SlideShare a Scribd company logo
1
A Presentation
on
(Cloud Computing )
Presented by:
Ms. Kanika Manchanda
AP
Department of Computer Applications
Department of Computer Applications
Table of Contents
1. Hypervisor: To help virtualization, the hypervisor’s role is to use a
server’s resources efficiently by creating and managing isolated virtual
environment.
2. Every virtual environment acts like a separate computer, with its own OS
& application.
3. The hypervisor allocates the server’s resources like:
- CPU
- Memory & storage.
To each virtual machine as needed.
2
Department of Computer Applications
Types of Hypervisors
• There are two major types of hypervisors
1. Type I
2. Type II
Types of Hypervisors
Type I Hypervisor: Runs directly on the physical hardware, replacing the
operating system. This is also called a native virtual machine.
This type of hypervisor is also called a
native virtual machine since
it runs natively on hardware.
Types of Hypervisors
• Type II Hypervisor: Runs on top of an existing operating system, using it
to manage virtual machines. It is also called a hosted virtual machine
because it relies on the host OS.
This type of hypervisor is also called
a hosted virtual machine
since it is hosted within an operating system.
Difference
Feature Xen VMware
Microsoft Hyper-V
Type Open-source hypervisor Commercial hypervisor with several products
Commercial hypervisor integrated with Windows
Server
Usage
Commonly used in large-scale cloud
environments (e.g., AWS)
Widely used in enterprises for server and desktop
virtualization, with various products for different needs
Often used in Windows environments; integrates well
with other Microsoft services and tools
Management Dom0 (Domain 0) manages resources, drivers,
and other VMs
VMware vSphere provides centralized management for
multiple VMs
Managed using Hyper-V Manager or System Center
for multiple servers
Performance
Efficient for large cloud environments, good
isolation between VMs
High performance with strong enterprise features,
especially in VMware ESXi
Good performance, especially in Windows-centric
environments
Compatibility
Works well with various Linux distributions and
some other OSes
Supports a wide range of operating systems, including
Windows and Linux
Best integrated with Windows OS, but also supports
Linux
Cost
Free and open-source, though commercial
support is available
Typically requires purchasing licenses for various
products
Requires Windows Server licenses, which can be
costly
Xen
• The Xen hypervisor is software that manages virtual machines on
a server.
• Sits between the hardware and the operating systems, managing
and dividing resources.
• Allowing multiple operating systems to run on the same server
simultaneously
• In the context of the Xen hypervisor, the concept of "rings" refers
to different levels of privilege in the system.
7
Department of Computer Applications
Difference between rings
Ring Level Description Role in Xen Hypervisor Access Level
Ring 0 Highest privilege level
Runs the Xen hypervisor itself.
Has direct access to hardware.
Full hardware access.
Ring 1 Intermediate privilege level Not typically used in Xen. Not applicable.
Ring 2 Intermediate privilege level Not typically used in Xen. Not applicable.
Ring 3 Lowest privilege level
Runs guest operating systems
(VMs). Limited access to
hardware.
Restricted access via hypervisor.
Xen Architecture Overview
• Xen Hypervisor: Runs in the highest privilege mode
and manages access to hardware for guest operating
systems.
• Guest Operating Systems: Run in virtual machines
called domains.
• Domain 0: A special domain with control over the
system, used to create, configure, and manage other
virtual machines. It also hosts an HTTP server for
these tasks.
• Rings: x86 systems use different security levels,
called rings, to manage permissions.
Pros of Xen
• Flexible and Efficient: Uses both hardware and software virtualization for
better performance and flexibility.
• Workload Management: Handles large workloads well, optimizing CPU,
memory, and network usage.
• Storage Integration: Works with major storage systems like HP, NetApp,
and Dell.
• Features: Supports multiple processors, live migration, conversion tools,
centralized management, and real-time monitoring for Windows and
Linux.
Cons of Xen
• Better on Linux: More reliable with Linux than Windows.
• Third-Party Dependence: Relies on external tools for managing
resources like drivers and storage.
• Deployment Issues: Can be complex and burdensome on Linux
systems over time.
• Resource Overhead: High input-output rates may impact resource
availability for other virtual machines.
Full Virtualization with VMware
• Concept: Full virtualization replicates hardware so the guest OS can run
without changes, as if it’s on real hardware.
VMware: Uses full virtualization for both desktops (Type-II
hypervisor) and servers (Type-I hypervisor).
How It Works: For x86 architecture, VMware handles
instructions directly if they’re not sensitive, and uses binary
translation(0,1) for sensitive instructions. This allows the OS
to run without modifications.
VMware Hypervisor
(used similarly to describe different levels of privilege)
Ring Level Description Role in VMware ESXi Access Level
Ring 0 Highest privilege level
Runs the VMware ESXi
hypervisor itself. Has direct
access to hardware.
Full hardware access.
Ring 1 Intermediate privilege level
Not typically used in VMware
ESXi.
Not applicable.
Ring 2 Intermediate privilege level
Not typically used in VMware
ESXi.
Not applicable.
Ring 3 Lowest privilege level
Runs guest operating systems
(VMs). Limited access to
hardware.
Restricted access via hypervisor.
Pros
• Windows Integration: Works well with Windows Server and Microsoft
tools, ideal for Windows-focused environments.
• Cost-Effective: Included with Windows Server licenses, saving money
compared to other virtualization options.
• Supports Many OSes: Compatible with various Windows and Linux
versions.
• Live Migration: Moves virtual machines between servers with little
downtime.
Cons
• Linux Setup Complexity: Setting up Linux VMs can be more difficult
compared to other platforms.
• Hardware Needs: Requires specific hardware features, which might not
work with older equipment.
• Licensing Costs: Additional costs for Windows Server and management
tools.
Microsoft Hyper-V
• Microsoft Hyper-V is a virtualization technology developed by Microsoft
that allows you to create and manage virtual machines (VMs) on
Windows-based servers. It's commonly used in data centers, enterprise
environments, and cloud services to consolidate workloads, optimize
resource use, and provide flexible virtualization solutions.
Difference
Ring Level Description Role in Hyper-V Access Level
Ring 0 Highest privilege level
Runs the Hyper-V hypervisor itself.
It has full control over the hardware
and manages virtual machines.
Full hardware access.
Ring 1 Intermediate privilege level
Not used in Hyper-V. Typically, this
level might be used for device
drivers or similar tasks in other
systems.
Not applicable.
Ring 2 Intermediate privilege level
Not used in Hyper-V. Similar to Ring
1, it’s not utilized for typical
operations in Hyper-V.
Not applicable.
Ring 3 Lowest privilege level
Runs guest operating systems
(VMs). They operate with restricted
access and rely on Hyper-V for
hardware interaction.
Restricted access via hypervisor.
Pros
• High Availability: Automatically moves VMs if a server fails to ensure
continuous operation.
• Hyper-Converged Infrastructure: Works with solutions like Azure
Stack HCI for combined storage and networking.
• Management Tools: Managed through Hyper-V Manager and can be
enhanced with System Center Virtual Machine Manager.
Cons
• Fewer Add-Ons: Fewer third-
party tools and extensions
compared to other virtualization
solutions like VMware.
• Learning Curve: May be complex
for those new to the platform
THANK YOU
20

More Related Content

PPTX
Open source hypervisors in cloud
PPTX
What is Virtualization and its types & Techniques.What is hypervisor and its ...
PPT
Virtualization
PPTX
Yellow and Black Modern Special Offer Promotional Facebook Ad_20241111_095533...
PPTX
lecture5-virtualization-190301171613.pptx
PPTX
Virtualization Cloud computing technology
PDF
Lecture5 virtualization
PPTX
KIIT_Cloud_scaling and Virtualization.pptx
Open source hypervisors in cloud
What is Virtualization and its types & Techniques.What is hypervisor and its ...
Virtualization
Yellow and Black Modern Special Offer Promotional Facebook Ad_20241111_095533...
lecture5-virtualization-190301171613.pptx
Virtualization Cloud computing technology
Lecture5 virtualization
KIIT_Cloud_scaling and Virtualization.pptx

Similar to Cloud computing 10 lecture class notes, full lecture notes (20)

PDF
Cloud Computing Virtualization and containers
PPTX
Cloud Computing: Virtualization
PPTX
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
PDF
Xen: Hypervisor for the Cloud - CCC13
PPT
Linux virtualization
PPTX
Cloud computing lecture notes calss notes
PPTX
Virtualization unit 3.pptx
PPTX
Xen Project Update LinuxCon Brazil
PPTX
Cloud Computing storage saas iaas paas.pptx
PPTX
Virtualization concepts in cloud computing
PPT
Virtual machine
PPTX
Xen Cloud Platform by Tim Mackey
PPTX
Parth virt
PPTX
1 virtualization
PDF
Kernel Recipes 2014 - Xen as a foundation for cloud infrastructure
PDF
Xen: Hypervisor for the Cloud from Frontier Meetup Mountain View CA 2013-10-14
PPTX
Chap 2 virtulizatin
PPTX
Virtualization: A Key to Efficient Cloud Computing
PPTX
what is virtualization and hypervisor.pptx
PPTX
Xen Hypervisor.pptx
Cloud Computing Virtualization and containers
Cloud Computing: Virtualization
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
Xen: Hypervisor for the Cloud - CCC13
Linux virtualization
Cloud computing lecture notes calss notes
Virtualization unit 3.pptx
Xen Project Update LinuxCon Brazil
Cloud Computing storage saas iaas paas.pptx
Virtualization concepts in cloud computing
Virtual machine
Xen Cloud Platform by Tim Mackey
Parth virt
1 virtualization
Kernel Recipes 2014 - Xen as a foundation for cloud infrastructure
Xen: Hypervisor for the Cloud from Frontier Meetup Mountain View CA 2013-10-14
Chap 2 virtulizatin
Virtualization: A Key to Efficient Cloud Computing
what is virtualization and hypervisor.pptx
Xen Hypervisor.pptx
Ad

Recently uploaded (20)

PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Institutional Correction lecture only . . .
PDF
Complications of Minimal Access Surgery at WLH
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Pharma ospi slides which help in ospi learning
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Pre independence Education in Inndia.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Microbial disease of the cardiovascular and lymphatic systems
2.FourierTransform-ShortQuestionswithAnswers.pdf
O7-L3 Supply Chain Operations - ICLT Program
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Institutional Correction lecture only . . .
Complications of Minimal Access Surgery at WLH
Module 4: Burden of Disease Tutorial Slides S2 2025
Abdominal Access Techniques with Prof. Dr. R K Mishra
Pharma ospi slides which help in ospi learning
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
VCE English Exam - Section C Student Revision Booklet
Renaissance Architecture: A Journey from Faith to Humanism
Pre independence Education in Inndia.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
human mycosis Human fungal infections are called human mycosis..pptx
01-Introduction-to-Information-Management.pdf
Cell Types and Its function , kingdom of life
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Microbial disease of the cardiovascular and lymphatic systems
Ad

Cloud computing 10 lecture class notes, full lecture notes

  • 1. 1 A Presentation on (Cloud Computing ) Presented by: Ms. Kanika Manchanda AP Department of Computer Applications Department of Computer Applications
  • 2. Table of Contents 1. Hypervisor: To help virtualization, the hypervisor’s role is to use a server’s resources efficiently by creating and managing isolated virtual environment. 2. Every virtual environment acts like a separate computer, with its own OS & application. 3. The hypervisor allocates the server’s resources like: - CPU - Memory & storage. To each virtual machine as needed. 2 Department of Computer Applications
  • 3. Types of Hypervisors • There are two major types of hypervisors 1. Type I 2. Type II
  • 4. Types of Hypervisors Type I Hypervisor: Runs directly on the physical hardware, replacing the operating system. This is also called a native virtual machine. This type of hypervisor is also called a native virtual machine since it runs natively on hardware.
  • 5. Types of Hypervisors • Type II Hypervisor: Runs on top of an existing operating system, using it to manage virtual machines. It is also called a hosted virtual machine because it relies on the host OS. This type of hypervisor is also called a hosted virtual machine since it is hosted within an operating system.
  • 6. Difference Feature Xen VMware Microsoft Hyper-V Type Open-source hypervisor Commercial hypervisor with several products Commercial hypervisor integrated with Windows Server Usage Commonly used in large-scale cloud environments (e.g., AWS) Widely used in enterprises for server and desktop virtualization, with various products for different needs Often used in Windows environments; integrates well with other Microsoft services and tools Management Dom0 (Domain 0) manages resources, drivers, and other VMs VMware vSphere provides centralized management for multiple VMs Managed using Hyper-V Manager or System Center for multiple servers Performance Efficient for large cloud environments, good isolation between VMs High performance with strong enterprise features, especially in VMware ESXi Good performance, especially in Windows-centric environments Compatibility Works well with various Linux distributions and some other OSes Supports a wide range of operating systems, including Windows and Linux Best integrated with Windows OS, but also supports Linux Cost Free and open-source, though commercial support is available Typically requires purchasing licenses for various products Requires Windows Server licenses, which can be costly
  • 7. Xen • The Xen hypervisor is software that manages virtual machines on a server. • Sits between the hardware and the operating systems, managing and dividing resources. • Allowing multiple operating systems to run on the same server simultaneously • In the context of the Xen hypervisor, the concept of "rings" refers to different levels of privilege in the system. 7 Department of Computer Applications
  • 8. Difference between rings Ring Level Description Role in Xen Hypervisor Access Level Ring 0 Highest privilege level Runs the Xen hypervisor itself. Has direct access to hardware. Full hardware access. Ring 1 Intermediate privilege level Not typically used in Xen. Not applicable. Ring 2 Intermediate privilege level Not typically used in Xen. Not applicable. Ring 3 Lowest privilege level Runs guest operating systems (VMs). Limited access to hardware. Restricted access via hypervisor.
  • 9. Xen Architecture Overview • Xen Hypervisor: Runs in the highest privilege mode and manages access to hardware for guest operating systems. • Guest Operating Systems: Run in virtual machines called domains. • Domain 0: A special domain with control over the system, used to create, configure, and manage other virtual machines. It also hosts an HTTP server for these tasks. • Rings: x86 systems use different security levels, called rings, to manage permissions.
  • 10. Pros of Xen • Flexible and Efficient: Uses both hardware and software virtualization for better performance and flexibility. • Workload Management: Handles large workloads well, optimizing CPU, memory, and network usage. • Storage Integration: Works with major storage systems like HP, NetApp, and Dell. • Features: Supports multiple processors, live migration, conversion tools, centralized management, and real-time monitoring for Windows and Linux.
  • 11. Cons of Xen • Better on Linux: More reliable with Linux than Windows. • Third-Party Dependence: Relies on external tools for managing resources like drivers and storage. • Deployment Issues: Can be complex and burdensome on Linux systems over time. • Resource Overhead: High input-output rates may impact resource availability for other virtual machines.
  • 12. Full Virtualization with VMware • Concept: Full virtualization replicates hardware so the guest OS can run without changes, as if it’s on real hardware. VMware: Uses full virtualization for both desktops (Type-II hypervisor) and servers (Type-I hypervisor). How It Works: For x86 architecture, VMware handles instructions directly if they’re not sensitive, and uses binary translation(0,1) for sensitive instructions. This allows the OS to run without modifications.
  • 13. VMware Hypervisor (used similarly to describe different levels of privilege) Ring Level Description Role in VMware ESXi Access Level Ring 0 Highest privilege level Runs the VMware ESXi hypervisor itself. Has direct access to hardware. Full hardware access. Ring 1 Intermediate privilege level Not typically used in VMware ESXi. Not applicable. Ring 2 Intermediate privilege level Not typically used in VMware ESXi. Not applicable. Ring 3 Lowest privilege level Runs guest operating systems (VMs). Limited access to hardware. Restricted access via hypervisor.
  • 14. Pros • Windows Integration: Works well with Windows Server and Microsoft tools, ideal for Windows-focused environments. • Cost-Effective: Included with Windows Server licenses, saving money compared to other virtualization options. • Supports Many OSes: Compatible with various Windows and Linux versions. • Live Migration: Moves virtual machines between servers with little downtime.
  • 15. Cons • Linux Setup Complexity: Setting up Linux VMs can be more difficult compared to other platforms. • Hardware Needs: Requires specific hardware features, which might not work with older equipment. • Licensing Costs: Additional costs for Windows Server and management tools.
  • 16. Microsoft Hyper-V • Microsoft Hyper-V is a virtualization technology developed by Microsoft that allows you to create and manage virtual machines (VMs) on Windows-based servers. It's commonly used in data centers, enterprise environments, and cloud services to consolidate workloads, optimize resource use, and provide flexible virtualization solutions.
  • 17. Difference Ring Level Description Role in Hyper-V Access Level Ring 0 Highest privilege level Runs the Hyper-V hypervisor itself. It has full control over the hardware and manages virtual machines. Full hardware access. Ring 1 Intermediate privilege level Not used in Hyper-V. Typically, this level might be used for device drivers or similar tasks in other systems. Not applicable. Ring 2 Intermediate privilege level Not used in Hyper-V. Similar to Ring 1, it’s not utilized for typical operations in Hyper-V. Not applicable. Ring 3 Lowest privilege level Runs guest operating systems (VMs). They operate with restricted access and rely on Hyper-V for hardware interaction. Restricted access via hypervisor.
  • 18. Pros • High Availability: Automatically moves VMs if a server fails to ensure continuous operation. • Hyper-Converged Infrastructure: Works with solutions like Azure Stack HCI for combined storage and networking. • Management Tools: Managed through Hyper-V Manager and can be enhanced with System Center Virtual Machine Manager.
  • 19. Cons • Fewer Add-Ons: Fewer third- party tools and extensions compared to other virtualization solutions like VMware. • Learning Curve: May be complex for those new to the platform