0% found this document useful (0 votes)
67 views17 pages

Ch03 Types and Application of Virtualization

The document outlines various types of virtualization, including hardware, network, storage, memory, software, operating system, data, and desktop virtualization. It details the distinctions between full, partial, and para virtualization, as well as specific implementations like Virtual Desktop Infrastructure (VDI) and Desktop-as-a-Service (DaaS). Additionally, the document explains the processes and benefits of each virtualization type, emphasizing their applications in enhancing performance and flexibility in computing environments.

Uploaded by

Noor Noor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views17 pages

Ch03 Types and Application of Virtualization

The document outlines various types of virtualization, including hardware, network, storage, memory, software, operating system, data, and desktop virtualization. It details the distinctions between full, partial, and para virtualization, as well as specific implementations like Virtual Desktop Infrastructure (VDI) and Desktop-as-a-Service (DaaS). Additionally, the document explains the processes and benefits of each virtualization type, emphasizing their applications in enhancing performance and flexibility in computing environments.

Uploaded by

Noor Noor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Virtual System and Services

Types of Virtualization
Topics to be covered
 Type of Virtualization
Type of Virtualization
 There are many different types of virtualization, each
for varying purposes and application
 Hardware
 Network
 Storage
 Memory
 Software
 Operating System
 Data
 Desktop
Hardware Virtualization
 Full Virtualization
 Bare metal/ Native
 Hosted
 Partial Virtualization
 Para Virtualization

 Full virtualization
 Almost complete simulation of the actual hardware to allow software, which typically consists of a guest
operating system, to run unmodified
 Partial virtualization
 Some but not all of the target environment is simulated
 Some guest programs, therefore, may need modifications to run in this virtual environment
 Para virtualization
 Hardware environment is not fully simulated
 It involves modifying the OS kernel to replace non-virtualizable instructions with hypercalls that directly
communicate with the virtualization layer hypervisor
 The guest programs are executed in their own isolated domains, as if they are running on a separate system
 The hypervisor and the operating system collaborate on the virtualization, requiring operating system changes
but resulting in near native performance
Hardware Virtualization
 Full Virtualization
 Native (bare-metal) hypervisor
 It runs directly on a given hardware
 A "guest" operating system thus runs at the second level above the hardware
 It sits directly on the hardware platform and most likely used to gain better
performance for individual users
 Has complete control over hardware
 Doesn’t have to “fight” an OS
 Hosted hypervisor
 Runs as a distinct software layer above both the hardware and the OS
 Useful both in private and public clouds to gain performance improvements
 Avoid code duplication: need not code a process scheduler, memory management
system – the OS already does that
 Can run native processes alongside VMs
 Familiar environment – how much CPU and memory does a VM take
 Easy management – stop a VM? Sure, just kill it
Hardware Virtualization (Type 1)

Applications Applications Applications Applications

Guest OS 1 OS 2 OS 3 OS 4

Virtualization Platform
Host

Hardware

Example: VMware ESX, Microsoft Hyper-V, Xen


Hardware Virtualization (Type 2)

Applications Applications Applications

Guest OS 1 OS 2 OS 3

Virtualization Platform Applications

Host Base Operating System

Hardware
Examples: VMware Workstation, Microsoft Virtual PC, Sun VirtualBox, QEMU, KVM
Software Virtualization
 OS Level
 Application Service
 Workspace virtualization
 Service virtualization
 Operating system-level virtualization
 hosting of multiple virtualized environments within a single OS instance
 Application virtualization
 It is a software technology that encapsulates application software from the underlying operating
system on which it is executed
 It is the hosting of individual applications in an environment separated from the underlying OS
 Application virtualization is closely associated with the concept of portable applications
 Workspace virtualization
 It is a way of distributing applications to client computers using application virtualization
 It also bundles several applications together into one complete workspace
 It is an approach that encapsulates and isolates an entire computing workspace
 Service virtualization
 It is emulating the behavior of dependent (e.g., third-party, evolving, or not implemented) system
components that are needed to exercise an application under test (AUT) for development or
testing purposes
 Rather than virtualizing entire components, it virtualizes only specific slices of dependent
behavior critical to the execution of development and testing tasks
Memory Virtualization
There are two types of memory virtualization:
 Software-based Virtualization
 Hardware-assisted memory virtualization
 A host performs virtual memory management without the knowledge of the guest operating system and
without interfering with the guest operating system’s own memory management subsystem.
 The VMM for each virtual machine maintains a mapping from the guest operating system's physical
memory pages to the physical memory pages on the underlying machine. (VMware refers to the underlying
host physical pages as “machine” pages and the guest operating system’s physical pages as “physical”
pages.)
 Each virtual machine sees a contiguous, zero-based, addressable physical memory space. The underlying
machine memory on the server used by each virtual machine is not necessarily contiguous.
 For both software-based and hardware-assisted memory virtualization, the guest virtual to guest physical
addresses are managed by the guest operating system. The hypervisor is only responsible for translating the
guest physical addresses to machine addresses. Software-based memory virtualization combines the guest's
virtual to machine addresses in software and saves them in the shadow page tables managed by the
hypervisor. Hardware-assisted memory virtualization utilizes the hardware facility to generate the combined
mappings with the guest's page tables and the nested page tables maintained by the hypervisor.
Memory Virtualization
 Can be implemented on Application Level Integration
OS Level Integration (Application-level
integration – Applications running on connected
computers directly connect to the memory pool
through an API or the file system. Operating System-
Level Integration – The operating system first
connects to the memory pool and makes that
pooled memory available to applications)
Storage Virtualization
 the process of completely abstracting logical storage from physical
storage
 Block Virtualization
 File Virtualization
 Storage virtualization is the process of grouping the physical storage
from multiple network storage devices so that it looks like a single
storage device. Storage virtualization aggregates the functions and
hides the actual complexity of the storage area network (SAN).
 The storage virtualization model can be divided into four
main layers:
 Storage devices
 Block aggregation layer
 File/record layer
 Application layer
Network Virtualization
Network virtualization (NV) refers to abstracting network
resources traditionally delivered in hardware to software. NV
can combine multiple physical networks to one virtual,
software-based network, or it can divide one physical network
into separate, independent virtual networks. 

 Internal Network Virtualization


 External Network Virtualization
 External Network Virtualization Combines multiple
networks or parts of networks into a virtual unit. Internal
virtualization: Uses software containers to mimic or
provide the functionality of a single physical network.
Data Virtualization
 Data virtualization is the process of aggregating data from
different sources of information to develop a single, logical
and virtual view of information so that it can be accessed by
front-end solutions such as applications, dashboards and
portals without having to know the data's exact storage
location
 Data virtualization
 the presentation of data as an abstract layer, independent of
underlying database systems, structures and storage
 Database virtualization
 the decoupling of the database layer, which lies between the
storage and application layers within the application stack over all
Desktop Virtualization
 It is a software technology that separates the desktop
environment and associated application software from the
physical client device that is used to access it
 Virtual Desktop Infrastructure
 Remote desktop services (RDS)
 Desktop-as-a-Service (DaaS)
 It may allow all the components of the desktop to be
virtualized
 which allows for a highly flexible and much more secure desktop
delivery model
Desktop Virtualization
 Virtual desktop infrastructure (VDI)

In virtual desktop infrastructure (VDI), the operating system runs on


a virtual machine (VM) hosted on a server in a data center. The
desktop image travels over the network to the end user’s device,
where the end user can interact with the desktop (and the
underlying applications and operating system) as if they were local.

VDI gives each user his or her own dedicated VM running its own
operating system. The operating system resources—drivers, CPUs,
memory, etc.—operate from a software layer called a hypervisor that
mimics their output, manages the resource allocation to multiple
VMs, and allows them to run side by side on the same server.
Desktop Virtualization
 Remote desktop services (RDS)
 Remote desktop virtualization implementations operate as client/server computing
environments
 In this application execution takes place on a remote operating system which is linked to
the local client device over a network using a remote display protocol through which the
user interacts with applications
 All applications and data used remain on the remote system with only display, keyboard,
and mouse information communicated with the local client device
 Devices can be a conventional PC/laptop, a thin client device, a tablet, or even a Smartphone
 A common implementation of this approach is to host multiple desktop operating system
instances on a server hardware platform running a hypervisor
 It is generally referred to as "Virtual Desktop Infrastructure" or "VDI”
 Remote desktop virtualization is frequently used in the following scenarios
 In distributed environments with high availability requirements and where desk-side technical support is
not readily available, such as branch office and retail environments
 In environments where high network latency degrades the performance of conventional client/server
applications
 In environments where remote access and data security requirements create conflicting requirements
that can be addressed by retaining all (application) data within the data center
Desktop Virtualization
 Desktop-as-a-Service (DaaS)

In desktop as a service (DaaS), VMs are hosted on a cloud-based


backend by a third-party provider. DaaS is readily scalable, can be
more flexible than on-premise solutions, and generally deploys faster
than many other desktop virtualization options.

Like other types of cloud desktop virtualization, DaaS shares many of


the general benefits of cloud computing, including support for
fluctuating workloads and changing storage demands, usage-based
pricing, and the ability to make applications and data accessible from
almost any internet-connected device. The chief drawback to DaaS is
that features and configurations are not always as customizable as
required.

You might also like