DR NEELESH KUMAR JAIN PROFESSOR SIRTS BHOPAL Dr Neelesh Jain
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Outline 1. Introduction 2. Characteristics of Virtualized environments. 3. Advantages of Virtualization.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Virtualization Virtualization technology is one of the fundamental components of cloud computing, especially in regard to infrastructure-based services. Virtualization allows the creation of a secure, customizable, and isolated execution environment for running applications, even if they are untrusted, without affecting other users’ applications. The basis of this technology is the ability of a computer program—or a combination of software and hardware — to emulate an executing environment separate from the one that hosts such programs.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Virtualization For example, we can run Windows OS on top of a virtual machine, which itself is running on Linux OS. Virtualization provides a great opportunity to build elastically scalable systems that can provision additional capability with minimum costs. Therefore, virtualization is widely used to deliver customizable computing environments on demand.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Introduction Virtualization is a large umbrella of technologies and concepts that are meant to provide an abstract environment—whether virtual hardware or an operating system—to run applications. The term virtualization is often synonymous with hardware virtualization, which plays a fundamental role in efficiently delivering Infrastructure-as-a-Service (IaaS) solutions for cloud computing.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Introduction Virtualization technologies have gained renewed interested recently due to the confluence of several phenomena: ● Increased performance and computing capacity. ● Underutilized hardware and software resources. ● Lack of space. ● Greening initiatives. ● Rise of administrative costs.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Characteristics of virtualized environments Virtualization is a broad concept that refers to the creation of a virtual version of something, whether hardware, a software environment, storage, or a network. In a virtualized environment there are three major components: guest, host, and virtualization layer. The guest represents the system component that interacts with the virtualization layer rather than with the host, as would normally happen. The host represents the original environment where the guest is supposed to be managed. The virtualization layer is responsible for recreating the same or a different environment where the guest will operate. (see fig below)
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain The Virtualization Reference Model
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Characteristics of virtualized environments These environments support different applications and then implementation of Virtualization Technology. The most intuitive and popular is Hardware Virtualization, which also constitute the original realization of Virtualization Concept.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Hardware Virtualization Here in Hardware Virtualization Guest is represented by a system image which is comprised of an operating system and installed applications. These are installed on the top of virtual hardware that is controlled and managed by the virtualization layer, also called the virtual machine manager. The host is instead represented by the physical hardware, and in some cases the operating system, that defines the environment where the virtual machine manager is running.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Hardware Virtualization In the case of virtual storage, the guest might be client applications or users that interact with the virtual storage management software deployed on top of the real storage system. The guest applications and users interacts with a virtual network, such as a virtual private network (VPN), which is managed by specific software (VPN client) using the physical network available on the node. VPNs are useful for creating the illusion of being within a different physical network and thus accessing the resources in it, which would otherwise not be available.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Advantage of Virtualization So we can conclude that main common characteristic of all these implementations for Virtual Environment is created by the means of the Software Program. So the ability of the software and today technologies has allowed profitable use of Virtualization and creates lots of opportunities . Such advantages have always been characteristics of virtualized solutions.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Advantage of Virtualization 1. Increased Security. The ability to control the execution of a guest in a completely transparent manner opens new possibilities for delivering a secure, controlled execution environment. The virtual machine represents an emulated environment in which the guest is executed. All the operations of the guest are generally performed against the virtual machine, which then translates and applies them to the host. This level of indirection allows the virtual machine manager to control and filter the activity of the guest, thus preventing some harmful operations from being performed.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Advantage of Virtualization 2. Managed Execution. Virtualization of the execution environment not only allows increased security, but a wider range of features also can be implemented. In particular, sharing, aggregation, emulation, and isolation are the most relevant features (see fig below)
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Advantage of Virtualization ● Sharing : Virtualization allows the creation of a separate computing environments within the same host. In this way it is possible to fully exploit the capabilities of a powerful guest, which would otherwise be underutilized. ● Aggregation : Not only is it possible to share physical resource among several guests, but virtualization also allows aggregation, which is the opposite process. A group of separate hosts can be tied together and represented to guests as a single virtual host.example represented by cluster management software, which harnesses the physical resources of a homogeneous group of machines and represents them as a single resource.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Advantage of Virtualization ● Emulation : Hardware virtualization solutions are able to provide virtual hardware and emulate a particular kind of device such as Small Computer System Interface (SCSI) devices for file I/O, without the hosting machine having such hardware installed. Old and legacy software that does not meet the requirements of current systems can be run on emulated hardware without any need to change the code. This is possible either by emulating the required hardware architecture or within a specific operating system sandbox, such as the MS-DOS mode in Windows 95/98. Another example of emulation is an arcade-game emulator that allows us to play arcade games on a normal personal computer.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Advantage of Virtualization ● Isolation : Virtualization allows providing guests—whether they are operating systems, applications, or other entities—with a completely separate environment, in which they are executed. The guest program performs its activity by interacting with an abstraction layer, which provides access to the underlying resources. Isolation brings several benefits; for example, it allows multiple guests to run on the same host without interfering with each other. Second, it provides a separation between the host and the guest. The virtual machine can filter the activity of the guest and prevent harmful operations against the host.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Advantage of Virtualization 3. Portability. The concept of portability applies in different ways according to the specific type of virtualization considered. In the case of a hardware virtualization solution, the guest is packaged into a virtual image that, in most cases, can be safely moved and executed on top of different virtual machines. In the case of programming-level virtualization, as implemented by the JVM or the .NET runtime, the binary code representing application components (jars or assemblies) can be run without any recompilation on any implementation of the corresponding virtual machine. Portability allows having your own system always with you and ready to use as long as the required virtual machine manager is available.
DR NEELESH JAIN PROFESSOR SIRTS BHOPAL Dr Neelesh Jain
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Taxonomy of Virtualization Techniques. Virtualization covers a wide range of emulation techniques that are applied to different areas of computing. A classification of these techniques helps us better understand their characteristics and use (See the figure below)
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Taxonomy of Virtualization Techniques.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Taxonomy of Virtualization Techniques. Virtualization is mainly used to emulate ● Execution Environments : To provide support for the execution of the programs for eg. OS, Application. ○ Process Level : Implemented on the top of an existing OS which has full control of the hardware ○ System Level : Implemented directly on Hardware and do not require support from existing OS. ● Storage : Storage virtualization is a system administration practice that allows decoupling the physical orga nization of the hardware from its logical representation. ● Networks : Network virtualization combines hardware appliances and specific software for the creation and management of a virtual network.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Virtualization | A Machine Reference Model When an execution environment is virtualized at unlike levels of the stack of computation then it requires a reference model which defines the interfaces within the level of abstractions, and this level of abstraction hides the details of implementations. This projects an idea that, virtualization techniques can substitute any one layer and can intercept the calls which are directed to it. That’s why a clear separation within the layers can simplify their implementations, which only need an emulation of the interfaces and a proper response with the underlying layer.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Virtualization | A Machine Reference Model At the base layer, the model for the hardware is declared or manifested on terms of an architecture i.e. Instruction Set Architecture (ISA).
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Instruction Set Architecture (ISA) Instruction Set Architecture (ISA) defines the instruction set for the processor, registers, memory, and interrupt management. It is an interface between software and hardware and It is mandatory for the operating system (OS) developer (system ISA) developers of applications who directly manages core hardware (user ISA). The operating system layer is separated by the application binary interface (ABI) from the application and libraries, which are managed by operating system.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Application Binary Interface (ABI) Application Binary Interface (ABI) covers facts such as low-level data types and call conventions and it also defines a format for many programs. Mainly, system calls are defined at this level. Moreover, this type of interface enables portability of various applications and libraries across OS which employ the same ABI. Application programming interface (API) is represented by the highest level of abstraction. This API interfaces applications to libraries and/or the core OS. For an action is to be performed in the application level API, ABI and the two which are responsible to make it done. Mainly, CPU runs on two privilege levels: 1. User Mode: In this mode, memory access is restricted up to some limit whereas access to peripherals is denied. 2. Kernel Mode: In this mode, CPU has instructions which manage memory and how to be accessed and it also has instructions which enable access of the peripherals like disks and network cards. From one running program to another running program, CPU switches automatically
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Hardware Level Virtualization Hardware-level virtualization is a virtualization technique that provides an abstract execution environment in terms of computer hardware on top of which a guest operating system can be run. In this model, the guest is represented by the operating system, the host by the physical computer hardware, the virtual machine by its emulation, and the virtual machine manager by the hypervisor. The hypervisor is generally a program or a combination of software and hardware that allows the abstraction of the underlying physical hardware. Hardware-level virtualization is also called system virtualization,
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Hypervisors Hypervisor is a form of virtualization software used in Cloud hosting to divide and allocate the resources on various pieces of hardware.The program which provide partitioning, isolation or abstraction is called virtualization hypervisor. Hypervisor is a hardware virtualization technique that allows multiple guest operating systems (OS) to run on a single host system at the same time. A hypervisor is sometimes also called a virtual machine manager(VMM).
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Types of Hypervisors TYPE-1 Hypervisor: Hypervisor runs directly on underlying host system.It is also known as “Native Hypervisor” or “Bare metal hypervisor”.It dose not require any base server operating system.It has direct access to hardware resources.Examples of Type 1 hypervisors include VMware ESXi, Citrix XenServer and Microsoft Hyper-V hypervisor.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Types of Hypervisors TYPE-2 Hypervisor: A Host operating system runs on undrlying host system.It is also known as ‘Hosted Hypervisor”.Basically a software installed on an operating system.Hypervisor asks operating system to make hardware calls.Example of Type 2 hypervisor include VMware Player or Parallels Desktop. Hosted hypervisors are often found on endpoints like PCs.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain HYPERVISOR REFERENCE MODEL There are 3 main modules coordinate in order to emulate the undrelying hardware: 1. Dispatcher 2. Allocator 3. Interpreter
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain HYPERVISOR REFERENCE MODEL DISPATCHER: The dispatcher behaves like the entry point of the monitor and reroutes the instructions of the virtual machine instance to one of the other two modules. ALLOCATOR: The allocator is responsible for deciding the system resources to be provided to the virtual machine instance.It means whenever virtual machine tries to execute an instruction that results in changing the machine resources associated with the virtual machine, the allocator is invoked by the dispatcher. INTERPRETER: The interpreter module consists of interpreter routines.These are executed, whenever virtual machine executes a priviliged instruction.
DR NEELESH KUMAR JAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Thank You __ Follow us on DrNeeleshjain

Virtualization in Cloud Computing and Machine reference Model

  • 1.
    DR NEELESH KUMARJAIN PROFESSOR SIRTS BHOPAL Dr Neelesh Jain
  • 2.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Outline 1. Introduction 2. Characteristics of Virtualized environments. 3. Advantages of Virtualization.
  • 3.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Virtualization Virtualization technology is one of the fundamental components of cloud computing, especially in regard to infrastructure-based services. Virtualization allows the creation of a secure, customizable, and isolated execution environment for running applications, even if they are untrusted, without affecting other users’ applications. The basis of this technology is the ability of a computer program—or a combination of software and hardware — to emulate an executing environment separate from the one that hosts such programs.
  • 4.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Virtualization For example, we can run Windows OS on top of a virtual machine, which itself is running on Linux OS. Virtualization provides a great opportunity to build elastically scalable systems that can provision additional capability with minimum costs. Therefore, virtualization is widely used to deliver customizable computing environments on demand.
  • 5.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Introduction Virtualization is a large umbrella of technologies and concepts that are meant to provide an abstract environment—whether virtual hardware or an operating system—to run applications. The term virtualization is often synonymous with hardware virtualization, which plays a fundamental role in efficiently delivering Infrastructure-as-a-Service (IaaS) solutions for cloud computing.
  • 6.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Introduction Virtualization technologies have gained renewed interested recently due to the confluence of several phenomena: ● Increased performance and computing capacity. ● Underutilized hardware and software resources. ● Lack of space. ● Greening initiatives. ● Rise of administrative costs.
  • 7.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Characteristics of virtualized environments Virtualization is a broad concept that refers to the creation of a virtual version of something, whether hardware, a software environment, storage, or a network. In a virtualized environment there are three major components: guest, host, and virtualization layer. The guest represents the system component that interacts with the virtualization layer rather than with the host, as would normally happen. The host represents the original environment where the guest is supposed to be managed. The virtualization layer is responsible for recreating the same or a different environment where the guest will operate. (see fig below)
  • 8.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain The Virtualization Reference Model
  • 9.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Characteristics of virtualized environments These environments support different applications and then implementation of Virtualization Technology. The most intuitive and popular is Hardware Virtualization, which also constitute the original realization of Virtualization Concept.
  • 10.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Hardware Virtualization Here in Hardware Virtualization Guest is represented by a system image which is comprised of an operating system and installed applications. These are installed on the top of virtual hardware that is controlled and managed by the virtualization layer, also called the virtual machine manager. The host is instead represented by the physical hardware, and in some cases the operating system, that defines the environment where the virtual machine manager is running.
  • 11.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Hardware Virtualization In the case of virtual storage, the guest might be client applications or users that interact with the virtual storage management software deployed on top of the real storage system. The guest applications and users interacts with a virtual network, such as a virtual private network (VPN), which is managed by specific software (VPN client) using the physical network available on the node. VPNs are useful for creating the illusion of being within a different physical network and thus accessing the resources in it, which would otherwise not be available.
  • 12.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Advantage of Virtualization So we can conclude that main common characteristic of all these implementations for Virtual Environment is created by the means of the Software Program. So the ability of the software and today technologies has allowed profitable use of Virtualization and creates lots of opportunities . Such advantages have always been characteristics of virtualized solutions.
  • 13.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Advantage of Virtualization 1. Increased Security. The ability to control the execution of a guest in a completely transparent manner opens new possibilities for delivering a secure, controlled execution environment. The virtual machine represents an emulated environment in which the guest is executed. All the operations of the guest are generally performed against the virtual machine, which then translates and applies them to the host. This level of indirection allows the virtual machine manager to control and filter the activity of the guest, thus preventing some harmful operations from being performed.
  • 14.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Advantage of Virtualization 2. Managed Execution. Virtualization of the execution environment not only allows increased security, but a wider range of features also can be implemented. In particular, sharing, aggregation, emulation, and isolation are the most relevant features (see fig below)
  • 15.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Advantage of Virtualization ● Sharing : Virtualization allows the creation of a separate computing environments within the same host. In this way it is possible to fully exploit the capabilities of a powerful guest, which would otherwise be underutilized. ● Aggregation : Not only is it possible to share physical resource among several guests, but virtualization also allows aggregation, which is the opposite process. A group of separate hosts can be tied together and represented to guests as a single virtual host.example represented by cluster management software, which harnesses the physical resources of a homogeneous group of machines and represents them as a single resource.
  • 16.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Advantage of Virtualization ● Emulation : Hardware virtualization solutions are able to provide virtual hardware and emulate a particular kind of device such as Small Computer System Interface (SCSI) devices for file I/O, without the hosting machine having such hardware installed. Old and legacy software that does not meet the requirements of current systems can be run on emulated hardware without any need to change the code. This is possible either by emulating the required hardware architecture or within a specific operating system sandbox, such as the MS-DOS mode in Windows 95/98. Another example of emulation is an arcade-game emulator that allows us to play arcade games on a normal personal computer.
  • 17.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Advantage of Virtualization ● Isolation : Virtualization allows providing guests—whether they are operating systems, applications, or other entities—with a completely separate environment, in which they are executed. The guest program performs its activity by interacting with an abstraction layer, which provides access to the underlying resources. Isolation brings several benefits; for example, it allows multiple guests to run on the same host without interfering with each other. Second, it provides a separation between the host and the guest. The virtual machine can filter the activity of the guest and prevent harmful operations against the host.
  • 18.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Advantage of Virtualization 3. Portability. The concept of portability applies in different ways according to the specific type of virtualization considered. In the case of a hardware virtualization solution, the guest is packaged into a virtual image that, in most cases, can be safely moved and executed on top of different virtual machines. In the case of programming-level virtualization, as implemented by the JVM or the .NET runtime, the binary code representing application components (jars or assemblies) can be run without any recompilation on any implementation of the corresponding virtual machine. Portability allows having your own system always with you and ready to use as long as the required virtual machine manager is available.
  • 19.
    DR NEELESH JAIN PROFESSOR SIRTSBHOPAL Dr Neelesh Jain
  • 20.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Taxonomy of Virtualization Techniques. Virtualization covers a wide range of emulation techniques that are applied to different areas of computing. A classification of these techniques helps us better understand their characteristics and use (See the figure below)
  • 21.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Taxonomy of Virtualization Techniques.
  • 22.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Taxonomy of Virtualization Techniques. Virtualization is mainly used to emulate ● Execution Environments : To provide support for the execution of the programs for eg. OS, Application. ○ Process Level : Implemented on the top of an existing OS which has full control of the hardware ○ System Level : Implemented directly on Hardware and do not require support from existing OS. ● Storage : Storage virtualization is a system administration practice that allows decoupling the physical orga nization of the hardware from its logical representation. ● Networks : Network virtualization combines hardware appliances and specific software for the creation and management of a virtual network.
  • 23.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Virtualization | A Machine Reference Model When an execution environment is virtualized at unlike levels of the stack of computation then it requires a reference model which defines the interfaces within the level of abstractions, and this level of abstraction hides the details of implementations. This projects an idea that, virtualization techniques can substitute any one layer and can intercept the calls which are directed to it. That’s why a clear separation within the layers can simplify their implementations, which only need an emulation of the interfaces and a proper response with the underlying layer.
  • 24.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Virtualization | A Machine Reference Model At the base layer, the model for the hardware is declared or manifested on terms of an architecture i.e. Instruction Set Architecture (ISA).
  • 25.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Instruction Set Architecture (ISA) Instruction Set Architecture (ISA) defines the instruction set for the processor, registers, memory, and interrupt management. It is an interface between software and hardware and It is mandatory for the operating system (OS) developer (system ISA) developers of applications who directly manages core hardware (user ISA). The operating system layer is separated by the application binary interface (ABI) from the application and libraries, which are managed by operating system.
  • 26.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Application Binary Interface (ABI) Application Binary Interface (ABI) covers facts such as low-level data types and call conventions and it also defines a format for many programs. Mainly, system calls are defined at this level. Moreover, this type of interface enables portability of various applications and libraries across OS which employ the same ABI. Application programming interface (API) is represented by the highest level of abstraction. This API interfaces applications to libraries and/or the core OS. For an action is to be performed in the application level API, ABI and the two which are responsible to make it done. Mainly, CPU runs on two privilege levels: 1. User Mode: In this mode, memory access is restricted up to some limit whereas access to peripherals is denied. 2. Kernel Mode: In this mode, CPU has instructions which manage memory and how to be accessed and it also has instructions which enable access of the peripherals like disks and network cards. From one running program to another running program, CPU switches automatically
  • 27.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Hardware Level Virtualization Hardware-level virtualization is a virtualization technique that provides an abstract execution environment in terms of computer hardware on top of which a guest operating system can be run. In this model, the guest is represented by the operating system, the host by the physical computer hardware, the virtual machine by its emulation, and the virtual machine manager by the hypervisor. The hypervisor is generally a program or a combination of software and hardware that allows the abstraction of the underlying physical hardware. Hardware-level virtualization is also called system virtualization,
  • 28.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Hypervisors Hypervisor is a form of virtualization software used in Cloud hosting to divide and allocate the resources on various pieces of hardware.The program which provide partitioning, isolation or abstraction is called virtualization hypervisor. Hypervisor is a hardware virtualization technique that allows multiple guest operating systems (OS) to run on a single host system at the same time. A hypervisor is sometimes also called a virtual machine manager(VMM).
  • 29.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Types of Hypervisors TYPE-1 Hypervisor: Hypervisor runs directly on underlying host system.It is also known as “Native Hypervisor” or “Bare metal hypervisor”.It dose not require any base server operating system.It has direct access to hardware resources.Examples of Type 1 hypervisors include VMware ESXi, Citrix XenServer and Microsoft Hyper-V hypervisor.
  • 30.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Types of Hypervisors TYPE-2 Hypervisor: A Host operating system runs on undrlying host system.It is also known as ‘Hosted Hypervisor”.Basically a software installed on an operating system.Hypervisor asks operating system to make hardware calls.Example of Type 2 hypervisor include VMware Player or Parallels Desktop. Hosted hypervisors are often found on endpoints like PCs.
  • 31.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain HYPERVISOR REFERENCE MODEL There are 3 main modules coordinate in order to emulate the undrelying hardware: 1. Dispatcher 2. Allocator 3. Interpreter
  • 32.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain HYPERVISOR REFERENCE MODEL DISPATCHER: The dispatcher behaves like the entry point of the monitor and reroutes the instructions of the virtual machine instance to one of the other two modules. ALLOCATOR: The allocator is responsible for deciding the system resources to be provided to the virtual machine instance.It means whenever virtual machine tries to execute an instruction that results in changing the machine resources associated with the virtual machine, the allocator is invoked by the dispatcher. INTERPRETER: The interpreter module consists of interpreter routines.These are executed, whenever virtual machine executes a priviliged instruction.
  • 33.
    DR NEELESH KUMARJAIN - 9406531900. Followme : Youtube / FB : DrNeeleshjain Thank You __ Follow us on DrNeeleshjain

Editor's Notes

  • #10 Virtualization is a technology that was initially developed during the mainframe era. The IBM CP/CMS mainframes were the first systems to introduce the concept of hardware virtualization and hypervisors. These systems, able to run multiple operating systems at the same time, provided a backward-compatible environment that allowed customers to run previous versions of their applications.
  • #17 Emulation - to reproduce the function
  • #18 Emulation - to reproduce the function
  • #23 execution virtualization can be implemented directly on top of the hardware by the operating system, an application, or libraries dynamically or statically linked to an application image.