You are on page 1of 34

CLOUD VIRTUALIZATION

PRESENTED BY
S.SUBASREE AP/CSE
SMVEC
• Virtualization is the "creation of a virtual (rather than
actual) version of something, such as a server, a
desktop, a storage device, an operating system or
network resources".
• Virtualization is a technique, which allows to share a
single physical instance of a resource or an application
among multiple customers and organizations. It does by
assigning a logical name to a physical storage and
providing a pointer to that physical resource when
demanded
CONCEPT OF VIRTUALIZATION

• Creation of a virtual machine over existing


operating system and hardware is known as
Hardware Virtualization. A Virtual machine
provides an environment that is logically
separated from the underlying hardware.
• The machine on which the virtual machine is
going to create is known as Host Machine and
that virtual machine is referred as a Guest
Machine.
TYPES

• Hardware Virtualization.
• Operating system Virtualization.
• Server Virtualization.
• Storage Virtualization.
Hardware Virtualization
• When the virtual machine software or virtual machine
manager (VMM) is directly installed on the hardware system is
known as hardware virtualization.
• The main job of hypervisor is to control and monitoring the
processor, memory and other hardware resources.
• After virtualization of hardware system we can install different
operating system on it and run different applications on those OS.
• Usage:
• Hardware virtualization is mainly done for the server platforms,
because controlling virtual machines is much easier than
controlling a physical server.
2) Operating System Virtualization
• When the virtual machine software or virtual
machine manager (VMM) is installed on the Host
operating system instead of directly on the
hardware system is known as operating system
virtualization.
• Usage:
• Operating System Virtualization is mainly used for
testing the applications on different platforms of OS.
3) Server Virtualization
• When the virtual machine software or virtual
machine manager (VMM) is directly installed on
the Server system is known as server virtualization.
• Usage:
• Server virtualization is done because a single
physical server can be divided into multiple servers
on the demand basis and for balancing the load.
4) Storage Virtualization
• Storage virtualization is the process of grouping
the physical storage from multiple network
storage devices so that it looks like a single
storage device.
• Storage virtualization is also implemented by
using software applications.
• Usage:
• Storage virtualization is mainly done for back-
up and recovery purposes.
Working of virtualization

• Virtualization plays a very important role in


the cloud computing technology, normally in
the cloud computing, users share the data
present in the clouds like application etc, but
actually with the help of virtualization users
shares the Infrastructure.
• The main usage of Virtualization Technology is to
provide the applications with the standard versions to
their cloud users, suppose if the next version of that
application is released, then cloud provider has to
provide the latest version to their cloud users and
practically it is possible because it is more expensive.
• To overcome this problem we use basically virtualization
technology, By using virtualization, all severs and the
software application which are required by other cloud
providers are maintained by the third party people, and
the cloud providers has to pay the money on monthly or
annual basis.
Hyper Thread
Hyper-Threading
• Intel® Hyper-Threading Technology is a hardware innovation
that allows more than one thread to run on each core. More
threads means more work can be done in parallel.
• Hyperthreading refers to the technology invented by Intel,
with which a physical microprocessor
• behaves like two logical, virtual cores. This makes it possible
for a processor to process more
• than one task or more than one thread simultaneously.
Hyperthreading increases CPU
• performance and ensures better utilization of the computer.
Hyper Threading
• Probably the biggest advantage of hyperthreading
is that implementing hyperthreading
• technology in microprocessors is less expensive
than using two physical microprocessors.
• However, since most computers today already
have multi-core processors, this advantage can
• only be exploited if CPUs with hyperthreading
have the same number of physical processors as
• machines that don’t support hyperthreading.
Advantage-Hyper Thread
• The actual advantage of hyperthreading is the efficient
utilization of resources.
• Two virtualcores in one physical core does not mean that all
tasks run at double speed. However, the
• computing load for several processes can not only be
distributed sequentially.
• But simultaneously between the virtual cores. This avoids
unnecessary idle times so that processescan be executed
without gaps.
• Threads don’t have to wait until a computationally intensive
thread has been processed, but simply run over the second
core.
Blade Servers
 A blade server is a thin, lightweight, modular computer
that slides in and out of a rack called
a blade enclosure.
 A blade server is part of the rackmount computer family
alongside its bigbrother, the formidable rack server.
 A blade server is typically situated inside a blade
enclosure alongside other blade servers.
 This full assemblage of blade servers, called a blade
system, is usually rack mounted, just like its rack mount
server counterpart.
Blade servers are typically located inside
massive cloud data centers, storing data
andperforming high-performance
computation for resource-intensive
applications.
 Programs that emphasize space conservation
and reduction in power consumption but still
require a high-performance server will find
the blade server quite useful.
 Their thin, compartmentalized form factor makes them
inherently more scalable than a rack server. In addition,
because one chassis-supported power supply unit can
power all the server blades within an enclosure, blade
servers are naturally more energy-efficient.
 Furthermore, blade servers' compute density is
unmatched, which is often why you see them powering
resource-intensive applications.
 For example, with a 1U rack mount server, you might be
able to incorporate two DualXeon SP CPU processor
boards, for a total of four CPUs, only, but picture a blad
enclosure housing numerous blade servers, each with a
Dual Xeon SP CPU, and just think of how much processing
power you can achieve.
Automated Provisioning
 Automated provisioning, also called self-service provisioning, is the
ability to deploy an information technology or telecommunications
service by using pre-defined procedures that are carried out
electronically without requiring human intervention.
 The term provisioning, which originated in telecommunications, is the
act of acquiring aservice. In a traditional setting, provisioning is a
manual process that requires the assistance of several people in
several roles and involves multiple steps.
 It could take days or even weeks to move a request from the
submission phase through the actual activation of service. Automating
provisioning allows customers to set up and make changes to services
themselves by using a Web browser or other client interface.
• It can provide a more efficient and rapid response to business requests
and cut service
• activation or service change time down to hours or even minutes.
• Automated provisioning is a type of policy-
based management and provisioning rights
can be granted on either a permissions-based
or role-based basis.
• Once automated provisioning has been
implemented, it is up to the service provider
to ensure that operational processes are being
followed and governance policies are not
being circumvented.
Policy Based Automation
Policy-based automation focuses on
separating your business and operational
policies from the mechanics of actually
performing the automation according to the
policies.
Policy-based automation focuses on setting
your policies and Automation Control deals
with implementing them.
Automation Control policy-based automation
includes resource information, groups of
resources, and relationships in the decision-
making process before acting.
Resource information defines resource class
and name, as well as how to start, stop, and
monitor the resource.
 Resources can be members of system-wide
groups and relationships.
The power of a policy
• Can be defined as resources belong together and
are managed as one (business entity)
• can specify how resources are dependent and
related to each other.
• Policy definitions can be reused, copied, and cloned
for similar applications elsewhere in the enterprise.
• The Sample Add-on policy includes automation
modules for base operating systems,major
middleware, and systems management software
Application Management
• Application Management (AM) is the lifecycle process
for software applications, covering how an application
operates, its maintenance, version control, and
upgrades from cradle to grave.
• Application management services are an enterprise-
wide endeavor providing governance designed to
ensure applications run at peak performance and as
efficiently as possible, from the end-user experience to
integration with enterprise back office functions such
as database, ERP, and SaaS cloud functions such as
CRM.
Application Management
• AM acts as a service operation function that
manages and supports applications and key
stakeholders who provide operational
proficiency or technical expertise through the
lifecycle.
AM Process
• AM processes include Application Lifecycle
Management (ALM) and Application
Performance Management (APM).
• There are several stakeholder groups in AM,
who should work as a team to reach critical
decisions such as build or buy, whether an
application should be modernized or replaced,
or where the application should be hosted.
Stakeholders in AM

• Application Manager/Application Analyst


• Business Unit Owners
• Developers/DevOps/DevSecOps
• Application users
Application Manager

• Application Managers are IT professionals who


own the AM process that manages the
application software lifecycle within the
enterprise.
• They are analysts who help define the need
for new applications, communicate their
findings to other key stakeholders, lead
implementation,maintenance, and retirement
of applications as part of the IT team.
Key functions of an Application Manager

• Identifying business opportunities


• Determine whether new application
capabilities should be purchased, subscribed
to via SaaS, or developed in-house.
• Application managers lead the roll-out to
prevent any possible problems from becoming
show-stoppers.
• Leads problem resolution
Key functions of an Application Manager

• Determines when training is needed and


oversees training for both IT and user teams.
• Ensuring application’s usefulness, or whether
application should be sunsetted in favor of
newer application or due to elimination of
business function.
Skills of application manager
• Strong understanding of project management
• System analysis including design,
development, deployment, and support
• IT troubleshooting
• Business process automation (BPA)
• Database management
• Communicating technical concepts to non-IT
audiences
Application Lifecycle Management
• Describes the ecosystem that manages an
application from cradle to grave.
• ALM is composed of stakeholders, ALM tools,
and a management process that spans each
phase of an application’s existence.
• As enterprises evolve from traditional waterfall to
agile and DevOps to cloud-native applications,
ALM tools and processes evolve in sync, so that
there may be multiple ALM processes in a given
organization depending on where they are in
their transition from traditional to modern
applications.
• combine these multiple development practices
into a comprehensive management methodology
• continuous integration (CI) and continuous
delivery (CD)
Phases of the ALM process
• ALM encompasses the lifecycle of applications
by considering the need for maintenance and
updates as an ongoing process.
• Governance
• Development
• Waterfall development process
• Maintenance

You might also like