SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
F5 WHITE PAPER - BY ALAN MURPHY - F5 TECHNICAL MARKETING MANAGER, SECURITY
1
VIRTUALIZATION DEFINED - EIGHT DIFFERENT WAYS
Introduction
Imagine a typical office...
Alice: Hey Bob, great news! I just heard our IT department is going to implement virtualization in the data center. It’s about time we supported
virtualization.
Bob: That is great news; virtualization is the wave of the future. What are we virtualizing? The servers? The web applications? The storage
network?”
Alice: Hmmm…good question; they didn’t specify. But how many different versions of virtualization could there be?
Alice has asked the million-dollar question: What does “going virtual” really mean in today’s IT world? Virtualization as a concept is not new;
computational environment virtualization has been around since the first mainframe systems. But recently, the term “virtualization” has become
ubiquitous, representing any type of process obfuscation where a process is somehow removed from its physical operating environment. Because
of this ambiguity, virtualization can almost be applied to any and all parts of an IT infrastructure. For example, mobile device emulators are a
form of virtualization because the hardware platform normally required to run the mobile operating system has been emulated, removing the
OS binding from the hardware it was written for. But this is just one example of one type of virtualization; there are many definitions of the term
“virtualization” floating around in the current lexicon, and all (or at least most) of them are correct, which can be quite confusing.
This paper focuses on virtualization as it pertains to the data center; but before considering any type of data center virtualization, it’s important
to define what technology or category of service you’re trying to virtualize. Generally speaking, virtualization falls into three categories: Operating
System, Storage, and Applications. But these categories are very broad and don’t adequately delineate the key aspects of data center virtualization.
It’s helpful to distill these broader categories into eight, specific categories to thoroughly understand the differences (and similarities) between the
definitions of virtualization.
Operating System Virtualization
The most prevalent form of virtualization today, virtual operating systems (or virtual machines) are quickly becoming a core component of the IT
infrastructure. Generally, this is the form of virtualization end-users are most familiar with. Virtual machines are typically full implementations of
standard operating systems, such as Windows Vista or RedHat Enterprise Linux, running simultaneously on the same physical hardware. Virtual
Machine Managers (VMMs) manage each virtual machine individually; each OS instance is unaware that 1) it’s virtual and 2) that other virtual
operating systems are (or may be) running at the same time. Companies like Microsoft, VMware, Intel, and AMD are leading the way in breaking
the physical relationship between an operating system and its native hardware, extending this paradigm into the data center. As the primary driving
force, data center consolidation is bringing the benefits of virtual machines to the mainstream market, allowing enterprises to reduce the number
of physical machines in their data centers without reducing the number of underlying applications. This trend ultimately saves enterprises money on
hardware, co-location fees, rack space, power, cable management, and more.
Application Server Virtualization
Application Server Virtualization has been around since the first load balancer, which explains why “application virtualization” is often used as
a synonym for advanced load balancing. The core concept of application server virtualization is best seen with a reverse proxy load balancer: an
appliance or service that provides access to many different application services transparently. In a typical deployment, a reverse proxy will host a
virtual interface accessible to the end user on the “front end.” On the “back end,” the reverse proxy will load balance a number of different servers
and applications such as a web server. The virtual interface—often referred to as a Virtual IP or VIP—is exposed to the outside world, represents
itself as the actual web server, and manages the connections to and from the web server as needed. This enables the load balancer to manage
multiple web servers or applications as a single instance, providing a more secure and robust topology than one allowing users direct access to
individual web servers. This is a one:many (one-to-many) virtualization representation: one server is presented to the world, hiding the availability of
multiple servers behind a reverse proxy appliance. Application Server Virtualization can be applied to any (and all) types of application deployments
and architectures, from fronting application logic servers to distributing the load between multiple web server platforms, and even all the way back
in the data center to the data and storage tiers with database virtualization.
Application Virtualization
While they may sound very similar, Application Server and Application Virtualization are two completely different concepts. What we now refer to
as application virtualization we used to call “thin clients.” The technology is exactly the same, only the name has changed to make it more IT-PC
(politically correct, not personal computer). Softgrid by Microsoft is an excellent example of deploying application virtualization. Although you
may be running Microsoft Word 2007 locally on your laptop, the binaries, personal information, and running state are all stored on, managed,
and delivered by Softgrid. Your local laptop provides the CPU and RAM required to run the software, but nothing is installed locally on your own
machine. Other types of Application Virtualization include Microsoft Terminal Services and browser-based applications. All of these implementations
depend on the virtual application running locally and the management and application logic running remotely.
F5 WHITE PAPER
2
VIRTUALIZATION DEFINED - EIGHT DIFFERENT WAYS
Management Virtualization
Chances are you already implement administrative virtualization throughout your IT organization, but you probably don’t refer to it by this phrase.
If you implement separate passwords for your root/administrator accounts between your mail and web servers, and your mail administrators don’t
know the password to the web server and vise versa, then you’ve deployed management virtualization in its most basic form. The paradigm can be
extended down to segmented administration roles on one platform or box, which is where segmented administration becomes “virtual.” User and
group policies in Microsoft Windows XP, 2003, and Vista are an excellent example of virtualized administration rights: Alice may be in the backup
group for the 2003 Active Directory server, but not in the admin group. She has read access to all the files she needs to back up, but she doesn’t
have rights to install new files or software. Although she is logging into the same sever that the true administrator is logs into, her user experience
differs from the administrator. Management virtualization is also a key concept in overall data center management. It’s critical that the network
administrators have full access to all the infrastructure gear, such as core routers and switches, but that they not have admin-level access to servers
Network Virtualization
Network virtualization may be the most ambiguous, specific definition of virtualization. For brevity, the scope of this discussion is relegated to
what amounts to virtual IP management and segmentation. A simple example of IP virtualization is a VLAN: a single Ethernet port may support
multiple virtual connections from multiple IP addresses and networks, but they are virtually segmented using VLAN tags. Each virtual IP connection
over this single physical port is independent and unaware of others’ existence, but the switch is aware of each unique connection and manages
each one independently. Another example is virtual routing tables: typically, a routing table and an IP network port share a 1:1 relationship, even
though that single port may host multiple virtual interfaces (such as VLANs or the “eth0:1” virtual network adapters supported by Linux). The single
routing table will contain multiple routes for each virtual connection, but they are still managed in a single table. Virtual routing tables change that
paradigm into a one:many relationship, where any single physical interface can maintain multiple routing tables, each with multiple entries. This
provides the interface with the ability to bring up (and tear down) routing services on the fly for one network without interrupting other services
and routing tables on that same interface.
Hardware Virtualization
Hardware virtualization is very similar in concept to OS/Platform virtualization, and to some degree is required for OS virtualization to occur.
Hardware virtualization breaks up pieces and locations of physical hardware into independent segments and manages those segments as separate,
individual components. Although they fall into different classifications, both symmetric and asymmetric multiprocessing are examples of hardware
virtualization. In both instances, the process requesting CPU time isn’t aware which processor it’s going to run on; it just requests CPU time from the
OS scheduler and the scheduler takes the responsibility of allocating processor time. As far as the process is concerned, it could be spread across any
number of CPUs and any part of RAM, so long as it’s able to run unaffected.
Another example of hardware virtualization is “slicing”: carving out precise portions of the system to run in a “walled garden,” such as allocating
a fixed 25% of CPU resources to bulk encryption. If there are no processes that need to crunch numbers on the CPU for block encryption, then
that 25% of the CPU will go unutilized. If too many processes need mathematical computations at once and require more than 25%, they will be
queued and run as a FIFO buffer because the CPU isn’t allowed to give out more than 25% of its resources to encryption. This type of hardware
virtualization is sometimes referred to as pre-allocation.
Asymmetric multiprocessing is a form of pre-allocation virtualization where certain tasks are only run on certain CPUs. In contrast, symmetric
multiprocessing is a form of dynamic allocation, where CPUs are interchangeable and used as needed by any part of the management system.
Each classification of hardware virtualization is unique and has value, depending on the implementation. Pre-allocation virtualization is perfect
for very specific hardware tasks, such as offloading functions to a highly optimized, single-purpose chip. However, pre-allocation of commodity
hardware can cause artificial resource shortages if the allocated chunk is underutilized. Dynamic allocation virtualization is a more standard
approach and typically offers greater benefit when compared to pre-allocation. For true virtual service provisioning, dynamic resource allocation
is important because it allows complete hardware management and control for resources as needed; virtual resources can be allocated as long as
hardware resources are still available. The downside to dynamic allocation implementations is that they typically do not provide full control over the
dynamicity, leading to processes which can consume all available resources.
Storage Virtualization
As another example of a tried-and-true technology that’s been dubbed “virtualization,” storage virtualization can be broken up into two general
classes: block virtualization and file virtualization. Block virtualization is best summed up by Storage Area Network (SAN) and Network Attached
Storage (NAS) technologies: distributed storage networks that appear to be single physical devices. Under the hood, SAN devices themselves
typically implement another form of Storage Virtualization: RAID. iSCSI is another very common and specific virtual implementation of block
virtualization, allowing an operating system or application to map a virtual block device, such as a mounted drive, to a local network adapter
(software or hardware) instead of a physical drive controller. The iSCSI network adapter translates block calls from the application to network
packets the SAN understands and then back again, essentially providing a virtual hard drive.
F5 WHITE PAPER - BY ALAN MURPHY - F5 TECHNICAL MARKETING MANAGER, SECURITY
3
VIRTUALIZATION DEFINED - EIGHT DIFFERENT WAYS
File virtualization moves the virtual layer up into the more human-consumable file and directory structure level. Most file virtualization technologies
sit in front of storage networks and keep track of which files and directories reside on which storage devices, maintaining global mappings of
file locations. When a request is made to read a file, the user may think this file is statically located on their personal remote drive, P:My Files
budget.xls; however, the file virtualization appliance knows that the file is actually located on an SMB server in a data center across the globe
at //10.0.16.125/finance/alice/budget-document/budget.xls. File-level virtualization obfuscates the static virtual location pointer of a file (in this
case, on Alice’s P: drive) from the physical location, allowing the back-end network to remain dynamic. If the IP address for the SMB server has to
change, or the connection needs to be re-routed to another data center entirely, only the virtual appliance’s location map needs to be updated, not
every user that needs to access their P: drive.
Service Virtualization
And finally, we reach the macro definition of virtualization: service virtualization. Service virtualization is consolidation of all of the above definitions
into one catch-all catchphrase. Service virtualization connects all of the components utilized in delivering an application over the network, and
includes the process of making all pieces of an application work together regardless of where those pieces physically reside. This is why service
virtualization is typically used as an enabler for application availability. For example, a web application typically has many parts: the user-facing
HTML; the application server that processes user input; the SOA gears that coordinate service and data availability between each component; the
database back-end for user, application, and SOA data; the network that delivers the application components; and the storage network that stores
the application code and data. Service virtualization allows each one of the pieces to function independently and be “called up” as needed for
the entire application to function properly. When we look deeper into these individual application components, we may see that the web server
is load-balanced between 15 virtual machine operating systems, the SOA requests are pushed through any number of XML gateways on the wire,
the database servers may be located in one of five global data centers, and so on. Service virtualization combines these independent pieces and
presents them together to the user as a single, complete application.
While Service virtualization may encompass all the current definitions of virtualization, it’s by no means where IT will stop defining the term. With
the pervasive and varied use of the word (as well as the technologies it refers to), there may never be a “final” definition for virtualization; it will
continue to evolve and expand as more and more technologies become less and less dependent on rigid operating environments.
Storage Virtualization - Continued

Más contenido relacionado

La actualidad más candente

Analyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and SoftwareAnalyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and SoftwareIBM India Smarter Computing
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET Journal
 
Cloud computing notes unit II
Cloud computing notes unit II Cloud computing notes unit II
Cloud computing notes unit II NANDINI SHARMA
 
Desktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of ITDesktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of ITInnoTech
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 
Windows Azure Overview
Windows Azure OverviewWindows Azure Overview
Windows Azure OverviewPankaj Bajaj
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platformspurplesea
 
Mid term report
Mid term reportMid term report
Mid term reportlokesh039
 
Microsoft India – Virtualization for Windows Whitepaper
Microsoft India – Virtualization for Windows WhitepaperMicrosoft India – Virtualization for Windows Whitepaper
Microsoft India – Virtualization for Windows WhitepaperMicrosoft Private Cloud
 
Service oriented software engineering
Service oriented software engineeringService oriented software engineering
Service oriented software engineeringSweta Kumari Barnwal
 
Virtualization and Cloud Computing
Virtualization and Cloud ComputingVirtualization and Cloud Computing
Virtualization and Cloud ComputingJosh Folgado
 
Virtualization Techniques & Cloud Compting
Virtualization Techniques & Cloud ComptingVirtualization Techniques & Cloud Compting
Virtualization Techniques & Cloud ComptingAhmed Mekkawy
 

La actualidad más candente (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Analyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and SoftwareAnalyst paper: Private Clouds Float with IBM Systems and Software
Analyst paper: Private Clouds Float with IBM Systems and Software
 
Intro ds 1
Intro ds 1Intro ds 1
Intro ds 1
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 
Cloud computing notes unit II
Cloud computing notes unit II Cloud computing notes unit II
Cloud computing notes unit II
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
 
Cloud Computing - Introduction
Cloud Computing - IntroductionCloud Computing - Introduction
Cloud Computing - Introduction
 
Desktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of ITDesktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of IT
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Module 3-cloud computing
Module 3-cloud computingModule 3-cloud computing
Module 3-cloud computing
 
Windows Azure Overview
Windows Azure OverviewWindows Azure Overview
Windows Azure Overview
 
Cloud Models
Cloud ModelsCloud Models
Cloud Models
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
Mid term report
Mid term reportMid term report
Mid term report
 
Microsoft India – Virtualization for Windows Whitepaper
Microsoft India – Virtualization for Windows WhitepaperMicrosoft India – Virtualization for Windows Whitepaper
Microsoft India – Virtualization for Windows Whitepaper
 
Service oriented software engineering
Service oriented software engineeringService oriented software engineering
Service oriented software engineering
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing Ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtualization and Cloud Computing
Virtualization and Cloud ComputingVirtualization and Cloud Computing
Virtualization and Cloud Computing
 
Virtualization Techniques & Cloud Compting
Virtualization Techniques & Cloud ComptingVirtualization Techniques & Cloud Compting
Virtualization Techniques & Cloud Compting
 

Destacado

Programming techniques
Programming techniquesProgramming techniques
Programming techniquesSuneel Dogra
 
Web sitedesignpart1
Web sitedesignpart1Web sitedesignpart1
Web sitedesignpart1Suneel Dogra
 
77555045 wimax-abstract
77555045 wimax-abstract77555045 wimax-abstract
77555045 wimax-abstractSuneel Dogra
 
Computer programming
Computer programmingComputer programming
Computer programmingSuneel Dogra
 
Logical expression and logical operators
Logical expression and logical operatorsLogical expression and logical operators
Logical expression and logical operatorsSuneel Dogra
 
C programming operators
C programming operatorsC programming operators
C programming operatorsSuneel Dogra
 

Destacado (9)

Programming techniques
Programming techniquesProgramming techniques
Programming techniques
 
Sql
SqlSql
Sql
 
Web sitedesignpart1
Web sitedesignpart1Web sitedesignpart1
Web sitedesignpart1
 
77555045 wimax-abstract
77555045 wimax-abstract77555045 wimax-abstract
77555045 wimax-abstract
 
cloud-computing
cloud-computingcloud-computing
cloud-computing
 
Dreamweaver
DreamweaverDreamweaver
Dreamweaver
 
Computer programming
Computer programmingComputer programming
Computer programming
 
Logical expression and logical operators
Logical expression and logical operatorsLogical expression and logical operators
Logical expression and logical operators
 
C programming operators
C programming operatorsC programming operators
C programming operators
 

Similar a Virtualization defined-wp

Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingBhuvanesh Hingal
 
1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docxshruti533256
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsSiddharth Coontoor
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfAkshithaReddy42848
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computingSoumyajit Basu
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud ComputingJamie Shoup
 
2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docxshruti533256
 
Quick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-ukQuick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-ukAssespro Nacional
 
Virtulization
VirtulizationVirtulization
VirtulizationAntu Sabu
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing Priti Banya Mohanty
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its TypesHTS Hosting
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of VirtualizationHTS Hosting
 
Virtualization terminology
Virtualization terminologyVirtualization terminology
Virtualization terminologyZeno Idzerda
 
V terminology guide
V terminology guideV terminology guide
V terminology guideRizi Butt
 

Similar a Virtualization defined-wp (20)

Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Virtualization1
Virtualization1Virtualization1
Virtualization1
 
1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdf
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
 
Presentation on Top Cloud Computing Technologies
Presentation on Top Cloud Computing TechnologiesPresentation on Top Cloud Computing Technologies
Presentation on Top Cloud Computing Technologies
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud Computing
 
2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx
 
Quick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-ukQuick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-uk
 
Virtulization
VirtulizationVirtulization
Virtulization
 
Managing The Virtualized Enterprise New Technology, New Challenges
Managing The Virtualized Enterprise New Technology, New ChallengesManaging The Virtualized Enterprise New Technology, New Challenges
Managing The Virtualized Enterprise New Technology, New Challenges
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing
 
lect 1TO 5.pptx
lect 1TO 5.pptxlect 1TO 5.pptx
lect 1TO 5.pptx
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of Virtualization
 
Virtualization terminology
Virtualization terminologyVirtualization terminology
Virtualization terminology
 
V terminology guide
V terminology guideV terminology guide
V terminology guide
 
Cloudcpmuting journal
Cloudcpmuting journalCloudcpmuting journal
Cloudcpmuting journal
 

Más de Suneel Dogra

Distributed databases
Distributed databasesDistributed databases
Distributed databasesSuneel Dogra
 
Data base management system
Data base management systemData base management system
Data base management systemSuneel Dogra
 
Web sitedesignpart1
Web sitedesignpart1Web sitedesignpart1
Web sitedesignpart1Suneel Dogra
 
He 12 different types of servers that every techie should know about
He 12 different types of servers that every techie should know aboutHe 12 different types of servers that every techie should know about
He 12 different types of servers that every techie should know aboutSuneel Dogra
 
Bachelor of computer application b.c.a.-2014
Bachelor of computer application b.c.a.-2014Bachelor of computer application b.c.a.-2014
Bachelor of computer application b.c.a.-2014Suneel Dogra
 
Cloud computing application
Cloud computing applicationCloud computing application
Cloud computing applicationSuneel Dogra
 
Fast track to linux
Fast track to linuxFast track to linux
Fast track to linuxSuneel Dogra
 
A sorted linear array
A sorted linear array A sorted linear array
A sorted linear array Suneel Dogra
 
Jumping statements
Jumping statementsJumping statements
Jumping statementsSuneel Dogra
 
Five tools to professional coding
Five tools to professional codingFive tools to professional coding
Five tools to professional codingSuneel Dogra
 
Machine language to artificial intelligence
Machine language to artificial intelligenceMachine language to artificial intelligence
Machine language to artificial intelligenceSuneel Dogra
 

Más de Suneel Dogra (20)

Business model
Business modelBusiness model
Business model
 
Internet
InternetInternet
Internet
 
Html
HtmlHtml
Html
 
Advanced html
Advanced htmlAdvanced html
Advanced html
 
File organisation
File organisationFile organisation
File organisation
 
Distributed databases
Distributed databasesDistributed databases
Distributed databases
 
Database models
Database models Database models
Database models
 
Data base management system
Data base management systemData base management system
Data base management system
 
Web sitedesignpart1
Web sitedesignpart1Web sitedesignpart1
Web sitedesignpart1
 
Internet security
Internet securityInternet security
Internet security
 
What is the linux
What is the linuxWhat is the linux
What is the linux
 
He 12 different types of servers that every techie should know about
He 12 different types of servers that every techie should know aboutHe 12 different types of servers that every techie should know about
He 12 different types of servers that every techie should know about
 
Bachelor of computer application b.c.a.-2014
Bachelor of computer application b.c.a.-2014Bachelor of computer application b.c.a.-2014
Bachelor of computer application b.c.a.-2014
 
Cloud computing application
Cloud computing applicationCloud computing application
Cloud computing application
 
Fast track to linux
Fast track to linuxFast track to linux
Fast track to linux
 
A sorted linear array
A sorted linear array A sorted linear array
A sorted linear array
 
String in c
String in cString in c
String in c
 
Jumping statements
Jumping statementsJumping statements
Jumping statements
 
Five tools to professional coding
Five tools to professional codingFive tools to professional coding
Five tools to professional coding
 
Machine language to artificial intelligence
Machine language to artificial intelligenceMachine language to artificial intelligence
Machine language to artificial intelligence
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Virtualization defined-wp

  • 1. F5 WHITE PAPER - BY ALAN MURPHY - F5 TECHNICAL MARKETING MANAGER, SECURITY 1 VIRTUALIZATION DEFINED - EIGHT DIFFERENT WAYS Introduction Imagine a typical office... Alice: Hey Bob, great news! I just heard our IT department is going to implement virtualization in the data center. It’s about time we supported virtualization. Bob: That is great news; virtualization is the wave of the future. What are we virtualizing? The servers? The web applications? The storage network?” Alice: Hmmm…good question; they didn’t specify. But how many different versions of virtualization could there be? Alice has asked the million-dollar question: What does “going virtual” really mean in today’s IT world? Virtualization as a concept is not new; computational environment virtualization has been around since the first mainframe systems. But recently, the term “virtualization” has become ubiquitous, representing any type of process obfuscation where a process is somehow removed from its physical operating environment. Because of this ambiguity, virtualization can almost be applied to any and all parts of an IT infrastructure. For example, mobile device emulators are a form of virtualization because the hardware platform normally required to run the mobile operating system has been emulated, removing the OS binding from the hardware it was written for. But this is just one example of one type of virtualization; there are many definitions of the term “virtualization” floating around in the current lexicon, and all (or at least most) of them are correct, which can be quite confusing. This paper focuses on virtualization as it pertains to the data center; but before considering any type of data center virtualization, it’s important to define what technology or category of service you’re trying to virtualize. Generally speaking, virtualization falls into three categories: Operating System, Storage, and Applications. But these categories are very broad and don’t adequately delineate the key aspects of data center virtualization. It’s helpful to distill these broader categories into eight, specific categories to thoroughly understand the differences (and similarities) between the definitions of virtualization. Operating System Virtualization The most prevalent form of virtualization today, virtual operating systems (or virtual machines) are quickly becoming a core component of the IT infrastructure. Generally, this is the form of virtualization end-users are most familiar with. Virtual machines are typically full implementations of standard operating systems, such as Windows Vista or RedHat Enterprise Linux, running simultaneously on the same physical hardware. Virtual Machine Managers (VMMs) manage each virtual machine individually; each OS instance is unaware that 1) it’s virtual and 2) that other virtual operating systems are (or may be) running at the same time. Companies like Microsoft, VMware, Intel, and AMD are leading the way in breaking the physical relationship between an operating system and its native hardware, extending this paradigm into the data center. As the primary driving force, data center consolidation is bringing the benefits of virtual machines to the mainstream market, allowing enterprises to reduce the number of physical machines in their data centers without reducing the number of underlying applications. This trend ultimately saves enterprises money on hardware, co-location fees, rack space, power, cable management, and more. Application Server Virtualization Application Server Virtualization has been around since the first load balancer, which explains why “application virtualization” is often used as a synonym for advanced load balancing. The core concept of application server virtualization is best seen with a reverse proxy load balancer: an appliance or service that provides access to many different application services transparently. In a typical deployment, a reverse proxy will host a virtual interface accessible to the end user on the “front end.” On the “back end,” the reverse proxy will load balance a number of different servers and applications such as a web server. The virtual interface—often referred to as a Virtual IP or VIP—is exposed to the outside world, represents itself as the actual web server, and manages the connections to and from the web server as needed. This enables the load balancer to manage multiple web servers or applications as a single instance, providing a more secure and robust topology than one allowing users direct access to individual web servers. This is a one:many (one-to-many) virtualization representation: one server is presented to the world, hiding the availability of multiple servers behind a reverse proxy appliance. Application Server Virtualization can be applied to any (and all) types of application deployments and architectures, from fronting application logic servers to distributing the load between multiple web server platforms, and even all the way back in the data center to the data and storage tiers with database virtualization. Application Virtualization While they may sound very similar, Application Server and Application Virtualization are two completely different concepts. What we now refer to as application virtualization we used to call “thin clients.” The technology is exactly the same, only the name has changed to make it more IT-PC (politically correct, not personal computer). Softgrid by Microsoft is an excellent example of deploying application virtualization. Although you may be running Microsoft Word 2007 locally on your laptop, the binaries, personal information, and running state are all stored on, managed, and delivered by Softgrid. Your local laptop provides the CPU and RAM required to run the software, but nothing is installed locally on your own machine. Other types of Application Virtualization include Microsoft Terminal Services and browser-based applications. All of these implementations depend on the virtual application running locally and the management and application logic running remotely.
  • 2. F5 WHITE PAPER 2 VIRTUALIZATION DEFINED - EIGHT DIFFERENT WAYS Management Virtualization Chances are you already implement administrative virtualization throughout your IT organization, but you probably don’t refer to it by this phrase. If you implement separate passwords for your root/administrator accounts between your mail and web servers, and your mail administrators don’t know the password to the web server and vise versa, then you’ve deployed management virtualization in its most basic form. The paradigm can be extended down to segmented administration roles on one platform or box, which is where segmented administration becomes “virtual.” User and group policies in Microsoft Windows XP, 2003, and Vista are an excellent example of virtualized administration rights: Alice may be in the backup group for the 2003 Active Directory server, but not in the admin group. She has read access to all the files she needs to back up, but she doesn’t have rights to install new files or software. Although she is logging into the same sever that the true administrator is logs into, her user experience differs from the administrator. Management virtualization is also a key concept in overall data center management. It’s critical that the network administrators have full access to all the infrastructure gear, such as core routers and switches, but that they not have admin-level access to servers Network Virtualization Network virtualization may be the most ambiguous, specific definition of virtualization. For brevity, the scope of this discussion is relegated to what amounts to virtual IP management and segmentation. A simple example of IP virtualization is a VLAN: a single Ethernet port may support multiple virtual connections from multiple IP addresses and networks, but they are virtually segmented using VLAN tags. Each virtual IP connection over this single physical port is independent and unaware of others’ existence, but the switch is aware of each unique connection and manages each one independently. Another example is virtual routing tables: typically, a routing table and an IP network port share a 1:1 relationship, even though that single port may host multiple virtual interfaces (such as VLANs or the “eth0:1” virtual network adapters supported by Linux). The single routing table will contain multiple routes for each virtual connection, but they are still managed in a single table. Virtual routing tables change that paradigm into a one:many relationship, where any single physical interface can maintain multiple routing tables, each with multiple entries. This provides the interface with the ability to bring up (and tear down) routing services on the fly for one network without interrupting other services and routing tables on that same interface. Hardware Virtualization Hardware virtualization is very similar in concept to OS/Platform virtualization, and to some degree is required for OS virtualization to occur. Hardware virtualization breaks up pieces and locations of physical hardware into independent segments and manages those segments as separate, individual components. Although they fall into different classifications, both symmetric and asymmetric multiprocessing are examples of hardware virtualization. In both instances, the process requesting CPU time isn’t aware which processor it’s going to run on; it just requests CPU time from the OS scheduler and the scheduler takes the responsibility of allocating processor time. As far as the process is concerned, it could be spread across any number of CPUs and any part of RAM, so long as it’s able to run unaffected. Another example of hardware virtualization is “slicing”: carving out precise portions of the system to run in a “walled garden,” such as allocating a fixed 25% of CPU resources to bulk encryption. If there are no processes that need to crunch numbers on the CPU for block encryption, then that 25% of the CPU will go unutilized. If too many processes need mathematical computations at once and require more than 25%, they will be queued and run as a FIFO buffer because the CPU isn’t allowed to give out more than 25% of its resources to encryption. This type of hardware virtualization is sometimes referred to as pre-allocation. Asymmetric multiprocessing is a form of pre-allocation virtualization where certain tasks are only run on certain CPUs. In contrast, symmetric multiprocessing is a form of dynamic allocation, where CPUs are interchangeable and used as needed by any part of the management system. Each classification of hardware virtualization is unique and has value, depending on the implementation. Pre-allocation virtualization is perfect for very specific hardware tasks, such as offloading functions to a highly optimized, single-purpose chip. However, pre-allocation of commodity hardware can cause artificial resource shortages if the allocated chunk is underutilized. Dynamic allocation virtualization is a more standard approach and typically offers greater benefit when compared to pre-allocation. For true virtual service provisioning, dynamic resource allocation is important because it allows complete hardware management and control for resources as needed; virtual resources can be allocated as long as hardware resources are still available. The downside to dynamic allocation implementations is that they typically do not provide full control over the dynamicity, leading to processes which can consume all available resources. Storage Virtualization As another example of a tried-and-true technology that’s been dubbed “virtualization,” storage virtualization can be broken up into two general classes: block virtualization and file virtualization. Block virtualization is best summed up by Storage Area Network (SAN) and Network Attached Storage (NAS) technologies: distributed storage networks that appear to be single physical devices. Under the hood, SAN devices themselves typically implement another form of Storage Virtualization: RAID. iSCSI is another very common and specific virtual implementation of block virtualization, allowing an operating system or application to map a virtual block device, such as a mounted drive, to a local network adapter (software or hardware) instead of a physical drive controller. The iSCSI network adapter translates block calls from the application to network packets the SAN understands and then back again, essentially providing a virtual hard drive.
  • 3. F5 WHITE PAPER - BY ALAN MURPHY - F5 TECHNICAL MARKETING MANAGER, SECURITY 3 VIRTUALIZATION DEFINED - EIGHT DIFFERENT WAYS File virtualization moves the virtual layer up into the more human-consumable file and directory structure level. Most file virtualization technologies sit in front of storage networks and keep track of which files and directories reside on which storage devices, maintaining global mappings of file locations. When a request is made to read a file, the user may think this file is statically located on their personal remote drive, P:My Files budget.xls; however, the file virtualization appliance knows that the file is actually located on an SMB server in a data center across the globe at //10.0.16.125/finance/alice/budget-document/budget.xls. File-level virtualization obfuscates the static virtual location pointer of a file (in this case, on Alice’s P: drive) from the physical location, allowing the back-end network to remain dynamic. If the IP address for the SMB server has to change, or the connection needs to be re-routed to another data center entirely, only the virtual appliance’s location map needs to be updated, not every user that needs to access their P: drive. Service Virtualization And finally, we reach the macro definition of virtualization: service virtualization. Service virtualization is consolidation of all of the above definitions into one catch-all catchphrase. Service virtualization connects all of the components utilized in delivering an application over the network, and includes the process of making all pieces of an application work together regardless of where those pieces physically reside. This is why service virtualization is typically used as an enabler for application availability. For example, a web application typically has many parts: the user-facing HTML; the application server that processes user input; the SOA gears that coordinate service and data availability between each component; the database back-end for user, application, and SOA data; the network that delivers the application components; and the storage network that stores the application code and data. Service virtualization allows each one of the pieces to function independently and be “called up” as needed for the entire application to function properly. When we look deeper into these individual application components, we may see that the web server is load-balanced between 15 virtual machine operating systems, the SOA requests are pushed through any number of XML gateways on the wire, the database servers may be located in one of five global data centers, and so on. Service virtualization combines these independent pieces and presents them together to the user as a single, complete application. While Service virtualization may encompass all the current definitions of virtualization, it’s by no means where IT will stop defining the term. With the pervasive and varied use of the word (as well as the technologies it refers to), there may never be a “final” definition for virtualization; it will continue to evolve and expand as more and more technologies become less and less dependent on rigid operating environments. Storage Virtualization - Continued