SlideShare ist ein Scribd-Unternehmen logo
1 von 3
4. EVALUATION


Overhead

                  Virtualization usually imposes little or no overhead, because programs in
virtual partition use the operating system's normal system call interface and do not need
to be subject to emulation or run in an intermediate virtual machine, as is the case with
whole-system virtualizers (such as VMware andQEMU) or para-virtualizers (such as Xen
and UML). It also does not require hardware assistance to perform efficiently.

Flexibility

                        Operating system-level virtualization is not as flexible as other
virtualization approaches since it cannot host a guest operating system different from the
host one, or a different guest kernel. For example, with Linux, different distributions are
fine, but other OS such as Windows cannot be hosted. This limitation is partially
overcome in Solaris Containers by its branded zones feature, which provides the ability to
run an environment within a container that emulates a Linux 2.4-based release or an older
Solaris release.

Storage

                    Some operating-system virtualizers provide file-level copy-on-write
mechanisms. (Most commonly, a standard file system is shared between partitions, and
partitions which change the files automatically create their own copies.) This is easier to
back up, more space-efficient and simpler to cache than the block-level copy-on-write
schemes common on whole-system virtualizers. Whole-system virtualizers, however,
can work with non-native file systems and create and roll back snapshots of the entire
system state.

Restrictions inside the container

The following actions are often prohibited:


•   Modifying the running kernel by direct access and loading kernel modules.

•   Mounting and dismounting file systems.

•   Creating device nodes.
•   Accessing raw, divert, or routing sockets.

•   Modifying kernel runtime parameters, such as most sysctl settings.

•   Changing secure level-related file flags.

•   Accessing network resources not associated with the container.




                    5. Conclusion and Future Work
               Virtualization technologies have matured to the point where the technology
is being deployed across a wide range of platforms and environments. The usage of
virtualization has gone beyond increasing the utilization of infrastructure, to areas like
data replication and data protection. This white paper looks at the continuing evolution of
virtualization, its potential, some tips on optimizing virtualization as well as how to
future proof the technology.

                   After all, server virtualization's value is well-established. Many, many
companies have migrated significant percentages of their servers to virtual machines
hosted on larger servers, gaining benefits in hardware utilization, energy use, and data
centre space. And those companies that haven't done so thus far are hatching plans to
consolidate their servers in the future. These are all capital or infrastructure costs, though.
What does server virtualization do for human costs—the IT operations piece of the
puzzle?

                Base level server consolidation offers a few benefits for IT operations. It
makes hardware maintenance much easier, since virtual machines can be moved to other
physical servers when it's time to maintain or repair the original server. This moves
hardware maintenance from a weekend and late night effort to a part of the regular
business day—certainly a great convenience.

                 The next step for most companies is to leverage the portability of virtual
machines to achieve IT operational agility. Because virtual machines are captured in disk
images, they are portable, no longer bound to an individual physical server. The ease of
reproducing virtual images means that application capacity can be easily dialed up and
down with the creation or tear down of additional virtual images. Server pooling allows
virtual machines to be automatically migrated according to application load. More
sophisticated virtualization uses include high availability, where virtual machines can be
moved—automatically, by the virtualization management software itself & mdash: when
hardware failures occur. Seeing the magic of a virtual machine automatically being
brought up on a new server after its original host is brought down, all without any human
intervention vividly demonstrates the power of more sophisticated virtualization use.
Certainly these kinds of uses of virtualization demonstrate its power to
transform IT operations, enabling IT organizations to offer the kind of responsiveness
and creativity that could only be dreamed of a few years ago. The deftness with which
applications can be migrated, upsized, down sized, cloned, etc. is something that will
forever change the way IT does its job.

Weitere ähnliche Inhalte

Was ist angesagt?

Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environments
Arun Gopinath
 
Differences between Virtualization and Cloud
Differences between Virtualization and CloudDifferences between Virtualization and Cloud
Differences between Virtualization and Cloud
Duan van der Westhuizen
 

Was ist angesagt? (20)

NCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of VirtualizationNCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of Virtualization
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environments
 
Differences between Virtualization and Cloud
Differences between Virtualization and CloudDifferences between Virtualization and Cloud
Differences between Virtualization and Cloud
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtulization submission
Virtulization submissionVirtulization submission
Virtulization submission
 
Virtualization Security Risks
Virtualization Security RisksVirtualization Security Risks
Virtualization Security Risks
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)
 
Operating system 16 virtual machines
Operating system 16 virtual machinesOperating system 16 virtual machines
Operating system 16 virtual machines
 
Virtualization
VirtualizationVirtualization
Virtualization
 
VMWARE
VMWAREVMWARE
VMWARE
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
 
Virtualization and how it leads to cloud
Virtualization and how it leads to cloudVirtualization and how it leads to cloud
Virtualization and how it leads to cloud
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Virtualization technology and an application of building vm ware
Virtualization technology and an application of building vm wareVirtualization technology and an application of building vm ware
Virtualization technology and an application of building vm ware
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 

Andere mochten auch

Andere mochten auch (7)

Imchub
ImchubImchub
Imchub
 
Il mio lavoro visto dagli ospiti
Il mio lavoro visto dagli ospitiIl mio lavoro visto dagli ospiti
Il mio lavoro visto dagli ospiti
 
Teste2
Teste2Teste2
Teste2
 
BranchOut
BranchOutBranchOut
BranchOut
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation1
Presentation1Presentation1
Presentation1
 
Il mio lavoro visto dagli ospiti
Il mio lavoro visto dagli ospitiIl mio lavoro visto dagli ospiti
Il mio lavoro visto dagli ospiti
 

Ähnlich wie Virtulization

APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
Neha417639
 
virtualization system basic introduction
virtualization system basic introductionvirtualization system basic introduction
virtualization system basic introduction
BadriHjSidek1
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overview
Logicalis
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation Overview
Logicalis
 
1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx
shruti533256
 
virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
XanGwaps
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
budabrooks46239
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
Colloquium
 

Ähnlich wie Virtulization (20)

Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptx
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
 
virtualization system basic introduction
virtualization system basic introductionvirtualization system basic introduction
virtualization system basic introduction
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overview
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation Overview
 
1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx1-Introduction to Virtualization.docx
1-Introduction to Virtualization.docx
 
virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
 
Sna lab prj (1)
Sna lab prj (1)Sna lab prj (1)
Sna lab prj (1)
 
Virtualization
VirtualizationVirtualization
Virtualization
 
VIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptxVIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptx
 
Datacenter migration using vmware
Datacenter migration using vmwareDatacenter migration using vmware
Datacenter migration using vmware
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
 
Gridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage ArchitectureGridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage Architecture
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
virtualization-190329110832.pdf
virtualization-190329110832.pdfvirtualization-190329110832.pdf
virtualization-190329110832.pdf
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
 
The Future of Server Virtualization
The Future of Server VirtualizationThe Future of Server Virtualization
The Future of Server Virtualization
 
virtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxvirtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptx
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Virtulization

  • 1. 4. EVALUATION Overhead Virtualization usually imposes little or no overhead, because programs in virtual partition use the operating system's normal system call interface and do not need to be subject to emulation or run in an intermediate virtual machine, as is the case with whole-system virtualizers (such as VMware andQEMU) or para-virtualizers (such as Xen and UML). It also does not require hardware assistance to perform efficiently. Flexibility Operating system-level virtualization is not as flexible as other virtualization approaches since it cannot host a guest operating system different from the host one, or a different guest kernel. For example, with Linux, different distributions are fine, but other OS such as Windows cannot be hosted. This limitation is partially overcome in Solaris Containers by its branded zones feature, which provides the ability to run an environment within a container that emulates a Linux 2.4-based release or an older Solaris release. Storage Some operating-system virtualizers provide file-level copy-on-write mechanisms. (Most commonly, a standard file system is shared between partitions, and partitions which change the files automatically create their own copies.) This is easier to back up, more space-efficient and simpler to cache than the block-level copy-on-write schemes common on whole-system virtualizers. Whole-system virtualizers, however, can work with non-native file systems and create and roll back snapshots of the entire system state. Restrictions inside the container The following actions are often prohibited: • Modifying the running kernel by direct access and loading kernel modules. • Mounting and dismounting file systems. • Creating device nodes.
  • 2. Accessing raw, divert, or routing sockets. • Modifying kernel runtime parameters, such as most sysctl settings. • Changing secure level-related file flags. • Accessing network resources not associated with the container. 5. Conclusion and Future Work Virtualization technologies have matured to the point where the technology is being deployed across a wide range of platforms and environments. The usage of virtualization has gone beyond increasing the utilization of infrastructure, to areas like data replication and data protection. This white paper looks at the continuing evolution of virtualization, its potential, some tips on optimizing virtualization as well as how to future proof the technology. After all, server virtualization's value is well-established. Many, many companies have migrated significant percentages of their servers to virtual machines hosted on larger servers, gaining benefits in hardware utilization, energy use, and data centre space. And those companies that haven't done so thus far are hatching plans to consolidate their servers in the future. These are all capital or infrastructure costs, though. What does server virtualization do for human costs—the IT operations piece of the puzzle? Base level server consolidation offers a few benefits for IT operations. It makes hardware maintenance much easier, since virtual machines can be moved to other physical servers when it's time to maintain or repair the original server. This moves hardware maintenance from a weekend and late night effort to a part of the regular business day—certainly a great convenience. The next step for most companies is to leverage the portability of virtual machines to achieve IT operational agility. Because virtual machines are captured in disk images, they are portable, no longer bound to an individual physical server. The ease of reproducing virtual images means that application capacity can be easily dialed up and down with the creation or tear down of additional virtual images. Server pooling allows virtual machines to be automatically migrated according to application load. More sophisticated virtualization uses include high availability, where virtual machines can be moved—automatically, by the virtualization management software itself & mdash: when hardware failures occur. Seeing the magic of a virtual machine automatically being brought up on a new server after its original host is brought down, all without any human intervention vividly demonstrates the power of more sophisticated virtualization use.
  • 3. Certainly these kinds of uses of virtualization demonstrate its power to transform IT operations, enabling IT organizations to offer the kind of responsiveness and creativity that could only be dreamed of a few years ago. The deftness with which applications can be migrated, upsized, down sized, cloned, etc. is something that will forever change the way IT does its job.