0% found this document useful (0 votes)
25 views

Unit-5 Cloud Computing

Uploaded by

tawantika531
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Unit-5 Cloud Computing

Uploaded by

tawantika531
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

UNIT=5

Virtualization in Cloud Computing and Types


 Virtualization is a technique of how to separate a service from the underlying physical delivery of that
service. It is the process of creating a virtual version of something like computer hardware. It was
initially developed during the mainframe era.
 It involves using specialized software to create a virtual or software-created version of a computing
resource rather than the actual version of the same resource. With the help of Virtualization, multiple
operating systems and applications can run on the same machine and its same hardware at the same
time, increasing the utilization and flexibility of hardware.
 In other words, one of the main cost-effective, hardware-reducing, and energy-saving techniques used
by cloud providers is Virtualization.
 Virtualization allows sharing of a single physical instance of a resource or an application among
multiple customers and organizations at one time. It does this by assigning a logical name to physical
storage and providing a pointer to that physical resource on demand.
 The term virtualization is often synonymous with hardware virtualization, which plays a fundamental
role in efficiently delivering Infrastructure-as-a-Service (IaaS) solutions for cloud computing. Moreover,
virtualization technologies provide a virtual environment for not only executing applications but also for
storage, memory, and networking.

 Host Machine: The machine on which the virtual machine is going to be built is known as Host Machine.
 Guest Machine: The virtual machine is referred to as a Guest Machine.
Work of Virtualization in Cloud Computing
Virtualization has a prominent impact on Cloud Computing. In the case of cloud computing, users store data in
the cloud, but with the help of Virtualization, users have the extra benefit of sharing the infrastructure. Cloud
Vendors take care of the required physical resources, but these cloud providers charge a huge amount for these
services which impacts every user or organization. Virtualization helps Users or Organisations in maintaining
those services which are required by a company through external (third-party) people, which helps in reducing
costs to the company. This is the way through which Virtualization works in Cloud Computing.
Benefits of Virtualization
 More flexible and efficient allocation of resources.
 Enhance development productivity.
 It lowers the cost of IT infrastructure.
 Remote access and rapid scalability.
 High availability and disaster recovery.
1
 Pay peruse of the IT infrastructure on demand.
 Enables running multiple operating systems.
Drawback of Virtualization
 High Initial Investment: Clouds have a very high initial investment, but it is also true that it will help in
reducing the cost of companies.
 Learning New Infrastructure: As the companies shifted from Servers to Cloud, it requires highly skilled
staff who have skills to work with the cloud easily, and for this, you have to hire new staff or provide
training to current staff.
 Risk of Data: Hosting data on third-party resources can lead to putting the data at risk, it has the chance of
getting attacked by any hacker or cracker very easily.
For more benefits and drawbacks, you can refer to the Pros and Cons of Virtualization.
Characteristics of Virtualization
 Increased Security: The ability to control the execution of a guest program in a completely transparent
manner opens new possibilities for delivering a secure, controlled execution environment. All the operations
of the guest programs are generally performed against the virtual machine, which then translates and applies
them to the host programs.
 Managed Execution: In particular, sharing, aggregation, emulation, and isolation are the most relevant
features.
 Sharing: Virtualization allows the creation of a separate computing environment within the same host.
 Aggregation: It is possible to share physical resources among several guests, but virtualization also allows
aggregation, which is the opposite process.
Types of Virtualization
1. Application Virtualization
2. Network Virtualization
3. Desktop Virtualization
4. Storage Virtualization
5. Server Virtualization
6. Data virtualization

1. Application Virtualization: Application virtualization helps a user to have remote access to an application
from a server. The server stores all personal information and other characteristics of the application but can still
run on a local workstation through the internet. An example of this would be a user who needs to run two
different versions of the same software. Technologies that use application virtualization are hosted applications
and packaged applications.
2. Network Virtualization: The ability to run multiple virtual networks with each having a separate control and
data plan. It co-exists together on top of one physical network. It can be managed by individual parties that are
potentially confidential to each other. Network virtualization provides a facility to create and provision virtual

2
networks, logical switches, routers, firewalls, load balancers, Virtual Private Networks (VPN), and workload
security within days or even weeks.

Fig. Network Virtualization


3. Desktop Virtualization: Desktop virtualization allows the users’ OS to be remotely stored on a server in the
data center. It allows the user to access their desktop virtually, from any location by a different machine. Users
who want specific operating systems other than Windows Server will need to have a virtual desktop. The main
benefits of desktop virtualization are user mobility, portability, and easy management of software installation,
updates, and patches.
4. Storage Virtualization: Storage virtualization is an array of servers that are managed by a virtual storage
system. The servers aren’t aware of exactly where their data is stored and instead function more like worker
bees in a hive. It makes managing storage from multiple sources be managed and utilized as a single repository.
storage virtualization software maintains smooth operations, consistent performance, and a continuous suite of
advanced functions despite changes, breaks down, and differences in the underlying equipment.
5. Server Virtualization: This is a kind of virtualization in which the masking of server resources takes place.
Here, the central server (physical server) is divided into multiple different virtual servers by changing the
identity number, and processors. So, each system can operate its operating systems in an isolated manner.
Where each sub-server knows the identity of the central server. It causes an increase in performance and
reduces the operating cost by the deployment of main server resources into a sub-server resource. It’s beneficial
in virtual migration, reducing energy consumption, reducing infrastructural costs, etc.

Server Virtualization
6. Data Virtualization: This is the kind of virtualization in which the data is collected from various sources and
managed at a single place without knowing more about the technical information like how data is collected,
stored & formatted then arranged that data logically so that its virtual view can be accessed by its interested
people and stakeholders, and users through the various cloud services remotely. Many big giant companies are
providing their services like Oracle, IBM, At scale, Cdata, etc.
Uses of Virtualization
 Data-integration
 Business-integration
 Service-oriented architecture data-services

3
 Searching organizational data

Hardware Based Virtualization


 A platform virtualization approach that allows efficient full virtualization with the help of hardware
capabilities, primarily from the host processor is referred to as Hardware based virtualization in
computing. To simulate a complete hardware environment, or virtual machine, full virtualization is used
in which an unchanged guest operating system (using the common instruction set as the host machine)
executes in sophisticated isolation.

 The different logical layers of operating system-based virtualization, in which the VM is first installed
into a full host operating system and subsequently used to generate virtual machines.

 An abstract execution environment in terms of computer hardware in which guest OS can be run,
referred to as Hardware-level virtualization. In this, an operating system represents the guest, the
physical computer hardware represents a host, its emulation represents a virtual machine, and the
hypervisor represents the Virtual Machine Manager. When the virtual machines are allowed to interact
with hardware without any intermediary action requirement from the host operating system generally
makes hardware-based virtualization more efficient. A fundamental component of hardware
virtualization is the hypervisor, or virtual machine manager (VMM).
Basically, there are two types of Hypervisors which are described below:

 Type-I hypervisors:

Hypervisors of type I run directly on top of the hardware. As a result, they stand in for operating systems
and communicate directly with the ISA interface offered by the underlying hardware, which they replicate
to allow guest operating systems to be managed. Because it runs natively on hardware, this sort of
hypervisor is also known as a native virtual machine.
 Type-II hypervisors:

4
To deliver virtualization services, Type II hypervisors require the assistance of an operating system. This
means they’re operating system-managed applications that communicate with it via the ABI and simulate
the ISA of virtual hardware for guest operating systems. Because it is housed within an operating system,
this form of hypervisor is also known as a hosted virtual machine.

Features of hardware-based virtualization are:

Isolation: Hardware-based virtualization provides strong isolation between virtual machines, which means that
any problems in one virtual machine will not affect other virtual machines running on the same physical host.
Security: Hardware-based virtualization provides a high level of security as each virtual machine is isolated
from the host operating system and other virtual machines, making it difficult for malicious code to spread from
one virtual machine to another.
Performance: Hardware-based virtualization provides good performance as the hypervisor has direct access to
the physical hardware, which means that virtual machines can achieve close to native performance.
Resource allocation: Hardware-based virtualization allows for flexible allocation of hardware resources such
as CPU, memory, and I/O bandwidth to virtual machines.
Snapshot and migration: Hardware-based virtualization allows for the creation of snapshots, which can be
used for backup and recovery purposes. It also allows for live migration of virtual machines between physical
hosts, which can be used for load balancing and other purposes.
Support for multiple operating systems: Hardware-based virtualization supports multiple operating systems,
which allows for the consolidation of workloads onto fewer physical machines, reducing hardware and
maintenance costs.
Compatibility: Hardware-based virtualization is compatible with most modern operating systems, making it
easy to integrate into existing IT infrastructure.

Advantages of hardware-based virtualization –

It reduces the maintenance overhead of paravirtualization as it reduces (ideally, eliminates) the modification in
the guest operating system. It is also significantly convenient to attain enhanced performance. A practical
benefit of hardware-based virtualization has been mentioned by VMware engineers and Virtual Iron.
Disadvantages of hardware-based virtualization –

Hardware-based virtualization requires explicit support in the host CPU, which may not available on all
x86/x86_64 processors. A “pure” hardware-based virtualization approach, including the entire unmodified guest
operating system, involves many VM traps, and thus a rapid increase in CPU overhead occurs which limits the
scalability and efficiency of server consolidation. This performance hit can be mitigated by the use of para-
virtualized drivers; the combination has been called “hybrid virtualization”.

Software Virtualization

5
 Software Virtualization. The software virtualizations are basically used to emulate a complete computer
system and it further allows the operating system to run.

 Some of the examples are VMware software, Virtual Box etc. Like, Hardware Virtualization, here we
will discuss advantages, working and types of software virtualization.
 Software Visualization in Cloud Computing allows the single computer server to run one or more
virtual environments. It is quite similar to virtualizations but here it abstracts the software installation
procedure and creates a virtual software out of it.
 In software virtualizations, an application will be installed which will perform the further task. One
software is physical while others are virtual as it allows 2 or more operating system using only one
computer.

Benefits of Software Virtualization

 Testing:-It is easier to test the new operating system and software on VMs as it does not require any additional
hardware and the testing can do within the same software. After the testing, the VM can move or delete for the
further testing.
 Utilization:-In software virtualization, there is higher efficiency in resource utilization if it tunes correctly. The VM
can modify as per the requirement such as the user can modify ram, drive space, etc. It requires very less amount of
hardware as compared to the equivalent number of physical machines.
 Efficient:-It is efficient in a way such that it can run 12 virtual machines and eliminates the use of 12 physical
boxes. This is the power cost as well as the cost of maintaining the server.
 Less Downtime:-The software is upgrading and the upgrade in the VMs can do when the VM is working. VM can
modify when it is working or it is not working which means that the downtime of it is very less.
 Flexible:-It provides flexibility to the user so that the user can modify the software as per their demand. The
modification can do within minutes and can adjust easily when the workload changes.
 Secure: -It can protect with many hantaviruses. Moreover, there are several firewalls which prevent hacking and
virus. The data in the software virtualization is safe as it stores in several different places so if the disaster takes place
the data can retrieve easily.

How Software Virtualization in Cloud Computing Works?

Software Virtualization Working


i. Backup

With the help of software virtualization, the entire operating system or server installation can be backed up.
This also benefits in a way that if the new server hack just restoring the previous version will allow running the
server.

6
ii. Run multiple operating systems

The different operating system can use in a single computer with the partition in the hard drive. The only thing
to keep in mind is to keep a snapshot of everything. If the data drowns, it can retrieve from some other place.

iii. Running a different version of applications

With the help of software virtualization new as well as the old operating system can use. So a program, if it is
not working on a particular operating system, we can check it on another one.

iv. Templates

After the configuration of VM as per the demand, it can convert into a template and this template can use to
make multiple copies of the original one.

Types of Software Virtualization

 Operating System Virtualization


 Application Virtualization
 Service Virtualization
i. Operating System Virtualization

In operating system virtualization, the hardware is used which consists of software on which different operating
systems work. Here, the operating system does not interfere with each other so that each one of them works
efficiently.

ii. Application Virtualization

Application virtualization is a technology, encapsulates the computer program within the operating system. It
can say that application virtualizations refer to running an application on a thin client.

This thin client runs an environment, which is different from what refer to as encapsulating from the operating
system which is the location of it.

iii. Service Virtualization

 In the service virtualization, the DevOps team can use the virtual servers rather than the physical one. It
emulates the behavior of essential components which will be present in the final production
environment.

 With the help of service virtualization, the complex application can go through testing much earlier in
the development process. It can say that service visualization is a technique to simulate the behavior of
some components in a mixture of component-based applications

7
Advantages of Software Virtualization

1) Client Deployments Become Easier: Copying a file to a workstation or linking a file in a network then we can
easily install virtual software.

2) Easy to manage: To manage updates becomes a simpler task. You need to update at one place and deploy the
updated virtual application to the all clients.

3) Software Migration: Without software virtualization, moving from one software platform to another platform
takes much time for deploying and impact on end user systems. With the help of virtualized software environment
the migration becomes easier.

What Is Memory Virtualization?

 Memory virtualization is like having a super smart organizer for your computer brain (Running
Memory -RAM). Imagine your computer brain is like a big bookshelf, and all the apps and
programs you installed or are running are like books.

 Memory virtualization is the librarian who arranges these books so your computer can easily find
and use them quickly. It also ensures that each application gets a fair share of the memory to run
smoothly and prevents mess, which ultimately makes your computer brain (RAM) more organized
(tidy) and efficient.

 In technical language, memory virtualization is a technique that abstracts, manages, and optimizes
physical memory (RAM) used in computer systems. It creates a layer of abstraction between the
RAM and the software running on your computer. This layer enables efficient memory allocation
to different processes, programs, and virtual machines.

 Memory virtualization helps optimize resource utilization and secures the smooth operations of
multiple applications on shared physical memory (RAM) by ensuring each application gets the
required memory to work flawlessly.

 Memory virtualization also decouples the volatile RAM (Temporary memory) from various
individual systems and aggregates that data into a virtualized memory pool available to any system
in the cluster. The distributed memory pool will be used as a high-speed cache, messaging layer,
and shared memory for the CPU to increase system performance and efficiency.

How Is Memory Virtualization Useful In Our Daily Lives?

 Basically, memory virtualization helps our computer systems to work fast and smoothly. It also
provides sufficient memory for all apps and programs to run seamlessly.

 Memory virtualization, a personal computer assistant, ensures everything stays organized and
works properly, which is very important for the efficient working of our computers and

8
smartphones. Whether browsing the web, working on Google documents, or using complex
software, memory virtualization is the hero that provides us with a smooth and responsive
computing experience in our daily lives.

 Memory virtualization is essential for modern computing, especially in cloud computing, where
multiple users and applications share the same physical hardware (Like RAM and System).

 It helps in efficient memory management and allocation, isolation between applications (by
providing the required share of memory), and dynamic adjustment based on the running workloads
of various applications. Without memory virtualization, it would be challenging to run multiple
applications at the same time.

 Applications you may have heard about! This critical technology enables more efficient and
flexible use of computing resources at both complex data centers and personal device levels.
Memory virtualization is integral to personal computers, mobile devices, web hosting, app hosting,
cloud computing, and data center operations.

How Does Memory Virtualization Work In Cloud Computing?

You may be thinking all that is fine, but how does memory virtualization work in cloud computing? It’s
just part of the broader concept of resource virtualization, which includes internet, storage, network, and
many other virtualization techniques. When memory virtualization takes place in cloud infrastructure, it
goes through a process.

Key Elements Involved in Memory Virtualization:

1. Abstraction of Physical Memory

 Like virtual memory (Hard Drive) abstracts physical memory (RAM/Cache Memory) in traditional
computing, similarly, memory virtualization in cloud computing abstracts the physical memory
(RAM – Running Memory) of various Virtual Machines (VMs) to create a pool of resources to
allocate to a group of VMs.

 For this abstraction of physical memory, Cloud service providers use a hypervisor known as a
Virtual Machine Monitor (VMM) that abstracts and manages VM memory in cloud Computing.
9
 This abstraction process allows cloud users (VMs) to request and consume memory without
worrying about the storage limit. It allows users to scale their memory resources as required
without concern for the underlying physical memory.

2. Resource Pooling

 In cloud computing, there is a Cloud Data Center where multiple physical servers host various
Virtual Machines (VMs) and manage their dynamic workloads. Memory virtualization pools the
memory resources (storage) from the data center to create a shared resource pool (Virtual
Memory).

 This pool can be allocated to different VMs and cloud users per their dynamic needs and workloa d

3. Dynamic Allocation

 Cloud service providers use memory virtualization to allocate virtual memory to VMs and Cloud
users instantly on demand (According to Workload). It means cloud memory can be dynamically
assigned and reassigned based on the fluctuating workload.

 This elasticity of cloud computing enables effective use of available resources, and cloud users can
scale up or down their cloud memory as needed.

4. Isolation and Data Security

 Memory virtualization ensures that the virtual memory allocated to one cloud user or VM is
isolated from others. This isolation is vital for data security and prevents one individual from
accessing another’s data or memory.

 That’s why many sensitive IT companies prefer to purchase private cloud services to prevent
hacking and data breaches.

Importance Of Memory Virtualization In Cloud Computing

Memory Virtualization plays a critical role in cloud computing for several reasons. It contributes to cloud
services’ efficiency, scalability, effective resource utilization, and cost-effectiveness.

Here are some of the key points that show the importance of memory virtualization in cloud
computing:

1. Memory virtualization allows cloud providers to use physical memory resources in the most efficient
way. Overcommitting of memory allows the optimization of memory resources and hardware.

10
2. This virtualization enables the dynamic allocation of cloud memory to cloud user instances. This
elasticity is crucial in cloud computing to manage varying workloads. It allows cloud users to scale up and
down memory resources as needed and promotes flexibility and cost savings.

3. Allocating separate cloud memory for every single user prevents unauthorized access and is a must for
data security.

4. Memory virtualization is vital for handling a large number of users and workloads. It ensures that
scaling up or down memory can be done without manual intervention whenever a VM is required.

5. Migration and live migration are important for load balancing, hardware maintenance, and disaster
recovery in cloud computing. Transferring VM memory from one host to another is only possible by live
migration and feasible when memory is virtualized.

6. By optimizing virtual memory usage, memory virtualization maximizes physical memory utilization
and helps reduce the overall operational cost of the cloud.

Future Of Memory Virtualization In Cloud Computing

The future of memory virtualization in cloud computing holds significant promise as cloud technology
continues to evolve and become more integral to our digital world. Several trends and developments are
likely to shape the future of memory virtualization:

 Increasing Demand for Memory Efficiency

In upcoming years, cloud workloads will become more diverse and intense, which will require efficient
memory management. Memory virtualization will play a crucial role in optimizing memory allocation and
achieving higher performance.

 Enhancing Data Security and Memory Isolation

Data breaches and hacking threats are rising daily, and countries concerned about data security and
privacy around the globe make this more vulnerable. So, it will be essential for cloud providers to offer
improved isolation and security features in cloud computing.

Memory virtualization will play a key role in data security, where multiple cloud users share the same
cloud storage.

 AI and Machine Learning Integration

Memory virtualization will be used to support AI and machine learning workloads that require huge
storage capacity, like ChatGPT, Bard, and AI-powered automation applications. It’s used in memory
allocation and storage utilization to enhance user experience.

11
 Quantum Computing Solutions

With the advancement of quantum computing, memory virtualization will adapt to unique memory
requirements in complex quantum algorithms and programs. That’s why several companies are working on
specialized memory management solutions based on memory virtualization for quantum computing.

 For Block chain Technologies Integration

We all know that blockchain is a futuristic technology adopted by every sector, from banking to healthcare
to IoT. Memory virtualization will be used to manage blockchain networks and decentralized
applications.

 Reduce Energy Consumption

Most nations are currently focusing on effective energy utilization and high efficiency. This led to the
development of memory virtualization solutions that minimize energy consumption. Big data centers and
cloud infrastructure companies currently use this technology to minimize energy consumption.

 Other Future Applications

Memory virtualization will be used in various other sectors in upcoming years, such as edge computing
expansion, custom memory allocation, distributed cloud architecture, and serverless computing.

Data Virtualization

Data virtualization is the process of retrieve data from various resources without knowing its type and physical
location where it is stored. It collects heterogeneous data from different resources and allows data users across
the organization to access this data according to their work requirements. This heterogeneous data can be
accessed using any application such as web portals, web services, E-commerce, Software as a Service (SaaS),
and mobile application.

We can use Data Virtualization in the field of data integration, business intelligence, and cloud computing.

Advantages of Data Virtualization

There are the following advantages of data virtualization -

o It allows users to access the data without worrying about where it resides on the memory.
o It offers better customer satisfaction, retention, and revenue growth.
o It provides various security mechanism that allows users to safely store their personal and professional
information.
o It reduces costs by removing data replication.
12
o It provides a user-friendly interface to develop customized views.
o It provides various simple and fast deployment resources.
o It increases business user efficiency by providing data in real-time.
o It is used to perform tasks such as data integration, business integration, Service-Oriented Architecture
(SOA) data services, and enterprise search.

Disadvantages of Data Virtualization

o It creates availability issues, because availability is maintained by third-party providers.


o It required a high implementation cost.
o It creates the availability and scalability issues.
o Although it saves time during the implementation phase of virtualization but it consumes more time to
generate the appropriate result.

Uses of Data Virtualization

1. Analyze performance:-Data virtualization is used to analyze the performance of the organization compared to
previous years.

2. Search and discover interrelated data:-Data Virtualization (DV) provides a mechanism to easily search the
data which is similar and internally related to each other.

3. Agile Business Intelligence:-It is one of the most common uses of Data Virtualization. It is used in agile
reporting, real-time dashboards that require timely aggregation, analyze and present the relevant data from
multiple resources. Both individuals and managers use this to monitor performance, which helps to make daily
operational decision processes such as sales, support, finance, logistics, legal, and compliance.

4. Data Management:-Data virtualization provides a secure centralized layer to search, discover, and govern the
unified data and its relationships.

Data Virtualization Tools

1. Red Hat JBoss data virtualization: Red Hat virtualization is the best choice for developers and those who are
using micro services and containers. It is written in Java.

2. TIBCO data virtualization: TIBCO helps administrators and users to create a data virtualization platform for
accessing the multiple data sources and data sets. It provides a builtin transformation engine to combine non-
relational and un-structured data sources.

3. Oracle data service integrator :It is a very popular and powerful data integrator tool which is mainly
worked with Oracle products. It allows organizations to quickly develop and manage data services to access a
single view of data.

4. SAS Federation Server: SAS Federation Server provides various technologies such as scalable, multi-user,
and standards-based data access to access data from multiple data services. It mainly focuses on securing data.

13
5. Denodo: Denodo is one of the best data virtualization tools which allows organizations to minimize the
network traffic load and improve response time for large data sets. It is suitable for both small as well as large
organizations.

Industries that use Data Virtualization

o Communication & Technology: In Communication & Technology industry, data virtualization is used
to increase revenue per customer, create a real-time ODS for marketing, manage customers, improve
customer insights, and optimize customer care, etc.
o Finance: In the field of finance, DV is used to improve trade reconciliation, empowering data
democracy, addressing data complexity, and managing fixed-risk income.
o Government: In the government sector, DV is used for protecting the environment.
o Healthcare
Data virtualization plays a very important role in the field of healthcare. In healthcare, DV helps to
improve patient care, drive new product innovation, accelerating M&A synergies, and provide a more
efficient claims analysis.
o Manufacturing
In manufacturing industry, data virtualization is used to optimize a global supply chain, optimize
factories, and improve IT assets utilization.

Network Virtualization in Cloud Computing

General Architecture of Network Virtualization


Tools for Network Virtualization:
1. Physical switch OS – It is where the OS must have the functionality of network virtualization.
2. Hypervisor –It is which uses third-party software or built-in networking and the functionalities of network
virtualization.The basic functionality of the OS is to give the application or the executing process with a simple set
of instructions. System calls that are generated by the OS and executed through the libc library are comparable to the
service primitives given at the interface between the application and the network through the SAP (Service Access
Point).The hypervisor is used to create a virtual switch and configuring virtual networks on it. The third-party
software is installed onto the hypervisor and it replaces the native networking functionality of the hypervisor. A
hypervisor allows us to have various VMs all working optimally on a single piece of computer hardware.
Functions of Network Virtualization :
 It enables the functional grouping of nodes in a virtual network.
 It enables the virtual network to share network resources.
 It allows communication between nodes in a virtual network without routing of frames.

14
 It restricts management traffic.
 It enforces routing for communication between virtual networks.
Network Virtualization in Virtual Data Center :
1. Physical Network
 Physical components: Network adapters, switches, bridges, repeaters, routers and hubs.
 Grants connectivity among physical servers running a hypervisor, between physical servers and storage
systems and between physical servers and clients.
2. VM Network
 Consists of virtual switches.
 Provides connectivity to hypervisor kernel.
 Connects to the physical network.

Network Virtualization In VDC


Advantages of Network Virtualization:
Improves manageability –
 Grouping and regrouping of nodes are eased.
 Configuration of VM is allowed from a centralized management workstation using management software.
Reduces CAPEX –
 The requirement to set up separate physical networks for different node groups is reduced.
Improves utilization –
 Multiple VMs are enabled to share the same physical network which enhances the utilization of network
resource.
Enhances performance –
 Network broadcast is restricted and VM performance is improved.
Enhances security –
 Sensitive data is isolated from one VM to another VM.
 Access to nodes is restricted in a VM from another VM.
Disadvantages of Network Virtualization:
 It needs to manage IT in the abstract.
 It needs to coexist with physical devices in a cloud-integrated hybrid environment.
 Increased complexity.
 Upfront cost.
 Possible learning curve.
Examples of Network Virtualization:
Virtual LAN (VLAN) –
 The performance and speed of busy networks can be improved by VLAN.
 VLAN can simplify additions or any changes to the network.
Network Overlays –
15
 A framework is provided by an encapsulation protocol called VXLAN for overlaying virtualized layer 2
networks over layer 3 networks.
 The Generic Network Virtualization Encapsulation protocol (GENEVE) provides a new way to
encapsulation designed to provide control-plane independence between the endpoints of the tunnel.
Network Virtualization Platform: VMware NSX –
 VMware NSX Data Center transports the components of networking and security such as switching,
firewalling and routing that are defined and consumed in software.
 It transports the operational model of a virtual machine (VM) for the network.
Applications of Network Virtualization:
 Network virtualization may be used in the development of application testing to mimic real-world hardware
and system software.
 It helps us to integrate several physical networks into a single network or separate single physical networks
into multiple analytical networks.
 In the field of application performance engineering, network virtualization allows the simulation of
connections between applications, services, dependencies, and end-users for software testing.
 It helps us to deploy applications in a quicker time frame, thereby supporting a faster go-to-market.
 Network virtualization helps the software testing teams to derive actual results with expected instances and
congestion issues in a networked environment.

Security Recommendations and Best Practices


We strongly recommend treating each virtual machine as if it was a physical machine for most activities.
Virtual machines are vulnerable to most of the same things as physical machines including data loss/corruption,
hardware failures, viruses, and hackers. Install and use virus scanning software. Take regular updates to your
operating system, preferably via an automatic update system. Make regular backups of important data. Follow
the recommended best practices for your guest operating system. In most cases, simply treat your virtual
workstation as you would any other machine.

Security Recommendations
1. Install Anti-Virus Software: While MIT does its best to prevent virus attacks, no computer is immune
to them. Anti-virus software needs to be installed separately on the Virtual Machine, even if virus
protection is already installed on the Macintosh operating system itself. For more information about
virus protection, distributed by MIT at no cost. Sophos, the software distributed and supported by IS&T,
includes protection against viruses, Trojans, worms and spyware, as well as adware.
2. While virus protection software offers some protection from spyware, we recommend using Windows
Defender on your Windows virtual machines for additional protection. Defender is included with
Windows. To find it, click on the Start button and type "Defender" in the search box.
3. Choose Strong Passwords: Weak passwords can be guessed, thus giving someone else access to your
files and your system. Create passwords that are at least eight characters long, containing numbers,
upper and lower case letters, and symbols. More information on creating strong passwords can be found
at Strong Passwords

16
4. Keep your Operating Systems Updated: It is equally important to keep your host and virtual operating
systems updated as compromises can occur in either kind of system. Install operating system security
updates to keep your system current and protected from known vulnerabilities. We strongly recommend
utilizing automatic updates, but note that virtual systems can only take updates when they are running. If
your virtual system has not been started in some time (or is rarely left running long enough to take an
update), we recommend you run a manual update as soon as you start your virtual system. For more
information, see: MIT Windows Automatic Update Service, Red Hat Network.
5. Maintain Like Risk Postures for All Machines (Virtual and Host)Your system is only as secure as
the least secure virtual or host machine. All guests on a host machine should have like risk posture -
same level of accessibility, data sensitivity and level of protection. If any guest is more vulnerable than
other guests or your host, it could be an entry to compromise the rest of your system.
6. Limit Host Access: Access to the host should be limited (firewalled off).
7. Snapshots of Virtual Machines :When taking a snapshot of a virtual machine and then branching off,
make sure to save the image at the instance before the branch (the trunk) rather than at the branch level
to ensure security patches are most up to date.

Security Risks Specific to Virtual Machines


While virtual machines are at risk of all the same things as any other machine, you should be aware of a few
additional issues.
1. If a host is compromised, scripts can be run on the host that can interact with the guest at whatever
privilege level the guest is logged in as. This can result in malicious trojans being installed on the host
and guest machines.
2. A virtual machine that is not virus protected, compromised, and in a shared networking configuration
can be used by an attacker to scan both the private and public address spaces. The other virtual machines
on the host (if not patched) can also be exploited via the network, so a software firewall on each of the
guests is recommended.
3. (Enterprise version) When turning on shared folders, they can be accessed through a compromised
guest. Files can then be placed on the host and attackers can access other guests' file systems.

What is VMware? Definition, Function & Benefits Explained


VMware is defined as a set of software and solutions that help convert the actual computer, server, or pool of
similar hardware into several virtual machines that may be used for a variety of tasks.Each virtual machine
(VMware cloud) has its own operating system and other capabilities.

What is VMware?

17
 VMware is a cloud computing and virtualization startup formed in 1998 that has played a significant
role in transforming the way hardware configurations power workloads and support designs.

 VMware virtualization essentially replaces certain pieces of hardware with VMware workstation that
performs functions of conventional physical servers and PCs performed previously in the virtualization
era.

 The VMware cloud takes advantage of this transition from one virtualization era to the other with its
products and services.

 These VMware resources may be split over several virtual servers that act much like a single physical
machine in the appropriate configurations – for example, storing data, developing and distributing
programs, maintaining a workspace, and much more.

 Each VMware workstation may run its own operating system and behave in the way that it has been
commanded to.

 Using the vCenter software, all of this can be managed from a single administrator website.

 VMware for Desktops is available for Windows, macOS, and Linux whereas the enterprise option,
vSphere requires no underlying operating system and runs directly on the hardware and is maintained
remotely.

How Does VMware Function?

 VMware is a computer software program that allows you to install a virtual operating system within any
operating system.

 If you are familiar with the Windows operating system and now need to use another operating system,
say, Linux, you may be hesitant to uninstall Windows and install Linux on your system.

 In such a case, one can use VMware on your Windows PC and add a virtual Linux operating system to
gain experience with Linux without actually installing it.

How Does a Hypervisor Work?

 The VMware hypervisor work performs the role of partitioning, or more particularly, abstracting and
separating these various operating systems and applications from the underlying computer hardware
when utilizing the VMware software.

18
 It means that the underlying hardware (known as the host computer) may function and run one or more
virtual computers independently (known as VMware guest machines).

 The hypervisor work also aids in the management of these distinct virtual machines by allocating
hardware resources such as memory allocation, CPU use, network bandwidth, and so on.

 Hypervisor work accomplishes this by assembling pools of abstracted hardware resources and allocating
them to VMware Virtual Machines.

 When a user requests it, it may also stop and start virtual computers.

5 Valuable Benefits of VMware

VMware has several advantages that can be seen in the various products it offers.

These products and services help enhance security and networking, VMware cloud storage, and many other
areas.

1. Offers Infrastructure for Virtual Desktops

 One of the main advantages of VMware is the ability to access the desktop from any location we want
while using VMware.

 As a result, we do not need a full desktop configuration at work because we can manage and operate
Windows desktops from the VMware cloud using VMware Horizon.

 This eliminates a number of things such as the need to create and administer a whole desktop at work.

 VMware also makes monitoring and controlling the user security less necessary and centralizes
management.

 This works well with two more VMware products, VMware Dynamic Environment Manager and
VMware App Volumes which help us in controlling the Windows desktop and delivering applications.

 If one is residing in the USA and wishes to work from VMware Singapore office, it can be done with the
help of VMware.

19
2. Deliver a Personal Desktop

 The VMware virtualization layer enables direct management and operation of a virtual machine on a
single Linux, Windows, or even laptop.

 VMware virtual machines have their own operating systems, like Linux or Windows.

 This allows us to run Windows on a Linux computer and vice versa without having to worry about the
installed operating system.

 Administrators can operate a virtual machine inside another machine using the VMware Workstation
product.

 Such a feature is also available for Mac computers – the VM Fusion module of VMware helps to do so.

3. VMware Offers Storage and Accessibility

 The vSAN product from VMware is another one that aids in storage and availability.

 It gives us software-based storage but is coupled with another VMware product called vSphere.

 The VMware vSAN pools disk storage from several ESXi and makes it available via smart policies.

 Additionally, when it is coupled with vSphere availability, it enables provision of more storage and
computing power.

4. VMware Offers Management of Disaster Recovery

 Disaster recovery is one of the advantages of VMware and it comes with it the Site Recovery Manager
to assist us in establishing a recovery plan that will be carried out automatically in the event of a failure.

 In order to maintain and protect the network and security of the relocated VMware, this solution was
further integrated with NSX.

5. The VMware Cloud Infrastructure

 A private cloud is used by large organizations, but if you are a SME or a startup, public cloud services
like VMware are suitable for your company.

 When it comes to private cloud vs public cloud, VMware is more affordable than private cloud because
you don’t have to manage any servers and all the infrastructure.
20
The VMware cloud product vSphere, which is used for infrastructure, offers the following features:

 vMotion
 ESXi
 vCenter Server

vSphere Client
VMware offers a range of software and hardware components that may be used for a number of benefits.
VMware provides a solution in a number of areas, including networking, storage, and security.

What is KVM?

A Kernel-based Virtual Machine (KVM) allows you to turn Linux or Windows Server into a hypervisor,
allowing your operating system to produce multiple virtual machines and isolated virtual environments. This
provides users with a straightforward experience of smooth integration. Although KVM is not limited to only
virtualization technologies, KVM benefits would include the following:

1. Performance
2. Security
3. Storage
4. Hardware Support
5. Memory Management
6. Live Migration
7. Scheduling and Resource Control
8. Lower Latency and Higher Prioritization

We will cover each of the KVM features shown to visualize better why we encourage using a Linux Kernel
Based Virtual Machine to optimize all operating systems.

What are KVM Linux Functions?

21
To understand a KVM Linux function, you must first understand virtualization and the differences
between hypervisor types. Virtualization, in simple terms, means one or more full guest operating systems can
operate on a single host server. The hardware virtualization provided to guest systems can be either emulated by
software or controlled by a hypervisor allocated to natural hardware resources.

What are the 3 Types of Virtualization?

 Full Virtualization. Full virtualization is when the hardware is wholly emulated on the software. No
further interaction with real hardware is needed.
 Para-Virtualization. The guest system requires specifically designed drivers as it directly interacts with
the hypervisor.
 Hardware-Assisted Para-Virtualization. The hardware support is already integrated within the processor.
Although this reduces customization, it increases the efficiency of the guest systems. Most Intel and
AMD processors include this functionality, although you may need to activate it within the BIOS/UEFI.

Who Uses KVM For Virtualization?

Large vending companies such as Red Hat Enterprise Linux, an associated company that runs KVM, are the
most prominent groups to use this feature. This is one reason we use a Kernel Based Virtual Machine (other
than its features). KVM is the only hypervisor for all Red Hats virtualization products.

Besides Red Hat, companies like IBM, Canonical, and Google rely on KVM-based technology for many
virtualization products. For this, KVM is the staple and main virtual machine that enables IT administrators to
execute multiple OSes on the same hardware.

What is Type 1 vs. Type 2 Hypervisor?

The hypervisor is a management or translation layer between natural and virtual hardware resources. Depending
on the type of virtualization solution, it is necessary to translate all requirements of the natural hardware.

22
The two types of hypervisors are:

 Type-1 (Bare Metal Hypervisor): Type-1 runs directly on the hardware without being included in an
operating system.
 Type-2 (Hosted Hypervisor): This type is embedded into the operating system, where it is enabled.

Remember, Linux KVM is a type-1 hypervisor and uses hardware-Assisted Para-Virtualization, although
uniquely integrated into the kernel module.

Features of Using KVM Hypervisor and Why We Use It

Using the KVM Hypervisor with Linux can involve many features, including security and high performance
within the virtualization infrastructure. Let's examine the characteristics and why they are better than traditional
virtualization solutions.

Performance: With the inherited performance of Linux, KVM performs scaling to match the demand load of
the guest operating systems and requests as they are increased. As a result, KVM is the basis of many enterprise
virtualization setups, allowing the highest demanding applications workloads to be virtualized.

Since KVM is a type-1 Hypervisor, it outperforms most traditional virtualization technologies, typically a type-
2 Hypervisor. This ensures near-metal performance, allowing KVM's hypervisor VM's boot fast and achieve
desired performance results.

Security :KVM operates two security systems with a combination of SELinux (Security-Enhanced Linux) and
sVirt (Secure Virtualization) to ensure the highest security and isolation for VMs. While SELinux contributes to
establishing security around VMs, sVirt extends SELinux's abilities. The extension of SELinux's protection
allows MAC (Mandatory Access Control) security to be applied to guest Virtual Machines, preventing manual
labeling errors.

Storage: Provided by Linux, KVM can use any provided supported storage. Storage like local disks or NAS
(Network Attached Storage) is typically the most supported by Linux for KVM use. This overall provides an
improved storage space providing redundancy for maximized use. KVM also provides shared file images,
ultimately giving shared VM images to multiple hosts. We are using 3-way storage, meaning a copy of your
storage is always available on two other servers.

23
Hardware Support

Since hardware vendors constantly contribute to hardware development and hardware virtualization for kernel
development, KVM can use various certified Linux-supported and Windows-supported hardware platforms.
The latest features are always being rapidly adopted into the Linux kernel.

Memory Management

As Linux also provides memory management features, KVM has inherited these features, including non-
uniform memory access. Virtual Machines memory has the potential to be swapped, being backed by large
volumes which produce overall higher performance. This is also shared or backed by a disk file.

Live Migration

KVM supports live migration, allowing a running Virtual Machine to be relocated between the physical hosts
without interrupting the service. With the VM remaining online and the network connection consistently active,
applications will continue to run while the VM is relocating. Another plus that KVM provides is the ability to
save the VMs state and resume/store the information for later if needed.

Scheduling and Resources Control

Virtual Machines are a Linux process scheduled and managed by the Linux kernel within the KVM model. This
scheduler allows well-organized and fine-grained control of the resources allocated within the Linux process
guaranteeing quality within the particular process. KVM includes a fair scheduler, control group, network
namespaces, and real-time extensions.

Lower Latency and Higher Prioritization

The Linux Kernel, as mentioned before, provides real-time extensions that allow VM-based apps to run at a
lower latency and higher prioritization. In addition, the kernel module also provides divided processes that
require long computing times within smaller components.

Kernel Virtual Machine Manager Options

There are a few popular KVM manager options to manage and facilitate VMs and provide an essential graphical
user interface. Management software for KVMs can be beneficial, and below we will provide some of the best
managing platforms for your ultimate experience.

The best Kernel Virtual Machine Manager options are:

 Virtual Machine Manager. A desktop interface for managing KVM VMs directly.
 Multipass. Mainly used by developers, this is the most recommended platform for using Ubuntu VMs.
Multipass installs on Linux, Windows, and MacOS.
 OpenStack. The most popular cloud computing that enables the management of distributed computing,
network, and storage resources.
24
Not only do management platforms help make a greater efficiency in your KVMs, but we purposely provide
these services so your business can successfully run smoothly and streamline operations

Virtual Machine Security


Introduction
The word "Cloud" refers to a network or the Internet. In other terms, the Cloud is something that exists in a
remote location. The cloud can provide services over both public and private networks, such as WAN, LAN,
and VPN. Cloud Computing is a service-oriented architecture technique that performs computational operations
using virtualized resources. Similarly, A virtual machine (VM) is a digital substitute for a real computer. Virtual
machine software is capable of running programs and operating systems, storing data, connecting to networks,
and performing other computer operations Digitally. Still, it requires regular maintenance, such as updates and
system monitoring. Since a VM (Virtual Machine) stores and accesses lots of data and can be misused and
manipulated easily. Therefore we must ensure all the security features to protect data.

Virtualized Security
The co-resident attack is a severe security threat in cloud infrastructure. Tenant virtual machines (VMs) security
in cloud computing can be assigned on the same host using virtualization technology supplied by Cloud Service
Provider. A multi-tenant environment allows hostile renters to undertake a co-resident attack and steal
information from other tenants via side channels. Organizations focus on eliminating side channels to prevent
this type of attack.
Virtualized security, often known as security virtualization, refers to software-based security solutions
designed to operate in a virtualized IT environment. This is in contrast to traditional, hardware-based network
security, which is static and operates on devices such as firewalls, routers, and switches.
Unlike hardware-based security, virtualized security is adaptable and dynamic. Instead of being connected to a
specific device, it can be installed anywhere on the network and is frequently cloud-based. This is critical for
virtual machine security in cloud computing, where operators constantly spin up workloads and applications;
virtualized security allows security services and functions to move around with those dynamically produced
workloads. These are the points that must be followed to make VM secured.
 Protecting the guest operating systems To keep your guest operating system safe, ensure it has the most
recent patches and, if necessary, anti-spyware and anti-malware software. Examine the documentation
provided by your guest operating system provider, as well as any other material accessible in books or on
the Internet about that operating system.
 Use templates and scripted management Virtual machine templates allow you to configure the operating
system to match your needs and then build more VMs with the same parameters. Consider using scripts
like PowerCLI to alter virtual machine parameters after the first deployment. This guide explains how to
use the GUI to execute tasks. To keep your environment consistent, consider using scripts instead of the
GUI. To optimize scripting in large environments, virtual machines can be organized into folders.
 Consider UEFI secure boot. You may set up your virtual computer to boot from UEFI. If your operating
system supports secure UEFI boot, you can enable it for your VMs for added protection.

How does Virtual Security work?

25
 Virtualized security can simulate the functionalities of traditional security hardware appliances (such as
firewalls and antivirus protection) and deliver them through software. Furthermore, virtualized security
can carry out additional security functions.
 These functions are only available because of the benefits of virtualization, and they are designed to
address the unique security requirements of a virtualized system.
 To decrease the potential attack surface, a business can, for example, install security measures between
the application layer and the underlying infrastructure or utilize tactics such as micro-segmentation.
 Virtualized security can be implemented as an application running directly on a bare-metal hypervisor
(from which it can provide good application monitoring) or as a hosted service running on a virtual
machine. Unlike physical security, which is bound to a single device, it can be instantly deployed where
it is most effective.

Source
Security virtualization serves as a barrier to secure network perimeter access. As an additional managed service,
it offers dedicated security services and guaranteed traffic isolation within the cloud, as well as customizable
firewall settings. Enterprises and service providers can use their virtualization investment to create a granular
security perimeter, providing tenants and service subscribers with dedicated security resources within a cloud
construct.

Benefits of Virtualized Security


Virtualized security is now needed to fulfill the complex security demands of a virtualized network, and it is
more flexible and efficient than traditional physical security.
 Less Expenditure: Virtual machine security in cloud computing enables a company to maintain a secure
network without incurring significant additional costs for expensive proprietary hardware. Pricing for
cloud-based virtualized security services.
 Flexible in Nature: Virtualized security services can track workloads everywhere, which is essential in a
virtualized environment. It protects data across various data centers, as well as in multi-cloud and hybrid
cloud scenarios, allowing a company to get the full benefits of virtualization while also keeping data
secure.
 Operational Effectiveness: Virtualized security is faster and easier to implement than hardware-based
security because it eliminates the need for IT personnel to set up and configure multiple hardware
appliances. Instead, they can deploy security solutions using centralized software, allowing quick
expansion. Using software to run security technologies also allows security chores to be automated, giving
IT workers more time.
 Regulatory Compliance: Traditional hardware-based security is static and incapable of meeting the
demands of a virtualized network, making virtual machine security in cloud computing a must-have for
enterprises that must maintain regulatory compliance.

26
Essential Steps to Secure Virtual Machine
 Keep connections secure and separate: Virtual networking is an excellent approach to creating flexible
connections to redeployed or scaled features. Still, each time a virtual network modification is made, it is
likely that an unintended connection will be established between two different services, tenants, or
features/functions deployments. This can result in a data plane leak, a connection between actual user
networks, or a management or control leak, allowing one user to influence the service.
 Separate management APIs are used to secure the network. The second step is to isolate infrastructure
management and orchestration from the service itself. Because management APIs are designed to regulate
features, functionalities, and service behavior, they will always pose a significant risk. It is crucial to
protect all such APIs, but especially those that control infrastructure parts that should never be accessed by
service consumers.
 Ensure that all components have been tested and verified. Before allowing virtual features and
functions to be implemented, step three in cloud-virtual security is to certify them for security compliance.
Outside attacks are a significant danger with virtual networking, but inner attacks are disastrous. When a
feature with a back-door security flaw is added to a service, it becomes part of the service infrastructure
and is much more likely to have open attack routes to other infrastructure pieces. It is critical to insist on a
robust lifecycle management compliance process flow for all hosted features and functionalities, one that
operators can audit and confirm.
 Protect hosted elements by isolating them Isolating the new hosted elements is the last step in securing
virtual machine security in cloud computing. For example, three features contained within an edge device
could be delivered in the cloud as a part of the service data plane, with addresses accessible to network
users, or as part of an invisible private sub network. If you deploy in the cloud, any of the features can be
attacked, and your hosting and administration operations may become visible and vulnerable as well.
When you isolate your hosting and feature connections within a private sub network, they are safe from
unauthorized access.

Mobile Operating System

 A mobile operating system is an operating system that helps to run other application software on mobile
devices. It is the same kind of software as the famous computer operating systems like Linux and
Windows, but now they are light and simple to some extent.
 The operating systems found on smartphones include Symbian OS, iPhone OS, RIM's
BlackBerry, Windows Mobile, Palm WebOS, Android, and Maemo. Android, WebOS, and Maemo are
all derived from Linux. The iPhone OS originated from BSD and NeXTSTEP, which are related to
UNIX.
 It combines the beauty of computer and hand use devices. It typically contains a cellular built-in modem
and SIM tray for telephony and internet connections. If you buy a mobile, the manufacturer company
chooses the OS for that specific device.

Popular platforms of the Mobile OS


27
1. Android OS: The Android operating system is the most popular operating system today. It is a mobile OS
based on the Linux Kernel and open-source software. The android operating system was developed
by Google. The first Android device was launched in 2008.

2. Bada (Samsung Electronics): Bada is a Samsung mobile operating system that was launched in 2010. The
Samsung wave was the first mobile to use the bada operating system. The bada operating system offers many
mobile features, such as 3-D graphics, application installation, and multipoint-touch.

3. BlackBerry OS: The BlackBerry operating system is a mobile operating system developed by Research In
Motion (RIM). This operating system was designed specifically for BlackBerry handheld devices. This
operating system is beneficial for the corporate users because it provides synchronization with Microsoft
Exchange, Novell GroupWise email, Lotus Domino, and other business software when used with the
BlackBerry Enterprise Server.

4. iPhone OS / iOS: The iOS was developed by the Apple inc for the use on its device. The iOS operating
system is the most popular operating system today. It is a very secure operating system. The iOS operating
system is not available for any other mobiles.

5. Symbian OS: Symbian operating system is a mobile operating system that provides a high-level of
integration with communication. The Symbian operating system is based on the java language. It combines
middleware of wireless communications and personal information management (PIM) functionality. The
Symbian operating system was developed by Symbian Ltd in 1998 for the use of mobile phones. Nokia was
the first company to release Symbian OS on its mobile phone at that time.

6. Windows Mobile OS: The window mobile OS is a mobile operating system that was developed
by Microsoft. It was designed for the pocket PCs and smart mobiles.

7. Harmony OS: The harmony operating system is the latest mobile operating system that was developed by
Huawei for the use of its devices. It is designed primarily for IoT devices.

8. Palm OS: The palm operating system is a mobile operating system that was developed by Palm Ltd for use
on personal digital assistants (PADs). It was introduced in 1996. Palm OS is also known as the Garnet OS.

9. WebOS (Palm/HP): The WebOS is a mobile operating system that was developed by Palm. It based on
the Linux Kernel. The HP uses this operating system in its mobile and touchpads.

Types of Mobile Operating System

Operating System for Mobile

An operating system for mobile devices enables users to use other kinds of application software on their phones,
tablets, etc. Additionally, we can state that it is a particular category of operating system created especially for
smartphones, tablets, smart watches, etc. Additionally, they combine PC operating systems with some mobile-
specific functionality. They are also rather lightweight and straightforward.

28
An operating system (OS) is a piece of software that serves as a conduit between and the system hardware the
user. Additionally, it manages all communications in both the software and hardware. Let's examine several
operating system functions before learning about various mobile operating systems.

Features of OS

1. Memory Control

It is the control of the major or main memory. Moreover, the main memory must contain the application that is
being run. Consequently, more than one application may be active at once. Consequently, managing the RAM is
necessary.

OS:

o Memory is allocated and released.


o Maintains track of who and how often uses each part of the primary memory.
o Enables memory distribution when multiprocessing.

2. Management and Scheduling of Processors

The OS decides the manner in which every process will utilize the CPU when a system has multiple processes
executing. So, CPU Scheduling is another name for it. The OS:

o Gives and takes away processors from processes.


o Records the state of the CPU.

3. Device Organization

Devices could be needed for the processes to be used. The OS is responsible for managing this. The OS:

o Assigns and releases devices to various processes.


o Keep track of the equipment.
o Specifies which process and for how long is allowed to utilize a specific device.

4. File Organization

A system's files are kept in various folders. The OS:

o Maintains track of the location and status of files.


o Resources are allocated and released.

5. Safety: The OS manages to keep the application and system secure and safe through authentication. User ID
and password are used to verify a user's identity.

29
Examples of Common Mobile Operating Systems

1. Android OS

In terms of mobile operating systems, Android OS is the most popular. Google also developed the Android
operating system. The OS is also open source and free. The Linux kernel is the foundation of this OS. Every
new update's name is inspired by a "dessert," such as a cupcake, donut, eclair, oreo, or kitkat, for example.

2. Bada

The company that launched this operating system is Samsung. In 2010, it first hit the market. Additionally, it
has features like multipoint touch, 3-D graphics, and software installation.

3. Blackberry OS

Research In Motion is the company that created this operating system (RIM). It was created especially for
BlackBerry-compatible devices. Additionally, business users find it handy.

4. Apple iOS

It is among the most widely used operating systems (OS) after Android. It is made to work with Apple products
including iPhones, iPad tablets, and other mobile devices. Furthermore, just like Android devices, there is a
playstore where you may download apps. The app store is also a feature of Apple iOS. Additionally, it contains
many robust security features.

30
5. Operating System for Windows Mobile

Microsoft created this operating system. Technically, it is intended for smartphones and portable PCs.
Additionally, it incorporates elements from the Windows OS for computers as well as other functionality for
mobile devices.

6. Symbian OS

This OS was developed by Symbian Ltd. Additionally, Nokia was the first company to implement this OS in its
mobile phones. Additionally, it offers communication at a high degree of reliability.

7. Harmony OS

Additionally, Huawei is its creator. It is the newest OS. It is intended primarily for usage in IoT devices.

8. Palm OS

It is also known as Garnet OS. Furthermore, Palm Ltd. developed this operating system to be used on Personal
digital assistants (PADs).

9. WebOS

Palm Ltd is the company behind it. Additionally, it is built on the Linux kernel, and HP employs it in their
touchpads and mobile devices.

Specifications of Mobile Operating Systems

1. Simple to use
o The visuals ought to be appealing.
31
o It should be simple to use the buttons and functionalities. Additionally, the functionalities shouldn't be
overly complex.
o Features must to be strong and practical.

2. Reliable app store


o One of an OS's fundamental components is an app.
o Apps are a crucial component of an operating system.
o The apps ought to be user-friendly and engaging.

3. Long-lasting battery
o One of a smartphone's primary requirements is power.
o They need electricity for their CPUs, sensors, etc. As a result, the battery plays a crucial part.
o Because smartphones use more power than ever, having a reliable battery backup is crucial.

4. Organizing and using data


o Controlling data and network utilisation should be the main goal of an operating system. It ought to
maintain the restriction and prerequisite in mind.
o The organisation of data relevant to to-do lists, reminders, calendars, alarms etc. is also essential. This
data should be kept by a decent OS in a highly safe and orderly manner. Additionally, the data must be
simply and immediately accessible.

Mobile Operating System Components

1. Kernel: An OS's kernel is its brain or heart. It has all the tools and features needed to control how OS
functions

2. Execution of the Process: In order for the statements to run and connect the software application to the
hardware, the OS runs a number of processes. Every time a process runs, it consumes resources such as
memory, space, and some others.

3. Interruption: Hardware devices mostly use interrupts to interact with the CPU. In general, it is a signal that
the device sends to ask the CPU for something. Additionally, if an interrupt happens, the CPU momentarily
halts the execution of the current process.

4. Memory Control:It is the control of the major or main memory. Moreover, the main memory must contain
the application that is being run. Consequently, more than one programs may be active at once. Consequently,
managing the RAM is necessary.

5. Multitasking: It is carrying out many tasks concurrently. The OS makes it feasible for the user to handle
multiple processes at once without any issues.

6. Safety: The OS keeps the system and programs safe and secure through authentication. User ID and
password are used to verify a user's identity.
32
7. User Interface: GUI, or graphic user interface, stands for. As suggested by the name, it provides a graphical
user interface for interacting with the desktop or laptop. Icons, menus, and other user-interaction tools are used.
Furthermore, by simply clicking these elements, the user can engage with ease. It is extremely user-friendly as a
result, and there are no commands to memorize.

What is Google Cloud Platform (GCP)?


Before we begin learning about the Google Cloud Platform, we will talk about what is Cloud Computing.
Basically, it is using someone else’s computer over the internet. Examples- GCP, AWS, IBM Cloud, etc. Some
interesting features of cloud computing are as follows:
 You get computing resources on-demand and self-service. The customer has to use a simple User Interface
and they get the computing power, storage requirements, and network you need, without human
intervention.
 You can access these cloud resources over the internet from anywhere on the globe.
 The provider of these resources has a huge collection of these resources and allocates them to customers out
of that collection.
 The resources are elastic. If you need more resources you can get more, rapidly. If you need less, you can
scale down back.
 The customers pay only for what they use or reserve. If they stop using resources, they stop paying.

Regions and zones


Let’s start at the finest grain level (i.e. the smallest or first step in the hierarchy), the Zone. A zone is an area
where Google Cloud Platform Resources like virtual machines or storage are deployed.

What Are The Benefits Of Using Google Cloud Platform?


 Scalability and flexibility: You can scale the servers based up on the load if there is high incoming traffic
then you can scale up and if the traffic is less then you can scale down which make it flexible and mostly
suited for the business use cases.
 Cost-effectiveness: Google Cloud Platform follows the pay-as-you-go model which it will charge only for
the how much time you use service and at level you are going to use the services.
 High performance: You can highly reliable on the infrastructure of the google cloud because they are
highly available and spread across the multiple regions around the world.
 Security: Google Cloud Platform is more secure you can trust the service offered by the gcp for the security
options such as encryption, access control, and data loss prevention.
What are the different types of Google Cloud Platform services?
Compute
 Compute Engine: It is used to provision the virtual machine machines to deploy the application with the
need of your required ram, rom and security groups.

33
 Google Kubernetes Engine(GKE): Google cloud provide kubernetes(GKE) as an service where you can
deploy the application and restof the things like autoscaling and load balancing will be taken care by the
google cloud.
 App Engine: A scalable runtime environment, Google App Engine is mostly used to run Web applications.
These dynamic scales as demand change over time because of Google’s vast computing infrastructure.
Because it offers a secure execution environment in addition to a number of services, App Engine makes it
easier to develop scalable and high-performance Web apps.
Storage
 Cloud Storage: You can store the data which is required to be highly available and which is in large
amount.
 Persistent Disk: Presistent disk is a storage disk which can be attached to the virtual machine and can be
reused for another virtual machine.
 Cloud SQL: Cloud SQL is a fully managed service by the google cloud platform and it offers services
like MySQL, PostgreSQL and SQL Server.
Networking
 Virtual Private Cloud (VPC): You can deploy your application in the private network which can be
achieved by the google cloud.
 Cloud Load Balancing: This is most important service in the google cloud which is used to distribute the
cloud across the multiple replicas of the applications.
 Cloud CDN: This is the service which will cache the content and delivers to the end users with the help of
edge locations.
Data analytics
 Bigquery: All organizations look for unlocking business insights from their data. But it can be hard to
scalably ingest, store, and analyze that data as it rapidly grows. Google’s enterprise data warehouse
called BigQuery, was designed to make large-scale data analysis accessible to everyone.
 Dataflow: It is the analysis of flow of data in control flow graph, i.e., the analysis that determines the
information regarding the definition and use of data in program. With the help of this analysis, optimization
can be done.
 Pub/Sub: Pub/sub Consider a scenario of synchronous message passing. You have two components in your
system that communicate with each other. LeLet’ss call the sender and receiver. The receiver asks for a
service from the sender and the sender serves the request and waits for an acknowledgment from the
receiver. There is another receiver that requests a service from the sender. The sender is blocked since it
hasn’t yet received any acknowledgment from the first receiver. The sender isn’t able to serve the second
receiver which can create problems. To solve this drawback, the Pub-Sub model was introduced.
Machine learning
 Vertex AI Platform: As we know Artificial Intelligence (AI) has undergone advancements throughout the
years leading to a transformation of industries and reshaping how businesses operate. The emergence of
cloud-based AI platforms has further accelerated this revolution enabling organizations to leverage the
potential of AI.
 AI Platform Training: You can train the AI model with the help of AI Platform Training in google cloud.
 AI Platform Prediction: You can make the predictions by using your machine learning models.

34
Productivity and collaboration
 Google Workspace: Most of us are familiar with various Google Workspace products (also called G Suite)
like Calendar, Drive, and Gmail, etc.
 Cloud Identity and Access Management (IAM): Identity Access Management is used by the root user
(administrator) of the organization. The users represent one person within the organization, and the users
can be grouped in that all the users will have the same privileges to the services.
Google Cloud Platform Future
Google Cloud Platform (GCP) is evolving constantly by expanding its resources and increasing its regions and
availability zone across the world which make it more available for the users to use reduces the latency. GCP is
upgrading itself according to the market trends gap play an major role in the upcoming years it will play major
role it will helps for the businesses to thrive in the increasingly data-driven and interconnected world.
 Artificial intelligence (AI) and machine learning (ML).
 Edge computing.
 Data analytics and data management.
 Cyber security.
 Sustainability.

Advantages of Google Cloud Platform (GCP)


1. Good documentation: We are talking about many pages in total, including a reasonably detailed API
Reference guide.
2. Different storage classes for every necessity: Regional (frequent use), Near line (infrequent use), and Cold
line (long-term storage).
3. High durability: This suggests that data survives even within the event of the simultaneous loss of two
disks.
4. Many regions available to store your data: North Ameria, South America, Europe, Asia, and Australia.
5. The “Console” tab within the documentation allows you to try for free of charge different SDKs. It’s
incredibly useful for developers
6. One of the simplest free layers within the industry. $300 free credit to start with any GCP product during
the primary year. Afterward, 5 GB of Storage to use forever without any charges.
Disadvantages of Google Cloud Platform (GCP)
1. The support fee is sort of hefty: Around 150 USD per month for the foremost basic service (Silver class).
2. Downloading data from Google Cloud Storage is expensive. 0, 12 USD per GB.
3. Google Cloud Platform web interface is somewhat confusing. Sometimes I am lost while browsing around
the menus.
4. Prices in both Microsoft Azure (around 0.018 USD per GB/month) or Backblaze B2 (about 0.005 USD per
GB/month) are less than Google Cloud Storage.
5. It has a high pricing schema, almost like AWS S3, so it’s easy to urge unexpected costs (e.g. number of
requests, transfers, etc.).
Three Categories of Cloud Services
 Infrastructure as a Service (IaaS): It provides you with all the hardware components you require such as
computing power, storage, network, etc.
 Platform as a Service (PaaS): It provides you with a platform that you can use to develop applications,
software, and other projects.

35
 Software as a Service (SaaS): It provides you with complete software to use like Gmail, Google Drive,
etc.
Blackberry Technology
 Blackberry is communication device that was developed in the year 1999 by Research in Motion (RIM)
Company.
 BlackBerry OS is a proprietary mobile operating system created particularly for Research in Motion's
(RIM) BlackBerry devices. BlackBerry OS runs on Blackberry modification phones such as the
BlackBerry Bold, Curve, and Pearl and Storm order.
 Blackberry Technology contains games, contacts, clock, reminders and various applications such as
PowerPoint and features of receiving and sending calls and messages.
 It allows sending and receiving mails and surfing internet. Blackberry is integrated into email system of
enterprise with the help of software package called BES or Blackberry Enterprise Server. Individuals
may use BES services without downloading it.
 The organizations, however, usually have BES installed in their network. BES works as relay for emails.
 This is mostly used in corporate settings. Using Blackberry technology, allows access to corporate
emails in user’s Blackberry device.
 This is called push email as it does not need manual syncing of emails. Moreover, every Blackberry
device has unique identification attached to it for authorization that is called Blackberry PIN.
Working: Blackberry Server Software is available in 2 forms namely, BPS and BES which stand for
Blackberry Professional Software and Blackberry Enterprise Server. The steps involved in sending emails are as
follows:
1. Email is sent by sender.
2. Email is received at the server and finds its way to personal computer.
3. BES tracks mail and in turn delivers it using “push” concept (compressing, encryption and message
forwarding are involved) to user’s Blackberry device.
4. Message is received on Blackberry device by the Internet.
5. Blackberry device receives mail, decrypts it and sends alert on device.
The BES is email server provided by Blackberry. It is made for organizations that have their own Lotus Domino
or Microsoft Exchange servers (for email and mobile applications). This server allows accessing corporate
email, calendar, list of tasks, contacts and other internal applications on their personal Blackberry device. It uses
unbreakable DES security which is very secure and can handle confidential data easily.
Advantages:
 It provides email facility.
 The blackberry handheld has all features of mobile phone along with walkie talkie and comes with
comfortable headset.
 Corporate data can be easily accessed.
 Organizers are present to make user more productive.
 It provides with users medium to access important announcements and conversations even when they are
not in office and respond to them accordingly.
 It provides faster services.

Advantages of Blackberry Technology

36
 Email
BlackBerry is a wireless continuation of your email mailbox and it can implement our normal email
activities such as sending or receiving emails, viewing connections, etc. without any problem like
dialing or linking. The BlackBerry device remains frequently linked to the wireless network allowing us
to access your mail.
 Phone
The BlackBerry devices phone constitutes all the particular characteristics of a mobile such as a call
waiting, call answer, conference calling, call forwarding, etc.
It is like the mobile phones, there are various models of the BlackBerry have several features such as
speakerphone, digital walkie-talkie, Bluetooth, SIP placed IP telephony, etc. The phones also feature
hand-free sets with headsets and support comfort, accuracy, and accessibility.
 Wireless Internet
The Blackberry wireless device allows us to browse the web. It can need the click and scroll track wheel
to operate the pages and type the URLs with the QWERTY keyboard or it can also use the 'super type'
keyboard displayed on the BlackBerry business phone.

 Tethered Modem
There are specific BlackBerry devices that are featured with more speedy wireless services such as
quick email and browsing experiences. The device can be used as a tethered modem that enables us not
to transfer the wireless PC card. The device can develop into a tethered modem to link your computer or
the laptop to the web.
 SMS
BlackBerry also supports us to send and receive text messages like some other mobiles.
 Instant Messaging
The instant messaging feature in the BlackBerry device supports us to connect your instant messaging
people when linked to the wireless network.
 Corporate Data Access
Through the wireless connectivity of BlackBerry, the business objective can be produced with access to
corporate information even when they are on the move.
 Paging
There are specific BlackBerry models that also transfer paging services to BlackBerry users who do not
have an email id.
Disadvantages:
 BES is designed to push mails only on blackberry device and not on mobiles of other brands.
 It is very costly to set up system.
 It would be even costlier to organisation that has large number of employees.

Ubuntu Phone

Ubuntu Phone is particularly an operating system of Ubuntu Touch and its current UBPorts
Project maintainer and the Pine64 hardware maker. Two amazing things fortunately unexpected come - the
arrival of Fairphone and also Volla which wish to be the next phone of Ubuntu and powered by the Touch.
These are amazing for covering in a short summary. Hence, this article is for us who are interested in the phone
of Ubuntu once again.

37
Ubuntu Phone was the idea of Canonical to start within 2011 - similar years when Unity was initially
introduced and abandoned unfortunately in 2017. The Convergence was the concept, Ubuntu Touch was the
mobile operating system, and the Ubuntu Edge was the hardware.

o Canonical wishes Ubuntu mobile for working magically on laptops and desktops only by plug and play.
o They created legendary crowdfunding that was dismissed with 12 million dollars and 20 thousand
comments.
o Ubuntu Touch powered Galaxy phones, Meizu, and BQ Aquaris successfully in the reality.
o As Ubuntu Company, Canonical Ltd., in the end, discontinued Ubuntu phone in favor of Ubuntu for IoT
and Cloud.
o Apparently, Ubuntu Phone however survives today not in the hand of Canonical but in a small project
which is known as UBPorts who is implementing everything for continuing Touch operating system
development and engaging with many makers of devices for making Ubuntu Phone real.
o We can now see the efforts of UBPorts as one-by-one phones arising from FairPhone, Volla,
PinePhone, and more.

What is Ubuntu Touch?

 Ubuntu Touch is the Ubuntu operating system's mobile version, developed by the community
of UBPorts. The user interface of Ubuntu Touch is specified in Qt and it is primarily designed for
touchscreen mobile devices like tablet computers and smartphones but the actual aim of convergence
was proposed for bringing Ubuntu Touch to TVs, IoT devices, desktops, and laptops for a fully unified
user experience.
 This project was begun by Canonical Ltd. However, Mark Shuttleworth disclosed on 5 April 2017
that Canonical will terminate support because of insufficient market interest.
 Then, it was adopted by UBPorts as the community project. In 2015, the UBPorts project was developed
by Marius Gripsgard, and the source code was sent to the UBPorts Foundation in which it resides
now. The mission of UBPorts is to support the combined Ubuntu Touch development and to advertise
its widespread use.

Features of Ubuntu Touch

Ubuntu Touch applies the touch user interface which is Qt5-based and several software frameworks developed
for MeeGo and Maemo like oFono as Maliit for input, accounts-sso for one sign-on, and telephony stack.

Often, the system can be used in Android with Linux kernels using libhybris which makes it convenient to port
to the most latest Android smartphones. Libertine is the project of Ubuntu to execute classical applications of
the desktop X.

38
Lock screen

If Ubuntu Touch is on the no lock screen feature appears immediately because applications will ask the user for
unlocking if essential when they're opened. The "Welcome Screen" center is an activity visualization on the
device. It displays the recent events and the status of the user on the welcome screen, finished with a design
across the circle that reflects activity on the preceding month over the phone.

Contained applications

Ubuntu Touch contains core applications like a file manager, an alarm clock, an email client, a calculator, and a
terminal among others. Currently, twelve or more core applications are being developed. Various applications
of Ubuntu Touch also work on the desktop including Weather, Terminal, Reminders, Notes, Gallery, Clocks,
Calendar, and Browser.

Side stage

In 2013, the side stage was released and permits users to side-by-side run both "phone apps" and "tablet
apps", resizing all on the top and if we require to see more of them. It focuses on "go even further" along with
the concept of multitasking, permitting screen space to be categorized in this manner.

39

You might also like