Virtualization In
Cloud Computing
Dr. Gayathri S
Introduction
Virtualization is the "creation of a virtual (rather than actual) version
mething, such as a server, a desktop, a storage device, an operating system
work resources".
Virtualization is a technique, which allows to share a single physical insta
resource or an application among multiple customers and organizations.
PRESENTATION TITLE
Why Virtualization is required?
Business demanded:
Cost savings
Flexibility
Mobility
End users demanded:
Frequent refresh
Easy Access
BYOD(Bring Your Own Device)
BYOD(Bring
PRESENTATION TITLE
Benefits
[Link]
Run multiple operating systems on one physical machine
Run
Share physical resources between virtual machines
Share
[Link]
Entire virtual machine is saved as a file,
Move, copy, or export as easily as a file
[Link]
Recovery as easily as restoring a file
[Link], Minimal Downtime
[Link] Provisioning
PRESENTATION TITLE
Pros and Cons of Virtualization
Pros:
Users
Users can access data without worrying about where it is
being stored in memory.
Simple
Simple and fast deployment of resources
By
By eliminating data replication, costs are reduced.
Provision
Provision of various security features.
PRESENTATION TITLE
Cons:
High Initial Investment: Clouds have a very high initial investment,
but it is also true that it will help in reducing the cost of companies.
Learning New Infrastructure: As the companies shifted from Servers
to Cloud, it requires highly skilled staff who have skills to work with the
cloud easily, and for this, you have to hire new staff or provide training
to current staff.
Risk of Data: Hosting data on third--party resources can lead to putting
the data at risk, it has the chance of getting attacked by any hacker or
cracker very easily.
PRESENTATION TITLE
Virtual Architecture
PRESENTATION TITLE
Hypervisors
A hypervisor (Virtual Machine Monitor) is a crucial piece of software
makes virtualization possible.
•It abstracts guest machines and the operating system they run on, fro
actual hardware.
•Hypervisors create a virtualization layer that separates CPU / Proces
RAM and other physical resources from the virtual machines you create.
•The machine we install a hypervisor on is called a host machine, and
virtual machines that run on top of them.
them
•From a VM’s standpoint, there is no difference between the physica
virtualized environment.
•Guest machines do not know that the hypervisor created them
virtual environment. Or that they are sharing available computing po
PRESENTATION TITLE
Types of Hypervisors
•Type
Type 1 Hypervisor(also called bare metal or native)
It is a virtualization software that has been installed directly onto
the computing hardware.
This type of hypervisor controls not only the hardware, but one
or more guest operating systems (OSes).
Examples of popular bare-metal
metal hypervisors are Microsoft Hyper-
V, Citrix XenServer and VMware ESXi.
ESXi
•Type
Type 2 Hypervisor(also known as hosted hypervisors)
It runs within the host OS, so the underlying hardware is
managed by the host OS.
PRESENTATION TITLE
A well-known
known example of a hosted hypervisor is Oracle VM
VirtualBox.
Others include VMware Server and Workstation, Microsoft
Others
Virtual PC, KVM, QEMU and Parallels.
PRESENTATION TITLE
PRESENTATION TITLE
Types of
Virtualization
1. Application Virtualization:
Application virtualization helps a user to have remote
access to an application from a server.
The server stores all personal information and other
characteristics of the application but can still run on a local
workstation through the internet.
internet
An example of this would be a user who needs to run two
different versions of the same software.
software
Technologies that use application virtualization are hosted
applications and packaged applications.
applications
PRESENTATION TITLE
2. Network Virtualization:
The ability to run multiple virtual networks with each
having a separate control and data plan.
It co-exists together on top of one physical network.
It can be managed by individual parties that are potentially
confidential to each other.
Network virtualization provides a facility to create and
provision virtual networks, logical switches, routers, firewalls,
load balancers, Virtual Private Networks (VPN), and
workload security within days or even weeks.
PRESENTATION TITLE
PRESENTATION TITLE
VLAN
One example of network virtualization is virtual LAN (VLAN).
PRESENTATION TITLE
Desktop Virtualization:
Desktop virtualization allows the users’ OS to be remotely
Desktop
stored on a server in the data center.
It allows the user to access their desktop virtually, from any
It
location by a different machine.
Users who want specific operating systems other than
Users
Windows Server will need to have a virtual desktop.
The main benefits of desktop virtualization are user
The
mobility, portability, and easy management of software
installation, updates, and patches.
PRESENTATION TITLE
Storage Virtualization:
Storage virtualization is an array of servers that are
managed by a virtual storage system.
system
The servers aren’t aware of exactly where their data is stored
and instead function more like worker bees in a hive.
It makes managing storage from multiple sources be
managed and utilized as a single repository.
Storage virtualization software maintains smooth operations
and consistent performance
PRESENTATION TITLE
Data Virtualization:
This is the kind of virtualization in which the data is collected
This
from various sources and managed at a single place
There is no more about the technical information like how dat
There
is collected, stored & formatted
Then data is arranged logically so that its virtual view can be
accessed by its interested people and stakeholders and users
through the various cloud services remotely.
Many big giant companies like Oracle, IBM, At scale, Cdata,
Many
etc. are providing data virtualization services.
PRESENTATION TITLE
Server Virtualization:
This is a kind of virtualization in which the masking of server resources ta
place.
Here, the central server (physical server) is divided into multiple diffe
virtual servers by changing the identity number, and processors.
So, each system can operate its operating systems in an isolated man
Where each sub-server knows the identity of the central server.
It causes an increase in performance and reduces the operating cost by
deployment of main server resources into a sub-server resource.
It’s beneficial in virtual migration, reducing energy consumption, reduc
infrastructural costs, etc.
PRE
SENTATION TITLE
PRESENTATION TITLE
The three types of server virtualization :
1. full virtualization
2. Para-virtualization
3. OS-level virtualization.
The difference lies in the OS modification and hypervisor each
employs.
PRESENTATION TITLE
Full Virtualization
Full Virtualization was introduced by IBM in the year 1966
Virtual machines emulates hardware to allow an unmodified gues
OS to be run in isolation.
The virtualization layer or VMM fully decouples the guest OS fr
he underlying infrastructure.
The hypervisor completely simulates the underlying hardware.
n full virtualization ,the guest OS is completely unaware that it’s
eing virtualized.
PRESENTATION TITLE
• Full virtualization uses a combination of direct execution and
binary translation.
Types:
Software assisted full virtualization
Hardware assisted full virtualization
PRESENTATION TITLE
Software Assisted –Full
Virtualization
•It
It completely relies on binary translation to trap and virtualize t
execution of sensitive, non-virtualizable
virtualizable instruction sets.
• It emulates the hardware using the software instruction sets.
Here is the list of software which will fall under software
assisted(BT).
•VM ware workstation(32Bitguests)
•VirtualPC
•VirtualBox(32-bitguests)
•VMwareServer
PRESENTATION TITLE
PRESENTATION TITLE
Hardware-Assisted
Assisted –Full
Virtualization (VT)
• Hardware assisted full virtualization eliminates the binary
translation and it directly interrupts with hardware using the
virtualization technology which has been integrated on x86
processors since 2005 (IntelVT
IntelVT-xandAMD-V).
• underlying hardware provides special CPU instructions to
aid virtualization.
PRESENTATION TITLE
PRESENTATION TITLE
The enterprise software which supports hardware-assisted–
hardware
Full virtualization which falls under
•hypervisortype1(Baremetal)
–VMwareESXi/ESX
–KVM
–Hyper-V
–Xen
•Full virtualization which falls under
–hypervisor type 2
•VMware Workstation(64-bit bit guests only )
•Virtual Box (64-bit
bit guests only )
PRESENTATION TITLE
Paravirtualization:
Para virtualization works differently from the full virtualization.
doesn’t need to simulate the hardware for the virtual machines.
he hypervisor is installed on a physical server (host) and a guest
S is installed into the environment.
irtual guests aware that it has been virtualized.
virtualized
n this virtualization method, guest source codes will be modified
th sensitive information to communicate with the host.
uest Operating systems require extensions to make API calls to t
pervisor.
PRESENTATION TITLE
Here is the list of products which supports paravirtualization.
Xen
IBM LPAR
Oracle VM for SPARC (LDOM)
Oracle VM for X86 (OVM)
Xen supports both Full virtualization and Para virtualization
PRESENTATION TITLE
Due to the architecture difference between windows and Linux based
Xen hypervisor, Windows operating system can’t be para-
virtualized. But it does for Linux guest by modifying the kernel. But
VMware ESXi doesn’t modify the kernel for both Linux and Windows
guests.
PRESENTATION TITLE
Full Vs Para Virtualization
PRESENTATION TITLE
OS-Level
Level Virtualization
•Unlike full and para-virtualization,OS
virtualization,OS level visualization
does not use a hypervisor.
• It also known as “containerization
containerization”
•The virtualization capability, which is part of the physical
server operating system, performs all the tasks of a
hypervisor.
•However, all the virtual servers must run that same
operating system in this server virtualization method.
PRESENTATION TITLE
Containers
•Containers are executable units of software in wh
application code is packaged, along with its libraries
dependencies, in common ways so that it can be
anywhere ,whether it be on desktop, traditional IT, or
cloud.
•Oracle Solaris zone is one of the famous containers in
enterprise market. Here is the list of other containers.
Linux LCX
Docker
AIX WPAR
PRESENTATION TITLE
PRESENTATION TITLE
PRESENTATION TITLE
Implementation Levels Of
Virtualization
PRESENTATION TITLE
5 Abstraction Levels : ranging
from H/W to Application
PRESENTATION TITLE
Instruction Set Architecture Level (ISA)
•ISA virtualization can work through ISA emulation. This is
used to run many legacy codes written for a different
hardware configuration.
•These codes run on any virtual machine using the ISA.
•With this, a binary code that originally needed some
additional layers to run is now capable of running on the x86
machines.
•It can also be tweaked to run on the x64 machine.
With ISA, it is possible to make the virtual machine hardware
agnostic.
PRESENTATION TITLE
• For the basic emulation, an interpreter is needed, which
interprets the source code and then converts it into a
hardware format that can be read.
read
•This then allows processing.
PRESENTATION TITLE
Hardware Abstraction Level (HAL)
•This
This level helps to perform virtualization at the hardware
level. It uses a bare hypervisor for its functioning.
•This
This level helps form the virtual machine and manages the
hardware through virtualization.
•It
It enables virtualization of each hardware component such
as I/O devices, processors, memory, etc.
•This
This way multiple users can use the same hardware with
numerous instances of virtualization at the same time.
•IBM
IBM had first implemented this on the IBM VM/370 back in
1960. It is more usable for cloud-based
cloud infrastructure.
PRESENTATION TITLE
Operating System Level
•At the operating system level, the virtualization model
creates an abstract layer between the applications and the
OS.
•It is like an isolated container on the physical server and
operating system that utilizes hardware and software. Each
of these containers functions like servers.
•When the number of users is high, and no one is willing to
share hardware, this level of virtualization comes in handy.
•Here, every user gets their own virtual environment with
dedicated virtual hardware resources.
resources This way, no conflicts
arise.
PRESENTATION TITLE
Library Level
•OS system calls are lengthy and cumbersome. Which is
why applications opt for APIs from user-level libraries.
•Most of the APIs provided by systems are rather well
documented.
• Hence, library level virtualization is preferred in such
scenarios.
•Library interfacing virtualization is made possible by API
hooks.
•These API hooks control the communication link from the
system to the applications.
•Some tools available today, such as vCUDA and WINE,
have successfully demonstrated this technique.
PRESENTATION TITLE
Application Level
•Application-level virtualization comes handy when you wish
to virtualize only an application.
application It does not virtualize an
entire platform or environment.
•On an operating system, applications work as one process.
Hence it is also known as process-level
process virtualization.
•It is generally useful when running virtual machines with
high-level languages.
•Here, the application sits on top of the virtualization layer,
which is above the application program.
program
•The application program is, in turn, residing in the operating
system.
•Programs written in high-level
level languages and compiled for
an application-level virtualPRESENTATION
machine can run fluently here.
TITLE