0% found this document useful (0 votes)
19 views

8-Types of Virtualizations, Desktop and Application Virtualizations-01-08-2024

notes

Uploaded by

pritish.khera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

8-Types of Virtualizations, Desktop and Application Virtualizations-01-08-2024

notes

Uploaded by

pritish.khera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 62

Types of Virtualization

Types of Virtualization
• Application Virtualization
• Network Virtualization
• Desktop Virtualization
• Storage Virtualization
• Server Virtualization
• Data virtualization
Application Virtualization
Application Virtualization
• Application virtualization helps a user to have
remote access to an application from a server.
• The server stores all personal information and
other characteristics of the application but can
still run on a local workstation through the
internet.
• To run two different versions of the same
software. Technologies that use application
virtualization are hosted applications and
packaged applications.
Application Virtualization a.k.a Process
Virtualization
Application behaves at runtime like it is directly
interfacing with the original operating system and
all the resources managed by it, but can be
isolated or sandboxed to varying degrees
• Example
– JVM for Java, Common Language Runtime for
Windows and WINE software installed in Linux
can run windows processes like Word
Runtime environment
– Runtime system that provides an environment
in which programs run
• layout of application memory,
• how the program accesses variables,
• mechanisms for passing parameters between
procedures, interfacing with the operating
system
• setting up and managing the stack and heap
• garbage collection, threads or other dynamic
features
How application virtualization is implemented?
– Packaging the application
• Application is installed within custom
packager which records all files, registry and
settings related to application
– Delivering the app to the target system
• The packaged application is delivered to the
target system through USB or web
How application virtualization is implemented?

– Executing the app in virtual environment


• Finally the app is executed within the virtual
environment which is completely isolated
from other applications and underlying
operating systems
Desktop Virtualization
• Desktop virtualization allows the users’ OS to be
remotely stored on a server in the data center.
• It allows the user to access their desktop virtually,
from any location by a different machine.
• Users who want specific operating systems other
than Windows Server will need to have a virtual
desktop.
• The main benefits of desktop virtualization are
user mobility, portability, and easy management
of software installation, updates, and patches.
Desktop Virtualization – in a brief
Desktop virtualization moves desktop computing to virtual machines hosted on servers.
 The end user interacts with a full desktop (typically Windows) environment while
management of software, processing, and storage is removed from distributed desktop
machines.
There is significant interest in desktop virtualization.
 About 39% of organizations are planning, piloting, or implementing solutions.
 Currently about 5% of organizations have already implemented.

Desktop virtualization is an emerging technology ready for prime-time and should be part
of every organization’s technology strategy.
 Desktop virtualization is a relative newcomer and it is still in its early days in terms of
adoption.
 However, it has significant potential to address the end user needs of a larger proportion
of the end users than the established presentation virtualization (Citrix XenApp, Microsoft
Terminal Services).
Some limitations still remain.
 Desktop virtualization does not yet adequately meet the needs of truly mobile users or
those who have high media processing requirements.
Desktop Virtualization
Desktop Virtualization (DeskV)
• Desktop Virtualization (DeskV) allows you to rely on
virtual machines to provision desktop systems.
• Desktop virtualization has several advantages, the least
of which is the ability to centralize desktop deployments
and reduce distributed management costs because
users access centralized desktops through a variety of
thin or unmanaged devices.
• Client desktop virtualization technologies are used to host
virtual desktops (or virtual machines) locally on the clients’
computer.
• Server desktop virtualization -two types: personal & shared.
• Shared desktops -shared among users
• Personal desktops -users having their own completely isolated
desktop.
Different abstractions for different kinds of
virtualization
Presentation Virtualization
• In traditional remote access of
server based applications, Presentation Layer
Presentation Virtualization

(Citrix Presentation Server, Corpora


te
Applica

Microsoft Terminal Services)


tin

Application Layer
Application Virtualization

only presentation layer


virtualization is used. Desktop OS Layer
Machine Virtualization

• Presentation virtualization is `
also used for remote access of Physical Machine Layer
Abstraction Layers in
Desktop Computing
workstation hardware such as
a blade PC in the data center.
Different abstractions for different kinds of
virtualization
Application Virtualization
• In application virtualization, an
application can be downloaded and
run locally without special Presentation Layer
Presentation Virtualization

configuration of either the application Corpora


te
Applica

or the client PC or its OS. The


tin

Application Layer

application interacts with an Application Virtualization

abstraction layer between it and the OS Desktop OS Layer

and machine layers. Machine Virtualization

• Examples of application virtualization `


Physical Machine Layer
solutions include VMware View Abstraction Layers in
Desktop Computing
(ThinView), Citrix XenApp, and
Microsoft App-V.
Different abstractions for different kinds of
virtualization
Desktop Virtualization
• Desktop Virtualization uses
both a Machine Virtualization Presentation Layer
Presentation Virtualization

layer for hosting PC VMs on a Corpora


te
Applica

server and presentation


tin

Application Layer
Application Virtualization

virtualization for remote


access of those virtual Desktop OS Layer
Machine Virtualization

machines from the desktop. `


Physical Machine Layer
Abstraction Layers in
Desktop Computing
Virtualization layers are not mutually
exclusive
• The different layers of virtualization can be combined for
different desktop computing solutions. For example:
– Desktop virtualization solutions combine presentation
virtualization and PC machine virtualization on a hosting
server.
– Application virtualization and application presentation
can also be combined with desktop virtualization – a
virtual desktop machine can be dynamically provisioned
with remote access and/or virtualized applications.
– Application virtualization can also be applied to server
hosted applications, making them co-exist on the same
server more efficiently.
Desktop virtualization moves desktop processing and
storage off the desktop

• In desktop virtualization, a full instance of a desktop operating system (typically


Windows) runs on a virtual machine that is hosted on a server and remote
accessed from a client device (a PC, laptop, or thin client).
• For the end user, the experience of the virtual desktop should be the same as using
a local PC. For example, they will see and interact with Windows and their familiar
applications. They may not even be aware that the applications are no longer
executing on a local CPU and OS instance.
• Access is managed through connection broker software. The broker connects the
user with a specific virtual desktop. The most popular software for managing both
virtual desktops and brokering are VMware View and Citrix XenDesktop.
Connection Broker

Virtual Machines Virtual Desktop


`
Host Servers Virtual Desktops Virtual Machine
Server Infrastructure Client Access
The Benefits of Desktop Virtualization

• Manage physical and virtual • Access desktops from any connected


desktops from a single console device
• Centralized desktop lifecycle • Enable rich desktop experiences on
management thin clients and older PCs

• Data always locked in the data center • Data center grade business continuity
• Improved compliance through for the desktop
centralization • Quicker resolution of desktop failures
There are limitations to the current model

• Desktop virtualization currently falls short of the ubiquitous How Persistent Virtual
desktop vision particularly in the area of mobility of the virtual Desktops Will Save Money
machine image. In VDI models, VMs tend to be hosted on central
servers and remote accessed from the desktop. In a large enterprise, PCs
are purchased in bulk but
• Desktop virtualization has many of the same advantages and
not always from the same
limitations of traditional presentation virtualization. For example, vendor. This makes it
central management of applications is a benefit of both, while necessary to maintain
latency of remote accessed applications and susceptibility to multiple configurations of
network outage is a limitation of both. software and operating
systems (one for the Dells,
• Moving an application that has network latency issues from one for the HPs, one for
terminal services to desktop virtualization will not improve the the white boxes, etc.)
experience of that application.
• Desktop virtualization solutions also typically require more With fully virtualized
desktops, the apps and OS
storage and processing on the back end than traditional terminal are configured for one
services solutions. virtual machine. PCs are
• Operating system/software licensing costs are also proving to be either VM hosts or remote
a challenge for adopters. access terminals.
Differences in PC
configurations are
rendered irrelevant.
I/O Virtualization /
Network Virtualization
• The ability to run multiple virtual networks with
each having a separate control and data plan.
• It co-exists together on top of one physical
network.
• It can be managed by individual parties that are
potentially confidential to each other.
• Network virtualization provides a facility to create
and provision virtual networks, logical switches,
routers, firewalls, load balancers, Virtual Private
Networks (VPN), and workload security within
days or even weeks.
Network or I/O Virtualization
Network Virtualization (NetV)
• Network Virtualization (NetV) lets you control available
bandwidth by splitting it into independent channels that
can be assigned to specific resources.
• For example, the simplest form of network virtualization
is the virtual local area network (VLAN), which creates a
logical segregation of a physical network.
• In addition, server virtualization products support the
creation of virtual network layers within the product
itself.
• using this virtual network layer would let you place a
perimeter network on the same host as other production
virtual workloads without impacting either of the networks or
letting the virtual machines access each other.
Virtualized I/O Models
Monolithic Model Service VM Model Pass-through Model
Service VMs Guest VMs
VM0 VMn VM0 VMn
I/O
VMn
Guest OS Guest OS Guest OS Guest OS
and Apps and Apps Services VM0 and Apps and Apps

Device Device Device


I/O Services Guest OS Drivers Drivers
Drivers
and Apps
Device Drivers

Hypervisor Hypervisor
Hypervisor

Shared Shared Assigned


Devices Devices Devices

Pro: Higher Performance Pro: High Security Pro: Highest Performance


Pro: I/O Device Sharing Pro: I/O Device Sharing Pro: Smaller Hypervisor
Pro: VM Migration Pro: VM Migration Pro: Device assisted sharing
Con: Larger Hypervisor Con: Lower Performance Con: Migration Challenges

VT-d Goal: Support all Models


Packet Receive in Virtualized I/O
Packet Receive in Pass through I/O
Storage Virtualization
Storage Virtualization
• Storage virtualization is an array of servers that are
managed by a virtual storage system.
• The servers aren’t aware of exactly where their
data is stored and instead function more like
worker bees in a hive.
• It makes managing storage from multiple sources
be managed and utilized as a single repository.
• storage virtualization software maintains smooth
operations, consistent performance, and a
continuous suite of advanced functions despite
changes, breaks down, and differences in the
underlying equipment.
Introduction
• Common storage architecture :
– DAS - Direct Attached Storage
• Storage device was directly
attached to a server or
workstation, without a storage
network in between.
– NAS - Network Attached Storage
• File-level computer data storage
connected to a computer network
providing data access to
heterogeneous clients.
– SAN - Storage Area Network
• Attach remote storage devices to
servers in such a way that the
devices appear as locally attached
to the operating system.
Introduction
• Desirable properties of storage virtualization:
– Manageability
• Storage resource should be easily configured and deployed.
– Availability
• Storage hardware failures should not affect the application.
– Scalability
• Storage resource can easily scale up and down.
– Security
• Storage resource should be securely isolated.
Introduction
• Storage concept and technique: Storage resource mapping
table
– The virtualization software or device is responsible for maintaining a
consistent view of all the mapping information for the virtualized
storage. This mapping information is often called meta-data and is
stored as a mapping table.
– The address space may be limited by the capacity needed to maintain
the mapping table. The level of granularity, and the total addressable
space both directly impact the size of the meta-data, and hence the
mapping table.
– Redundant data
– Multi-path
– Data sharing
– Tiering
• LUN - Logical Unit Number

• SAN - Storage Area Network


Storage Virtualization
Storage Virtualization (StoreV)
• Storage Virtualization (StoreV) is used to merge physical
storage from multiple devices so that they appear as
one single storage pool.

• The storage in this pool can take several forms: direct


attached storage (DAS), network attached storage (NAS),
or storage area networks (SANs).

• Though storage virtualization is not a requirement for server


virtualization, one of the key strengths you will be able to obtain
from storage virtualization is the ability to rely on thin provisioning
or the assignation of a logical unit (LUN) of storage of a given size,
but provisioning it only on an as-needed basis.
Storage Virtualization (StoreV)
For example, if you
create a LUN of
100 gigabytes (GB)
and you are only
using 12GB, only
12GB of actual
storage is
provisioned. This
significantly
reduces the cost of
storage since you
only pay as you go.
Concept and Technique
• Storage resource mapping table
#LBA – Logical Block Addressing
 Maintain tables to map storage resource to target. #LUN – Logical Unit Number

 Dynamic modify table entries for thin provisioning.


 Use table to isolate different storage address space.
Concept and Technique
• Redundant data
– Maintain replicas to provide high availability.
– Use RAID technique to improve performance and
availability.
Concept and Technique
• Multi-path
– A fault-tolerance and
performance
enhancement technique.
– There is more than one physical
path between the host and
storage devices through the
buses, controllers, switches,
and bridge devices
connecting them.
Concept and Technique
• Data sharing
– Use data de-duplication technique to eliminate duplicated
data.
– Save and improve the usage of storage space
Concept and Technique
• Tiering
– Automatic migrate data across storage resources with
different properties according to the significance or
access frequency of data.
– Example: iMac fusion drive

Storage Policies Access Group


What To Be Virtualized
• Layers can be virtualized

User Space
– File system
Application
• Provide compatible system
call interface to user space System call interface
applications.

Kernel Space
– Block device File System

• Provide compatible block Block interface


device interface to file system.
• Through the interface such as Device driver
SCSI, SAS, ATA, SATA, etc.
Storage Device
File System Level
• File system level virtualization
– File system maintains metadata
(i-node) of each file.
– Translate file access requests to
underlining file system.
– Sometime divide large file into
small sub-files (chunks) for
parallel access, which improves
the performance
Block Device Level
• Block level data
– The file system block
• The atomic unit of file system management is the file
system block.
• A file's data may span multiple file system blocks.
• A file system block is composed of a consecutive range
of disk block addresses.
– Data in disk
• Disk drives read and write data to media through
cylinder, head, and sector geometry.
• Microcode on a disk translates between disk block
numbers and cylinder/head/sector locations.
• This translation is an elementary form of virtualization.
Block Device Level
• Data block level virtualization
– LUN & LBA
• A single block of information is
addressed using a logical unit
identifier (LUN) and an offset
within that LUN, which known as
a Logical Block Address (LBA).
– Apply address space remapping
• The address space mapping is
between a logical disk and a
logical unit presented by one or
more storage controllers.
A7

Where To Be Virtualized
• Storage interconnection
– The path to storage
• The storage interconnection provides the data path
between servers and storage.
• The storage interconnection is composed of both
hardware and software components.
• Operating systems provide drivers for I/O to storage
assets.
• Storage connectivity for hosts is provided by host bus
adapters (HBAs) or network interface cards (NICs).
Slide 51

A7 Cable Plant Transport - Details required

Admin, 21-02-2019
Where To Be Virtualized
• Different approaches :
– Host-based approach
• Implemented as a software
running on host systems.
– Network-based approach
• Implemented on network
devices.
– Storage-based approach
• Implemented on storage target
subsystem.
A9

Host-based Virtualization
• Host-based approach
– File level
• Run virtualized file system on
the host to map files into data Block 1
Sub-file Block 2 Block 1
Sub-file Block 2Sub-fileBlock 1

blocks, which distributed 1 2 3

among several storage


devices.
– Block level
• Run logical volume
management software on the
host to intercept I/O requests
and redirect them to storage
devices.
– Provide services
• Software RAID
Slide 53

A9 Homogenous File System Needs to be mentioned in this slide

Admin, 21-02-2019
Host-based Virtualization
• A typical example :
– LVM
• Software layer between the
file system and the disk driver.
• Executed by the host CPU.
• Lack hardware-assist for
functions such as software
RAID.
• Independence from vendor-
specific storage architectures.
• Dynamic capacity allocation to
expand or shrink volumes.
• Support alternate pathing for
high availability.
Network-based Virtualization
• Network-based approach
– File level
Block 1 Block 2 Block 1 Block 2 Block 1
• Seldom implement file level
virtualization on network
device.
– Block level
• Run software on dedicated
appliances or intelligent
switches and routers.
– Provide services
• Multi-path
• Storage pooling
Storage-based Virtualization
• Storage-based approach
– File level Block 1 Block 1 Block 1

• Run software on storage device


to provide file based data
storage services to host
through network.
– Block level
• Embeds the technology in the
target storage devices.
– Provide services
Replica
Block 1
Sub-file Replica
Block 1
Sub-file Replica
Block 1
Sub-file
• Storage pooling 1.bak
1 2.bak
2 3

• Replication and RAID


• Data sharing and tiering
Server Virtualization
• This is a kind of virtualization in which the masking of server
resources takes place.
• Here, the central server (physical server) is divided into
multiple different virtual servers by changing the identity
number, and processors.
• So, each system can operate its operating systems in an
isolated manner.
• Where each sub-server knows the identity of the central
server.
• It causes an increase in performance and reduces the
operating cost by the deployment of main server resources
into a sub-server resource. It’s beneficial in virtual migration,
reducing energy consumption, reducing infrastructural costs,
etc.
Server Virtualization
Data Virtualization
• This is the kind of virtualization in which the data
is collected from various sources and managed at
a single place without knowing more about the
technical information.
• how data is collected, stored & formatted then
arranged that data logically so that its virtual view
can be accessed by its interested people and
stakeholders, and users through the various cloud
services remotely.
• Many big giant companies are providing their
services like Oracle, IBM, At scale, Cdata, etc.
Uses of Virtualization

• Data-integration

• Business-integration

• Service-oriented architecture data-services

• Searching organizational data

You might also like