Thursday, 26 July 2012

Concept of Virtualization – Technology Times


Virtualization:  Virtualization creates tremendous business and IT benefits for organizations globally, but if left unprotected these platforms may become a weak link for cybercriminals to exploit.  Virtualization systems often struggle to and the correct balance between guest transparency and performance (e.g., Para-virtualized I/O reduces guest transparency but increases performance).  Virtualization has a performance penalty caused by the overhead of transitions between the guest and the host context.  Virtualization Polling Engine (VPE): Using Dedicated CPU Cores to Accelerate I/O Virtualization.  Virtualization incurs an additional layer of indirection to this already overloaded access path.

Virtualization technologies encompass a variety of mechanisms to decouple the system architecture and the user-perceived behavior of hardware and software resources.  Virtualization allows multiple operating system instances to run concurrently on a single computer; it is a means of separating hardware from a single operating system.  Virtualization is a modified solution between centralized and decentralized deployments.  Virtualization allows an operator to control a guest operating system’s use of CPU, memory, storage, and other resources, so each guest receives only the resources that it needs.  Virtualization is only one part of Red Hat’s larger strategy to commoditize each major computing component, and make it simple for administrators to bring computing resources to the application that needs them.  Virtualization technology, based on ‘job execution containers,’ may address the issue.  Virtualization technology enabled large enterprises, including banks, to minimize these issues without compromising their business.  Virtualization has brought a paradigm shift to the way in which enterprises use and manage physical infrastructure.

Virtualization is the ability to run multiple virtual machines on a single piece of hardware.  Virtualization and hosting architects who are responsible for implementing enterprise level virtualization solutions and virtual private server hosted solutions based on Parallels Virtuozzo Containers capabilities.  Virtualization allows policy-based management of storage to be implemented in a practical manner and allows the management tools to be consistent across varying devices.  Virtualization is only performed on pre-assigned storage, losing a key advantage of SANs as well as the independence of volumes from servers.  Virtualization hides the physical characteristics of a computing platform from users, instead showing another abstract computing platform.  Virtualization of routers has been investigated in different contexts and is already available in commercial products .The application of system virtualization to routers has been investigated. Performance challenges were identified that have to be tackled when virtual routers are based on the popular XEN hypervisor.

As virtualization disentangles the operating system from the hardware, a number of very useful new tools become available.  If virtualization is tied to a system monitoring solution, or to a provisioning and management tool like Red Hat® Satellite Server, systems could be migrated automatically to better-suited hardware during periods of peak use or maintenance.  A. Virtualization at the Host Level One method of virtualization is via storage management software that runs at the server level.  The virtualization process which allows full virtualization of a PC system within another PC system.  Full virtualization provides total abstraction of the underlying physical system and creates a complete virtual system in which the guest operating system can execute.  Full virtualization provides complete isolation of different virtualized applications, which makes this approach highly secure by design.  While virtualization is quickly becoming ubiquitous, applications remain oblivious to the changes in the underlying platform.  An x86 virtualization software package, Virtual Box 3.1, was selected to have setup for Virtualized Environment.

Machine virtualization is undoubtedly useful, but does not come cheap. The performance cost of virtualization, for I/O intensive workloads in particular, can be heavy.  Machine virtualization provides many benefits: it enables server consolidation, makes it possible to run legacy environments on new platforms, and helps simplify system management.  Machine virtualization typically requires isolating the physical resources from untrusted virtual machines.  Network virtualization is a networking environment that allows us to provide multiple heterogeneous virtual networks that co-exists together in isolation with each other.  Kaspersky Security for Virtualization was launched in a CIO Strategy Summit held in Mumbai on April 27, 2012.  Kaspersky Security for Virtualization is delivered as a virtual security appliance that integrates with VMware vShield™ Endpoint to provide agent-less, anti-malware security based upon Kaspersky Lab’s advanced anti-malware engine.  One of the greatest advantages of virtualization – IT resource efficiency – can suffer when sub-par security deployments apply physical security rules to virtual machines.

0 comments:

Post a Comment