0% found this document useful (0 votes)
22 views

Cloud Computing Unit 3

Uploaded by

bimwebdeveloper
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
22 views

Cloud Computing Unit 3

Uploaded by

bimwebdeveloper
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 14
Cloud Computing | Unit-2 34 3 Cloud Virtualization Technology Overview of Virtualization Techniques > Virtualization is the “creation of a virtual (rather than actual) version of something, such as aserver, a desktop, a storage device, an operating system or network resources". > Virtualization is a technique, which allows to share a single physical instance of aresource or an application among multiple customers and organizations. It does by assigning alogical name to a physical storage and providing a pointer to that physical resource when demanded. > Virtualization is a technique how to separate a service from the underlying physical delivery of that service. It is the process of creating a virtual version of something like computer hardware. It was initially developed during the mainframe era. It involves using specialized software to create a virtual or software-created version, of a computing resource rather than the actual version of the same resource. With the help of Virmalization, ‘multiple operating systems and applications can rum on the same machine and its same hardware at the same time, increasing the utilization and flexibility of hardware. > In other words, one of the main costeffective, hardware-reducing, and energy-saving techniques used by cloud providers is Virtwalization. Virtualization allows sharing of a single physical instance of @ resource or an application among multiple customers and organizations at one time. It does this by assigning a logical name to physical storage and providing a pointer to that physical resource on demand. The term virtualization is often synonymious with hardware virtualization, which plays a fimdamental role in efficiently delivering Infrastructure-as-a-Service (IaaS) solutions for cloud computing, Moreover, virtualization technologies provide a virtual environment for not only executing applications but also for storage, memory, and networking Binaries/ Libraries al Binaries/ Binaries/ Libraries Libraries Guest Guest Guest os os os Hyperviser Server Hardware Virtualization > The machine on which the virtual machine is going to create is known as Host Machine and that virtual machine is referred as a Guest Machine. > This virtual machine is managed by a software or firmware, which is known as hypervisor. Compiled by: jaresh Prasad Das Page 1 Cloud Computing | Unit-2 “4 Hypervisor ¥ The hypervisor is a firmware or low-level program that acts as a Virtual Machine Manager. There are two types of hypervisor: ‘© Type 1 hypervisor executes on bare system. LynxSecure, RTS Hypervisor, Oracle VM, Sun xVM Server, VirtualLogic VLX are examples of Type 1 hypervisor. The following diagram. shows the Type 1 hypervisor. ‘Type 1 Hypervisor ‘The type! hypervisor does not have any host operating system because they are installed on a bare system. © Type 2 hypervisor is @ software interface that emulates the devices with which a system normally interacts. Containers, KVM, Microsoft Hyper V, VMWare Fusion, Virtual Server 2005 R2, Windows Virtual PC and VMWare workstation 6.0 are examples of Type 2 hypervisor. The following diagram shows the Type 2 hypervisor. ‘Type 2 Hypervisor 4 Work of Virtualization in Cloud Computing > Virtualization has a prominent impact on Cloud Computing. In the case of cloud computing, users store data in the cloud, but with the help of Virtualization, users have the extra benefit of sharing the infrastructure Cloud Vendors take care of the required physical resources, but these cloud providers charge a lmge amount for these services which impacts every user ot organization. Virtualization helps Users ot Organizations in maintaining those services which are required by a company throngh extemal (third-party) people, which helps in reducing costs to the company. This is the way through which Virtualization works in Cloud Computing. Compiled by:-Naresh Prasad Das Page 2 Cloud Computing | Unit-2 3.4.3 Benefits of Virtualization More flexible and efficient allocation of resources. Enhance development productivity. It lowers the cost of IT infrastructure Remote access and rapid scalability. High availability and disaster recovery Pay peruse of the IT infrastructure on demand, Enables nmning multiple operating systems Drawback of Virtualization High Initial Investment: Clouds have a very high initial investment, but it is also true that it will help in reducing the cost of companies. Learning New Infrastructure: As the companies shifted from Servers to Cloud, it requires highly skilled staff who have skills to work with the cloud easily, and for this, you have to hire new staff or provide training, to current staff, Risk of Data: Hosting data on third-party resources can lead to putting the data at risk, it has the chance of getting attacked by any hacker or cracker very easily. Characteristics of Virtualization Increased Security: The ability to control the execution of a guest program in a completely transparent manner opens new possibilities for delivering a secure, controlled execution environment, All the operations of the guest programs are generally performed against the virtual machine, which then translates and applies them to the host programs. Managed Execution: In particular, sharing, aggregation, emulation, and isolation are the most relevant features. Sharing: Virtualization allows the creation of separate computing environment within the same host regation: It is possible to share physical resources among several guests, but virtualization also allows aggregation, which is the opposite process. 3.2 Types of Virtualization > There are various types of virtualization in cloud computing, each serving different purposes. Here are the some main types of virtualization in cloud computing: 1. Server Virtualization: > Server virtualization involves running multiple virtual machines (VMs) on a single physical server. Each VM operates independently and can run different operating systems and applications. Hypervisors, such as VMware vSphere, Microsoft Hyper-V, and KVM, manage these VMs. Server virtualization is widely used in IaaS (Infrastructure as a Service) cloud environments. > Benefits: Improved server utilization. © Isolation berween VMs © Easy backup and migration. © Resource allocation and scaling, ‘Network Virtualization: > Network virtualization abstracts the physical network infrastructure, allowing multiple virtual networks to coexist on the same physical network. Software-defined networking (SDN) and network virtualization platforms like VMware NSX and Cisco ACI enable network virtualization. This is essential for multi-tenancy and network isolation in cloud environments. > Benefits: © Isolation of network traffic. © Dynamic network provisioning. Compiled by: jaresh Prasad Das Page 3 Cloud Computing | Unit-2 ‘© Simplified network management © Improved security and quality of service. Storage Virtualization: Storage virtualization abstracts physical storage devices and presents them as a single, virtualized storage pool. This enables efficient storage management, data replication, and disaster recovery. Technologies like Storage Area Networks (SAN) and Network Attached Storage (NAS) often employ storage virtualization. Benefits: Better storage utilization. © Simplified data management © Data redundancy and fault tolerance. © Efficient backup and recovery. Desktop Virtualization (VDI - Virtual Desktop Infrastructure): Desktop virtualization allows users to access their desktop environments remotely from various devices. It involves running multiple virtual desktops on a centralized server or cloud infrastructure. Popular desktop virtualization solutions include VMware Horizon, Citrix Virtual Apps and Desktops, and Microsoft Remote Desktop. Benefits © Centralized management and updates. (© Enhanced security and data protection. © Support for remote work and BYOD. © Efficient resource allocation, Application Virtualization Application virtualization decouples software applications from the mderlying operating system, ‘making them portable across different platforms. This allows applications to run in isolation without interfering with other applications or the host OS. Popular application virtualization technologies include Docker and Kubernetes containers. Benefits: © Simplified application deployment. © Portability and consistency. © Resource efficiency. © Scalability Hardware Virtualization: Hardware virtualization is an essential component of server virtualization. It involves the use of a hypervisor to create multiple virtual instances (VMs) on a single physical server. Each VM is isolated and has its own virtualized harclware resources, incinding CPU, memory, and storage. Benefits © Efficient resource allocation @ Isolation and security. © Improved hardware utilization. © Simplified management. Storage Virtualization: Storage virtualization abstracts physical storage resources into a virtual storage pool, which can be allocated and managed dynamically. This technology simplifies storage management, improves scalability, and enhances data protection and disaster recovery. Benefits: © Centralized and simplified storage management. © Dynamic provisioning of storage resources. © Enhanced data redundancy and failover capabilities. Compiled by: jaresh Prasad Das Page 4 Cloud Computing | Unit-2 ‘0 Efficient data backup and recovery. 8. Security Virtualization: > Security virtualization involves isolating security functions and policies into separate virtual instances. This helps improve security and compliance, especially in multi-tenant cloud environments, Virtualized security components can include firewalls, intrusion detection systems, and encryption services, > Benefits: © Enhanced security for cloud services and applications. Isolation of secuity policies and controls. Scalability and adaptability of security measures, Improved compliance and auditing capabilities, o00 3.3 Implementation Level of Virtualization > A traditional computer runs with a host operating system specially tailored for its hardware architecture, as shown in Figure a. After virtualization, different user applications managed by their own operating systems (guest OS) can run on the same hardware, independent of the host OS. This is often done by adding additional software, called a virtualization layer as shown in Fignre b. This virtalization layer is known as hypervisor or virtual machine monitor (VMM). The VMs are shown in the upper boxes, where applications nun with their own guest OS over the virmalized CPU, memory, and VO resources. ‘Application Virtual Machines Host operating system Hardware Virtualization layer (Hypervisor or VMM) Hardware running the Host OS SFO? CHeose {@) Traditional computer (0) After virtualization > The main function of the software layer for virtualization is to virtualize the physical hardware of a host machine into virtual resources to be used by the VMs, exclusively. This can be implemented at vations operational levels, as we will discuss shortly. The virtualization software creates the abstraction of VMs by interposing a virtualization layer at various levels of a computer system. Common virtualization layers include the instruction set architecture (ISA) level, hardware level, operating system level, library support level, and application level Compiled by:-Naresh Prasad Das Page 5 Cloud Computing | Unit-2 Application level JVM/..NET CLR / Panot Library (user-level API) level WINE/ WABI/ LxRun / Visual MainWin | vCUDA ‘Operating system level Jail / Virtual Environment / Ensim’s VPS / FVM. Hardware abstraction layer (HAL) level ‘VMware / Virtual PC / Denali / Xen /L4 / Plex 86 / User mode Linux / Cooperative Linux Instruction set architecture (ISA) level Bochs / Crusoe / QEMU / BIRD / Dynamo Instruction Set Architecture Level (ISA) ISA virtualization can work through ISA emulation. This is used to run many legacy codes that were written for a different configuration of hardware. These codes run on any virtual machine using the ISA. With this, a binary code that originally needed some additional layers to ran is now capable of ranning on the x86 machines. It can also be tweaked to rin on the x64 machine, With ISA, it is possible to make the ‘virtual machine hardware agnostic. For the basic enmlation, an interpreter is needed, which interprets the source code and then converts it into a hardware format that can be read. This then allows processing, This is one of the five implementation levels of virtualization in cloud computing, Hardware Abstraction Level (HAL) ‘Tme to its name HAL lets the virtualization perform at the level of the hardware. This makes use of a hypervisor which is used for fimctioning. At this level, the virtual machine is formed, and this manages the hardware using the process of virmalization. It allows the virtualization of each of the hardware components, which could be the input-output device, the memory, the processor, etc. Multiple users will not be able to use the same hardware and also use multiple virtualization instances at the very same time. This is mostly used in the cloud-based infiastructure, Operating System Level At the level of the operating system, the virtualization model is capable of creating a layer that is abstract between the operating system and the application. This is an isolated container that is on the operating system and the physical server, which makes use of the software and hardware. Each of these then finctions in the form of a server. When there are several users, and no one wants to share the hardware, then this is where the vistualization level is used. Every user will get his virtual environment using ‘virtual hardware resource that is dedicated. In this way, there is no question of any conflict. Compiled by:-Naresh Prasad Das Page 6 ve ve ve Cloud Computing | Unit-2 4. Library Level > The operating system is cumbersome, and this is when the applications make use of the APT that is from the libraries at a user level, These APIs are documented well, and this is why the library virtualization level is preferred in these scenarios. APT hooks make it possible as it controls the link of communication from the application to the system. 5. Application Level > The application-level virtualization is used when there is a desire to virtualize only one application and is the last of the implementation levels of virtualization in cloud computing. One does not need to virtualize the entire environment of the platform. > This is generally used when you run virtual machines that use high-level languages. The application will sit above the virtualization layer, which in tum sits on the application program. } It lets the high-level language programs compiled to be used in the application level of the virtual machine rin seamlessly. 34° Server Virtualization > ‘Server Virtualization is the process of dividing a physical server into several virtual servers, called virtual private servers. Each virmal private server can man independently. > The concept of Server Virtualization widely used in the IT infrastructure to minimizes the costs by increasing the utilization of existing resources. > Server Virtualization is the partitioning of a physical server into a number of small virtual servers, each ‘unning its own operating system These operating systems are known as guest operating systems. These are nmning on another operating system known as the host operating system, Each guest running in this manner is unaware of any other guests rmmning on the same host. Different virtualization techniques are employed to achieve this transparency. 4 Types of Server virtualization : Hypervisor > In the Server Virtualization, Hypervisor plays an important role. Tt is a layer between the operating system (OS) and hardware. There are two types of hypervisor ‘© Type I hypervisor (also known as bare metal or native hypervisors) 0. Type 2 hypervisor (also known as hosted or Embedded hypervisors) > The hypervisor is mainly used to perform various tasks such as allocate physical hardware resources (CPU, RAM, etc) fo several smaller independent virtual machines, called "guest" on the host machine. > A Hypervisor or VMM(virtual machine monitor) is a layer that exists between the operating system and hardware. It provides the necessary services and features for the smooth running of multiple operating systems. > It identifies traps, responds to privileged CPU instructions, and handles queuing, dispatching, and retuming the hardware requests. A host operating system also rms on top of the hypervisor to administer and manage the virtual machines. Full Virtualization > Full, Virtualization uses a hypervisor to directly communicate with the CPU and physical server. It provides the best isolation and security mechanism to the virtual machines. > The biggest disadvantage of using hypervisor in full virtualization is that a hypervisor has its own processing needs, so it can slow down the application and server performance. > VMWare ESX server is the best example of full virtualization. > Advantages: © Nomodification to the Guest operating system is required. > Limitations © Complex Compiled by:-Naresh Prasad Das Page 7 Cloud Computing | Unit-2 ‘© Slower due to entulation (© Installation of the new device driver is difficult, HARDWARE ¥ Para Virtualization is quite similar to the Full Virtualization. The advantage of using this virtualization is that it is easier to use, Enhanced performance, and does not require enmilation overhead. Xen primarily and UML use the Para Virtualization The difference between full and pare virtualization is that, in para virtualization hypervisor does not need too nich processing power to manage the OS. It is based on Hypervisor. Much of the emulation and trapping overhead in software implemented virtualization is handled in this model. The guest operating system is modified and recompiled before installation into the virtual machine Due to the modification in the Guest operating system, performance is enhanced as the modified guest ‘operating system communicates directly with the hypervisor and emulation overhead is removed. Example: Xen primarily uses Paravirtualization, where a customized Limux environment is used to support the administrative environment known as domain 0. > Advantages: Easier © Enhanced Performance © No emulation overhead > Limitations (© Requires modification to a guest operating system > Operating system virtualization is also called as system-lever virtualization, It is a server virtualization technology that divides one operating system into multiple isolated user-space called virtual environments, The biggest advantage of using server visualization is that it reduces the use of physical space, so it will save money. y v v v > Linus OS Virtualization and Windows OS Virtualization are the types of Operating System virtualization. > FreeVPS, Open'VZ, and Limnx Vserver are some examples of System-Level Virtualization. Compiled by:-Naresh Prasad Das Page 8 Cloud Computing | Unit-2 ‘Runs multiple but logically distinct environments on a single instance of the operating system kernel. Also called shared kernel approach as all virtual machines share a common kernel of host operating system. Based on the change root concept “chroot”. chroot starts during bootup. The kemel uses root filesystems to load drivers and perform other early-stage system initialization tasks, It then switches to another root filesystem using chroot command to mount an ondisk file system as its final root filesystem and continue system initialization and configuration within that file system, The chroot mechanism of system-level virtualization is an extension of this concept. It enables the system to start virtual servers with their own set of processes that execute relative to their own filesystem root directories. ‘The main difference between system-level and server virtualization is whether different operating systems can be run on different virtual systems. If all virtual servers must share the same copy of the operating system it is system-level virtualization and if different servers can have different operating systems ( including different versions of a single operating system) it is server virtualization. Examples: FreeVPS, Linux Vserver, and OpenVZ are some examples. > Advantages: © Significantly lightweight than complete machines(including a kernel) Can host many more virtual servers Enhanced Security and isolation ‘Virtualizing an operating system usually has little to no overhead. Live migration is possible with OS Virtualization. It can also leverage dynamic container load balancing between nodes and clusters. On OS virtualization, the file-level copy-on-write (CoW) method is possible, making it easier to back up data, more space-efficient, and easier to cache than block-level copy-on-write schemes. > Limitations © Kemel or driver problems can take down all viral servers vl y y y v 000000 virtua rerun NACHINE NACHE SINGLE SHARED KERNEL HOST OPERATING SYSTEM HARDWARE > Hardware Assisted Virtualization was presented by AMD and Intel. It is also known as Hardware virtualization, AMD virtualization, and Intel virtualization. It is designed to increase the performance of the processor. The advantage of using Hardware Assisted Virtualization is that it requires less. hypervisor overhead. > Itis similar to Full Virtualization and Patavirtualization in terms of operation except that it requires hardware support. Much of the hypervisor overhead due to trapping and emulating /O operations and status instructions executed within a guest OS is dealt with by relying on the hardware extensions of the x86 architecture, > Unmodified OS can be nin as the hardware support for virtualization would be used to handle hardware access requests, privileged and protected operations, and to communicate with the virtual machine, Compiled by: jaresh Prasad Das Page 9 Cloud Computing | Unit-2 ® Examples: AMD — V Pacifica and Intel VT Vanderpool provide hardware support for virtualization. > Advantages © No modification to a guest operating system is required. ‘© Very less hypervisor overhiead > Limitations 0 Hardware support Required 6. Kernel-Level Virtualization > Kemel-level virtualization is one of the most important types of server virtualization. It is an, opensource virtualization which uses the Limos kernel as a hypervisor. > The advantage of using kemel virtualization is that it does not require any special administrative software and has very less overhead. } User Mode Linux (UML) and Kemel-based virtual machine are some examples of kernel virtualization, > Instead of using a hypervisor, it nuns a separate version of the Limax kemel and sees the associated virtual machine as a user-space process on the physical host. This makes it easy to ran multiple virtual machines on a single host. A device driver is used for communication between the main Linux kernel and the virtual machine, Processor support is required for virtualization (Intel VT or AMD — v). A slightly modified QEMU process is used as the display and execution containers for the virtual machines, In many ways, kernel-level virtualization is a specialized form of server virtualization. > Examples: User ~ Mode Linux( UML ) and Kernel Virtual Machine( KVM ) > Advantages ‘© No special administrative software is required. © Veryless overhead > Limitations o Hardware Support Required LUNUX KERNEL as HYPERVISOR HARDWARE 4 Advantages of Server Virtualization © Independent Restart In Server Virtualization, each server can restart independently and does not affect the working of other virtual servers. © Low Cost: Server Virtualization can divide a single server into multiple virtual private servers, so it reduces the cost of hardware components. Disaster Recovery: Disaster Recovery is one of the best advantages of Server Vistualization, In Server Virtualization, data can easily and quickly move from one server to another and these data can be stored and retrieved from anywhere Compiled by:-Naresh Prasad Das Page 10 Cloud Computing | Unit-2 ‘© Faster deployment of resources: Server virtualization allows us to deploy our resources in a simpler and faster way. © Security: It allows uses to store their sensitive data inside the data centers. Disadvantages of Server Virtualization © The biggest disadvantage of server virtualization is that when the server goes offline, all the websites that are hosted by the server will also go down, ‘There is no way to measure the performance of virtualized environments. It requires a huge amount of RAM consumption. It is difficult to set up and maintain. ‘Some core applications and databases are not supported virtualization, It requires extra hardware resources. Uses of Server Virtualization © Server Virtualization is used in the testing and development environment. © Itimproves the availability of servers. © Itallows organizations to make efficient use of resources. © Itreduces redundancy without purchasing additional hardware components. oo000 3.5 Hypervisor Management Software > Hypervisor management software, also known as virtualization management software, plays a critical role in cloud computing environments. It is responsible for overseeing and controlling the virtualization layer (the hypervisor) and the virtualized resources, such as virtual machines (VMs) or containers, in order to ensure efficient, secure, and scalable operation. Hypervisor Management: Hypervisor Installation and Configuration: Hypervisor management software helps install and configure hypervisors on physical servers. It can deploy. various types of hypervisors, such as VMware vSphere, ‘Microsoft Hyper-V, KVM, and Xen, depending on the specific requirements of the cloud infrastructure. Hypervisor Monitoring: It continuously monitors the health and performance of hypervisors, ensuring they are running optimally. This includes tracking CPU and memory usage, network traffic, and storage capacity. Resource Management: Resource Allocation: Hypervisor management software allocates CPU, memory, storage, and network resources to virtual machines and containers. It ensures that resources are distributed fairly and efficiently among multiple VMs. Dynamic Resource Scaling’ The software allows for dynamic resource scaling, automatically adjusting resource allocation based on the workloads and requirements of VMs ot containers. This ensures that applications can scale up or down as needed. Overcommitment: In some cases, the software supports overcommitment, where it assigns more virtual resources than are physically available, relying on statistical analysis to avoid resource contention, YM and Container Management: VM Lifecycle Management: Hypervisor management software assists in creating, cloning, starting, stopping, and deleting virtual machines, It provides tools for managing the entire VM lifecycle, including creating snapshots and templates. Container Orchestration: In environments that use containers, the software may provide container orchestration features, such as deploying containers, scaling them, and managing their networking and storage. Storage and Network Management: Storage Virtualization: It abstracts physical storage devices, creating a virtualized storage pool that can be dynamically allocated to VMs or containers. It may also manage features like storage snapshots, replication, and backup. Compiled by: jaresh Prasad Das Page 11 Cloud Computing | Unit-2 > Network Virtualization: Hypervisor management software can create virtual networks, configure network settings for VMs, and enforce network policies. Software-defined networking (SDN) may be integrated to provide advanced network management capabilities ‘Security and Isolation » Access Control: The software enforces access controls and permissions, ensuring that only authorized users or applications can access VMs, containers, or other virtualized resources, Isolation: It enforces strong isolation between VMs and containers, preventing interference or unauthorized access between different virtualized workloads. High Availability and Fault Tolerance: > High Availability (HA): Hypervisor management software often includes features for HA, allowing it to automatically restart VMs on healthy hosts in the event of a host failure. > Fault Tolerance (FT): Some software supports FT, where VMs are simultaneously active on two hosts, providing continuous service even in the event of a hardware failure. © Reporting and Analytics: » Performance Metrics: The software collects performance data, generates reports, and provides analytics that can help in optimizing resource allocation and capacity planning. > Cost Analysis: It may offer insights into resource costs, helping cloud administrators make informed decisions about resource usage and billing. ‘© Integration and APIs: Integration with Cloud Management Platforms: Hypervisor management software can integrate with higher~ level cloud management platforms, such as OpenStack or VMware vRealize, to enable a unified cloud management experience. > APIs and Automation: APIs allow for programmatic control of the virtualization environment, facilitating automation and orchestration of cloud resources. Hypervisor management software is a critical component of cloud infrastructure, cnabling efficient resource utilization, scalability, security, and high availability. Its role is to abstract the complexities of virtualization, providing a user-friendly interface for cloud administrators to manage virtualized resources and ensuring the seamless operation of cloud services. 3.6 Virtual Infrastructure > Virtual infrastructure is a collection of software-defined components that make up an enterprise IT environment, A virtual infrastructure provides the same IT capabilities as physical resources, but with software, so that IT teams can allocate these virtual resources quickly and across multiple systems, based on the varying needs of the enterprise. > By decoupling physical hardware from an operating system, a virtual infrastructure can help organizations achieve greater IT resource utilization, flexibility, scalability and cost savings. These benefits are especially helpful to small businesses that require reliable infrastructure but can’t afford to invest in costly physical hardware, ‘Virtual infrastructure components By separating physical hardware fiom operating systems, virtualization can provision compute, memory, storage and networking resources across multiple virtual machines (VMs) for greater application performance, increased cost savings and easier management. Despite variances in design and functionality, a virtual infrastructure typically consists of these key components: + Virtualized compute: This component offers the same capabilities as physical servers, but with the ability to be more efficient. Through virtualization, many operating systems and applications can run on a single physical server, whereas in traditional infrastructureservers were often underutilized. Virtual compute also makes newer technologies likecloud computing and containers possible ‘+ Virtualized storage: This component frees organizations from the constraints and limitations of hardware by combining pools of physical storage capacity into a single, more manageable repository. By connecting Compiled by: ve jaresh Prasad Das Page 12 Cloud Computing | Unit-2 + ve ve storage arrays to multiple servers using storage area networks, organizations can bolster their storage resources and gain more flexibility in provisioning them to virtual machines. ‘© Virtualized networking and security: This component decouple networking services ftom the underlying hardware and allows users to access network resources from a centralized management system. Key security features ensure a protected environment for virtual machines, including restricted access, virttal machine isolation and user provisioning measures. ‘Management solution: This component provides a user-friendly console for configuring, managing and provisioning virtualized IT infrastructure, as well automating processes. A management solution allows IT teams to migrate virtual machines from one physical serverto another without delays or downtime, ‘while enabling high availability for applications running in virtual machines, disaster recovery and bac! up administration. Benefits of virtual infrastructure The benefits of virtualization touch every aspect of an TT infrastructure, from storage and server systems to networking tools. Here are some key benefits of a virtual infiastructure: Cost savings: By consolidating servers, virtualization reduces capital and operating costs associated with variables such as electrical power, physical security, hosting and server development. Scalability: A virtual infiastructure allows organizations to react quickly to changing customer demands and market trends by ramping up on CPU utilization or scaling back accordingly. Increased productivity: Faster provisioning of applications and resources allows IT teams to respond more quickly to employee demands for new tools and technologies. The result: increased productivity, efficiency and agility for IT teams, and an enhanced employee experience and increased talent retention rates without hardware procurement delays. Simplified server management: From seasonal spikes in consumer demand to unexpected economic downtums, organizations need to respond quickly. Simplified server management makes sure IT teams can spin up, or down, viral machines when required and re-provision resources based on real-time needs Furthermore, many management consoles offer dashboards, automated alerts and reports so that IT teams can respond immediately to server performance issues. Virtual infrastructure requirements From design to disaster recovery, there are certain virtual infrastnicture requirements organizations must meet to reap long-term value from their investment. Plan ahead: When designing a virtual infrastructure, IT teams should consider how business growth, market Anetuations and advancements in technology might impact their hardware requirements and reliance on compute, networking and storage resources, Look for ways to cut costs: IT infiastructure costs can become unwieldy if IT teams don’t take the time to continuously examine a virtual infrastructure and its deliverables. Cost-cutting initiatives may range from replacing old servers and renegotiating vendor agreements to automating time-consuming server management tasks, Prepare for failure: Despite its failover hardware and high availability, even the most resilient virtual infrastructure can experience downtime. IT teams should prepare for worst-case scenarios by taking advantage of monitoring tools, purchasing extra hardware and relying on clusters to better manage host resources. Virtual infrastructure architecture A. virtual infrastructure architecture can help organizations transform and manage their TT system infrastructure through virtualization. But it requires the right building blocks to deliver results. These include: Host: A virtualization layer that manages resources and other services for virtual machines. Virtual machines run on these individual hosts, which continuously perform monitoring and management activities in the background, Multiple hosts can be grouped together to work on the same network and storage subsystems, culminating in combined computing and memory resources to form a cluster. Machines can be dynamically added or removed from a cluster. Compiled by:-Naresh Prasad Das Page 13 Cloud Computing | Unit-2 ‘© Hypervisor: A software layer that enables one host computer to simultaneously support multiple virtual operating systems, also known as virtual machines. By sharing the same physical computing resources, such as memory, processing and storage, the hypervisor stretches available resources and improves IT flexibility. ‘* Virtual machine: These software-defined computers encompass operating systems, software programs and documents. Managed by a virtual infrastructure, each virtual machine has its own operating system called a guest operating system. The key advantage of virtual machines is that IT teams can provision them faster and ‘more easily than physical machines without the need for hardware procurement. Better yet, IT teams can easily deploy and suspend a virtual machine, and control access privileges, for greater security. These privileges are based on policies set by a system administrator. ‘¢ User interface: This front-end element means administrators can view and manage virtual infrastructure components by connecting directly to the server host or through a browserbased interface Compiled by:-Naresh Prasad Das Page 14

You might also like