Unit 3
Unit 3
Unit 3
Structure
3.0 Introduction
3.1 Objectives
3.2 Virtualization and Underlying Abstraction
3.3 Characteristic Features of Virtualization
3.3.1 Advancement in Security
3.3.2 Managing of Execution
3.4 Advantages of Virtualization
3.5 Machine or Server Level Virtualization
3.6 Hypervisor
3.7 Full Virtualization
3.8 Para-Virtualization
3.9 Other Virtualization Techniques
3.9.1 Network Virtualization
3.9.2 Storage Virtualization
3.9.3 Desktop Virtualization
3.9.4 Operating System Virtualization
3.9.5 Data Virtualization
3.9.6 Application Virtualization
3.10 VMware Vs XenServer
3.11 Summary
3.12 Solutions/Answers
3.13 Further Readings
3.0 INTRODUCTION
Cloud Computing has gained immense popularity due to the availability of
scalable Infrastructure as a Services, Platform as a Service, and Software as a
Services. This is a framework where different kinds of services related to
networks, computing resources, storage, development platform, and
application are provisioned through the internet. In this respect, the basic
information of cloud computing is already discussed in the previous unit.
In this unit, we will discuss the basics of virtualization, its advantages, and its
underlying abstraction. It is to be noted that virtualization is the fundamental
technology that helps to create an abstraction layer that hides the intricacy of
the underlying hardware. The virtualization technique provides a secure and
isolated environment for any user application such that one running application
does not affect the execution of another application. Further, in this unit, we
will learn about server-level virtualization and explore different hypervisor-
based virtualization approaches. We will also discuss operating system-level
virtualization, network virtualization, storage virtualization, and desktop
virtualization. Finally, a brief comparison will be done on hypervisors like
XenServer and VMware.
1
Cloud Computing
Fundamentals and
Virtualization 3.1 OBJECTIVES
After going through this unit you should be able to:
2
Resource
machine or any other virtual application. A diagrammatic representation of the Virtualization
From the above discussion, it should be noted that in reality, the virtualization
environment is a software program, and hence virtualization technology has
better control and flexibility over the underlying environment. The capability
of software to imitate a real computing environment has facilitated the
utilization of resources in an efficient way. In the last few years, virtualization
technology has drastically evolved and the current version of technology
allows us to make use of the maximum benefit that virtualization provides.
3
Cloud Computing
Fundamentals and system. This kind of functionality is automatically provided by the
Virtualization
virtualization environment.
4
Resource
Virtualization technology is adopted by different areas of computing. Further, Virtualization
based on the requirements and uses different virtualization techniques were
developed and each technique has its own unique characteristics. In this regard
Fig 3 shows a detailed classification of virtualization techniques. We will be
discussing some of the techniques in detail in the later sections.
…………………………………………………………………………
…………………………………………………………………………
6
Resource
• Reducing Power Need: Virtualization helps to run more than one Virtualization
operating system and application on a single physical system. This
allows to reduce the requirement of more servers and hence reducing
the requirement of energy for running and cooling the physical
machines.
• Hypervisor
• Para Virtualization
• Full Virtualization
• Hardware-Assisted Virtualization
• Kernel level Virtualization
• System-Level or Operating System Virtualization
3.5.1 Advantages
8
Resource
• In the case of server virtualization, each virtual machine may be Virtualization
restarted independently without affecting the execution of other
virtual machines running on the same host physical machine.
• Server virtualization can partition a single physical server into
many small virtual servers and allows to utilize the hardware of the
existing physical servers efficiently. Therefore this minimizes the
requirement of the extra physical servers and the initial investment
cost.
• As each small virtual server executes in isolation, if any virtual
machine faces any kind of issues then it will not affect the
execution of other virtual machines running on the same host
physical machine.
3.5.2 Disadvantages
In addition to some of the advantages server virtualization also have some
disadvantages and they are as follows:
3.6 HYPERVISOR
Prior to the notion of Hypervisor, most computers could only run one operating
system at most and this increased the reliability of the services and applications
because the entire system's hardware had to handle requests from a single
operating system. However, the demerit of this idea is that the system cannot
utilize all of the computing capacity. However, using a hypervisor minimizes
the need for space, energy, and maintenance. The hypervisor is also referred to
as a virtual machine monitor and it helps to manage virtual machines and their
physical resource demands. It isolates virtual machines from one another by
logically provisioning and assigning computing power, memory, and storage.
9
Cloud Computing
Fundamentals and Thus at any point of time if any virtual machine operation is vulnerable then it
Virtualization
will not affect the execution of another machine.
This is also termed as “Bare metal” hypervisor. This type of hypervisor runs
directly on the underlying physical resources. For running this kind of
hypervisor operating system is not required and it itself acts as a host operating
system. These kinds of hypervisors are most commonly used in virtual server
scenarios (See Fig 5).
Pros: These types of Hypervisor are highly effective as they can directly
communicate with physical hardware. It also raises the level of security, and
there was nothing in between them that could undermine security.
Cons: To administrate different VMs and manage the host hardware, a Type 1
hypervisor frequently requires a separate administration system.
Examples:
10
Resource
Citrix XenServer: It is a commercial Type 1 Hypervisor that supports Linux Virtualization
and Windows OS. It was developed by IBM and is generally known as Citrix
hypervisor. Xen supports virtualization technologies such as Intel VT and
AMD-V hardware-assisted environments. It also supports paravirtualization,
which alters the guest OS to work with the hypervisor, improving performance.
VSphere hypervisor: Customers can download VMware ESXi for free as part
of the Free vSphere hypervisor, which also offers basic server virtualization.
Large businesses will purchase a more comprehensive vSphere solution that
includes a VMware's vCenter Server license. It is a separate server used to
manage the vSphere environment on physical hosts.
This hypervisor is not compatible with the hardware it is running on. It runs as
a program on a computer's operating system. This type of hypervisor takes the
help of an operating system to deliver virtualization-based services. Type-2
hypervisors are best suited for endpoint devices such as personal computers
that run an alternative operating system known as Guest OS. Type-2
hypervisors frequently provide a different toolkit that enhances the connection
between Guest and Host operating systems (See Figure 6.).
Pros: A type-2 hypervisor allows for rapid and easy access to a Guest OS
while the main operating system runs on the host physical machine. This kind
of facility immensely helps the end-user in their work. For example, a user can
use Cortana to access their favorite Linux-based tool (in Windows, only found
a speech dictation system ).
11
Cloud Computing
Fundamentals and Examples:
Virtualization
…………………………………………………………………………
…………………………………………………………………………
12
Resource
system. The virtual machine completely isolates the guest operating system Virtualization
A binary translation and direct execution are used together to accomplish full
virtualization. The hardware CPU runs non-sensitive commands at normal
speed for full virtualization hypervisors. Operating system-related instructions
are interpreted on the fly for further use. As similar kinds of guest operating
system instances can execute on virtualized or real physical systems, the full
virtualization technique delivers the most required isolation and security
solution for virtual instances running on the virtual environment (see Fig 7).
13
Cloud Computing
Fundamentals and
• Hardware-Assisted Full Virtualization
Virtualization
This type of full virtualization can use either of the two hypervisor types.
3.8 PARA-VIRTUALIZATION
workload.
While the more complex binary translation support required for full
virtualization is complicated, changing the guest OS to enable para-
virtualization is reasonably straightforward. For years, VMware has deployed
para-virtualization approaches in VMware tools and optimized virtual device
drivers throughout the VMware product range. The VMware tools service
gives access to the VMM Hypervisor's backdoor, which can do tasks like time
synchronization, logging, and guest termination.
Figure 9: Para-Virtualization
15
Cloud Computing
Fundamentals and
Virtualization 3.9 OTHER VIRTUALIZATION TECHNIQUES
16
Resource
3.9.3 Desktop Virtualization Virtualization
Modern organizations collect data from several sources and store it in different
formats. They might also store data in different places, such as in a cloud
infrastructure and an on-premises data center. Data virtualization creates a
software layer between this data and the applications that need it. Data
virtualization tools process an application’s data request and return results in a
suitable format. Thus, organizations use data virtualization solutions to
17
Cloud Computing
Fundamentals and increase flexibility for data integration and support cross-functional data
Virtualization
analysis.
18
Resource
Table 1: VMware vSphere Vs Citrix XenServer Virtualization
VMware has 128 Virtual CPUs Citrix XenServer has 32 Virtual CPUs
(VCPUs) per Virtual machine. It per Virtual machine. It can only run on
can run on either Intel-Vt or AMD- Intel-Vt or AMD-V intelligent systems.
V intelligent devices.
Only MS-DOS and FreeBSD are Citrix XenServer supports various host
supported as hosts in VMware OS such as Win NT Server, Win XP,
vSphere. As a guest OS, VMware Linux ES, e.t.c. Citrix XenServer also
vSphere supports MS-DOS, Sun supports various guest operating
Java Desktop System, and Solaris systems, but not MS-DOS, Sun Java
X86 Platform Edition. Desktop Environment, or Solaris X86
platform edition. To run, it will need
AMD-V competent hardware.
19
Cloud Computing
Fundamentals and
Virtualization
BusyBox is used by the VMware It provides almost all the required
server management system for features and ability to create and
managing the environment. manage the virtualization environment
and it uses XenCenter for managing the
environment.
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
3.11 SUMMARY
20
Resource
memory. Virtualization allows to hide the intricacy of the underlying Virtualization
environment and provides a secure and isolated environment for any user
application. The created computing environment is virtual and it simulates an
environment similar to a real computer. The use of the virtual infrastructure is
smooth as the user finds almost no difference in the experience when
compared to a real computing environment. In this regard, a detailed overview
of virtualization is given in this unit. We have discussed some very important
topics related to virtualization like advantages of virtualization, different
virtualization techniques, and its characteristics with an example. For further
clarity of existing virtualization techniques like full virtualization and para-
virtualization, we have compared the two very well-known hypervisors Citrix
XenServer and VMware.
3.12 SOLUTIONS/ANSWERS
2. In the case of virtualization more than one guest virtual machine runs
on a single host machine, and on each virtual machine different virtual
applications are executed. Further, it is very important to run each
virtual machine in isolation such that no two applications running on
different virtual machines interfere with each other. In this respect,
virtual machine manager (VMM) plays an important role by managing
virtual machines efficiently and providing enough security. The
operations of the different virtual machines are observed by VMM and
filtered accordingly such that no unfavorable activity is permitted.
Sometimes it becomes important to hide some sensitive or important
data of the host from other guest applications running on the same
system. This kind of functionality is automatically provided by the
virtualization environment with the help of VMM.
21
Cloud Computing
Fundamentals and In case of isolation, the virtualization environment enables guest virtual
Virtualization
machines to run in isolation such that no virtual machines running on
the same host physical machine interfere with each other. The guest
virtual application accesses the underlying resources through the
abstraction layer. The virtual machine manager monitors the operation
of each guest application and tries to prevent vulnerable activity
operation if any.
22
Resource
Virtualization
3. Type-1 Hypervisor: This is also termed as “Bare metal” hypervisor.
This type of hypervisor runs directly on the underlying physical
resources. For running this kind of hypervisor operating system is not
required and it itself acts as a host operating System. These kinds of
hypervisors are most commonly used in virtual server scenarios. The
examples are Hyper-V hypervisor, Citrix XenServer, and ESXi
hypervisor.
2.
a. True
b. True
c. True
d. True
e. False
23
Cloud Computing
Fundamentals and purpose of network virtualization is to virtualize network routing
Virtualization
protocol, forwarding, and different addressing schemes. Further,
network virtualization will also allow every form of IT virtualization to
create a layer of abstraction between virtual hardware and the activities
that use it. Network virtualization, in particular, allows network
functionalities, hardware resources, and software resources to be
offered as a virtual network, independent of hardware. It is used to join
virtual machines (VMs), partition a physical network, or merge many
physical networks. IT can improve digital service providers' overall
performance, flexibility, and reliability.
24