Unit-5 Cloud Computing
Unit-5 Cloud Computing
Host Machine: The machine on which the virtual machine is going to be built is known as Host Machine.
Guest Machine: The virtual machine is referred to as a Guest Machine.
Work of Virtualization in Cloud Computing
Virtualization has a prominent impact on Cloud Computing. In the case of cloud computing, users store data in
the cloud, but with the help of Virtualization, users have the extra benefit of sharing the infrastructure. Cloud
Vendors take care of the required physical resources, but these cloud providers charge a huge amount for these
services which impacts every user or organization. Virtualization helps Users or Organisations in maintaining
those services which are required by a company through external (third-party) people, which helps in reducing
costs to the company. This is the way through which Virtualization works in Cloud Computing.
Benefits of Virtualization
More flexible and efficient allocation of resources.
Enhance development productivity.
It lowers the cost of IT infrastructure.
Remote access and rapid scalability.
High availability and disaster recovery.
1
Pay peruse of the IT infrastructure on demand.
Enables running multiple operating systems.
Drawback of Virtualization
High Initial Investment: Clouds have a very high initial investment, but it is also true that it will help in
reducing the cost of companies.
Learning New Infrastructure: As the companies shifted from Servers to Cloud, it requires highly skilled
staff who have skills to work with the cloud easily, and for this, you have to hire new staff or provide
training to current staff.
Risk of Data: Hosting data on third-party resources can lead to putting the data at risk, it has the chance of
getting attacked by any hacker or cracker very easily.
For more benefits and drawbacks, you can refer to the Pros and Cons of Virtualization.
Characteristics of Virtualization
Increased Security: The ability to control the execution of a guest program in a completely transparent
manner opens new possibilities for delivering a secure, controlled execution environment. All the operations
of the guest programs are generally performed against the virtual machine, which then translates and applies
them to the host programs.
Managed Execution: In particular, sharing, aggregation, emulation, and isolation are the most relevant
features.
Sharing: Virtualization allows the creation of a separate computing environment within the same host.
Aggregation: It is possible to share physical resources among several guests, but virtualization also allows
aggregation, which is the opposite process.
Types of Virtualization
1. Application Virtualization
2. Network Virtualization
3. Desktop Virtualization
4. Storage Virtualization
5. Server Virtualization
6. Data virtualization
1. Application Virtualization: Application virtualization helps a user to have remote access to an application
from a server. The server stores all personal information and other characteristics of the application but can still
run on a local workstation through the internet. An example of this would be a user who needs to run two
different versions of the same software. Technologies that use application virtualization are hosted applications
and packaged applications.
2. Network Virtualization: The ability to run multiple virtual networks with each having a separate control and
data plan. It co-exists together on top of one physical network. It can be managed by individual parties that are
potentially confidential to each other. Network virtualization provides a facility to create and provision virtual
2
networks, logical switches, routers, firewalls, load balancers, Virtual Private Networks (VPN), and workload
security within days or even weeks.
Server Virtualization
6. Data Virtualization: This is the kind of virtualization in which the data is collected from various sources and
managed at a single place without knowing more about the technical information like how data is collected,
stored & formatted then arranged that data logically so that its virtual view can be accessed by its interested
people and stakeholders, and users through the various cloud services remotely. Many big giant companies are
providing their services like Oracle, IBM, At scale, Cdata, etc.
Uses of Virtualization
Data-integration
Business-integration
Service-oriented architecture data-services
3
Searching organizational data
The different logical layers of operating system-based virtualization, in which the VM is first installed
into a full host operating system and subsequently used to generate virtual machines.
An abstract execution environment in terms of computer hardware in which guest OS can be run,
referred to as Hardware-level virtualization. In this, an operating system represents the guest, the
physical computer hardware represents a host, its emulation represents a virtual machine, and the
hypervisor represents the Virtual Machine Manager. When the virtual machines are allowed to interact
with hardware without any intermediary action requirement from the host operating system generally
makes hardware-based virtualization more efficient. A fundamental component of hardware
virtualization is the hypervisor, or virtual machine manager (VMM).
Basically, there are two types of Hypervisors which are described below:
Type-I hypervisors:
Hypervisors of type I run directly on top of the hardware. As a result, they stand in for operating systems
and communicate directly with the ISA interface offered by the underlying hardware, which they replicate
to allow guest operating systems to be managed. Because it runs natively on hardware, this sort of
hypervisor is also known as a native virtual machine.
Type-II hypervisors:
4
To deliver virtualization services, Type II hypervisors require the assistance of an operating system. This
means they’re operating system-managed applications that communicate with it via the ABI and simulate
the ISA of virtual hardware for guest operating systems. Because it is housed within an operating system,
this form of hypervisor is also known as a hosted virtual machine.
Isolation: Hardware-based virtualization provides strong isolation between virtual machines, which means that
any problems in one virtual machine will not affect other virtual machines running on the same physical host.
Security: Hardware-based virtualization provides a high level of security as each virtual machine is isolated
from the host operating system and other virtual machines, making it difficult for malicious code to spread from
one virtual machine to another.
Performance: Hardware-based virtualization provides good performance as the hypervisor has direct access to
the physical hardware, which means that virtual machines can achieve close to native performance.
Resource allocation: Hardware-based virtualization allows for flexible allocation of hardware resources such
as CPU, memory, and I/O bandwidth to virtual machines.
Snapshot and migration: Hardware-based virtualization allows for the creation of snapshots, which can be
used for backup and recovery purposes. It also allows for live migration of virtual machines between physical
hosts, which can be used for load balancing and other purposes.
Support for multiple operating systems: Hardware-based virtualization supports multiple operating systems,
which allows for the consolidation of workloads onto fewer physical machines, reducing hardware and
maintenance costs.
Compatibility: Hardware-based virtualization is compatible with most modern operating systems, making it
easy to integrate into existing IT infrastructure.
It reduces the maintenance overhead of paravirtualization as it reduces (ideally, eliminates) the modification in
the guest operating system. It is also significantly convenient to attain enhanced performance. A practical
benefit of hardware-based virtualization has been mentioned by VMware engineers and Virtual Iron.
Disadvantages of hardware-based virtualization –
Hardware-based virtualization requires explicit support in the host CPU, which may not available on all
x86/x86_64 processors. A “pure” hardware-based virtualization approach, including the entire unmodified guest
operating system, involves many VM traps, and thus a rapid increase in CPU overhead occurs which limits the
scalability and efficiency of server consolidation. This performance hit can be mitigated by the use of para-
virtualized drivers; the combination has been called “hybrid virtualization”.
Software Virtualization
5
Software Virtualization. The software virtualizations are basically used to emulate a complete computer
system and it further allows the operating system to run.
Some of the examples are VMware software, Virtual Box etc. Like, Hardware Virtualization, here we
will discuss advantages, working and types of software virtualization.
Software Visualization in Cloud Computing allows the single computer server to run one or more
virtual environments. It is quite similar to virtualizations but here it abstracts the software installation
procedure and creates a virtual software out of it.
In software virtualizations, an application will be installed which will perform the further task. One
software is physical while others are virtual as it allows 2 or more operating system using only one
computer.
Testing:-It is easier to test the new operating system and software on VMs as it does not require any additional
hardware and the testing can do within the same software. After the testing, the VM can move or delete for the
further testing.
Utilization:-In software virtualization, there is higher efficiency in resource utilization if it tunes correctly. The VM
can modify as per the requirement such as the user can modify ram, drive space, etc. It requires very less amount of
hardware as compared to the equivalent number of physical machines.
Efficient:-It is efficient in a way such that it can run 12 virtual machines and eliminates the use of 12 physical
boxes. This is the power cost as well as the cost of maintaining the server.
Less Downtime:-The software is upgrading and the upgrade in the VMs can do when the VM is working. VM can
modify when it is working or it is not working which means that the downtime of it is very less.
Flexible:-It provides flexibility to the user so that the user can modify the software as per their demand. The
modification can do within minutes and can adjust easily when the workload changes.
Secure: -It can protect with many hantaviruses. Moreover, there are several firewalls which prevent hacking and
virus. The data in the software virtualization is safe as it stores in several different places so if the disaster takes place
the data can retrieve easily.
With the help of software virtualization, the entire operating system or server installation can be backed up.
This also benefits in a way that if the new server hack just restoring the previous version will allow running the
server.
6
ii. Run multiple operating systems
The different operating system can use in a single computer with the partition in the hard drive. The only thing
to keep in mind is to keep a snapshot of everything. If the data drowns, it can retrieve from some other place.
With the help of software virtualization new as well as the old operating system can use. So a program, if it is
not working on a particular operating system, we can check it on another one.
iv. Templates
After the configuration of VM as per the demand, it can convert into a template and this template can use to
make multiple copies of the original one.
In operating system virtualization, the hardware is used which consists of software on which different operating
systems work. Here, the operating system does not interfere with each other so that each one of them works
efficiently.
Application virtualization is a technology, encapsulates the computer program within the operating system. It
can say that application virtualizations refer to running an application on a thin client.
This thin client runs an environment, which is different from what refer to as encapsulating from the operating
system which is the location of it.
In the service virtualization, the DevOps team can use the virtual servers rather than the physical one. It
emulates the behavior of essential components which will be present in the final production
environment.
With the help of service virtualization, the complex application can go through testing much earlier in
the development process. It can say that service visualization is a technique to simulate the behavior of
some components in a mixture of component-based applications
7
Advantages of Software Virtualization
1) Client Deployments Become Easier: Copying a file to a workstation or linking a file in a network then we can
easily install virtual software.
2) Easy to manage: To manage updates becomes a simpler task. You need to update at one place and deploy the
updated virtual application to the all clients.
3) Software Migration: Without software virtualization, moving from one software platform to another platform
takes much time for deploying and impact on end user systems. With the help of virtualized software environment
the migration becomes easier.
Memory virtualization is like having a super smart organizer for your computer brain (Running
Memory -RAM). Imagine your computer brain is like a big bookshelf, and all the apps and
programs you installed or are running are like books.
Memory virtualization is the librarian who arranges these books so your computer can easily find
and use them quickly. It also ensures that each application gets a fair share of the memory to run
smoothly and prevents mess, which ultimately makes your computer brain (RAM) more organized
(tidy) and efficient.
In technical language, memory virtualization is a technique that abstracts, manages, and optimizes
physical memory (RAM) used in computer systems. It creates a layer of abstraction between the
RAM and the software running on your computer. This layer enables efficient memory allocation
to different processes, programs, and virtual machines.
Memory virtualization helps optimize resource utilization and secures the smooth operations of
multiple applications on shared physical memory (RAM) by ensuring each application gets the
required memory to work flawlessly.
Memory virtualization also decouples the volatile RAM (Temporary memory) from various
individual systems and aggregates that data into a virtualized memory pool available to any system
in the cluster. The distributed memory pool will be used as a high-speed cache, messaging layer,
and shared memory for the CPU to increase system performance and efficiency.
Basically, memory virtualization helps our computer systems to work fast and smoothly. It also
provides sufficient memory for all apps and programs to run seamlessly.
Memory virtualization, a personal computer assistant, ensures everything stays organized and
works properly, which is very important for the efficient working of our computers and
8
smartphones. Whether browsing the web, working on Google documents, or using complex
software, memory virtualization is the hero that provides us with a smooth and responsive
computing experience in our daily lives.
Memory virtualization is essential for modern computing, especially in cloud computing, where
multiple users and applications share the same physical hardware (Like RAM and System).
It helps in efficient memory management and allocation, isolation between applications (by
providing the required share of memory), and dynamic adjustment based on the running workloads
of various applications. Without memory virtualization, it would be challenging to run multiple
applications at the same time.
Applications you may have heard about! This critical technology enables more efficient and
flexible use of computing resources at both complex data centers and personal device levels.
Memory virtualization is integral to personal computers, mobile devices, web hosting, app hosting,
cloud computing, and data center operations.
You may be thinking all that is fine, but how does memory virtualization work in cloud computing? It’s
just part of the broader concept of resource virtualization, which includes internet, storage, network, and
many other virtualization techniques. When memory virtualization takes place in cloud infrastructure, it
goes through a process.
Like virtual memory (Hard Drive) abstracts physical memory (RAM/Cache Memory) in traditional
computing, similarly, memory virtualization in cloud computing abstracts the physical memory
(RAM – Running Memory) of various Virtual Machines (VMs) to create a pool of resources to
allocate to a group of VMs.
For this abstraction of physical memory, Cloud service providers use a hypervisor known as a
Virtual Machine Monitor (VMM) that abstracts and manages VM memory in cloud Computing.
9
This abstraction process allows cloud users (VMs) to request and consume memory without
worrying about the storage limit. It allows users to scale their memory resources as required
without concern for the underlying physical memory.
2. Resource Pooling
In cloud computing, there is a Cloud Data Center where multiple physical servers host various
Virtual Machines (VMs) and manage their dynamic workloads. Memory virtualization pools the
memory resources (storage) from the data center to create a shared resource pool (Virtual
Memory).
This pool can be allocated to different VMs and cloud users per their dynamic needs and workloa d
3. Dynamic Allocation
Cloud service providers use memory virtualization to allocate virtual memory to VMs and Cloud
users instantly on demand (According to Workload). It means cloud memory can be dynamically
assigned and reassigned based on the fluctuating workload.
This elasticity of cloud computing enables effective use of available resources, and cloud users can
scale up or down their cloud memory as needed.
Memory virtualization ensures that the virtual memory allocated to one cloud user or VM is
isolated from others. This isolation is vital for data security and prevents one individual from
accessing another’s data or memory.
That’s why many sensitive IT companies prefer to purchase private cloud services to prevent
hacking and data breaches.
Memory Virtualization plays a critical role in cloud computing for several reasons. It contributes to cloud
services’ efficiency, scalability, effective resource utilization, and cost-effectiveness.
Here are some of the key points that show the importance of memory virtualization in cloud
computing:
1. Memory virtualization allows cloud providers to use physical memory resources in the most efficient
way. Overcommitting of memory allows the optimization of memory resources and hardware.
10
2. This virtualization enables the dynamic allocation of cloud memory to cloud user instances. This
elasticity is crucial in cloud computing to manage varying workloads. It allows cloud users to scale up and
down memory resources as needed and promotes flexibility and cost savings.
3. Allocating separate cloud memory for every single user prevents unauthorized access and is a must for
data security.
4. Memory virtualization is vital for handling a large number of users and workloads. It ensures that
scaling up or down memory can be done without manual intervention whenever a VM is required.
5. Migration and live migration are important for load balancing, hardware maintenance, and disaster
recovery in cloud computing. Transferring VM memory from one host to another is only possible by live
migration and feasible when memory is virtualized.
6. By optimizing virtual memory usage, memory virtualization maximizes physical memory utilization
and helps reduce the overall operational cost of the cloud.
The future of memory virtualization in cloud computing holds significant promise as cloud technology
continues to evolve and become more integral to our digital world. Several trends and developments are
likely to shape the future of memory virtualization:
In upcoming years, cloud workloads will become more diverse and intense, which will require efficient
memory management. Memory virtualization will play a crucial role in optimizing memory allocation and
achieving higher performance.
Data breaches and hacking threats are rising daily, and countries concerned about data security and
privacy around the globe make this more vulnerable. So, it will be essential for cloud providers to offer
improved isolation and security features in cloud computing.
Memory virtualization will play a key role in data security, where multiple cloud users share the same
cloud storage.
Memory virtualization will be used to support AI and machine learning workloads that require huge
storage capacity, like ChatGPT, Bard, and AI-powered automation applications. It’s used in memory
allocation and storage utilization to enhance user experience.
11
Quantum Computing Solutions
With the advancement of quantum computing, memory virtualization will adapt to unique memory
requirements in complex quantum algorithms and programs. That’s why several companies are working on
specialized memory management solutions based on memory virtualization for quantum computing.
We all know that blockchain is a futuristic technology adopted by every sector, from banking to healthcare
to IoT. Memory virtualization will be used to manage blockchain networks and decentralized
applications.
Most nations are currently focusing on effective energy utilization and high efficiency. This led to the
development of memory virtualization solutions that minimize energy consumption. Big data centers and
cloud infrastructure companies currently use this technology to minimize energy consumption.
Memory virtualization will be used in various other sectors in upcoming years, such as edge computing
expansion, custom memory allocation, distributed cloud architecture, and serverless computing.
Data Virtualization
Data virtualization is the process of retrieve data from various resources without knowing its type and physical
location where it is stored. It collects heterogeneous data from different resources and allows data users across
the organization to access this data according to their work requirements. This heterogeneous data can be
accessed using any application such as web portals, web services, E-commerce, Software as a Service (SaaS),
and mobile application.
We can use Data Virtualization in the field of data integration, business intelligence, and cloud computing.
o It allows users to access the data without worrying about where it resides on the memory.
o It offers better customer satisfaction, retention, and revenue growth.
o It provides various security mechanism that allows users to safely store their personal and professional
information.
o It reduces costs by removing data replication.
12
o It provides a user-friendly interface to develop customized views.
o It provides various simple and fast deployment resources.
o It increases business user efficiency by providing data in real-time.
o It is used to perform tasks such as data integration, business integration, Service-Oriented Architecture
(SOA) data services, and enterprise search.
1. Analyze performance:-Data virtualization is used to analyze the performance of the organization compared to
previous years.
2. Search and discover interrelated data:-Data Virtualization (DV) provides a mechanism to easily search the
data which is similar and internally related to each other.
3. Agile Business Intelligence:-It is one of the most common uses of Data Virtualization. It is used in agile
reporting, real-time dashboards that require timely aggregation, analyze and present the relevant data from
multiple resources. Both individuals and managers use this to monitor performance, which helps to make daily
operational decision processes such as sales, support, finance, logistics, legal, and compliance.
4. Data Management:-Data virtualization provides a secure centralized layer to search, discover, and govern the
unified data and its relationships.
1. Red Hat JBoss data virtualization: Red Hat virtualization is the best choice for developers and those who are
using micro services and containers. It is written in Java.
2. TIBCO data virtualization: TIBCO helps administrators and users to create a data virtualization platform for
accessing the multiple data sources and data sets. It provides a builtin transformation engine to combine non-
relational and un-structured data sources.
3. Oracle data service integrator :It is a very popular and powerful data integrator tool which is mainly
worked with Oracle products. It allows organizations to quickly develop and manage data services to access a
single view of data.
4. SAS Federation Server: SAS Federation Server provides various technologies such as scalable, multi-user,
and standards-based data access to access data from multiple data services. It mainly focuses on securing data.
13
5. Denodo: Denodo is one of the best data virtualization tools which allows organizations to minimize the
network traffic load and improve response time for large data sets. It is suitable for both small as well as large
organizations.
o Communication & Technology: In Communication & Technology industry, data virtualization is used
to increase revenue per customer, create a real-time ODS for marketing, manage customers, improve
customer insights, and optimize customer care, etc.
o Finance: In the field of finance, DV is used to improve trade reconciliation, empowering data
democracy, addressing data complexity, and managing fixed-risk income.
o Government: In the government sector, DV is used for protecting the environment.
o Healthcare
Data virtualization plays a very important role in the field of healthcare. In healthcare, DV helps to
improve patient care, drive new product innovation, accelerating M&A synergies, and provide a more
efficient claims analysis.
o Manufacturing
In manufacturing industry, data virtualization is used to optimize a global supply chain, optimize
factories, and improve IT assets utilization.
14
It restricts management traffic.
It enforces routing for communication between virtual networks.
Network Virtualization in Virtual Data Center :
1. Physical Network
Physical components: Network adapters, switches, bridges, repeaters, routers and hubs.
Grants connectivity among physical servers running a hypervisor, between physical servers and storage
systems and between physical servers and clients.
2. VM Network
Consists of virtual switches.
Provides connectivity to hypervisor kernel.
Connects to the physical network.
Security Recommendations
1. Install Anti-Virus Software: While MIT does its best to prevent virus attacks, no computer is immune
to them. Anti-virus software needs to be installed separately on the Virtual Machine, even if virus
protection is already installed on the Macintosh operating system itself. For more information about
virus protection, distributed by MIT at no cost. Sophos, the software distributed and supported by IS&T,
includes protection against viruses, Trojans, worms and spyware, as well as adware.
2. While virus protection software offers some protection from spyware, we recommend using Windows
Defender on your Windows virtual machines for additional protection. Defender is included with
Windows. To find it, click on the Start button and type "Defender" in the search box.
3. Choose Strong Passwords: Weak passwords can be guessed, thus giving someone else access to your
files and your system. Create passwords that are at least eight characters long, containing numbers,
upper and lower case letters, and symbols. More information on creating strong passwords can be found
at Strong Passwords
16
4. Keep your Operating Systems Updated: It is equally important to keep your host and virtual operating
systems updated as compromises can occur in either kind of system. Install operating system security
updates to keep your system current and protected from known vulnerabilities. We strongly recommend
utilizing automatic updates, but note that virtual systems can only take updates when they are running. If
your virtual system has not been started in some time (or is rarely left running long enough to take an
update), we recommend you run a manual update as soon as you start your virtual system. For more
information, see: MIT Windows Automatic Update Service, Red Hat Network.
5. Maintain Like Risk Postures for All Machines (Virtual and Host)Your system is only as secure as
the least secure virtual or host machine. All guests on a host machine should have like risk posture -
same level of accessibility, data sensitivity and level of protection. If any guest is more vulnerable than
other guests or your host, it could be an entry to compromise the rest of your system.
6. Limit Host Access: Access to the host should be limited (firewalled off).
7. Snapshots of Virtual Machines :When taking a snapshot of a virtual machine and then branching off,
make sure to save the image at the instance before the branch (the trunk) rather than at the branch level
to ensure security patches are most up to date.
What is VMware?
17
VMware is a cloud computing and virtualization startup formed in 1998 that has played a significant
role in transforming the way hardware configurations power workloads and support designs.
VMware virtualization essentially replaces certain pieces of hardware with VMware workstation that
performs functions of conventional physical servers and PCs performed previously in the virtualization
era.
The VMware cloud takes advantage of this transition from one virtualization era to the other with its
products and services.
These VMware resources may be split over several virtual servers that act much like a single physical
machine in the appropriate configurations – for example, storing data, developing and distributing
programs, maintaining a workspace, and much more.
Each VMware workstation may run its own operating system and behave in the way that it has been
commanded to.
Using the vCenter software, all of this can be managed from a single administrator website.
VMware for Desktops is available for Windows, macOS, and Linux whereas the enterprise option,
vSphere requires no underlying operating system and runs directly on the hardware and is maintained
remotely.
VMware is a computer software program that allows you to install a virtual operating system within any
operating system.
If you are familiar with the Windows operating system and now need to use another operating system,
say, Linux, you may be hesitant to uninstall Windows and install Linux on your system.
In such a case, one can use VMware on your Windows PC and add a virtual Linux operating system to
gain experience with Linux without actually installing it.
The VMware hypervisor work performs the role of partitioning, or more particularly, abstracting and
separating these various operating systems and applications from the underlying computer hardware
when utilizing the VMware software.
18
It means that the underlying hardware (known as the host computer) may function and run one or more
virtual computers independently (known as VMware guest machines).
The hypervisor work also aids in the management of these distinct virtual machines by allocating
hardware resources such as memory allocation, CPU use, network bandwidth, and so on.
Hypervisor work accomplishes this by assembling pools of abstracted hardware resources and allocating
them to VMware Virtual Machines.
When a user requests it, it may also stop and start virtual computers.
VMware has several advantages that can be seen in the various products it offers.
These products and services help enhance security and networking, VMware cloud storage, and many other
areas.
One of the main advantages of VMware is the ability to access the desktop from any location we want
while using VMware.
As a result, we do not need a full desktop configuration at work because we can manage and operate
Windows desktops from the VMware cloud using VMware Horizon.
This eliminates a number of things such as the need to create and administer a whole desktop at work.
VMware also makes monitoring and controlling the user security less necessary and centralizes
management.
This works well with two more VMware products, VMware Dynamic Environment Manager and
VMware App Volumes which help us in controlling the Windows desktop and delivering applications.
If one is residing in the USA and wishes to work from VMware Singapore office, it can be done with the
help of VMware.
19
2. Deliver a Personal Desktop
The VMware virtualization layer enables direct management and operation of a virtual machine on a
single Linux, Windows, or even laptop.
VMware virtual machines have their own operating systems, like Linux or Windows.
This allows us to run Windows on a Linux computer and vice versa without having to worry about the
installed operating system.
Administrators can operate a virtual machine inside another machine using the VMware Workstation
product.
Such a feature is also available for Mac computers – the VM Fusion module of VMware helps to do so.
The vSAN product from VMware is another one that aids in storage and availability.
It gives us software-based storage but is coupled with another VMware product called vSphere.
The VMware vSAN pools disk storage from several ESXi and makes it available via smart policies.
Additionally, when it is coupled with vSphere availability, it enables provision of more storage and
computing power.
Disaster recovery is one of the advantages of VMware and it comes with it the Site Recovery Manager
to assist us in establishing a recovery plan that will be carried out automatically in the event of a failure.
In order to maintain and protect the network and security of the relocated VMware, this solution was
further integrated with NSX.
A private cloud is used by large organizations, but if you are a SME or a startup, public cloud services
like VMware are suitable for your company.
When it comes to private cloud vs public cloud, VMware is more affordable than private cloud because
you don’t have to manage any servers and all the infrastructure.
20
The VMware cloud product vSphere, which is used for infrastructure, offers the following features:
vMotion
ESXi
vCenter Server
vSphere Client
VMware offers a range of software and hardware components that may be used for a number of benefits.
VMware provides a solution in a number of areas, including networking, storage, and security.
What is KVM?
A Kernel-based Virtual Machine (KVM) allows you to turn Linux or Windows Server into a hypervisor,
allowing your operating system to produce multiple virtual machines and isolated virtual environments. This
provides users with a straightforward experience of smooth integration. Although KVM is not limited to only
virtualization technologies, KVM benefits would include the following:
1. Performance
2. Security
3. Storage
4. Hardware Support
5. Memory Management
6. Live Migration
7. Scheduling and Resource Control
8. Lower Latency and Higher Prioritization
We will cover each of the KVM features shown to visualize better why we encourage using a Linux Kernel
Based Virtual Machine to optimize all operating systems.
21
To understand a KVM Linux function, you must first understand virtualization and the differences
between hypervisor types. Virtualization, in simple terms, means one or more full guest operating systems can
operate on a single host server. The hardware virtualization provided to guest systems can be either emulated by
software or controlled by a hypervisor allocated to natural hardware resources.
Full Virtualization. Full virtualization is when the hardware is wholly emulated on the software. No
further interaction with real hardware is needed.
Para-Virtualization. The guest system requires specifically designed drivers as it directly interacts with
the hypervisor.
Hardware-Assisted Para-Virtualization. The hardware support is already integrated within the processor.
Although this reduces customization, it increases the efficiency of the guest systems. Most Intel and
AMD processors include this functionality, although you may need to activate it within the BIOS/UEFI.
Large vending companies such as Red Hat Enterprise Linux, an associated company that runs KVM, are the
most prominent groups to use this feature. This is one reason we use a Kernel Based Virtual Machine (other
than its features). KVM is the only hypervisor for all Red Hats virtualization products.
Besides Red Hat, companies like IBM, Canonical, and Google rely on KVM-based technology for many
virtualization products. For this, KVM is the staple and main virtual machine that enables IT administrators to
execute multiple OSes on the same hardware.
The hypervisor is a management or translation layer between natural and virtual hardware resources. Depending
on the type of virtualization solution, it is necessary to translate all requirements of the natural hardware.
22
The two types of hypervisors are:
Type-1 (Bare Metal Hypervisor): Type-1 runs directly on the hardware without being included in an
operating system.
Type-2 (Hosted Hypervisor): This type is embedded into the operating system, where it is enabled.
Remember, Linux KVM is a type-1 hypervisor and uses hardware-Assisted Para-Virtualization, although
uniquely integrated into the kernel module.
Using the KVM Hypervisor with Linux can involve many features, including security and high performance
within the virtualization infrastructure. Let's examine the characteristics and why they are better than traditional
virtualization solutions.
Performance: With the inherited performance of Linux, KVM performs scaling to match the demand load of
the guest operating systems and requests as they are increased. As a result, KVM is the basis of many enterprise
virtualization setups, allowing the highest demanding applications workloads to be virtualized.
Since KVM is a type-1 Hypervisor, it outperforms most traditional virtualization technologies, typically a type-
2 Hypervisor. This ensures near-metal performance, allowing KVM's hypervisor VM's boot fast and achieve
desired performance results.
Security :KVM operates two security systems with a combination of SELinux (Security-Enhanced Linux) and
sVirt (Secure Virtualization) to ensure the highest security and isolation for VMs. While SELinux contributes to
establishing security around VMs, sVirt extends SELinux's abilities. The extension of SELinux's protection
allows MAC (Mandatory Access Control) security to be applied to guest Virtual Machines, preventing manual
labeling errors.
Storage: Provided by Linux, KVM can use any provided supported storage. Storage like local disks or NAS
(Network Attached Storage) is typically the most supported by Linux for KVM use. This overall provides an
improved storage space providing redundancy for maximized use. KVM also provides shared file images,
ultimately giving shared VM images to multiple hosts. We are using 3-way storage, meaning a copy of your
storage is always available on two other servers.
23
Hardware Support
Since hardware vendors constantly contribute to hardware development and hardware virtualization for kernel
development, KVM can use various certified Linux-supported and Windows-supported hardware platforms.
The latest features are always being rapidly adopted into the Linux kernel.
Memory Management
As Linux also provides memory management features, KVM has inherited these features, including non-
uniform memory access. Virtual Machines memory has the potential to be swapped, being backed by large
volumes which produce overall higher performance. This is also shared or backed by a disk file.
Live Migration
KVM supports live migration, allowing a running Virtual Machine to be relocated between the physical hosts
without interrupting the service. With the VM remaining online and the network connection consistently active,
applications will continue to run while the VM is relocating. Another plus that KVM provides is the ability to
save the VMs state and resume/store the information for later if needed.
Virtual Machines are a Linux process scheduled and managed by the Linux kernel within the KVM model. This
scheduler allows well-organized and fine-grained control of the resources allocated within the Linux process
guaranteeing quality within the particular process. KVM includes a fair scheduler, control group, network
namespaces, and real-time extensions.
The Linux Kernel, as mentioned before, provides real-time extensions that allow VM-based apps to run at a
lower latency and higher prioritization. In addition, the kernel module also provides divided processes that
require long computing times within smaller components.
There are a few popular KVM manager options to manage and facilitate VMs and provide an essential graphical
user interface. Management software for KVMs can be beneficial, and below we will provide some of the best
managing platforms for your ultimate experience.
Virtual Machine Manager. A desktop interface for managing KVM VMs directly.
Multipass. Mainly used by developers, this is the most recommended platform for using Ubuntu VMs.
Multipass installs on Linux, Windows, and MacOS.
OpenStack. The most popular cloud computing that enables the management of distributed computing,
network, and storage resources.
24
Not only do management platforms help make a greater efficiency in your KVMs, but we purposely provide
these services so your business can successfully run smoothly and streamline operations
Virtualized Security
The co-resident attack is a severe security threat in cloud infrastructure. Tenant virtual machines (VMs) security
in cloud computing can be assigned on the same host using virtualization technology supplied by Cloud Service
Provider. A multi-tenant environment allows hostile renters to undertake a co-resident attack and steal
information from other tenants via side channels. Organizations focus on eliminating side channels to prevent
this type of attack.
Virtualized security, often known as security virtualization, refers to software-based security solutions
designed to operate in a virtualized IT environment. This is in contrast to traditional, hardware-based network
security, which is static and operates on devices such as firewalls, routers, and switches.
Unlike hardware-based security, virtualized security is adaptable and dynamic. Instead of being connected to a
specific device, it can be installed anywhere on the network and is frequently cloud-based. This is critical for
virtual machine security in cloud computing, where operators constantly spin up workloads and applications;
virtualized security allows security services and functions to move around with those dynamically produced
workloads. These are the points that must be followed to make VM secured.
Protecting the guest operating systems To keep your guest operating system safe, ensure it has the most
recent patches and, if necessary, anti-spyware and anti-malware software. Examine the documentation
provided by your guest operating system provider, as well as any other material accessible in books or on
the Internet about that operating system.
Use templates and scripted management Virtual machine templates allow you to configure the operating
system to match your needs and then build more VMs with the same parameters. Consider using scripts
like PowerCLI to alter virtual machine parameters after the first deployment. This guide explains how to
use the GUI to execute tasks. To keep your environment consistent, consider using scripts instead of the
GUI. To optimize scripting in large environments, virtual machines can be organized into folders.
Consider UEFI secure boot. You may set up your virtual computer to boot from UEFI. If your operating
system supports secure UEFI boot, you can enable it for your VMs for added protection.
25
Virtualized security can simulate the functionalities of traditional security hardware appliances (such as
firewalls and antivirus protection) and deliver them through software. Furthermore, virtualized security
can carry out additional security functions.
These functions are only available because of the benefits of virtualization, and they are designed to
address the unique security requirements of a virtualized system.
To decrease the potential attack surface, a business can, for example, install security measures between
the application layer and the underlying infrastructure or utilize tactics such as micro-segmentation.
Virtualized security can be implemented as an application running directly on a bare-metal hypervisor
(from which it can provide good application monitoring) or as a hosted service running on a virtual
machine. Unlike physical security, which is bound to a single device, it can be instantly deployed where
it is most effective.
Source
Security virtualization serves as a barrier to secure network perimeter access. As an additional managed service,
it offers dedicated security services and guaranteed traffic isolation within the cloud, as well as customizable
firewall settings. Enterprises and service providers can use their virtualization investment to create a granular
security perimeter, providing tenants and service subscribers with dedicated security resources within a cloud
construct.
26
Essential Steps to Secure Virtual Machine
Keep connections secure and separate: Virtual networking is an excellent approach to creating flexible
connections to redeployed or scaled features. Still, each time a virtual network modification is made, it is
likely that an unintended connection will be established between two different services, tenants, or
features/functions deployments. This can result in a data plane leak, a connection between actual user
networks, or a management or control leak, allowing one user to influence the service.
Separate management APIs are used to secure the network. The second step is to isolate infrastructure
management and orchestration from the service itself. Because management APIs are designed to regulate
features, functionalities, and service behavior, they will always pose a significant risk. It is crucial to
protect all such APIs, but especially those that control infrastructure parts that should never be accessed by
service consumers.
Ensure that all components have been tested and verified. Before allowing virtual features and
functions to be implemented, step three in cloud-virtual security is to certify them for security compliance.
Outside attacks are a significant danger with virtual networking, but inner attacks are disastrous. When a
feature with a back-door security flaw is added to a service, it becomes part of the service infrastructure
and is much more likely to have open attack routes to other infrastructure pieces. It is critical to insist on a
robust lifecycle management compliance process flow for all hosted features and functionalities, one that
operators can audit and confirm.
Protect hosted elements by isolating them Isolating the new hosted elements is the last step in securing
virtual machine security in cloud computing. For example, three features contained within an edge device
could be delivered in the cloud as a part of the service data plane, with addresses accessible to network
users, or as part of an invisible private sub network. If you deploy in the cloud, any of the features can be
attacked, and your hosting and administration operations may become visible and vulnerable as well.
When you isolate your hosting and feature connections within a private sub network, they are safe from
unauthorized access.
A mobile operating system is an operating system that helps to run other application software on mobile
devices. It is the same kind of software as the famous computer operating systems like Linux and
Windows, but now they are light and simple to some extent.
The operating systems found on smartphones include Symbian OS, iPhone OS, RIM's
BlackBerry, Windows Mobile, Palm WebOS, Android, and Maemo. Android, WebOS, and Maemo are
all derived from Linux. The iPhone OS originated from BSD and NeXTSTEP, which are related to
UNIX.
It combines the beauty of computer and hand use devices. It typically contains a cellular built-in modem
and SIM tray for telephony and internet connections. If you buy a mobile, the manufacturer company
chooses the OS for that specific device.
2. Bada (Samsung Electronics): Bada is a Samsung mobile operating system that was launched in 2010. The
Samsung wave was the first mobile to use the bada operating system. The bada operating system offers many
mobile features, such as 3-D graphics, application installation, and multipoint-touch.
3. BlackBerry OS: The BlackBerry operating system is a mobile operating system developed by Research In
Motion (RIM). This operating system was designed specifically for BlackBerry handheld devices. This
operating system is beneficial for the corporate users because it provides synchronization with Microsoft
Exchange, Novell GroupWise email, Lotus Domino, and other business software when used with the
BlackBerry Enterprise Server.
4. iPhone OS / iOS: The iOS was developed by the Apple inc for the use on its device. The iOS operating
system is the most popular operating system today. It is a very secure operating system. The iOS operating
system is not available for any other mobiles.
5. Symbian OS: Symbian operating system is a mobile operating system that provides a high-level of
integration with communication. The Symbian operating system is based on the java language. It combines
middleware of wireless communications and personal information management (PIM) functionality. The
Symbian operating system was developed by Symbian Ltd in 1998 for the use of mobile phones. Nokia was
the first company to release Symbian OS on its mobile phone at that time.
6. Windows Mobile OS: The window mobile OS is a mobile operating system that was developed
by Microsoft. It was designed for the pocket PCs and smart mobiles.
7. Harmony OS: The harmony operating system is the latest mobile operating system that was developed by
Huawei for the use of its devices. It is designed primarily for IoT devices.
8. Palm OS: The palm operating system is a mobile operating system that was developed by Palm Ltd for use
on personal digital assistants (PADs). It was introduced in 1996. Palm OS is also known as the Garnet OS.
9. WebOS (Palm/HP): The WebOS is a mobile operating system that was developed by Palm. It based on
the Linux Kernel. The HP uses this operating system in its mobile and touchpads.
An operating system for mobile devices enables users to use other kinds of application software on their phones,
tablets, etc. Additionally, we can state that it is a particular category of operating system created especially for
smartphones, tablets, smart watches, etc. Additionally, they combine PC operating systems with some mobile-
specific functionality. They are also rather lightweight and straightforward.
28
An operating system (OS) is a piece of software that serves as a conduit between and the system hardware the
user. Additionally, it manages all communications in both the software and hardware. Let's examine several
operating system functions before learning about various mobile operating systems.
Features of OS
1. Memory Control
It is the control of the major or main memory. Moreover, the main memory must contain the application that is
being run. Consequently, more than one application may be active at once. Consequently, managing the RAM is
necessary.
OS:
The OS decides the manner in which every process will utilize the CPU when a system has multiple processes
executing. So, CPU Scheduling is another name for it. The OS:
3. Device Organization
Devices could be needed for the processes to be used. The OS is responsible for managing this. The OS:
4. File Organization
5. Safety: The OS manages to keep the application and system secure and safe through authentication. User ID
and password are used to verify a user's identity.
29
Examples of Common Mobile Operating Systems
1. Android OS
In terms of mobile operating systems, Android OS is the most popular. Google also developed the Android
operating system. The OS is also open source and free. The Linux kernel is the foundation of this OS. Every
new update's name is inspired by a "dessert," such as a cupcake, donut, eclair, oreo, or kitkat, for example.
2. Bada
The company that launched this operating system is Samsung. In 2010, it first hit the market. Additionally, it
has features like multipoint touch, 3-D graphics, and software installation.
3. Blackberry OS
Research In Motion is the company that created this operating system (RIM). It was created especially for
BlackBerry-compatible devices. Additionally, business users find it handy.
4. Apple iOS
It is among the most widely used operating systems (OS) after Android. It is made to work with Apple products
including iPhones, iPad tablets, and other mobile devices. Furthermore, just like Android devices, there is a
playstore where you may download apps. The app store is also a feature of Apple iOS. Additionally, it contains
many robust security features.
30
5. Operating System for Windows Mobile
Microsoft created this operating system. Technically, it is intended for smartphones and portable PCs.
Additionally, it incorporates elements from the Windows OS for computers as well as other functionality for
mobile devices.
6. Symbian OS
This OS was developed by Symbian Ltd. Additionally, Nokia was the first company to implement this OS in its
mobile phones. Additionally, it offers communication at a high degree of reliability.
7. Harmony OS
Additionally, Huawei is its creator. It is the newest OS. It is intended primarily for usage in IoT devices.
8. Palm OS
It is also known as Garnet OS. Furthermore, Palm Ltd. developed this operating system to be used on Personal
digital assistants (PADs).
9. WebOS
Palm Ltd is the company behind it. Additionally, it is built on the Linux kernel, and HP employs it in their
touchpads and mobile devices.
1. Simple to use
o The visuals ought to be appealing.
31
o It should be simple to use the buttons and functionalities. Additionally, the functionalities shouldn't be
overly complex.
o Features must to be strong and practical.
3. Long-lasting battery
o One of a smartphone's primary requirements is power.
o They need electricity for their CPUs, sensors, etc. As a result, the battery plays a crucial part.
o Because smartphones use more power than ever, having a reliable battery backup is crucial.
1. Kernel: An OS's kernel is its brain or heart. It has all the tools and features needed to control how OS
functions
2. Execution of the Process: In order for the statements to run and connect the software application to the
hardware, the OS runs a number of processes. Every time a process runs, it consumes resources such as
memory, space, and some others.
3. Interruption: Hardware devices mostly use interrupts to interact with the CPU. In general, it is a signal that
the device sends to ask the CPU for something. Additionally, if an interrupt happens, the CPU momentarily
halts the execution of the current process.
4. Memory Control:It is the control of the major or main memory. Moreover, the main memory must contain
the application that is being run. Consequently, more than one programs may be active at once. Consequently,
managing the RAM is necessary.
5. Multitasking: It is carrying out many tasks concurrently. The OS makes it feasible for the user to handle
multiple processes at once without any issues.
6. Safety: The OS keeps the system and programs safe and secure through authentication. User ID and
password are used to verify a user's identity.
32
7. User Interface: GUI, or graphic user interface, stands for. As suggested by the name, it provides a graphical
user interface for interacting with the desktop or laptop. Icons, menus, and other user-interaction tools are used.
Furthermore, by simply clicking these elements, the user can engage with ease. It is extremely user-friendly as a
result, and there are no commands to memorize.
33
Google Kubernetes Engine(GKE): Google cloud provide kubernetes(GKE) as an service where you can
deploy the application and restof the things like autoscaling and load balancing will be taken care by the
google cloud.
App Engine: A scalable runtime environment, Google App Engine is mostly used to run Web applications.
These dynamic scales as demand change over time because of Google’s vast computing infrastructure.
Because it offers a secure execution environment in addition to a number of services, App Engine makes it
easier to develop scalable and high-performance Web apps.
Storage
Cloud Storage: You can store the data which is required to be highly available and which is in large
amount.
Persistent Disk: Presistent disk is a storage disk which can be attached to the virtual machine and can be
reused for another virtual machine.
Cloud SQL: Cloud SQL is a fully managed service by the google cloud platform and it offers services
like MySQL, PostgreSQL and SQL Server.
Networking
Virtual Private Cloud (VPC): You can deploy your application in the private network which can be
achieved by the google cloud.
Cloud Load Balancing: This is most important service in the google cloud which is used to distribute the
cloud across the multiple replicas of the applications.
Cloud CDN: This is the service which will cache the content and delivers to the end users with the help of
edge locations.
Data analytics
Bigquery: All organizations look for unlocking business insights from their data. But it can be hard to
scalably ingest, store, and analyze that data as it rapidly grows. Google’s enterprise data warehouse
called BigQuery, was designed to make large-scale data analysis accessible to everyone.
Dataflow: It is the analysis of flow of data in control flow graph, i.e., the analysis that determines the
information regarding the definition and use of data in program. With the help of this analysis, optimization
can be done.
Pub/Sub: Pub/sub Consider a scenario of synchronous message passing. You have two components in your
system that communicate with each other. LeLet’ss call the sender and receiver. The receiver asks for a
service from the sender and the sender serves the request and waits for an acknowledgment from the
receiver. There is another receiver that requests a service from the sender. The sender is blocked since it
hasn’t yet received any acknowledgment from the first receiver. The sender isn’t able to serve the second
receiver which can create problems. To solve this drawback, the Pub-Sub model was introduced.
Machine learning
Vertex AI Platform: As we know Artificial Intelligence (AI) has undergone advancements throughout the
years leading to a transformation of industries and reshaping how businesses operate. The emergence of
cloud-based AI platforms has further accelerated this revolution enabling organizations to leverage the
potential of AI.
AI Platform Training: You can train the AI model with the help of AI Platform Training in google cloud.
AI Platform Prediction: You can make the predictions by using your machine learning models.
34
Productivity and collaboration
Google Workspace: Most of us are familiar with various Google Workspace products (also called G Suite)
like Calendar, Drive, and Gmail, etc.
Cloud Identity and Access Management (IAM): Identity Access Management is used by the root user
(administrator) of the organization. The users represent one person within the organization, and the users
can be grouped in that all the users will have the same privileges to the services.
Google Cloud Platform Future
Google Cloud Platform (GCP) is evolving constantly by expanding its resources and increasing its regions and
availability zone across the world which make it more available for the users to use reduces the latency. GCP is
upgrading itself according to the market trends gap play an major role in the upcoming years it will play major
role it will helps for the businesses to thrive in the increasingly data-driven and interconnected world.
Artificial intelligence (AI) and machine learning (ML).
Edge computing.
Data analytics and data management.
Cyber security.
Sustainability.
35
Software as a Service (SaaS): It provides you with complete software to use like Gmail, Google Drive,
etc.
Blackberry Technology
Blackberry is communication device that was developed in the year 1999 by Research in Motion (RIM)
Company.
BlackBerry OS is a proprietary mobile operating system created particularly for Research in Motion's
(RIM) BlackBerry devices. BlackBerry OS runs on Blackberry modification phones such as the
BlackBerry Bold, Curve, and Pearl and Storm order.
Blackberry Technology contains games, contacts, clock, reminders and various applications such as
PowerPoint and features of receiving and sending calls and messages.
It allows sending and receiving mails and surfing internet. Blackberry is integrated into email system of
enterprise with the help of software package called BES or Blackberry Enterprise Server. Individuals
may use BES services without downloading it.
The organizations, however, usually have BES installed in their network. BES works as relay for emails.
This is mostly used in corporate settings. Using Blackberry technology, allows access to corporate
emails in user’s Blackberry device.
This is called push email as it does not need manual syncing of emails. Moreover, every Blackberry
device has unique identification attached to it for authorization that is called Blackberry PIN.
Working: Blackberry Server Software is available in 2 forms namely, BPS and BES which stand for
Blackberry Professional Software and Blackberry Enterprise Server. The steps involved in sending emails are as
follows:
1. Email is sent by sender.
2. Email is received at the server and finds its way to personal computer.
3. BES tracks mail and in turn delivers it using “push” concept (compressing, encryption and message
forwarding are involved) to user’s Blackberry device.
4. Message is received on Blackberry device by the Internet.
5. Blackberry device receives mail, decrypts it and sends alert on device.
The BES is email server provided by Blackberry. It is made for organizations that have their own Lotus Domino
or Microsoft Exchange servers (for email and mobile applications). This server allows accessing corporate
email, calendar, list of tasks, contacts and other internal applications on their personal Blackberry device. It uses
unbreakable DES security which is very secure and can handle confidential data easily.
Advantages:
It provides email facility.
The blackberry handheld has all features of mobile phone along with walkie talkie and comes with
comfortable headset.
Corporate data can be easily accessed.
Organizers are present to make user more productive.
It provides with users medium to access important announcements and conversations even when they are
not in office and respond to them accordingly.
It provides faster services.
36
Email
BlackBerry is a wireless continuation of your email mailbox and it can implement our normal email
activities such as sending or receiving emails, viewing connections, etc. without any problem like
dialing or linking. The BlackBerry device remains frequently linked to the wireless network allowing us
to access your mail.
Phone
The BlackBerry devices phone constitutes all the particular characteristics of a mobile such as a call
waiting, call answer, conference calling, call forwarding, etc.
It is like the mobile phones, there are various models of the BlackBerry have several features such as
speakerphone, digital walkie-talkie, Bluetooth, SIP placed IP telephony, etc. The phones also feature
hand-free sets with headsets and support comfort, accuracy, and accessibility.
Wireless Internet
The Blackberry wireless device allows us to browse the web. It can need the click and scroll track wheel
to operate the pages and type the URLs with the QWERTY keyboard or it can also use the 'super type'
keyboard displayed on the BlackBerry business phone.
Tethered Modem
There are specific BlackBerry devices that are featured with more speedy wireless services such as
quick email and browsing experiences. The device can be used as a tethered modem that enables us not
to transfer the wireless PC card. The device can develop into a tethered modem to link your computer or
the laptop to the web.
SMS
BlackBerry also supports us to send and receive text messages like some other mobiles.
Instant Messaging
The instant messaging feature in the BlackBerry device supports us to connect your instant messaging
people when linked to the wireless network.
Corporate Data Access
Through the wireless connectivity of BlackBerry, the business objective can be produced with access to
corporate information even when they are on the move.
Paging
There are specific BlackBerry models that also transfer paging services to BlackBerry users who do not
have an email id.
Disadvantages:
BES is designed to push mails only on blackberry device and not on mobiles of other brands.
It is very costly to set up system.
It would be even costlier to organisation that has large number of employees.
Ubuntu Phone
Ubuntu Phone is particularly an operating system of Ubuntu Touch and its current UBPorts
Project maintainer and the Pine64 hardware maker. Two amazing things fortunately unexpected come - the
arrival of Fairphone and also Volla which wish to be the next phone of Ubuntu and powered by the Touch.
These are amazing for covering in a short summary. Hence, this article is for us who are interested in the phone
of Ubuntu once again.
37
Ubuntu Phone was the idea of Canonical to start within 2011 - similar years when Unity was initially
introduced and abandoned unfortunately in 2017. The Convergence was the concept, Ubuntu Touch was the
mobile operating system, and the Ubuntu Edge was the hardware.
o Canonical wishes Ubuntu mobile for working magically on laptops and desktops only by plug and play.
o They created legendary crowdfunding that was dismissed with 12 million dollars and 20 thousand
comments.
o Ubuntu Touch powered Galaxy phones, Meizu, and BQ Aquaris successfully in the reality.
o As Ubuntu Company, Canonical Ltd., in the end, discontinued Ubuntu phone in favor of Ubuntu for IoT
and Cloud.
o Apparently, Ubuntu Phone however survives today not in the hand of Canonical but in a small project
which is known as UBPorts who is implementing everything for continuing Touch operating system
development and engaging with many makers of devices for making Ubuntu Phone real.
o We can now see the efforts of UBPorts as one-by-one phones arising from FairPhone, Volla,
PinePhone, and more.
Ubuntu Touch is the Ubuntu operating system's mobile version, developed by the community
of UBPorts. The user interface of Ubuntu Touch is specified in Qt and it is primarily designed for
touchscreen mobile devices like tablet computers and smartphones but the actual aim of convergence
was proposed for bringing Ubuntu Touch to TVs, IoT devices, desktops, and laptops for a fully unified
user experience.
This project was begun by Canonical Ltd. However, Mark Shuttleworth disclosed on 5 April 2017
that Canonical will terminate support because of insufficient market interest.
Then, it was adopted by UBPorts as the community project. In 2015, the UBPorts project was developed
by Marius Gripsgard, and the source code was sent to the UBPorts Foundation in which it resides
now. The mission of UBPorts is to support the combined Ubuntu Touch development and to advertise
its widespread use.
Ubuntu Touch applies the touch user interface which is Qt5-based and several software frameworks developed
for MeeGo and Maemo like oFono as Maliit for input, accounts-sso for one sign-on, and telephony stack.
Often, the system can be used in Android with Linux kernels using libhybris which makes it convenient to port
to the most latest Android smartphones. Libertine is the project of Ubuntu to execute classical applications of
the desktop X.
38
Lock screen
If Ubuntu Touch is on the no lock screen feature appears immediately because applications will ask the user for
unlocking if essential when they're opened. The "Welcome Screen" center is an activity visualization on the
device. It displays the recent events and the status of the user on the welcome screen, finished with a design
across the circle that reflects activity on the preceding month over the phone.
Contained applications
Ubuntu Touch contains core applications like a file manager, an alarm clock, an email client, a calculator, and a
terminal among others. Currently, twelve or more core applications are being developed. Various applications
of Ubuntu Touch also work on the desktop including Weather, Terminal, Reminders, Notes, Gallery, Clocks,
Calendar, and Browser.
Side stage
In 2013, the side stage was released and permits users to side-by-side run both "phone apps" and "tablet
apps", resizing all on the top and if we require to see more of them. It focuses on "go even further" along with
the concept of multitasking, permitting screen space to be categorized in this manner.
39