0% found this document useful (0 votes)
45 views4 pages

Chapter 3 - CC

Uploaded by

x.omama781
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views4 pages

Chapter 3 - CC

Uploaded by

x.omama781
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

ID: 52J20125 INSTA: SALMAN_UTASA

Virtualization is a technology that creates a virtual version of an actual object.


• It uses software to divide the capabilities of a physical machine among many users.
• Almost any resource: operating systems, storage, computer networks, etc.
• It allows multiple applications to share the same physical resources.

Benefits of Virtualization:
Optimized Use of Resources: Makes the most out of physical hardware.
Reduced Costs: Saves money on software licenses, infrastructure setup, and cooling.

Why Organizations Adopt Virtualization:


Cost Reduction: Lowers operational and maintenance costs.
• Reduces expenses on electricity, air conditioning, and cooling.

Increased Ubiquity: decreases downtime because resources are separated.


• Improves efficiency and keeps business running smoothly.

Easier Backup: Simplifies backup procedures for virtual servers and machines.
• Allows quick transfer of virtual machines between servers.

Environmental Protection: Saves energy and reduces e-waste.


• Helps safeguard the environment.

Key Concepts in Virtualization


Processor Access Management: Applications demand high access to the processor.
• The Operating System uses abstraction to prevent interference between applications.

Privilege Levels / Protection Rings: Provide security and fault tolerance by limiting
resource access to specific privilege levels.
Privilege Levels:
• Level 0: Innermost layer
- Highest privilege | Runs the OS kernel | CPU operates at this level when the OS boots.

• Levels 1 and 2: Middle layers


- Run device drivers and OS services.

• Level 3: Outermost layer


Least privilege | Runs user programs.
ID: 52J20125 INSTA: SALMAN_UTASA

Techniques of virtualization

1. Full Virtualization
• Primary hardware is replicated and made available to the guest operating system.
• User-level code (executed in ring 3) runs directly on the processor.
• Virtual machine monitor (VMM) must be executed in Ring 0.
• Binary translation is used to run the guest operating system without modification.

Advantages:
• Virtual machines are fully isolated.
• Operating systems can be installed without modification.
• Provides performance like native CPU and memory.
• Supports various operating systems and versions from different vendors.
• Because the guest OS remains unmodified, migration and portability is very easy.
Example: VMware, Hyper-V
---------------------------------------------------------------------------------------------------------------------

2. Para Virtualization / OS assisted virtualization


• The guest OS is modified so that it can communicate with the hypervisor (VMM).
• Uses hypercalls communicate directly with the hypervisor.
• OS must run its privileged instructions in Ring0.
Advantages:
• Easer to implement than full virtualization where no hardware assistance is available.
• Greater performance because overheads from emulation are reduced.
Example: Citrix-XEN Server

---------------------------------------------------------------------------------------------------------------------
3. Hardware assisted virtualization
• Provides full virtualization using hardware capabilities.
• Embedding VM into hardware component of server.
Example: Intel-VT, AMD-V
ID: 52J20125 INSTA: SALMAN_UTASA

How Virtualization Works


Goal of Virtualization create an independent environment for different applications on a
single hardware machine.
• This is done by creating virtual instances of Operating Systems, applications etc.
• Allows to run multiple Operating Systems at the same time on a single hardware.

Virtual Machine (VM):


• VM is a software responsible for creating virtual instances.
• VMs are portable, platform independent, and sandboxed from the host system.
• A host can run multiple VMs simultaneously.
• Creating a VM requires substantial processing power, physical memory, and network.

Virtual Machine Monitor (VMM) / Hypervisor:


VMM is software, firmware, or hardware used to manage VMs and maintain the
integrity of virtual environments.
Types of Hypervisors:
# Type 1 Hypervisor: Runs directly on the system hardware, also called "bare metal"
embedded hypervisor.
# Type 2 Hypervisor: Runs on a host operating system.
---------------------------------------------------------------------------------------------------------------------

Types of Virtualizations
1. Data virtualization is the process of combining data from different sources of
information into one virtual view. This view can be accessed by front-end solutions like
applications and dashboards without needing to know where the data is stored.

2. Desktop Virtualization transforms desktops and applications into an on-demand


service accessible to any user, anywhere, on any device.
Desktop Virtualization Features
# If a user's computer fails, their desktop remains accessible:
• If the user computer hardware damaged, replace it and connect to virtual desktop.
# No installation or updates:
• The OS and applications are managed centrally, saving users from updating them.
# Inter device compatibility:
• The virtual desktop is accessible from any device and shareable among many users.
ID: 52J20125 INSTA: SALMAN_UTASA

3. CPU Virtualization allows a single processor to act as multiple individual CPUs and
enable the users to run different operating systems simultaneously.

4. Network Virtualization encapsulates hardware and software network resources into a


software-based administrative entity.
• External Network Virtualization: combines or divides multiple LANs into a single
virtual network, managed by software.
(Has components VLANs and network switches)

• Internal Network Virtualization: utilizes a single system as a hypervisor to control


virtualized network interface cards (VNICs).
(Each host can have one or more NICs, with each NIC supporting multiple VNICs)

5. Storage Virtualization combining of physical storage from different storage devices to


form a large pool of memory, managed centrally.

6. Server Virtualization divides a physical server into several logically isolated virtual
machines and creates multiple resource instances.

Virtualization in cloud
• Virtualization plays a very important role in achieving the aim/ objectives of cloud
technology, “to be everywhere, flexible, and easy to use.”
• Virtualization provides sharing of infrastructure.

• Through virtualization, the resource becomes massively scalable.


• Cloud services like SaaS, PaaS, and IaaS are possible because of virtualization.

-----------------------------------------------------------------------------------------------------------------
Linux commands

You might also like