aware of its part of a larger system and all
actions you run on it are isolated from the host. Although a VM is
isolated, the primary OS is still directly connected to the hardware.
This makes it less secure than type 1 hypervisors.
• In environments where security is paramount, this type of
hypervisor may not suit your needs. However, end-users & clients
with small businesses may find this type of environment more
fitting.
• Having a hosted hypervisor allows more than one instance of an
operating system to be installed. However, you should be careful
with resource allocation. Over-allocation may result in your host
machine crashing.
• Examples of type 2 hypervisors include VMware Workstation,
KVM, Oracle VM VirtualBox, Microsoft Virtual PC, Red Hat
Enterprise Virtualization etc.

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY,


DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR JALANDHAR Shaveta Kalsi, CSEKalsi,
Shaveta DepttCSE Deptt
THANK YOU!!

DAV INSTITUTE OF ENGINEERING & TECHNOLOGY, JALANDHAR Shaveta Kalsi, CSE Deptt

You might also like