CS802(B) UNIT 1
CS802(B) UNIT 1
LECTURE 1 [UNIT-I]
History
The first report published on SOA by the analysts Roy W.Schulte and YefimV.Natis in 1996.
SOA is widely used in market which responds quickly and makes effective changes
according to market situations.
The SOA keep secret the implementation details of the subsystems.
It allows interaction of new channels with customers, partners and suppliers.
It authorizes the companies to select software or hardware of their choice as it acts as
platform independence.
Features
SOA uses interfaces which solves the difficult integration problems in large systems.
SOA communicates customers, providers and suppliers with messages by using the
XML schema.
It uses the message monitoring to improve the performance measurement and detects the
security attacks.
As it reuses the service, there will be lower software development and management
costs.
Advantages
SOA allows reuse the service of an existing system alternately building the new system.
It allows plugging in new services or upgrading existing services to place the new
business requirements.
It can enhance the performance, functionality of a service and easily makes the system
upgrade.
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 1
CS802 (B) Cloud Computing AIST SAGAR
SOA has capability to adjust or modify the different external environments and large
applications can be managed easily.
The companies can develop applications without replacing the existing applications.
It provides reliable applications in which you can test and debug the independent
services easily as compared to large number of code.
Disadvantages
SOA requires high investment cost (means large investment on technology, development
and human resource).
There is greater overhead when a service interacts with another service which increases
the response time and machine load while validating the input parameters.
SOA is not suitable for GUI (graphical user interface) applications which will become
more complex when the SOA requires the heavy data exchange.
Description
The SOA blueprint contains some following goals:
Requirements of design principles
Specific tasks of design principles
Interaction of services
Details of integration scenario
Templates for the specific tasks
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 2
CS802 (B) Cloud Computing AIST SAGAR
Considerations in SOA
There are some considerations must be covered in SOA:
Infrastructure
Accessible of requirements
Performance requirements
Platform for system
Architecture
Development
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 3
CS802 (B) Cloud Computing AIST SAGAR
Handling errors
Security for service access
Administration
The business activity monitoring functionality can be used by the products to display the
runtime details in the graphical system. The BAM products includes adapters or sensors which
are used to access the data using the Java, PL/SQL and other languages.
View Layer
The view layer provides two types of applications; one is RichClient application and another
one is WebClient application. The rich client application processes the data on the client side
and contains some locally installed programs little network resources dependance. The web
client is a client server side component which contains applications running on user's computer
and connected to server.
Application Server
The application server includes some functionalities such as workflow, rules, registry, CEP,
ESB, services and systems.
Workflow
The workflow is used when there is an interaction between human and implementation which is
done through the XPDL (XML Process Definition Language). The BPEL (Business Process
Execution Language) was used for runnable processes. When there is an upgrade in human
interaction feature by using the WS-HumanTask and WS-BPEL4People specifications, results
in blur boundaries of automated service calls.
Rules
The rules can be modified or changed commonly at run time when they are not incorporated in
the system. You can define the rules which are based on the system or natural language, before
becoming accessible by using the interfaces such as Java, Web service etc. The products
contains rules like JBoss rules, WebSphere ILOG rules, Visual rules and Oracle business rules.
CEP
The CEP stands for Complex Event Processing which allows to browse event streams based on
the certain pattern which can be uncorrelated in time or content. The Continuous Query
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 4
CS802 (B) Cloud Computing AIST SAGAR
Language (CQL) language contains SQL-style query language which attaches the elements for
organizing the data streams to the SQL language constructs.
ESB
The ESB stands for Enterprise Service Bus which gives patterns that are liable for the tasks and
ranges from routing to reachability, allow the interaction between message and protocol
transformation and manages the SOA environment. The ESB is placed between service provider
and consumer which is used for service virtualization. The services and systems are attached to
the ESB.
Description
The service is a kind of operation which is well defined, self contained that performs a specific
task.
The following figure shows SOA service categories:
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 5
CS802 (B) Cloud Computing AIST SAGAR
LECTURE 2 [UNIT-I]
WEB SERVICES:
The service can be categorized into following ways:
Entity Service
The entity services include entities of customer such as purchase order, insurance policy,
invoice of order, ordered date etc in which you can perform CRUD operations such as Create,
Read, Delete and Update on the entities. These services provide information of the business
process stored in the databases and handle the business entities.
Task Service
The task service adds the business logic to other services and due to its focus on business entity,
it contains low amount of reusability. Task services provide operations on more than one entity
such as customer purchase order, creating purchase order number, validating customer details
etc. A service is called as task service when it needs to access the multiple entities.
Utility Service
The utility services are technology oriented services which are used to build larger and higher
level services and provides other capabilities which are unrelated to the message transfer. The
utility services provide reusable functions such as event logging, creating unique number and
notification etc to the other functional domains. These services contain small, closely packed
services which are used as building blocks in service oriented system.
Proxy Service
The proxy services contain the services which act as connection between members of the
service oriented system and conflict subsystem. The device and process services lie under this
type of services. Sometimes services which are defined under proxy services are called as
gateway services.
Device Service
The device service is a kind of proxy service which is referred as hardware device and used to
communicate between other services. The device service does not include the API which is not
well suited with the service oriented system.
Process Service
The device service is also a kind of proxy service which acts as interpreter between application
and service oriented system members. This service creates and arranges the application services
to implement the business processes.
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 6
CS802 (B) Cloud Computing AIST SAGAR
SOAP
Points to Note
SOAP is a communication protocol designed to communicate via Internet.
SOAP can extend HTTP for XML messaging.
SOAP provides data transport for Web services.
SOAP can exchange complete documents or call a remote procedure.
SOAP can be used for broadcasting a message.
SOAP is platform- and language-independent.
SOAP is the XML way of defining what information is sent and how.
SOAP enables client applications to easily connect to remote services and invoke remote
methods.
Although SOAP can be used in a variety of messaging systems and can be delivered via a
variety of transport protocols, the initial focus of SOAP is remote procedure calls transported
via HTTP.
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 7
CS802 (B) Cloud Computing AIST SAGAR
Other frameworks including CORBA, DCOM, and Java RMI provide similar functionality to
SOAP, but SOAP messages are written entirely in XML and are therefore uniquely platform-
and language-independent.
UDDI AND WSDL :
The UDDI data model defines a generic structure for storing information about a business and
the web services it publishes. The UDDI data model is completely extensible, including several
repeating sequence structures of information.
However, WSDL is used to describe the interface of a web service. WSDL is fairly
straightforward to use with UDDI.
WSDL is represented in UDDI using a combination of business Service,
bindingTemplate, and tModel information.
As with any service registered in UDDI, generic information about the service is stored
in the business Service data structure, and information specific to how and where the
service is accessed is stored in one or more associated binding Template structures.
Each binding Template structure includes an element that contains the network address
of the service and has associated with it one or more tModel structures that describe and
uniquely identify the service.
When UDDI is used to store WSDL information, or pointers to WSDL files,
the tModel should be referred to by convention as type wsdlSpec, meaning that
the overview Doc element is clearly identified as pointing to a WSDL service interface
definition.
For UDDI, WSDL contents are split into two major elements the interface file and the
implementation file.
The Hertz reservation system web service provides a concrete example of how UDDI and
WSDL works together. Here is the <tModel> for this web service −
<tModelauthorizedName="..."operator="..."tModelKey="...">
<name>HertzReserveService</name>
<descriptionxml:lang="en">
WSDL description of the Hertz reservation service interface
</description>
<overviewDoc>
<descriptionxml:lang="en">
WSDL source document.
</description>
<overviewURL>
http://mach3.ebphost.net/wsdl/hertz_reserve.wsdl
</overviewURL>
</overviewDoc>
<categoryBag>
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 8
CS802 (B) Cloud Computing AIST SAGAR
<keyedReferencetModelKey="uuid:C1ACF26D-9672-4404-9D70-39B756E62AB4"
keyName="uddi-org:types"keyValue="wsdlSpec"/>
</categoryBag>
</tModel>
The key points are −
The overview URL element gives the URL to where the service interface definition
WSDL file can be found. This allows humans and UDDI/WSDL aware tools to locate
the service interface definition.
The purpose of the keyed Reference element in the category Bag is to make sure that this
Model is categorized as a WSDL specification document.
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 9
CS802 (B) Cloud Computing AIST SAGAR
LECTURE 3 [UNIT-I]
RESTful Web Services are basically REST Architecture based Web Services. In REST
Architecture everything is a resource. RESTful web services are light weight, highly scalable and
maintainable and are very commonly used to create APIs for web-based applications. This
tutorial will teach you the basics of RESTful Web Services and contains chapters discussing all
the basic components of RESTful Web Services with suitable examples.
HTTP methods
Following four HTTP methods are commonly used in REST based architecture.
GET − Provides a read only access to a resource.
POST − Used to create a new resource.
DELETE − Used to remove a resource.
PUT − Used to update a existing resource or create a new resource.
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 10
CS802 (B) Cloud Computing AIST SAGAR
Cloud Computing provides us means of accessing the applications as utilities over the Internet.
It allows us to create, configure, and customize the applications online.
SOFTWARE AS A SERVICE:
SaaS is also known as "On-Demand Software." It is a software distribution model in which services
are hosted by a cloud service provider. These services are available to end-users over the internet, so
the end-users do not need to install any software on their devices to access these services.
Fig 3: SAAS
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 11
CS802 (B) Cloud Computing AIST SAGAR
Characteristics of SaaS:
o Web-based Delivery: SaaS apps can be accessed from anywhere with an internet connection
because they are supplied over the internet, often through a web browser. Users no longer need to
install and maintain software programs on their local machines as a result.
o Multiple Users or "tenants" can access SaaS applications from a single instance of the program
thanks to the concept of multi-tenancy. As a result, the provider can serve several clients with the
same application without administering unique program instances for every client.
o Automatic Updates: SaaS providers are in charge of keeping the software up to date and making
sure that everyone has access to the newest features and security patches. Users are no longer
required to manually install updates or fixes as a result.
o Scalable: SaaS systems are scalable, which can readily grow or shrink in response to user
demand. This frees up enterprises from worrying about infrastructure or licensing fees and lets
them add or remove users as needed.
o Pricing on a Subscription Basis: SaaS programs are frequently sold using a subscription-based
pricing model, in which customers pay a monthly or yearly price to access the program. As a
result, companies won't need to invest significantly in software licenses upfront.
o Data Security, including data encryption, access restrictions, and backups, is the responsibility of
SaaS providers. Users no longer need to handle their own data security because of this.
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 12
CS802 (B) Cloud Computing AIST SAGAR
LECTURE 4 [UNIT-I]
PLATFORM AS A SERVICE
Fig 4: PaaS
PaaS includes infrastructure (servers, storage, and networking) and platform (middleware,
development tools, database management systems, business intelligence, and more) to support
the web application life cycle.
Databases: Managed database services are provided by PaaS providers, making it simple for
developers to store and retrieve data. These services support relational databases (like MySQL,
PostgreSQL, and Microsoft SQL Server) and NoSQL databases (like MongoDB, Cassandra, and
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 13
CS802 (B) Cloud Computing AIST SAGAR
Redis). For its database services, PaaS platforms often offer automated backups, scalability, and
monitoring tools.
Additional Tools and Services: PaaS providers provide a range of extra tools and services to
aid in the lifecycle of application development and deployment. These may consist of the
following:
What is Cloud?
The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is
something, which is present at remote location. Cloud can provide services over public and
private networks, i.e., WAN, LAN or VPN.
Applications such as e-mail, web conferencing, customer relationship management (CRM)
execute on cloud.
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 14
CS802 (B) Cloud Computing AIST SAGAR
Cloud computing offers platform independency, as the software is not required to be installed
locally on the PC. Hence, the Cloud Computing is making our business
applications mobile and collaborative.
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 15
CS802 (B) Cloud Computing AIST SAGAR
LECTURE 5 [UNIT-I]
Basic Concepts
There are certain services and models working behind the scene making the cloud computing
feasible and accessible to end users. Following are the working models for cloud computing:
Deployment Models
Service Models
Deployment Models
Deployment models define the type of access to the cloud, i.e., how the cloud is located? Cloud
can have any of the four types of access: Public, Private, Hybrid, and Community.
Public Cloud
The public cloud allows systems and services to be easily accessible to the general public.
Public cloud may be less secure because of its openness.
Private Cloud
The private cloud allows systems and services to be accessible within an organization. It is
more secured because of its private nature.
Community Cloud
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 16
CS802 (B) Cloud Computing AIST SAGAR
Hybrid Cloud
The hybrid cloud is a mixture of public and private cloud, in which the critical activities are
performed using private cloud while the non-critical activities are performed using public cloud.
Service Models
Cloud computing is based on service models. These are categorized into three basic service
models which are -
Infrastructure-as–a-Service (IaaS)
Platform-as-a-Service (PaaS)
Software-as-a-Service (SaaS)
Anything-as-a-Service (XaaS) is yet another service model, which includes Network-as-a-
Service, Business-as-a-Service, Identity-as-a-Service, Database-as-a-Service or Strategy-as-a-
Service.
The Infrastructure-as-a-Service (IaaS) is the most basic level of service. Each of the service
models inherit the security and management mechanism from the underlying model, as shown
in the following diagram:
Infrastructure-as-a-Service (IaaS)
IaaS provides access to fundamental resources such as physical machines, virtual machines,
virtual storage, etc.
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 17
CS802 (B) Cloud Computing AIST SAGAR
Platform-as-a-Service (PaaS)
PaaS provides the runtime environment for applications, development and deployment tools,
etc.
Software-as-a-Service (SaaS)
SaaS model allows to use software applications as a service to end-users.
Benefits
Cloud Computing has numerous advantages. Some of them are listed below -
One can access applications as utilities, over the Internet.
One can manipulate and configure the applications online at any time.
It does not require to install a software to access or manipulate cloud application.
Cloud Computing offers online development and deployment tools, programming
runtime environment through PaaS model.
Cloud resources are available over the network in a manner that provide platform
independent access to any type of clients.
Cloud Computing offers on-demand self-service. The resources can be used without
interaction with cloud service provider.
Cloud Computing is highly cost effective because it operates at high efficiency with
optimum utilization. It just requires an Internet connection
Cloud Computing offers load balancing that makes it more reliable.
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 18
CS802 (B) Cloud Computing AIST SAGAR
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 19
CS802 (B) Cloud Computing AIST SAGAR
Cloud Computing allows the users to use web services and resources on demand. One can logon
to a website at any time and use them.
Resource Pooling
Cloud computing allows multiple tenants to share a pool of resources. One can share single
physical instance of hardware, database and basic infrastructure.
Rapid Elasticity
It is very easy to scale the resources vertically or horizontally at any time. Scaling of resources
means the ability of resources to deal with increasing or decreasing demand.
The resources being used by customers at any given point of time are automatically monitored.
Measured Service
In this service cloud provider controls and monitors all the aspects of cloud service. Resource
optimization, billing, and capacity planning etc. depend on it.
In this Lecture we will discuss a few important questions around Cloud Monitoring.
But before we delve deeper into each section, you must keep in mind that the big
responsibility lies on cloud managers who need to leverage the right tools if they want to
successfully monitor mission critical applications in the cloud environment.
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 20
CS802 (B) Cloud Computing AIST SAGAR
LECTURE 6 [UNIT-I]
Cloud Monitoring
Cloud monitoring can be defined as the process of closely observing cloud-based
applications and services. It’s the process of controlling and reviewing the operational
workflow and processes within the cloud infrastructure.
This process involves use of manual as well as automated IT monitoring (with ITOM / NMS
tools) and certain cloud infrastructure management techniques to make sure it performs
optimally & efficiently.
Generally, admins have the authority to review the health and operational status of cloud
servers and components.
Concerns emerge based on the kind of cloud structure the organization has, and how they
utilize it. In case they are utilizing an open cloud infra, they will in general have limited
control for managing the IT infra. A private cloud, which most organizations use, offers
more control and adaptability, with included utilization benefits.
No matter what kind of cloud structure a company uses, monitoring is an important part of
performance and security.
There are several elements that have to work in sync to optimize performance. Cloud
monitoring primarily includes the following:
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 21
CS802 (B) Cloud Computing AIST SAGAR
There are different types of cloud services that needs monitoring. It is not only about
monitoring servers hosted on Google App Engine, Azure or AWS. For enterprise customers
it is all about monitoring what they consume (IT Infrastructure – Application, Database, OS,
Server, Network etc.) and use in their daily operations bifurcated into what they manage and
what the vendor manages.
Cloud monitoring tools are essential as they provide monitoring, management, reports and
can even alert you to possible service disruptions. Cloud monitoring he lps in minimizing
downtime and optimizing performance. Following are some of the ways to proactively
manage the cloud and avoid frequent issues:
Data Security: For security it is important to attain strict control over data at all endpoints,
thus minimizing risks. Quick fixes that analyze, scan and take action on data as it leaves the
network help protect against data loss. It’s also crucial to scan, evaluate and analyze
incoming data to avoid malware and data breaches before it’s downloaded to the network.
APIs: The cloud can have multitude of performance issues due to poorly constructed APIs.
Poor cloud API performance can be avoided by using APIs that work via objects instead of
operations. Eventually there’ll be fewer individual API calls and less traffic. APIs with few
data type restrictions and logical design results in improved performance.
To pinpoint where and when delay occurs you need to follow an application’s workflow.
Tools that track consumption, performance and availability are required for monitoring the
cloud while guaranteeing the secure transfer of data.
No IT infrastructure required
No CAPEX – only pay monthly subscription
Quick Setup and Installation as infrastructure is already in place
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 22
CS802 (B) Cloud Computing AIST SAGAR
As per Gartner, I&O leaders should implement the following to cope up with the increased
demand especially during the rapid digitalization that’s kicking in:
Expanding workload capacity on-premise with the help of public cloud services
With the help of cloud native architecture IT leaders can auto scale & build up
capacity for surged demand
Real time performance monitoring to ensure the continuity of business operations
On-premise data centers may not be able to handle the surge in demand, moving to
cloud is a smart move
Leveraging multi-cloud tools to prevent resource shortfalls in specific areas.
Cloud monitoring makes it simple to analyses patterns and detect potential security risks in
the cloud infrastructure.
Following are some of the key capabilities:
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 23
CS802 (B) Cloud Computing AIST SAGAR
A hybrid cloud setting presents uncommon challenges because data consists in both
the public and private cloud. Constraints regarding compliance and security can
create problems for data accessing users.
Admins can clarify performance issues by identifying in which cloud the data has to
be stored in addition to what data to update.
Synchronization of data can be a roadblock as well, but segregating data into faster
and smaller parts helps in diminishing issues.
Even though private cloud grants more control, to ensure optimum performance one still
need to monitor workloads.
If you don’t have a clear view of workload and network performance, then you won’t be
able to justify architectural or configuration changes, for a better quality of service
implementations or other technologies.
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 24
CS802 (B) Cloud Computing AIST SAGAR
LECTURE 7 [UNIT-I]
Hypervisor
A hypervisor, also known as a virtual machine monitor or VMM. The hypervisor is a piece of
software that allows us to build and run virtual machines which are abbreviated as VMs.
A hypervisor allows a single host computer to support multiple virtual machines (VMs) by
sharing resources including memory and processing.
Hypervisors allow the use of more of a system's available resources and provide greater IT
versatility because the guest VMs are independent of the host hardware which is one of the major
benefits of the Hypervisor.
In other words, this implies that they can be quickly switched between servers. Since a
hypervisor with the help of its special feature, it allows several virtual machines to operate on a
single physical server. So, it helps us to reduce:
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 25
CS802 (B) Cloud Computing AIST SAGAR
Kinds of Hypervisors
There are two types of hypervisors: "Type 1" (also known as "bare metal") and "Type 2" (also
known as "hosted"). A type 1 hypervisor functions as a light operating system that operates
directly on the host's hardware, while a type 2 hypervisor functions as a software layer on top of
an operating system, similar to other computer programs.
Since they are isolated from the attack-prone operating system, bare-metal hypervisors are
extremely stable.
Furthermore, they are usually faster and more powerful than hosted hypervisors. For these
purposes, the majority of enterprise businesses opt for bare-metal hypervisors for their data
center computing requirements.
While hosted hypervisors run inside the OS, they can be topped with additional (and different)
operating systems.
The hosted hypervisors have longer latency than bare-metal hypervisors which is a very major
disadvantage of the it. This is due to the fact that contact between the hardware and the
hypervisor must go through the OS's extra layer.
The native or bare metal hypervisor, the Type 1 hypervisor is known by both names.
It replaces the host operating system, and the hypervisor schedules VM services directly to the
hardware.
The type 1 hypervisor is very much commonly used in the enterprise data center or other server-
based environments.
It includes KVM, Microsoft Hyper-V, and VMware vSphere. If we are running the updated
version of the hypervisor then we must have already got the KVM integrated into the Linux
kernel in 2007.
It is also known as a hosted hypervisor, The type 2 hypervisor is a software layer or framework
that runs on a traditional operating system.
It operates by separating the guest and host operating systems. The host operating system
schedules VM services, which are then executed on the hardware.
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 26
CS802 (B) Cloud Computing AIST SAGAR
Individual users who wish to operate multiple operating systems on a personal computer should
use a form 2 hypervisor.
This type of hypervisor also includes the virtual machines with it.
Hardware acceleration technology improves the processing speed of both bare-metal and hosted
hypervisors, allowing them to build and handle virtual resources more quickly.
On a single physical computer, all types of hypervisors will operate multiple virtual servers for
multiple tenants. Different businesses rent data space on various virtual servers from public
cloud service providers. One server can host multiple virtual servers, each of which is running
different workloads for different businesses.
Hypervisors are a key component of the technology that enables cloud computing since they are
a software layer that allows one host device to support several virtual machines at the same time.
Hypervisors allow IT to retain control over a cloud environment's infrastructure, processes, and
sensitive data while making cloud-based applications accessible to users in a virtual
environment.
Having to rewrite any existing application for the cloud, on the other hand, will eat up valuable
IT resources and create infrastructure silos.
A hypervisor also helps in the rapid migration of applications to the cloud as being a part of a
virtualization platform.
As a result, businesses will take advantage of the cloud's many advantages, such as lower
hardware costs, improved accessibility, and increased scalability, for a quicker return on
investment.
Benefits of hypervisors
o Speed: The hypervisors allow virtual machines to be built instantly unlike bare-metal
servers. This makes provisioning resources for complex workloads much simpler.
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 27
CS802 (B) Cloud Computing AIST SAGAR
o Efficiency: Hypervisors that run multiple virtual machines on the resources of a single
physical machine often allow for more effective use of a single physical server.
o Flexibility: Since the hypervisor distinguishes the OS from the underlying hardware, the
program no longer relies on particular hardware devices or drivers, bare-metal
hypervisors enable operating systems and their related applications to operate on a variety
of hardware types.
o Portability: Multiple operating systems can run on the same physical server thanks to
hypervisors (host machine). The hypervisor's virtual machines are portable because they
are separate from the physical computer.
VIDEO REFERENCES:
1) https://youtu.be/KDPEVT-PylU?list=PLL7liBDYa4YaKc07Ht4YWc1ZLSpiUFOnC
2) https://youtu.be/_wWygQt2z1M?list=PLL7liBDYa4YaKc07Ht4YWc1ZLSpiUFOn
C
3) https://youtu.be/fMVYlGDj7cA?list=PLL7liBDYa4YaKc07Ht4YWc1ZLSpiUFOnC
4) https://youtu.be/5G0L7XCt6XQ
5) https://youtu.be/CaHBhnc1e_I
QUICK QUESTIONS:
Mrs.Monali Sahoo, Asst. Professor, Department of Computer Science and Engineering Page | 28