Professional Documents
Culture Documents
– Hypervisor
• A hypervisor is the software layer that coordinates VMs.
• It serves as an interface between the VM and the
underlying physical hardware, ensuring that each has
access to the physical resources it needs to execute.
• It is the OS that runs on actual hardware and the Virtual
counterpart is a part of this OS as a running process.
– Virtual Machine (VM)
• It is a virtual computer that runs under a hypervisor
• They normally comprise several files containing the VM’s
configuration, the storage for the virtual hard drive, and
some snapshots of the VM that preserve its state at a
particular point in time
Continued..
– Container
• These are light-weight VMs that are part of the same
OS instance as its hypervisor.
– Virtualization Software
• It is a software that aids in implementing virtualization
on any computer.
– Virtual Network
• Virtual Network is a logically separate network within
servers that can be extended to other servers or across
multiple servers.
Benefits of virtualization
• Resource efficiency
• previously each application server required its own
dedicated physical CPU
• server virtualization run several applications—each on its
own VM with its own OS—on a single physical computer
• Easier management
• physical computers with software-defined VMs makes it
easier to use
• automated deployment and configuration tools enable
administrators to define collections of virtual machines
and applications as services, in software template
Continued..
• Minimal downtime
• OS and application crashes can cause downtime and disrupt user
productivity
• Running multiple redundant physical servers is more expensive.
• Faster provisioning
• Buying, installing, and configuring hardware for each application is time-
consuming.
• Provided that the hardware is already in place, provisioning virtual
machines to run all your applications is significantly faster.
• Vendor neutrality
• open-source configuration, it favors vendor-agnostic hardware
configuration
• greater flexibility to experiment, while also helping improve software
and features, enhance scalability, establish simplified and industry
standardized integrations
Types of Virtualization
• Desktop virtualization
• Network virtualization
• Storage virtualization
• Data virtualization
• Application virtualization
• Data center virtualization
• CPU virtualization
• GPU virtualization
• Linux virtualization
• Cloud virtualization
Continued..
• Desktop virtualization
• Desktop virtualization lets us deploy simulated desktop
environments to many physical machines at once
• desktop virtualization allows admins to perform mass
configurations, updates, and security checks on all virtual
desktops.
• There are two types of desktop virtualization
• Virtual desktop infrastructure (VDI)
– runs multiple desktops in VMs on a central server and streams them to
users who log in on thin client devices.
– VDI lets an organization provide its users access to variety of OS's from
any device, without installing OS's on any device
• Local desktop virtualization
– runs a hypervisor on a local computer, enabling the user to run one or
more additional OSs on that computer and switch from one OS to
another as needed without changing anything about the primary OS.
Continued..
• Network virtualization
• create a “view” of the network that an administrator
can use to manage the network from a single console
• The network administrator can modify and control
these elements without touching the underlying
physical components -which simplifies network
management
• software-defined networking (SDN)
– virtualizes hardware that controls network traffic routing
• network function virtualization (NFV)
– Virtualizes one or more hardware appliances that provide a
specific network function
Continued..
• Storage virtualization
– enables all the storage devices on the network -whether they’re
installed on individual servers or standalone storage units
– masses all blocks of storage into a single shared pool from which
they can be assigned to any VM on the network as needed
• Data virtualization
– multiple file formats, in multiple locations, ranging from the
cloud to on-premise hardware and software systems
– any application access all of that data—irrespective of source,
format or location
– Data virtualization tools create a software layer between the
applications accessing the data and the systems storing it
Continued..
• Application virtualization
– runs application software without installing it directly on
the user’s OS
– Local application virtualization
• The entire application runs on the endpoint device but runs in a
runtime environment instead of on the native hardware.
– Application streaming
• The application lives on a server which sends small components
of the software to run on the end user's device when needed.
– Server-based application virtualization
• The application runs entirely on a server that sends only its user
interface to the client device.
Continued..
• Data centre virtualization
– enabling an administrator to divide a single
physical data center into multiple virtual data
centers for different clients
• CPU virtualization
– CPU virtualization - makes hypervisors, virtual
machines, and operating systems possible.
– It allows a single CPU to be divided into multiple
virtual CPUs for use by multiple VMs.
Continued..
• GPU virtualization (graphical processing unit)
– is a special multi-core processor that improves overall
computing performance by taking over heavy-duty graphic
or mathematical processing
– lets multiple VMs use all or some of a single GPU’s
processing power for faster video, artificial intelligence (AI),
and other graphic- or math-intensive applications
• Linux virtualization
– Linux includes its own hypervisor, called the kernel-based
virtual machine (KVM)
– As an open source OS, Linux is highly customizable
Continued..
• Cloud virtualization
– By virtualizing servers, storage, and other physical data center
resources, cloud computing providers can offer a range of
services to customers
– Infrastructure as a service (IaaS)
• Virtualized server, storage, and network resources you can configure
based on their requirements.
– Platform as a service (PaaS)
• Virtualized development tools, databases, and other cloud-based
services you can use to build you own cloud-based applications and
solutions.
– Software as a service (SaaS)
• Software applications you use on the cloud. SaaS is the cloud-based
service most abstracted from the hardware.
Virtualization methods
• Full virtualization
• allows multiple guest operating systems to execute on a host
operating system independently
• virtual machine is used to completely isolate the guest OS
from the hypervisor and the hardware
• guest operating systems execute independently
• Full virtualization uses an unmodified version of the guest
operating system.
• The guest communicates directly with the CPU
• is slower, less secure, and lower performing in comparison to
para virtualization
• Examples:
– Microsoft and Parallels systems.
Continued..
• A host OS runs directly on
the hardware
• Guest OS runs on the virtual
machine
• Guest OS do not concern
about the presence of a
hypervisor
• each virtual machine and its
guest operating system
operate as independent
computers
Continued..
• Advantages
– No modification to the
Guest operating system
is required.
• Limitations
– Complex
– Slower due to emulation
– Installation of the new
device driver is difficult.
Full virtualization
Continued..
• Paravirtualization
• allows multiple guest operating systems to run on host
operating systems while communicating with
the hypervisor to improve performance.
• Para virtualization uses a modified guest operating system.
• The hypervisor passes the unmodified calls from the guest
to the CPU and other interfaces, both real and virtual.
• calls are routed through the hypervisor
• partial isolation of the guest OS from the hypervisor and
the hardware
• it offers a higher performance and is faster
• Example : Xen and VMware
Continued..
• Hypervisor is installed on the
device
• Guest OS are installed into the
environment
• virtualization method
modifies the guest operating
system to communicate with
the hypervisor
Continued..
• Advantages
– Easier
– Enhanced Performance
– No emulation overhead
• Limitations
– Requires modification to
a guest operating system
Paravirtualization
Continued..
• Hardware-Assisted Virtualization
• Similar to Full Virtualization and Paravirtualization in
terms of operation except that it requires hardware
support
• underlying hardware provides special CPU instructions
to aid virtualization.
• used to create virtual versions of physical desktops and
operating systems
• it uses a virtual machine manager (VMM) called
a hypervisor to provide abstracted hardware to
multiple guest operating systems, which can then share
the physical hardware resources more efficiently
• Examples: Intel-VT and AMD’s AMD-V processors
Continued..
• Advantages:
– better performance and lower costs
– Very less hypervisor overhead
• Limitations:
– Hardware support Required
Continued..
• Software virtualization
• Software virtualization uses binary translation -other
emulation techniques to run unmodified operating systems.
• Installation mechanism differs from application to
application. programs require certain helper applications or
frameworks and these applications may have conflict with
existing applications.
• Similar to virtualizations but here it abstracts the software
installation procedure and creates a virtual software out of
it
• Virtualization but able to abstract the software installation
procedure and create virtual software installations.
• Examples:
– VMware software, virtual box
Cloud Computing and Virtualization
Advantages of VMs Disadvantages of VMs
• Type-2 hypervisors
– personal use, smaller deployments, or multiple-
environment test requirements
Security Issues and Recommendations
• The hypervisor creates a virtual environment in the
data centers.
• The attack generally compromises the hypervisor
through malicious code written by any attacker to
corrupt the whole server.
• Bare metal hypervisor (type 1) - is very difficult to
perform the attack as it is deployed directly on the
hardware.
• Hosted hypervisors (type 2) are more vulnerable to the
attacks as hypervisors are running on top of the host
OSs.
Security Issues and Recommendations
• There are two possibilities of attacking the hypervisor
• Through the host OS
• Through the guest OS
Cloud computing refers to the distribution of Virtualization is a technology that lets you use
computer services such as servers, storage, a single physical hardware system to create
networking, and intelligence via the Internet, many virtual environments or dedicated
or the cloud. resources.