SlideShare a Scribd company logo
VIRTUALIZATION
A CONCEPT IMPLEMENTATION CLOUD
Nishant Kumar
Gurukula Kangri University, Haridwar
https://lectureppt.mybluemix.net
Origin
• The term "virtualization" traces its roots to 1960’s mainframes, when
IBM invested a lot of time and effort in developing robust time-
sharing solutions. It was a method of logically dividing the
mainframes resources for different applications.
• Time-sharing refers to the shared usage of computer resources
among a large group of users, aiming to increase the efficiency of
both the users and the expensive computer resources they share.
Origin…
• This model represented a major breakthrough in computer
technology: the cost of providing computing capability dropped
considerably and it became possible for organizations, and even
individuals, to use a computer without actually owning one.
• Similar reasons are driving virtualization for industry standard
computing today: the capacity in a single server is so large that it is
almost impossible for most workloads to effectively use it. The best
way to improve resource utilization, and at the same time simplify
data center management, is through virtualization.
WHY
DO WE NEED
VIRTUAIZATION ?
Web Server
Windows
App Server
Linux
DB Server
Linux
EMail
Windows
If something goes wrong ?
App Server
DOWN!
Why Virtualization : Advantages
• Resource optimization
• Maximizing Uptime
• Automatically protect applications from server failure.
• Easy Migrations
• Protect investment in existing, legacy systems.
• Optimization of workloads
Virtualization
• The ability to run multiple operating systems on a single
physical system and share the underlying hardware
resources.
• Virtualization, is a shift in thinking from physical to
logical, treating resources as logical resources rather than
separate physical resources
Characteristics
• Partitioning: Run multiple application and operating systems in a single physical
machine by partitioning the available resources
• Isolation: Virtual machines are completely isolated from hosts and other virtual
machines
• Encapsulations: Encapsulate the entire state of a virtual machine in hardware-
independent files
Types of Virtualization
• HARDWARE VIRTUALIZATION
• DESKTOP VIRTUALIZATION
• STORAGE VIRTUALIZATION
Hypervisor
• Hypervisor, also called as Virtual Machine Monitor (VMM), creates a
virtual platform on the host computer, on top of which multiple guest
operating systems are executed and monitored.
• This way, multiple operating systems, which are either multiple
instances of the same operating system, or different operating
systems, can share the hardware resources offered by the host.
Hypervisor Types
• Type 1: native or bare metal
• Native hypervisors are software systems that run directly on the host's hardware to control the
hardware, and to monitor the guest operating systems. Consequently, the guest operating
system runs on a separate level above the hypervisor.
Examples : Oracle VM, Microsoft Hyper-V, VMWare ESX and Xen.
• Type 2: hosted
• Hosted hypervisors are designed to run within a traditional operating system. In other words, a
hosted hypervisor adds a distinct software layer on top of the host operating system, and the
guest operating system becomes a third software level above the hardware.
Example : well-known example of a hosted hypervisor is Oracle VM VirtualBox, VMWare Server
and Workstation, Microsoft Virtual PC, KVM, QEMU and Parallels.
BARE-MATEL ARCHITECTURE
HOSTED ARCHITECTURE
IMPLEMENTATION STEPS
1. Initially check network connection between server and client.
2. Install Virtual Manager
3. Install Hypervisor, KVM
4. Installing Virtual Machine using Virtual Machine Manager.
5. Configuring KVM
6. Now installing VNC Viewer at client side.
7. Accessing virtual machine hosted by server through VNC Viewer.
PREREQUISITE
• Two systems required:
• First Server with CentOS 6.4 or RedHat 6 installed. (All further implementation
is done on CentOS 6.4)
• Second is Client with Linux or Windows OS.
• Both the systems should be on a network (connected over LAN).
• Set Server IP 192.168.1.253
Client IP 192.168.1.252
• Or as per your IP range but both should be on same subnet.
SERVER-SIDE SETUP
• Required Package Installation: There are two Process to install required package.
• Connect to INTERNET to install all packages directly from the distributor
repository.
• Using available packages in CentOS or RedHat Installation Disk by creating own
repository.
• Setup virtualization on Server:
• Open terminal.
• Install KVM, a hypervisior by using.
yum install kvm
• Install virt-manager (Graphical tool to manage virtual machines).
yum install virt-manager
• Install libvirt
yum install libvirt
• Start libvirt service:
service libvirtd start
• Open virt-manager tool to install virtual machines.
virt-manger
• Add new virtual machine and follow steps using Virtual Machine
Manager Wizard.
• After installation following screen will appear:
• Initially the hypervisor is setup to use virtual machine on local machine
(127.0.0.1). To set-up to use it from the remote computer we have to configure it
with the server IP address.
vi /etc/libvirt/qemu.conf
• Uncomment the vnc_listen parameter and replace 127.0.0.1 with your Server IP.
vnc_listen=”192.168.1.253”
• Once a virtual machine is setup a configuration file is created for each
virtual machine in /etc/libvirt/qemu/ directory with the name of the virtual
machine.
• Edit this VM Configuration file to allow the VNC access of this virtual
machine, we can also add password to stop unauthorized access to the
virtual machine (optional).
• Now our virtual machine is ready to be accessed remotely, just we need to know
on which port qemu is listening, to know that just run the following command:
virsh vncdisplay <virtual_machine_name>
OR
netstat –tuplen
CLIENT-SIDE SETUP
Setup client side to access the virtual machine:
• Install any VNC Viewer.
yum install tigervnc
• Open VNC Viewer
• Provide IP of Server and Port no on which virtual machine is running.
• Here you are in Virtual Machine running on Server.
• Now use the server resources remotely.
THANKShttps://lectureppt.mybluemix.net

More Related Content

PPT
Virtualization
ODP
Introduction to virtualization
PPTX
What is Virtualization
PPT
Introduction to Virtualization
PDF
Introduction to virtualization
PPTX
Virtualization
PPTX
Cloud Computing: Virtualization
PDF
Lecture5 virtualization
Virtualization
Introduction to virtualization
What is Virtualization
Introduction to Virtualization
Introduction to virtualization
Virtualization
Cloud Computing: Virtualization
Lecture5 virtualization

What's hot (20)

PPTX
Virtual Machines - Virtual Box
PPTX
Linux
PPTX
Virtual Machine
PDF
Evolution of Cloud Computing
PPT
Virtualization.ppt
PDF
Virtualization presentation
PPTX
Server virtualization
PPTX
Virtual machine
PPTX
Virtual machines and containers
PPTX
VirtualBox networking explained
PPT
Server virtualization by VMWare
PPTX
Platform as a Service (PaaS)
PDF
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
PPTX
Chap 2 virtulizatin
PPTX
Implementation levels of virtualization
PDF
Kubernetes Concepts And Architecture Powerpoint Presentation Slides
PPTX
Google Cloud Platform
PDF
Introduction to Google Cloud Platform
PPT
Virtual machine
PDF
[OpenStack 하반기 스터디] Docker를 이용한 OpenStack 가상화
Virtual Machines - Virtual Box
Linux
Virtual Machine
Evolution of Cloud Computing
Virtualization.ppt
Virtualization presentation
Server virtualization
Virtual machine
Virtual machines and containers
VirtualBox networking explained
Server virtualization by VMWare
Platform as a Service (PaaS)
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Chap 2 virtulizatin
Implementation levels of virtualization
Kubernetes Concepts And Architecture Powerpoint Presentation Slides
Google Cloud Platform
Introduction to Google Cloud Platform
Virtual machine
[OpenStack 하반기 스터디] Docker를 이용한 OpenStack 가상화
Ad

Viewers also liked (6)

PPTX
Technical education benchmarks
PPSX
Bluemix Introduction
PPTX
Database Management System
PPTX
Relational Data Model Introduction
DOCX
Virtualization in cloud computing
PPT
Sexuality education - how to talk to your children about sex
Technical education benchmarks
Bluemix Introduction
Database Management System
Relational Data Model Introduction
Virtualization in cloud computing
Sexuality education - how to talk to your children about sex
Ad

Similar to Virtualization, A Concept Implementation of Cloud (20)

PPTX
lecture5-virtualization-190301171613.pptx
PPTX
Virtualization
PPTX
VIRTUALIZATION AND ITS TYPES IMPLEMENTATION.pptx
PPTX
6-Virtualizaiton-6.pptx
PPTX
Virtualization in cloud computing
PDF
VIRTUALIZATION-IMPLEMENTATION.pdf-LEVELS
PPTX
VIRTUALIZATION-IMPLEMENTATION.pptx-TYPES
PPTX
CC-5 - MOD.pptx Cloud Vertulization nand
PPTX
virtualization.pptx
PPTX
Virtualization
PPTX
virtualization(1).pptx
PPTX
Chapter 3 - Cloud computing Virtualization-2
PPTX
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
PDF
Cloud Computing Virtualization and containers
PPT
Virtualization
PPTX
Server Virtualization
PPTX
virtualization123 file that is good for study
PPTX
virtualization-220403085202_Chapter1.pptx
PPTX
Lecture1(VM).pptx
PPTX
1 (3).pptx
lecture5-virtualization-190301171613.pptx
Virtualization
VIRTUALIZATION AND ITS TYPES IMPLEMENTATION.pptx
6-Virtualizaiton-6.pptx
Virtualization in cloud computing
VIRTUALIZATION-IMPLEMENTATION.pdf-LEVELS
VIRTUALIZATION-IMPLEMENTATION.pptx-TYPES
CC-5 - MOD.pptx Cloud Vertulization nand
virtualization.pptx
Virtualization
virtualization(1).pptx
Chapter 3 - Cloud computing Virtualization-2
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
Cloud Computing Virtualization and containers
Virtualization
Server Virtualization
virtualization123 file that is good for study
virtualization-220403085202_Chapter1.pptx
Lecture1(VM).pptx
1 (3).pptx

More from Nishant Munjal (20)

PPTX
Database Management System
PPTX
Functions & Recursion
PPTX
Array, string and pointer
PPTX
Programming in C
PPTX
Introduction to computers
PPTX
Unix Administration
PPTX
Shell Programming Concept
PPTX
VI Editor
PPTX
Introduction to Unix
PPTX
Routing Techniques
PPTX
Asynchronous Transfer Mode
PPTX
Overview of Cloud Computing
PPTX
SQL Queries Information
PPTX
Database Design and Normalization Techniques
PPTX
Concurrency Control
PPTX
Transaction Processing Concept
PPTX
Personnel Management and Industrial Psycology
PPTX
Marketing Management
PPTX
Principles of Management
PPTX
Industrial Economics
Database Management System
Functions & Recursion
Array, string and pointer
Programming in C
Introduction to computers
Unix Administration
Shell Programming Concept
VI Editor
Introduction to Unix
Routing Techniques
Asynchronous Transfer Mode
Overview of Cloud Computing
SQL Queries Information
Database Design and Normalization Techniques
Concurrency Control
Transaction Processing Concept
Personnel Management and Industrial Psycology
Marketing Management
Principles of Management
Industrial Economics

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
Teaching material agriculture food technology
PDF
KodekX | Application Modernization Development
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Big Data Technologies - Introduction.pptx
PDF
Machine learning based COVID-19 study performance prediction
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
Mobile App Security Testing_ A Comprehensive Guide.pdf
Cloud computing and distributed systems.
Encapsulation_ Review paper, used for researhc scholars
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Review of recent advances in non-invasive hemoglobin estimation
Teaching material agriculture food technology
KodekX | Application Modernization Development
MYSQL Presentation for SQL database connectivity
Big Data Technologies - Introduction.pptx
Machine learning based COVID-19 study performance prediction
The AUB Centre for AI in Media Proposal.docx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)

Virtualization, A Concept Implementation of Cloud

  • 1. VIRTUALIZATION A CONCEPT IMPLEMENTATION CLOUD Nishant Kumar Gurukula Kangri University, Haridwar https://lectureppt.mybluemix.net
  • 2. Origin • The term "virtualization" traces its roots to 1960’s mainframes, when IBM invested a lot of time and effort in developing robust time- sharing solutions. It was a method of logically dividing the mainframes resources for different applications. • Time-sharing refers to the shared usage of computer resources among a large group of users, aiming to increase the efficiency of both the users and the expensive computer resources they share.
  • 3. Origin… • This model represented a major breakthrough in computer technology: the cost of providing computing capability dropped considerably and it became possible for organizations, and even individuals, to use a computer without actually owning one. • Similar reasons are driving virtualization for industry standard computing today: the capacity in a single server is so large that it is almost impossible for most workloads to effectively use it. The best way to improve resource utilization, and at the same time simplify data center management, is through virtualization.
  • 5. Web Server Windows App Server Linux DB Server Linux EMail Windows
  • 6. If something goes wrong ? App Server DOWN!
  • 7. Why Virtualization : Advantages • Resource optimization • Maximizing Uptime • Automatically protect applications from server failure. • Easy Migrations • Protect investment in existing, legacy systems. • Optimization of workloads
  • 8. Virtualization • The ability to run multiple operating systems on a single physical system and share the underlying hardware resources. • Virtualization, is a shift in thinking from physical to logical, treating resources as logical resources rather than separate physical resources
  • 9. Characteristics • Partitioning: Run multiple application and operating systems in a single physical machine by partitioning the available resources • Isolation: Virtual machines are completely isolated from hosts and other virtual machines • Encapsulations: Encapsulate the entire state of a virtual machine in hardware- independent files
  • 10. Types of Virtualization • HARDWARE VIRTUALIZATION • DESKTOP VIRTUALIZATION • STORAGE VIRTUALIZATION
  • 11. Hypervisor • Hypervisor, also called as Virtual Machine Monitor (VMM), creates a virtual platform on the host computer, on top of which multiple guest operating systems are executed and monitored. • This way, multiple operating systems, which are either multiple instances of the same operating system, or different operating systems, can share the hardware resources offered by the host.
  • 12. Hypervisor Types • Type 1: native or bare metal • Native hypervisors are software systems that run directly on the host's hardware to control the hardware, and to monitor the guest operating systems. Consequently, the guest operating system runs on a separate level above the hypervisor. Examples : Oracle VM, Microsoft Hyper-V, VMWare ESX and Xen. • Type 2: hosted • Hosted hypervisors are designed to run within a traditional operating system. In other words, a hosted hypervisor adds a distinct software layer on top of the host operating system, and the guest operating system becomes a third software level above the hardware. Example : well-known example of a hosted hypervisor is Oracle VM VirtualBox, VMWare Server and Workstation, Microsoft Virtual PC, KVM, QEMU and Parallels.
  • 15. IMPLEMENTATION STEPS 1. Initially check network connection between server and client. 2. Install Virtual Manager 3. Install Hypervisor, KVM 4. Installing Virtual Machine using Virtual Machine Manager. 5. Configuring KVM 6. Now installing VNC Viewer at client side. 7. Accessing virtual machine hosted by server through VNC Viewer.
  • 16. PREREQUISITE • Two systems required: • First Server with CentOS 6.4 or RedHat 6 installed. (All further implementation is done on CentOS 6.4) • Second is Client with Linux or Windows OS. • Both the systems should be on a network (connected over LAN). • Set Server IP 192.168.1.253 Client IP 192.168.1.252 • Or as per your IP range but both should be on same subnet.
  • 17. SERVER-SIDE SETUP • Required Package Installation: There are two Process to install required package. • Connect to INTERNET to install all packages directly from the distributor repository. • Using available packages in CentOS or RedHat Installation Disk by creating own repository. • Setup virtualization on Server: • Open terminal. • Install KVM, a hypervisior by using. yum install kvm • Install virt-manager (Graphical tool to manage virtual machines). yum install virt-manager • Install libvirt yum install libvirt
  • 18. • Start libvirt service: service libvirtd start • Open virt-manager tool to install virtual machines. virt-manger • Add new virtual machine and follow steps using Virtual Machine Manager Wizard. • After installation following screen will appear:
  • 19. • Initially the hypervisor is setup to use virtual machine on local machine (127.0.0.1). To set-up to use it from the remote computer we have to configure it with the server IP address. vi /etc/libvirt/qemu.conf • Uncomment the vnc_listen parameter and replace 127.0.0.1 with your Server IP. vnc_listen=”192.168.1.253”
  • 20. • Once a virtual machine is setup a configuration file is created for each virtual machine in /etc/libvirt/qemu/ directory with the name of the virtual machine. • Edit this VM Configuration file to allow the VNC access of this virtual machine, we can also add password to stop unauthorized access to the virtual machine (optional).
  • 21. • Now our virtual machine is ready to be accessed remotely, just we need to know on which port qemu is listening, to know that just run the following command: virsh vncdisplay <virtual_machine_name> OR netstat –tuplen
  • 22. CLIENT-SIDE SETUP Setup client side to access the virtual machine: • Install any VNC Viewer. yum install tigervnc • Open VNC Viewer • Provide IP of Server and Port no on which virtual machine is running.
  • 23. • Here you are in Virtual Machine running on Server. • Now use the server resources remotely.