SlideShare una empresa de Scribd logo
1 de 9
Virtual Machine
Virtualization/Emulation
What is a virtual machine?
• compute resource that uses software instead of a physical computer to
run programs and deploy apps.
• One or more virtual “guest” machines run on a physical “host” machine.
• Each virtual machine runs its own operating system and functions separately from the other
VMs.
Why use a VM?
• Server consolidation- migrating network services and applications from multiple computers
to a singular computer.
• less need to purchase additional physical resources, like hard drives or hard disks, as well as reducing the need for
power, space, and cooling in the datacenter.
• provide additional disaster recovery options by enabling failover and redundancy that could previously only be
achieved through additional hardware.
• Provides an environment that is isolated from the rest of a system.
• no interference
• Testing new applications or setting up a production environment.
• single purpose VM to support a specific process
What are VMs used for?
• Building and deploying apps to the cloud.
• Trying out a new operating system (OS), including beta releases.
• New environment to make it simpler and quicker for developers to run dev-test
scenarios.
• Backing up your existing OS.
• Accessing virus-infected data or running an old application by installing an older
OS.
• Running software or apps on operating systems that they weren't originally
intended for.
What are the benefits of using VMs?
• Cost savings—reduce your physical infrastructure footprint
• decreasing the need to maintain many servers and saving on maintenance costs and
electricity.
• Agility and speed—Virtualization makes the process of running dev-test
scenarios a lot quicker.
• Lowered downtime—portable and easy to move from one hypervisor to another
on a different machine
• great solution for backup
• Scalability—easily scale your apps by adding more physical or virtual servers to
distribute the workload across multiple VMs.
• increase the availability and performance of your apps.
• Security benefits—allows you to run apps of questionable security.
• safely study computer viruses, isolating the viruses to avoid risking their host computer.
Disadvantages of virtual machines
• Running multiple VMs on one physical machine can result in unstable
performance if infrastructure requirements are not met.
• VMs are less efficient and run slower than a full physical computer.
• Most enterprises use a combination of physical and virtual infrastructure to balance the
corresponding advantages and disadvantages.
• A VM can be infected with the weaknesses of the host machine.
• Eg:, process isolation is a feature usually employed by OS. However, there are bugs that
violate it. A regular computer devoid of VMs would then only be affected. But, a computer
with a number of VMs would then infect each of those “machines” as well.
Hypervisor
• separates the OS and applications in a computer from the underlying physical
hardware.
• enables virtualization, by giving the physical host machine the ability to operate multiple VMs
on the same system.
• virtualization is inextricably bound to hypervisor technology.
• hypervisors were initially called Virtual Machine Monitors (VMM).
• provides a layer between the hardware and the VMs.
• This layer handles all of the transactions between the two.
Types of hypervisors
Type 1
• A type 1 hypervisor is on bare metal. VM resources are scheduled directly to the
hardware by the hypervisor.
• KVM- was merged into the Linux® kernel in 2007
• Critics/Xen Server, VMware ESXi and Microsoft hyper-V
Type 2
• A type 2 hypervisor is hosted. VM resources are scheduled against a host
operating system, which is then executed against the hardware.
• VMware Workstation, Oracle VirtualBox, Microsoft Virtual PC, VMware Workstation, Oracle
Solaris Zones, VMware Fusion, Oracle VM Server

Más contenido relacionado

La actualidad más candente

What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualizationhktripathy
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing pptMehul Patel
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualizationelliando dias
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to VirtualizationRahul Hada
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualizationGokulnath S
 
Virtualization
VirtualizationVirtualization
Virtualizationvishnurk
 
VMware Overview
VMware OverviewVMware Overview
VMware OverviewMadhu Bala
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloudAshok Kumar
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentationMangesh Gunjal
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualizationDr.Neeraj Kumar Pandey
 
Virtual machines and their architecture
Virtual machines and their architectureVirtual machines and their architecture
Virtual machines and their architectureMrinmoy Dalal
 

La actualidad más candente (20)

What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Virtual machine subhash gupta
Virtual machine subhash guptaVirtual machine subhash gupta
Virtual machine subhash gupta
 
VMware Overview
VMware OverviewVMware Overview
VMware Overview
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Virtual machines and their architecture
Virtual machines and their architectureVirtual machines and their architecture
Virtual machines and their architecture
 

Similar a Virtual machine

Introductin to virtualization i
Introductin to virtualization   iIntroductin to virtualization   i
Introductin to virtualization iParth Patel
 
lecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxlecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxAnilkumarbehera16
 
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravym456
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulizationAJIT NEGI
 
Virtualization intro to freshers
Virtualization intro to freshersVirtualization intro to freshers
Virtualization intro to freshersShravani Mondrety
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containersSelvaraj Kesavan
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualizationwebhostingguy
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud ComputingPyingkodi Maran
 
virtualization(1).pptx
virtualization(1).pptxvirtualization(1).pptx
virtualization(1).pptxAkashRajBehera
 
Virtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudVirtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudNishant Munjal
 
Introduction to virtualization and Hypervisor.pptx
Introduction to virtualization and Hypervisor.pptxIntroduction to virtualization and Hypervisor.pptx
Introduction to virtualization and Hypervisor.pptxEshwarsk2
 

Similar a Virtual machine (20)

Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
 
Introductin to virtualization i
Introductin to virtualization   iIntroductin to virtualization   i
Introductin to virtualization i
 
lecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxlecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptx
 
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
 
Virtualization intro to freshers
Virtualization intro to freshersVirtualization intro to freshers
Virtualization intro to freshers
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
 
Cloud
CloudCloud
Cloud
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computing
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 
virtualization(1).pptx
virtualization(1).pptxvirtualization(1).pptx
virtualization(1).pptx
 
virtualization.pptx
virtualization.pptxvirtualization.pptx
virtualization.pptx
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudVirtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of Cloud
 
unit-2.pptx
unit-2.pptxunit-2.pptx
unit-2.pptx
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
 
Introduction to virtualization and Hypervisor.pptx
Introduction to virtualization and Hypervisor.pptxIntroduction to virtualization and Hypervisor.pptx
Introduction to virtualization and Hypervisor.pptx
 
1 (3).pptx
1 (3).pptx1 (3).pptx
1 (3).pptx
 

Más de Rinaldo John

Handling fermenters and troubleshooting
Handling fermenters and troubleshootingHandling fermenters and troubleshooting
Handling fermenters and troubleshootingRinaldo John
 
Fermenter designs and setup
Fermenter designs and setupFermenter designs and setup
Fermenter designs and setupRinaldo John
 
Bioprocessing and its significance
Bioprocessing and its significanceBioprocessing and its significance
Bioprocessing and its significanceRinaldo John
 
Lost in communication
Lost in communicationLost in communication
Lost in communicationRinaldo John
 
Role of Environmental Biotechnology
Role of Environmental BiotechnologyRole of Environmental Biotechnology
Role of Environmental BiotechnologyRinaldo John
 
Molecular analysis of Microbial Community
Molecular analysis of Microbial CommunityMolecular analysis of Microbial Community
Molecular analysis of Microbial CommunityRinaldo John
 
Social entrepreneurship
Social entrepreneurshipSocial entrepreneurship
Social entrepreneurshipRinaldo John
 
Genetic counselling
Genetic counsellingGenetic counselling
Genetic counsellingRinaldo John
 
Journal Club Presentation PPT Format
Journal Club Presentation PPT FormatJournal Club Presentation PPT Format
Journal Club Presentation PPT FormatRinaldo John
 
Distribution of microbes in aquatic environment
Distribution of microbes in aquatic environmentDistribution of microbes in aquatic environment
Distribution of microbes in aquatic environmentRinaldo John
 
Microbial contamination
Microbial contamination Microbial contamination
Microbial contamination Rinaldo John
 
Antibiotics and Synthetic Antimicrobial agents
Antibiotics and Synthetic Antimicrobial agentsAntibiotics and Synthetic Antimicrobial agents
Antibiotics and Synthetic Antimicrobial agentsRinaldo John
 
Antibiotics part 4
Antibiotics part 4Antibiotics part 4
Antibiotics part 4Rinaldo John
 
Antibiotics part 3
Antibiotics part 3Antibiotics part 3
Antibiotics part 3Rinaldo John
 
Antibiotics part 2
Antibiotics part 2Antibiotics part 2
Antibiotics part 2Rinaldo John
 
Soil as microbial habitat
Soil as microbial habitatSoil as microbial habitat
Soil as microbial habitatRinaldo John
 

Más de Rinaldo John (20)

Handling fermenters and troubleshooting
Handling fermenters and troubleshootingHandling fermenters and troubleshooting
Handling fermenters and troubleshooting
 
Fermenter designs and setup
Fermenter designs and setupFermenter designs and setup
Fermenter designs and setup
 
Bioprocessing and its significance
Bioprocessing and its significanceBioprocessing and its significance
Bioprocessing and its significance
 
Luke 18:18-30
Luke 18:18-30Luke 18:18-30
Luke 18:18-30
 
Lost in communication
Lost in communicationLost in communication
Lost in communication
 
Role of Environmental Biotechnology
Role of Environmental BiotechnologyRole of Environmental Biotechnology
Role of Environmental Biotechnology
 
Molecular analysis of Microbial Community
Molecular analysis of Microbial CommunityMolecular analysis of Microbial Community
Molecular analysis of Microbial Community
 
Social entrepreneurship
Social entrepreneurshipSocial entrepreneurship
Social entrepreneurship
 
Genetic counselling
Genetic counsellingGenetic counselling
Genetic counselling
 
Journal Club Presentation PPT Format
Journal Club Presentation PPT FormatJournal Club Presentation PPT Format
Journal Club Presentation PPT Format
 
Microbial loop
Microbial loopMicrobial loop
Microbial loop
 
Distribution of microbes in aquatic environment
Distribution of microbes in aquatic environmentDistribution of microbes in aquatic environment
Distribution of microbes in aquatic environment
 
Microbial contamination
Microbial contamination Microbial contamination
Microbial contamination
 
Antibiotics and Synthetic Antimicrobial agents
Antibiotics and Synthetic Antimicrobial agentsAntibiotics and Synthetic Antimicrobial agents
Antibiotics and Synthetic Antimicrobial agents
 
Antibiotics part 4
Antibiotics part 4Antibiotics part 4
Antibiotics part 4
 
Antibiotics part 3
Antibiotics part 3Antibiotics part 3
Antibiotics part 3
 
Antibiotics part 2
Antibiotics part 2Antibiotics part 2
Antibiotics part 2
 
Proverbs 2
Proverbs 2Proverbs 2
Proverbs 2
 
Soil as microbial habitat
Soil as microbial habitatSoil as microbial habitat
Soil as microbial habitat
 
Sulphur cycle
Sulphur cycleSulphur cycle
Sulphur cycle
 

Último

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Virtual machine

  • 2. What is a virtual machine? • compute resource that uses software instead of a physical computer to run programs and deploy apps. • One or more virtual “guest” machines run on a physical “host” machine. • Each virtual machine runs its own operating system and functions separately from the other VMs.
  • 3. Why use a VM? • Server consolidation- migrating network services and applications from multiple computers to a singular computer. • less need to purchase additional physical resources, like hard drives or hard disks, as well as reducing the need for power, space, and cooling in the datacenter. • provide additional disaster recovery options by enabling failover and redundancy that could previously only be achieved through additional hardware. • Provides an environment that is isolated from the rest of a system. • no interference • Testing new applications or setting up a production environment. • single purpose VM to support a specific process
  • 4. What are VMs used for? • Building and deploying apps to the cloud. • Trying out a new operating system (OS), including beta releases. • New environment to make it simpler and quicker for developers to run dev-test scenarios. • Backing up your existing OS. • Accessing virus-infected data or running an old application by installing an older OS. • Running software or apps on operating systems that they weren't originally intended for.
  • 5. What are the benefits of using VMs? • Cost savings—reduce your physical infrastructure footprint • decreasing the need to maintain many servers and saving on maintenance costs and electricity. • Agility and speed—Virtualization makes the process of running dev-test scenarios a lot quicker. • Lowered downtime—portable and easy to move from one hypervisor to another on a different machine • great solution for backup • Scalability—easily scale your apps by adding more physical or virtual servers to distribute the workload across multiple VMs. • increase the availability and performance of your apps. • Security benefits—allows you to run apps of questionable security. • safely study computer viruses, isolating the viruses to avoid risking their host computer.
  • 6. Disadvantages of virtual machines • Running multiple VMs on one physical machine can result in unstable performance if infrastructure requirements are not met. • VMs are less efficient and run slower than a full physical computer. • Most enterprises use a combination of physical and virtual infrastructure to balance the corresponding advantages and disadvantages. • A VM can be infected with the weaknesses of the host machine. • Eg:, process isolation is a feature usually employed by OS. However, there are bugs that violate it. A regular computer devoid of VMs would then only be affected. But, a computer with a number of VMs would then infect each of those “machines” as well.
  • 7.
  • 8. Hypervisor • separates the OS and applications in a computer from the underlying physical hardware. • enables virtualization, by giving the physical host machine the ability to operate multiple VMs on the same system. • virtualization is inextricably bound to hypervisor technology. • hypervisors were initially called Virtual Machine Monitors (VMM). • provides a layer between the hardware and the VMs. • This layer handles all of the transactions between the two.
  • 9. Types of hypervisors Type 1 • A type 1 hypervisor is on bare metal. VM resources are scheduled directly to the hardware by the hypervisor. • KVM- was merged into the Linux® kernel in 2007 • Critics/Xen Server, VMware ESXi and Microsoft hyper-V Type 2 • A type 2 hypervisor is hosted. VM resources are scheduled against a host operating system, which is then executed against the hardware. • VMware Workstation, Oracle VirtualBox, Microsoft Virtual PC, VMware Workstation, Oracle Solaris Zones, VMware Fusion, Oracle VM Server

Notas del editor

  1. The term bare metal refers to the fact that there is no operating system between the virtualization software and the hardware. The virtualization software resides on the “bare metal” or the hard disk of the hardware, where the operating system is usually installed.