Skip to main content

Cloud Computing - Virtualization

Virtualization:

  • Hosting all of a physical machine's hardware and software components independently on a single or shared hardware resource.
  • In virtualization, we can run multiple operating systems on a single machine at the same time. In the case of dual-boot, we can run an OS at a time.
  • Virtual Machine: VM is the set of virtual hardware devices, virtual RAM and virtual CPU that run like a traditional operating system.
  • Virtual Server: It is also a virtual machine running as a server. It can run one or possibly more server-based application. This server may be a database or messaging or anything else.
  • VMM (Virtual Machine Monitor): VMM consists of multiple virtual machines top of the hypervisor to handle all the VMs.
  • Hypervisor: Hypervisor consists of multiple VMs and communicates with the real hardware to provide the resources to the available virtual machines. It controls all the physical resources on the computer. two types of the hypervisor exist as shown in the below diagram.
        


  • VIM (Virtual Infrastructure Management): VIM is a tool that is used for managing multiple VMMs. openNebula is the open-source VIM available. Using the VIM tool, we can manage the multiple VMMs from single computer or console.
Virtualization Products:
  • Microsoft Hyper-V: This is a type 2 hypervisor. It supports live migration of virtual machines without any downtime. It has the ability of VM snapshots or checkpoints, So in case of any disaster or failure, user can roll back the VM configuration to the time when it was working fine.
  • Citrix XenServer: This is a type 1 hypervisor, so it can run directly on hardware. This improves the overall system utilization and increases application performance because it accesses the hardware directly. 
    • XenServer automatically balances the load among all the virtual machines. If any virtual machine is idle then Xenserver dynamically allocates the memory to the another VM(s) that need more resources. 
    • There is improved security, administration and delegated access in terms of the management
    • It supports live migration and site recovery services.
    • It supports dynamic load balancing.











Comments

  1. Inetsoft.com is a business intelligence tool that suggests the right visualizations for the data and gives non-analytst access to deep insights from flexible visualizations.

    ReplyDelete
  2. I generally want quality content and I found that in your post. The information you have shared about virtualization is beneficial and significant for us. Keep sharing these kinds of articles here. Top Virtualization Training in Delaware

    ReplyDelete

Post a Comment

Popular posts from this blog

Blockchain in Theory - Blockchain, Bitcoin, Mining

   Blockchain is the software protocol that tell the Internet how to transfer money and assets. Blockchain is the layer and Bitcoin is the application. Just one of many cryptocurrency kinds of applications. When one user send email to another then both users do not have to know about the underlaying process except email address. Similarly,  User don't need to know anything other than other user's wallet address to send some bitcoin or other cryptocurrencies.  Any file on Internet may have multiple copies but money is something that should not be copied multiple times. This has been a longstanding problem in computing networks namely the double spend problem. Satoshi Nakamoto introduced white paper for digital cash system in 2008 to resolve the double spending problem and fortified by a ledger which enforces the money is only spent once. It took 15 years alone for corporate email as the main application to be a standard thing in our lives. And similarly the money Internet block

How to kill a process running on particular port in Linux

  If port 8080 needs to be kill use below single command: kill -9 $(lsof -t -i:8080) Note: remove -9 from the command, if you don't want to kill the process violently. To list any process listening to the port 8080: lsof -i:8080 Use any port number that you want to kill.

Nudge Notes - Python Language Basics

  1. Datatypes in Python: None Numeric float -> 1.5 int -> 5 complex -> 2+5j bool -> True/false Sequence List -> [3,5,6,7,1] Tuple -> (3,5,6,7,1) Set -> {3,5,6,7,1} String -> "Akshay" Range  range(5) -> range(0, 5)  list(range(5)) -> [0,1,2,3,4] list(range(2,10,2)) -> [2,4,6,8] Dictonary product_price = {'book': 50, 'pen': 300, 'eraser': 10}  product_price.get('book') -> 50 2. Number Conversion in Python bin( 28 ) -> 0b 11100 oct( 28 ) -> 0o 34  hex( 28 ) ->  0x 1c 3. Swap two numbers in Python           a = 5       b = 6 Method #1:             a, b = b, a Method #2            a = a + b         b = a - b         a = a - b 4. "math" module in python     import math math.sqrt(25) -> 5.0 math.floor(2.5) -> 2.0 math.ceil(2.5) -> 3.0 math.pow(2, 3) -> 8.0 math.pi -> 3.141592653589793 math.e -> 2.718281828459045 5. How to import a module in python import math import math as