SlideShare ist ein Scribd-Unternehmen logo
1 von 15
M Tech (CS) / MCA Cloud Computing
3: Virtualization
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharishi Dayanand Saraswati University Ajmer
Virtualization
• Virtualization is the process of creating a virtual version
of an operating system, computer, application, or any
computing resource. Partitioning a hard drive is also a
virtualization. The term is virtualization as the users or
applications can communicate with the virtual
resources just like these would with logical resources.
Using this process, multiple operating systems can run
on a system. The logical view of resources makes it
easier to enhance the performance of resources. The
key benefit of virtualization is that it makes your
infrastructure more efficient. The performance,
availability of resources, and automation becomes
better.
Virtualization
• Virtualization is essentially a technology that allows
creation of different computing environments. These
environments are called virtual because they simulate
the interface that is expected by a guest.
• Virtualization technologies are also used to replicate
runtime environments for programs. Applications in
the case of process virtual machines (which include the
foundation of technologies such as Java or .NET),
instead of being executed by the operating system, are
run by a specific program called a virtual machine. This
technique allows isolating the execution of applications
and providing a finer control on the resource they
access.
Flavors of Virtualization
AggregationSharing Emulation Isolation Virtualization
Physical
Resources
Virtual
Resources
Virtualization Layer
Virtual Hardware Virtual NetworkingVirtual Storage
Software Emulation
Host Physical Hardware Physical Storage Physical Networking
Guest ApplicationsApplicationsVirtual Image
Storage Virtualization
• This involves the process of combining physical storage
devices into one virtualized storage environment. This
technology helps in the separation of physical storage
systems from virtual storage partitions. It is extremely
helpful for administrators to have extended control
over the resources and in turn, for the storage
allocation across users and projects. Migrating data
from one storage device to another can also be done
seamlessly, without the end users being impacted. This
technology is often used parallel with server
virtualization to reduce costs and for easier
implementation.
• The conversion of a physical system to a virtual
system is termed as Hardware Virtualization. The
Virtual Machine performs just like a physical
machine. The software and applications remain
on the physical system. The virtual image of the
software and applications is what is installed on
the virtual server and accessed by the virtual
machine. This is the most commonly used type of
virtualization owing to the ease of upgrades, cost
factor, and enhanced usage.
Hardware Virtualization
• In this type of virtualization, the operating system
of a desktop system is moved to a virtual
environment. So, the while the system is your
physical one, the operating system is hosted on a
virtual server, located somewhere else. The
advantage of moving the operating system to the
virtual server is that the copies of the same
operating system can be used by multiple users.
You would require a Virtual Machine Manager for
this model to work. This technology definitely
saves cost on the extra systems and operating
systems.
Operating system Virtualization
Operative Systems
ExecutionStack
Hardware - level
Virtualization
Hardware
Programming Languages
Applications
OS- level Virtualization
Programming Language
level Virtualization
Application - level
Virtualization
Virtualization vs Cloud Computing
• A popular IT myth is that Virtualization and Cloud
Computing are the same and that the terms can be
used interchangeably. But the fact is that though there
are similarities between the two technologies, both are
different in application and use. The primary difference
being that virtualization is a technology to create
virtual data and cloud computing is a service offering
this virtual data. Virtualization technology can be called
as the foundational unit for cloud computing. To
explain better, if cloud computing is the service,
virtualization is an element of the infrastructure
promoting cloud.
Virtualization vs Cloud Computing
• Both the technologies are used to maximize the
usage of computing resources. They work
towards increasing the performance and
efficiency and also reduce the costs involved. To
decide whether virtualization or cloud is best for
your business, you need to analyze your business
requirements. On the cost front, for
virtualization, the initial cost involved is more but
operational expenditure is lesser. While, for
cloud, initial cost is less but as users and demand
for resources increase, the operational
expenditure also increases.
Multi Tenancy
• Multi-tenancy is an important aspect in the functioning of
cloud computing and virtualization enables it. When an
instance of a software or applications runs on a server and
serves multiple tenants (client-organizations), the principle
behind this model is termed as Multi tenancy. In the multi
tenancy architecture, the application or software has its
data and properties virtually partitioned, so that each user
has a custom virtual software or application to use. Each
user’s data is separated and not visible to the other users.
• An economical factor driving the importance of cloud is
that development and maintenance expenses would be
shared by the end users.
Resiliency
• The failover mechanism that distributes redundant IT and
computing resource implementations across different
physical locations is known as Resilient computing. This
process is important in cloud computing because if one of
the resource is down or unavailable, the next redundant
implementation takes over the roles. So that end user is not
impacted by the downtime. The failover order can be
preconfigured. In cloud computing, resiliency can be those
redundant resources on the same cloud, but located at
geographically different location, or even on different
clouds.
• This technology helps increase the availability and trust on
the cloud applications and resources.
Cloud Ecosystem
• This is a term that describes the complex framework of
the interdependent resources that work in-sync to
enable the services of a cloud. In cloud computing, this
ecosystem involves the components such as software,
applications, and the infrastructure, as well as the
vendors, users, integrators, and any others who play a
role in enabling the services and functions of the cloud.
This collective group of the functions and capabilities
from the different organizations, platforms, and
services, together form the cloud ecosystem. There are
many layers within this computing model and these
enable the working of the dynamic environments
dependent on the model.
Virtualization
Execution
Environment
Storage
Network
….
Emulation
High-Level VM
Multiprogramming
Hardware-assisted
Virtualization
Process Level
System Level
Paravirtualization
Full Virtualization
How it is done? Technique Virtualization Model
Application
Programming
Language
Operating
System
Hardware
Partial Virtualization

Weitere ähnliche Inhalte

Was ist angesagt?

Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computingeShikshak
 
Above the Clouds: A Berkeley View of Cloud Computing: Paper Review
Above the Clouds: A Berkeley View of Cloud Computing:  Paper Review Above the Clouds: A Berkeley View of Cloud Computing:  Paper Review
Above the Clouds: A Berkeley View of Cloud Computing: Paper Review Mala Deep Upadhaya
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...IEEEFINALYEARPROJECTS
 
33. dynamic resource allocation using virtual machines
33. dynamic resource allocation using virtual machines33. dynamic resource allocation using virtual machines
33. dynamic resource allocation using virtual machinesmuhammed jassim k
 
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Survey on Dynamic Resource Allocation Strategy in Cloud Computing EnvironmentSurvey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Survey on Dynamic Resource Allocation Strategy in Cloud Computing EnvironmentEditor IJCATR
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing PresentationMohammed Kharma
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101Chris Yeo
 
Sonu seminar ppt
Sonu seminar pptSonu seminar ppt
Sonu seminar pptAjay Chawda
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computingeShikshak
 
Cloud Technology Ecosystems
Cloud Technology EcosystemsCloud Technology Ecosystems
Cloud Technology EcosystemsJoseph Jacks
 
Virtualization and Cloud Computing
Virtualization and Cloud ComputingVirtualization and Cloud Computing
Virtualization and Cloud ComputingJosh Folgado
 
Cloud-computing part 1
Cloud-computing part 1Cloud-computing part 1
Cloud-computing part 1pallavi_gaurav
 
Next basepresentation
Next basepresentationNext basepresentation
Next basepresentationShiyam Hoda
 
Mod05lec22(cloudonomics tutorial)
Mod05lec22(cloudonomics tutorial)Mod05lec22(cloudonomics tutorial)
Mod05lec22(cloudonomics tutorial)Ankit Gupta
 
Performance analysis of an energy efficient virtual machine consolidation alg...
Performance analysis of an energy efficient virtual machine consolidation alg...Performance analysis of an energy efficient virtual machine consolidation alg...
Performance analysis of an energy efficient virtual machine consolidation alg...IAEME Publication
 
Cloud Computing by Khalil Jubran-Mindspring Networks
Cloud Computing  by Khalil Jubran-Mindspring NetworksCloud Computing  by Khalil Jubran-Mindspring Networks
Cloud Computing by Khalil Jubran-Mindspring NetworksKhalil Jubran
 

Was ist angesagt? (20)

Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computing
 
Above the Clouds: A Berkeley View of Cloud Computing: Paper Review
Above the Clouds: A Berkeley View of Cloud Computing:  Paper Review Above the Clouds: A Berkeley View of Cloud Computing:  Paper Review
Above the Clouds: A Berkeley View of Cloud Computing: Paper Review
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
 
33. dynamic resource allocation using virtual machines
33. dynamic resource allocation using virtual machines33. dynamic resource allocation using virtual machines
33. dynamic resource allocation using virtual machines
 
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Survey on Dynamic Resource Allocation Strategy in Cloud Computing EnvironmentSurvey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
 
Sonu seminar ppt
Sonu seminar pptSonu seminar ppt
Sonu seminar ppt
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
 
Cloud Technology Ecosystems
Cloud Technology EcosystemsCloud Technology Ecosystems
Cloud Technology Ecosystems
 
Class 2
Class 2Class 2
Class 2
 
Virtualization and Cloud Computing
Virtualization and Cloud ComputingVirtualization and Cloud Computing
Virtualization and Cloud Computing
 
Cloud-computing part 1
Cloud-computing part 1Cloud-computing part 1
Cloud-computing part 1
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Next basepresentation
Next basepresentationNext basepresentation
Next basepresentation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Mod05lec22(cloudonomics tutorial)
Mod05lec22(cloudonomics tutorial)Mod05lec22(cloudonomics tutorial)
Mod05lec22(cloudonomics tutorial)
 
CLOUD COMPUTING
CLOUD COMPUTINGCLOUD COMPUTING
CLOUD COMPUTING
 
Performance analysis of an energy efficient virtual machine consolidation alg...
Performance analysis of an energy efficient virtual machine consolidation alg...Performance analysis of an energy efficient virtual machine consolidation alg...
Performance analysis of an energy efficient virtual machine consolidation alg...
 
Cloud Computing by Khalil Jubran-Mindspring Networks
Cloud Computing  by Khalil Jubran-Mindspring NetworksCloud Computing  by Khalil Jubran-Mindspring Networks
Cloud Computing by Khalil Jubran-Mindspring Networks
 

Ähnlich wie Cloud computing virtualization

Virtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.pptVirtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.pptMohammadArmanulHaque
 
Virtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A ReviewVirtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A Reviewijtsrd
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Dynamic resource allocation using...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Dynamic resource allocation using...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Dynamic resource allocation using...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Dynamic resource allocation using...IEEEGLOBALSOFTTECHNOLOGIES
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introductionguest90f660
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud ComputingLiming Liu
 
Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxSURBHI SAROHA
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready referenceHelly Patel
 
e-suap cloud computing- English version
e-suap cloud computing- English versione-suap cloud computing- English version
e-suap cloud computing- English versionSabino Labarile
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingNyakeob
 
2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docxshruti533256
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxbudabrooks46239
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxgarkhot123
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 

Ähnlich wie Cloud computing virtualization (20)

Virtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.pptVirtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.ppt
 
Virtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A ReviewVirtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A Review
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Dynamic resource allocation using...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Dynamic resource allocation using...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Dynamic resource allocation using...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Dynamic resource allocation using...
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready reference
 
e-suap cloud computing- English version
e-suap cloud computing- English versione-suap cloud computing- English version
e-suap cloud computing- English version
 
Cloud Services: Types of Cloud
Cloud Services: Types of CloudCloud Services: Types of Cloud
Cloud Services: Types of Cloud
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
M1802028591
M1802028591M1802028591
M1802028591
 
2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx2-Virtualization in Cloud Computing and Types.docx
2-Virtualization in Cloud Computing and Types.docx
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptx
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
Performance Evaluation of Virtualization Technologies for Server
Performance Evaluation of Virtualization Technologies for ServerPerformance Evaluation of Virtualization Technologies for Server
Performance Evaluation of Virtualization Technologies for Server
 

Mehr von Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applicationsVaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesVaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeVaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication codeVaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmVaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmVaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationVaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremVaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primalityVaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbersVaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfishVaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple desVaibhav Khanna
 

Mehr von Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Kürzlich hochgeladen

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 

Kürzlich hochgeladen (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 

Cloud computing virtualization

  • 1. M Tech (CS) / MCA Cloud Computing 3: Virtualization Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharishi Dayanand Saraswati University Ajmer
  • 2. Virtualization • Virtualization is the process of creating a virtual version of an operating system, computer, application, or any computing resource. Partitioning a hard drive is also a virtualization. The term is virtualization as the users or applications can communicate with the virtual resources just like these would with logical resources. Using this process, multiple operating systems can run on a system. The logical view of resources makes it easier to enhance the performance of resources. The key benefit of virtualization is that it makes your infrastructure more efficient. The performance, availability of resources, and automation becomes better.
  • 3. Virtualization • Virtualization is essentially a technology that allows creation of different computing environments. These environments are called virtual because they simulate the interface that is expected by a guest. • Virtualization technologies are also used to replicate runtime environments for programs. Applications in the case of process virtual machines (which include the foundation of technologies such as Java or .NET), instead of being executed by the operating system, are run by a specific program called a virtual machine. This technique allows isolating the execution of applications and providing a finer control on the resource they access.
  • 4. Flavors of Virtualization AggregationSharing Emulation Isolation Virtualization Physical Resources Virtual Resources
  • 5. Virtualization Layer Virtual Hardware Virtual NetworkingVirtual Storage Software Emulation Host Physical Hardware Physical Storage Physical Networking Guest ApplicationsApplicationsVirtual Image
  • 6. Storage Virtualization • This involves the process of combining physical storage devices into one virtualized storage environment. This technology helps in the separation of physical storage systems from virtual storage partitions. It is extremely helpful for administrators to have extended control over the resources and in turn, for the storage allocation across users and projects. Migrating data from one storage device to another can also be done seamlessly, without the end users being impacted. This technology is often used parallel with server virtualization to reduce costs and for easier implementation.
  • 7. • The conversion of a physical system to a virtual system is termed as Hardware Virtualization. The Virtual Machine performs just like a physical machine. The software and applications remain on the physical system. The virtual image of the software and applications is what is installed on the virtual server and accessed by the virtual machine. This is the most commonly used type of virtualization owing to the ease of upgrades, cost factor, and enhanced usage. Hardware Virtualization
  • 8. • In this type of virtualization, the operating system of a desktop system is moved to a virtual environment. So, the while the system is your physical one, the operating system is hosted on a virtual server, located somewhere else. The advantage of moving the operating system to the virtual server is that the copies of the same operating system can be used by multiple users. You would require a Virtual Machine Manager for this model to work. This technology definitely saves cost on the extra systems and operating systems. Operating system Virtualization
  • 9. Operative Systems ExecutionStack Hardware - level Virtualization Hardware Programming Languages Applications OS- level Virtualization Programming Language level Virtualization Application - level Virtualization
  • 10. Virtualization vs Cloud Computing • A popular IT myth is that Virtualization and Cloud Computing are the same and that the terms can be used interchangeably. But the fact is that though there are similarities between the two technologies, both are different in application and use. The primary difference being that virtualization is a technology to create virtual data and cloud computing is a service offering this virtual data. Virtualization technology can be called as the foundational unit for cloud computing. To explain better, if cloud computing is the service, virtualization is an element of the infrastructure promoting cloud.
  • 11. Virtualization vs Cloud Computing • Both the technologies are used to maximize the usage of computing resources. They work towards increasing the performance and efficiency and also reduce the costs involved. To decide whether virtualization or cloud is best for your business, you need to analyze your business requirements. On the cost front, for virtualization, the initial cost involved is more but operational expenditure is lesser. While, for cloud, initial cost is less but as users and demand for resources increase, the operational expenditure also increases.
  • 12. Multi Tenancy • Multi-tenancy is an important aspect in the functioning of cloud computing and virtualization enables it. When an instance of a software or applications runs on a server and serves multiple tenants (client-organizations), the principle behind this model is termed as Multi tenancy. In the multi tenancy architecture, the application or software has its data and properties virtually partitioned, so that each user has a custom virtual software or application to use. Each user’s data is separated and not visible to the other users. • An economical factor driving the importance of cloud is that development and maintenance expenses would be shared by the end users.
  • 13. Resiliency • The failover mechanism that distributes redundant IT and computing resource implementations across different physical locations is known as Resilient computing. This process is important in cloud computing because if one of the resource is down or unavailable, the next redundant implementation takes over the roles. So that end user is not impacted by the downtime. The failover order can be preconfigured. In cloud computing, resiliency can be those redundant resources on the same cloud, but located at geographically different location, or even on different clouds. • This technology helps increase the availability and trust on the cloud applications and resources.
  • 14. Cloud Ecosystem • This is a term that describes the complex framework of the interdependent resources that work in-sync to enable the services of a cloud. In cloud computing, this ecosystem involves the components such as software, applications, and the infrastructure, as well as the vendors, users, integrators, and any others who play a role in enabling the services and functions of the cloud. This collective group of the functions and capabilities from the different organizations, platforms, and services, together form the cloud ecosystem. There are many layers within this computing model and these enable the working of the dynamic environments dependent on the model.
  • 15. Virtualization Execution Environment Storage Network …. Emulation High-Level VM Multiprogramming Hardware-assisted Virtualization Process Level System Level Paravirtualization Full Virtualization How it is done? Technique Virtualization Model Application Programming Language Operating System Hardware Partial Virtualization