SlideShare una empresa de Scribd logo
1 de 27
Submitted By: SubmittedTo.
Ms. Prachi Rawal Mr. Hemant Sahu
MCA 5th Sem.(3rdYear) Assoc.Prof.&Head
Of MCA Department
 The journey toward the cloud begins with
virtualization.
 Virtualization has emerged as the key
disruptive technology that has catalyzed and
enabled data centres to deliver cloud
services.
 Compute, networks, and storage form the
three infrastructure pillars of today’s data
centre.
by:Mr.Abhishek Khare
 The idea of virtualization is not new; it has
been around since the days of the mainframe.
 But more recently, the term virtualization
has gained a broader, more inclusive
connotation beyond server virtualization.
by:Mr.Abhishek Khare
 Virtualization can be defined as the abstraction of
physical resources into logical units, such that a single
physical resource can appear as many logical units
and multiple physical resources can appear as a single
logical unit.
 The primary motivation behind virtualization is to
hide the physical characteristics and irrelevant details
of these resources from their end users.
 Thus, each user gets the illusion of being the lone user
of that physical resource (one-to-many virtualization).
Or multiple physical resources appear as a single
virtual resource to the user (many-to-one
virtualization).
by:Mr.Abhishek Khare
 Consider the familiar example of virtualizing
an x86 server, where software, called virtual
machine monitor (VMM) or hypervisor ,
allows multiple virtual machines (VM) to run
on the same physical server, as illustrated in
Figure
by:Mr.Abhishek Khare
by:Mr.Abhishek Khare
 Each VM emulates a physical computer by
creating a separate operating system
environment.
 The ability to run multiple VMs means that we
can now simultaneously host multiple operating
systems on the same underlying physical
machine. Each operating system gets the
illusion that it is the only one running on that
host server.
 One physical machine has effectively been
divided into many logical ones.
by:Mr.Abhishek Khare
 Virtual LANs (VLAN) are another example of
one-to-many virtualization, where a single
physical network is partitioned into many
logical ones.
 Instead of setting up separate physical
networks for each user group, a single
physical network infrastructure can suffice,
with each user group assigned to a separate
logical network (VLAN).
by:Mr.Abhishek Khare
 The classic example for many-to-one
virtualization is that of a load balancer, which
front ends a group of web servers. As shown
is Figure
by:Mr.Abhishek Khare
by:Mr.Abhishek Khare
 The load balancer hides the details about the
multiple physical web servers and simply
exposes a single virtual IP (VIP).
 The web clients that connect to the VIP to
obtain the web service have the illusion that
there is a single web server.
 Many physical web servers have been
abstracted into one logical web server.
by:Mr.Abhishek Khare
 The concept of virtualization has been around
since the 1960s, when IBM implemented it to
logically partition mainframe computers into
separateVMs.
 This partitioning enabled mainframes to run
multiple applications and processes at the
same time, which improved their utilization.
 Such multitasking allowed better leveraging
of those expensive investments.
by:Mr.Abhishek Khare
 Over the next two to three decades, the need for
virtualization declined as inexpensive PCs and servers
became available.
 In addition, client/server applications became
prevalent, and the trend shifted toward distributed
computing. Furthermore, the universal adoption of
Windows and Linux led to the emergence of x86
servers as the dominant compute platforms.
 Unlike mainframes, however, these servers have not
been designed for virtualization. To enable the
virtualization of x86 servers, specialized software
called hypervisor was developed by companies such
asVMware, Citrix, Microsoft, and others.
by:Mr.Abhishek Khare
 The term virtualization has evolved beyond server
virtualization into a significantly broader context.
 Today, it represents any type of process obfuscation
where a process is removed from its physical
operating environment.
 Therefore, virtualization can be applied to other areas
of IT, such as storage, network, applications, services,
desktops, and many more.
 This chapter focuses on server virtualization, network
virtualization, and storage virtualization, which
together form the foundation of today’s virtualized
data center.
by:Mr.Abhishek Khare
 Server or compute virtualization is the most
popular and visible form of virtualization today.
 We briefly touched on this form of virtualization
as an example of one-to-many virtualization and
saw how low-level software (hypervisor or VMM)
allows multiple operating systems to run
concurrently on a single host computer.
 As Figure 1-1 illustrated, each operating system,
along with its applications, runs in complete
isolation as a VM on top of the hypervisor, under
the illusion that it is the sole operating system
running on that physical machine.
by:Mr.Abhishek Khare
 To successfully virtualize the system and
enable multiple VMs to run concurrently on
the same host, hypervisors dynamically
partition and share the available physical
resources, such as CPU, memory, and I/O
devices. The functionality of the hypervisor
varies greatly based on the architecture and
implementation.
by:Mr.Abhishek Khare
by:Mr.Abhishek Khare
 CPU, memory, and I/O are typically
considered the three vital resources of a
server.
 Correspondingly, the three key components
of server virtualization are CPU virtualization,
memory virtualization, and I/O virtualization .
The sections that follow take a look at all
three components, starting with the
virtualization of the x86 CPU.
by:Mr.Abhishek Khare
 Beyond CPU virtualization, the other critical
part of server virtualization is memory
virtualization. This involves sharing the host
physical memory (machine memory) and
dynamically allocating it to VMs, as illustrated
in Figure 1-4 .
 VM memory virtualization is similar to the
virtual memory support provided by modern
OS.
by:Mr.Abhishek Khare
 Applications see a contiguous address space
that is not necessarily tied to the underlying
physical memory in the system.
 The operating system keeps mappings of
virtual page numbers to physical page
numbers stored in page tables.
 All modern x86 CPUs include a memory
management unit (MMU) and a translation
look-aside buffer (TLB) to optimize virtual
memory performance.
by:Mr.Abhishek Khare
by:Mr.Abhishek Khare
 Having coveredVMs (CPUs) and then virtual
memory, this discussion now turns to the final
component of the server virtualization story: I/O
virtualization (IOV).
 As the name suggests, IOV involves virtualizing
the I/O path from the server to the peripheral
device, enabling multipleVMs to share an I/O
device.
 As shown earlier in the case of CPU and memory
virtualization, even in IOV we have a software
approach and a hardware approach.
by:Mr.Abhishek Khare
 A virtual storage area network (VSAN) is a
logical partition in a storage area network
(SAN). VSANs allow traffic to be isolated
within specific portions of a storage area
network.
by:Mr.Abhishek Khare
 The use of multiple VSANs can make a system
easier to configure and scale out. Subscribers
can be added or relocated without the need for
changing the physical layout.
 If a problem occurs in one VSAN, that problem
can be handled with a minimum of disruption to
the rest of the network.
 Because the independence of VSANs minimizes
the total system's vulnerability, security is
improved. VSANs also offer the possibility of
data redundancy, minimizing the risk of
catastrophic data loss.
by:Mr.Abhishek Khare
 The term is most often associated with Cisco
Systems and is often mentioned in
conjunction with the zoning. Zoning splits a
SAN into multiple, isolated subnetworks.
 The concept behind a VSAN is often
compared to that of a virtual local area
network (VLAN).
 VLANs segregate broadcasts from other
networks
by:Mr.Abhishek Khare
 In computer networking, a single layer-2
network may be partitioned to create
multiple distinct broadcast domains, which
are mutually isolated so that packets can only
pass between them via one or more routers;
such a domain is referred to as a virtual local
area network, virtual LAN or VLAN.
by:Mr.Abhishek Khare
by:Mr.Abhishek Khare

Más contenido relacionado

La actualidad más candente

NCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of VirtualizationNCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of Virtualizationncceconnect
 
Virtualization&cloud computing
Virtualization&cloud computingVirtualization&cloud computing
Virtualization&cloud computingssuser7b6236
 
Virtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference ModelVirtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference ModelDr Neelesh Jain
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualizationrjain51
 
Virtualization
VirtualizationVirtualization
VirtualizationYansi Keim
 
Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)Sarbjeet Singh
 
Microsoft Virtualization Overview
Microsoft Virtualization OverviewMicrosoft Virtualization Overview
Microsoft Virtualization Overviewwebhostingguy
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its TypesHTS Hosting
 
Desktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of ITDesktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of ITInnoTech
 
Networked user interface
Networked user interfaceNetworked user interface
Networked user interfaceAmbo University
 
Virtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudVirtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudNishant Munjal
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualizationAyaz Shahid
 
Virtualization
VirtualizationVirtualization
VirtualizationSingh_Trn
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environmentsArun Gopinath
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology Ravindra Dastikop
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization Mahbub Noor Bappy
 

La actualidad más candente (20)

NCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of VirtualizationNCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
 
Virtualization&cloud computing
Virtualization&cloud computingVirtualization&cloud computing
Virtualization&cloud computing
 
Virtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference ModelVirtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference Model
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Microsoft Virtualization Overview
Microsoft Virtualization OverviewMicrosoft Virtualization Overview
Microsoft Virtualization Overview
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
 
Managing The Virtualized Enterprise New Technology, New Challenges
Managing The Virtualized Enterprise New Technology, New ChallengesManaging The Virtualized Enterprise New Technology, New Challenges
Managing The Virtualized Enterprise New Technology, New Challenges
 
Virtualization Security Risks
Virtualization Security RisksVirtualization Security Risks
Virtualization Security Risks
 
Desktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of ITDesktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of IT
 
Networked user interface
Networked user interfaceNetworked user interface
Networked user interface
 
Virtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudVirtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of Cloud
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environments
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization
 

Destacado (12)

Kompetisi Debat APBN
Kompetisi Debat APBNKompetisi Debat APBN
Kompetisi Debat APBN
 
profile
profileprofile
profile
 
PORTOFOLIO 2.3
PORTOFOLIO 2.3PORTOFOLIO 2.3
PORTOFOLIO 2.3
 
Instructivo de equipos de riego
Instructivo de  equipos de riegoInstructivo de  equipos de riego
Instructivo de equipos de riego
 
ISLA flyer
ISLA flyerISLA flyer
ISLA flyer
 
6 chaves de poder
6 chaves de poder6 chaves de poder
6 chaves de poder
 
Preus quotes socis, xandalls i extraescolars 2012-2013
Preus quotes socis, xandalls i extraescolars   2012-2013Preus quotes socis, xandalls i extraescolars   2012-2013
Preus quotes socis, xandalls i extraescolars 2012-2013
 
Windows 10
Windows 10Windows 10
Windows 10
 
La ciudad de Atenas
La ciudad de AtenasLa ciudad de Atenas
La ciudad de Atenas
 
Projeção cónica (u1.pág.26)
Projeção cónica (u1.pág.26)Projeção cónica (u1.pág.26)
Projeção cónica (u1.pág.26)
 
Familien-Gründung und Karriere
Familien-Gründung und KarriereFamilien-Gründung und Karriere
Familien-Gründung und Karriere
 
Apresentação Oral de Trabalhos Científicos - Profa. Rilva Muñoz
Apresentação Oral de Trabalhos Científicos - Profa. Rilva MuñozApresentação Oral de Trabalhos Científicos - Profa. Rilva Muñoz
Apresentação Oral de Trabalhos Científicos - Profa. Rilva Muñoz
 

Similar a Virtualization

Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud ComputingJamie Shoup
 
Advantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of VirtualizationAdvantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of VirtualizationElizabeth Anderson
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingBhuvanesh Hingal
 
Virtualization defined-wp
Virtualization defined-wpVirtualization defined-wp
Virtualization defined-wpSuneel Dogra
 
PLAT FORM VIRTUALIZATION
PLAT FORM VIRTUALIZATIONPLAT FORM VIRTUALIZATION
PLAT FORM VIRTUALIZATIONNRajaMohanReddy
 
Gridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage ArchitectureGridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage ArchitectureGridstore
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsSiddharth Coontoor
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 
VIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptxVIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptxKelvinBakespear
 
Platform virtualization.raj
Platform virtualization.rajPlatform virtualization.raj
Platform virtualization.rajNRajaMohanReddy
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET Journal
 
Quick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-ukQuick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-ukAssespro Nacional
 
Processor Virtualization Comparison VMWare ESXi vs Microsoft Hyper-V
Processor Virtualization Comparison VMWare ESXi vs Microsoft Hyper-VProcessor Virtualization Comparison VMWare ESXi vs Microsoft Hyper-V
Processor Virtualization Comparison VMWare ESXi vs Microsoft Hyper-VBlesson Babu
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session aleyeldean
 
Server Virtualization Architecture and Implementation
Server Virtualization Architecture and ImplementationServer Virtualization Architecture and Implementation
Server Virtualization Architecture and ImplementationLockheed Martin
 
2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docxshruti533256
 

Similar a Virtualization (20)

Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud Computing
 
Advantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of VirtualizationAdvantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of Virtualization
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Virtualization defined-wp
Virtualization defined-wpVirtualization defined-wp
Virtualization defined-wp
 
PLAT FORM VIRTUALIZATION
PLAT FORM VIRTUALIZATIONPLAT FORM VIRTUALIZATION
PLAT FORM VIRTUALIZATION
 
Gridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage ArchitectureGridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage Architecture
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
VIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptxVIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptx
 
Platform virtualization.raj
Platform virtualization.rajPlatform virtualization.raj
Platform virtualization.raj
 
Cloud Technology: Virtualization
Cloud Technology: VirtualizationCloud Technology: Virtualization
Cloud Technology: Virtualization
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 
Presentation on Top Cloud Computing Technologies
Presentation on Top Cloud Computing TechnologiesPresentation on Top Cloud Computing Technologies
Presentation on Top Cloud Computing Technologies
 
Quick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-ukQuick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-uk
 
Vitualisation
VitualisationVitualisation
Vitualisation
 
Processor Virtualization Comparison VMWare ESXi vs Microsoft Hyper-V
Processor Virtualization Comparison VMWare ESXi vs Microsoft Hyper-VProcessor Virtualization Comparison VMWare ESXi vs Microsoft Hyper-V
Processor Virtualization Comparison VMWare ESXi vs Microsoft Hyper-V
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session
 
Server Virtualization Architecture and Implementation
Server Virtualization Architecture and ImplementationServer Virtualization Architecture and Implementation
Server Virtualization Architecture and Implementation
 
2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 

Más de Ajay Chawda

Mastering the art of visual storytelling the graphic designers journey
Mastering the art of visual storytelling the graphic designers journeyMastering the art of visual storytelling the graphic designers journey
Mastering the art of visual storytelling the graphic designers journeyAjay Chawda
 
Android technlogy
Android technlogyAndroid technlogy
Android technlogyAjay Chawda
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technologyAjay Chawda
 
Sonu seminar ppt
Sonu seminar pptSonu seminar ppt
Sonu seminar pptAjay Chawda
 

Más de Ajay Chawda (6)

Mastering the art of visual storytelling the graphic designers journey
Mastering the art of visual storytelling the graphic designers journeyMastering the art of visual storytelling the graphic designers journey
Mastering the art of visual storytelling the graphic designers journey
 
Android technlogy
Android technlogyAndroid technlogy
Android technlogy
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
linux
linuxlinux
linux
 
Sonu seminar ppt
Sonu seminar pptSonu seminar ppt
Sonu seminar ppt
 
4g technology
4g technology4g technology
4g technology
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Virtualization

  • 1. Submitted By: SubmittedTo. Ms. Prachi Rawal Mr. Hemant Sahu MCA 5th Sem.(3rdYear) Assoc.Prof.&Head Of MCA Department
  • 2.  The journey toward the cloud begins with virtualization.  Virtualization has emerged as the key disruptive technology that has catalyzed and enabled data centres to deliver cloud services.  Compute, networks, and storage form the three infrastructure pillars of today’s data centre. by:Mr.Abhishek Khare
  • 3.  The idea of virtualization is not new; it has been around since the days of the mainframe.  But more recently, the term virtualization has gained a broader, more inclusive connotation beyond server virtualization. by:Mr.Abhishek Khare
  • 4.  Virtualization can be defined as the abstraction of physical resources into logical units, such that a single physical resource can appear as many logical units and multiple physical resources can appear as a single logical unit.  The primary motivation behind virtualization is to hide the physical characteristics and irrelevant details of these resources from their end users.  Thus, each user gets the illusion of being the lone user of that physical resource (one-to-many virtualization). Or multiple physical resources appear as a single virtual resource to the user (many-to-one virtualization). by:Mr.Abhishek Khare
  • 5.  Consider the familiar example of virtualizing an x86 server, where software, called virtual machine monitor (VMM) or hypervisor , allows multiple virtual machines (VM) to run on the same physical server, as illustrated in Figure by:Mr.Abhishek Khare
  • 7.  Each VM emulates a physical computer by creating a separate operating system environment.  The ability to run multiple VMs means that we can now simultaneously host multiple operating systems on the same underlying physical machine. Each operating system gets the illusion that it is the only one running on that host server.  One physical machine has effectively been divided into many logical ones. by:Mr.Abhishek Khare
  • 8.  Virtual LANs (VLAN) are another example of one-to-many virtualization, where a single physical network is partitioned into many logical ones.  Instead of setting up separate physical networks for each user group, a single physical network infrastructure can suffice, with each user group assigned to a separate logical network (VLAN). by:Mr.Abhishek Khare
  • 9.  The classic example for many-to-one virtualization is that of a load balancer, which front ends a group of web servers. As shown is Figure by:Mr.Abhishek Khare
  • 11.  The load balancer hides the details about the multiple physical web servers and simply exposes a single virtual IP (VIP).  The web clients that connect to the VIP to obtain the web service have the illusion that there is a single web server.  Many physical web servers have been abstracted into one logical web server. by:Mr.Abhishek Khare
  • 12.  The concept of virtualization has been around since the 1960s, when IBM implemented it to logically partition mainframe computers into separateVMs.  This partitioning enabled mainframes to run multiple applications and processes at the same time, which improved their utilization.  Such multitasking allowed better leveraging of those expensive investments. by:Mr.Abhishek Khare
  • 13.  Over the next two to three decades, the need for virtualization declined as inexpensive PCs and servers became available.  In addition, client/server applications became prevalent, and the trend shifted toward distributed computing. Furthermore, the universal adoption of Windows and Linux led to the emergence of x86 servers as the dominant compute platforms.  Unlike mainframes, however, these servers have not been designed for virtualization. To enable the virtualization of x86 servers, specialized software called hypervisor was developed by companies such asVMware, Citrix, Microsoft, and others. by:Mr.Abhishek Khare
  • 14.  The term virtualization has evolved beyond server virtualization into a significantly broader context.  Today, it represents any type of process obfuscation where a process is removed from its physical operating environment.  Therefore, virtualization can be applied to other areas of IT, such as storage, network, applications, services, desktops, and many more.  This chapter focuses on server virtualization, network virtualization, and storage virtualization, which together form the foundation of today’s virtualized data center. by:Mr.Abhishek Khare
  • 15.  Server or compute virtualization is the most popular and visible form of virtualization today.  We briefly touched on this form of virtualization as an example of one-to-many virtualization and saw how low-level software (hypervisor or VMM) allows multiple operating systems to run concurrently on a single host computer.  As Figure 1-1 illustrated, each operating system, along with its applications, runs in complete isolation as a VM on top of the hypervisor, under the illusion that it is the sole operating system running on that physical machine. by:Mr.Abhishek Khare
  • 16.  To successfully virtualize the system and enable multiple VMs to run concurrently on the same host, hypervisors dynamically partition and share the available physical resources, such as CPU, memory, and I/O devices. The functionality of the hypervisor varies greatly based on the architecture and implementation. by:Mr.Abhishek Khare
  • 18.  CPU, memory, and I/O are typically considered the three vital resources of a server.  Correspondingly, the three key components of server virtualization are CPU virtualization, memory virtualization, and I/O virtualization . The sections that follow take a look at all three components, starting with the virtualization of the x86 CPU. by:Mr.Abhishek Khare
  • 19.  Beyond CPU virtualization, the other critical part of server virtualization is memory virtualization. This involves sharing the host physical memory (machine memory) and dynamically allocating it to VMs, as illustrated in Figure 1-4 .  VM memory virtualization is similar to the virtual memory support provided by modern OS. by:Mr.Abhishek Khare
  • 20.  Applications see a contiguous address space that is not necessarily tied to the underlying physical memory in the system.  The operating system keeps mappings of virtual page numbers to physical page numbers stored in page tables.  All modern x86 CPUs include a memory management unit (MMU) and a translation look-aside buffer (TLB) to optimize virtual memory performance. by:Mr.Abhishek Khare
  • 22.  Having coveredVMs (CPUs) and then virtual memory, this discussion now turns to the final component of the server virtualization story: I/O virtualization (IOV).  As the name suggests, IOV involves virtualizing the I/O path from the server to the peripheral device, enabling multipleVMs to share an I/O device.  As shown earlier in the case of CPU and memory virtualization, even in IOV we have a software approach and a hardware approach. by:Mr.Abhishek Khare
  • 23.  A virtual storage area network (VSAN) is a logical partition in a storage area network (SAN). VSANs allow traffic to be isolated within specific portions of a storage area network. by:Mr.Abhishek Khare
  • 24.  The use of multiple VSANs can make a system easier to configure and scale out. Subscribers can be added or relocated without the need for changing the physical layout.  If a problem occurs in one VSAN, that problem can be handled with a minimum of disruption to the rest of the network.  Because the independence of VSANs minimizes the total system's vulnerability, security is improved. VSANs also offer the possibility of data redundancy, minimizing the risk of catastrophic data loss. by:Mr.Abhishek Khare
  • 25.  The term is most often associated with Cisco Systems and is often mentioned in conjunction with the zoning. Zoning splits a SAN into multiple, isolated subnetworks.  The concept behind a VSAN is often compared to that of a virtual local area network (VLAN).  VLANs segregate broadcasts from other networks by:Mr.Abhishek Khare
  • 26.  In computer networking, a single layer-2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them via one or more routers; such a domain is referred to as a virtual local area network, virtual LAN or VLAN. by:Mr.Abhishek Khare