SlideShare uma empresa Scribd logo
1 de 15
What is Virtualization 01-01-01 Introduction to  What is Virtualization
Comparison traditional server  virtual server
Physical Server  ,[object Object],[object Object]
Risk AD Server Web Server & AD Server ,[object Object],[object Object],[object Object],Web Server consolidate
Hardware Utilization Utilization is very low. 70% Available resources.
[object Object],Server Virtualization consolidate Physical servers.
Server Virtualization Physical Server Virtualized Server
Virtualization Layer ,[object Object],[object Object],Host  Operating  System
Virtual Server ESX Server (virtualization layer) ESX Server   Physical Server  bare metal Virtualized CPU,  memory,  network cards, hard drives Virtual Server
Virtual Machine Monitor Physical Server
VMkernel
VMkernel Resource Manager
Management Console VMware  Infrastructure Client
Management Console ,[object Object],[object Object],VirtualCenter Server VI Client VI Client ESX Server
Virtual Server ESX Server (virtualization layer)

Mais conteúdo relacionado

Mais procurados

Introduction to virtualisation
Introduction to virtualisationIntroduction to virtualisation
Introduction to virtualisation
sagaroceanic11
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
Israel Marcus
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
elliando dias
 
Hardware virtualization basic
Hardware virtualization basicHardware virtualization basic
Hardware virtualization basic
Sanoj Kumar
 

Mais procurados (20)

Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloud
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Virtualization technology and an application of building vm ware
Virtualization technology and an application of building vm wareVirtualization technology and an application of building vm ware
Virtualization technology and an application of building vm ware
 
Virtualisation basics
Virtualisation basicsVirtualisation basics
Virtualisation basics
 
Virtualization
VirtualizationVirtualization
Virtualization
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 
Introduction to virtualisation
Introduction to virtualisationIntroduction to virtualisation
Introduction to virtualisation
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Server virtualization by VMWare
Server virtualization by VMWareServer virtualization by VMWare
Server virtualization by VMWare
 
Hypervisor
HypervisorHypervisor
Hypervisor
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
 
Hardware virtualization basic
Hardware virtualization basicHardware virtualization basic
Hardware virtualization basic
 
Virtualization concept slideshare
Virtualization concept slideshareVirtualization concept slideshare
Virtualization concept slideshare
 
Virtualization Technology Overview
Virtualization Technology OverviewVirtualization Technology Overview
Virtualization Technology Overview
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computing
 

Semelhante a Introduction to Virtualization (viadmin.com)

An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
Alan McSweeney
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
webhostingguy
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
webhostingguy
 
Esx configuration guide
Esx configuration guideEsx configuration guide
Esx configuration guide
Naga Raju N
 
Virtualization
VirtualizationVirtualization
Virtualization
ganeshhcl
 
Virtualization_TechTalk
Virtualization_TechTalkVirtualization_TechTalk
Virtualization_TechTalk
Arif k
 
Virtualization Introduction.ppt
Virtualization Introduction.pptVirtualization Introduction.ppt
Virtualization Introduction.ppt
shruti533256
 
Using Virtualization To Improve Development And Testing
Using Virtualization To Improve Development And TestingUsing Virtualization To Improve Development And Testing
Using Virtualization To Improve Development And Testing
elliando dias
 

Semelhante a Introduction to Virtualization (viadmin.com) (20)

VMware Esx Short Presentation
VMware Esx Short PresentationVMware Esx Short Presentation
VMware Esx Short Presentation
 
Introducing Xen Server
Introducing Xen ServerIntroducing Xen Server
Introducing Xen Server
 
virtualization-220403085202.pdf
virtualization-220403085202.pdfvirtualization-220403085202.pdf
virtualization-220403085202.pdf
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
 
6420 a 15
6420 a 156420 a 15
6420 a 15
 
Virtualization meisen 042811
Virtualization meisen 042811Virtualization meisen 042811
Virtualization meisen 042811
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
 
Esx configuration guide
Esx configuration guideEsx configuration guide
Esx configuration guide
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization_TechTalk
Virtualization_TechTalkVirtualization_TechTalk
Virtualization_TechTalk
 
Virtualization Introduction.ppt
Virtualization Introduction.pptVirtualization Introduction.ppt
Virtualization Introduction.ppt
 
Using Virtualization To Improve Development And Testing
Using Virtualization To Improve Development And TestingUsing Virtualization To Improve Development And Testing
Using Virtualization To Improve Development And Testing
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Introduction to Virtualization (viadmin.com)

Notas do Editor

  1. 1-01-01 Introduction To help you understand how VMware Virtual Infrastructure works, let’s first provide some background on VMware ’s virtualization technology.           
  2. To start with I am going to compare what are the differences between a traditional hardware server and a virtual server?           
  3.              - The traditional physical hardware server or workstation an – x86 based system with - an Intel or AMD processor like Pentium 4 or Opteron; - has devices such as disks, - network cards, - memory, - CPU and so on.; - and software including an operating system and applications. Each layer of the architecture is pretty tightly tied to the layer below and ultimately to the hardware. This is the architecture that we’ve been using for years. However, it’s definitely not ideal.
  4. Why not ideal? Well, you have only one OS and pretty much one workload per physical machine. It’s very difficult to put more than one major application on these servers because you risk running into conflicts and performance problems if you do.
  5. In fact, a best practice for computing today is to run only one application per server in order to avoid those problems. However, the result is that most of the time utilization is very low —there’s a lot of computing power that we’ve paid for that’s going to waste.
  6.    - Let’s take a look at the Virtual Server. Server virtualization fundamentally changes the way you think of desktop or server machines. It allows you to slice and dice a single box into smaller virtual servers.
  7.         - It takes a physical system (hardware, operating system, and applications) along with the operating system and everything installed in the operating system and packages them into what we call a “virtual machine”.
  8. This is achieved by installing a very thin application layer (called ESX Server) on top of the physical hardware which allows you to slice and dice a single box into smaller virtual servers and control resources assigned to each virtual machine.      - The Server virtualization layer , also known as the VMkernel , runs on the native hardware. It manages all the operating systems on the physical machine. It is also known as Host or Host Operating System , because it hosts the virtual machines running on a particular physical system.
  9. The so called Virtualization layer is represented by ESX Server which installs on a bare metal and separates operating system and applications from hardware and firmware by presenting a virtualized -CPU, -memory, -hard drives, - Network cards to the Operating System. The virtual environments are called virtual servers or virtual machines , but they are also known as guests . You can create multiple virtual machines that share physical system’s resources. Each guest runs on a virtual imitation of the hardware layer and contains a virtual hardware configuration (such as 256 MB RAM, 1024X768 screen resolution) as well as virtual disks (like C and D drive) where the operating system and applications can be installed. To the operating system in a virtual machine, it looks like it’s running on real physical hardware. Thus, the OS inside of a virtual machine is the same operating system as you use on a physical machine—whether it’s Windows, Linux, Netware, BSD, and so on. It doesn’t need to be modified for virtualization. The Guest has no knowledge of the Host's (ESX Server) operating system because it is not aware that it's not running on real hardware. The applications installed into the OS are the same complete applications that ran on an OS before installing ESX Server virtualization layer.
  10. ESX Server consists of two main components that implement the virtual platform: the Virtual Machine Monitor and the VMKernel . A Guest operating system such as Windows or Linux runs on top of this virtual platform. The VMM handles the execution of all instructions on the virtual CPU and the emulation of all virtual devices.
  11. The VMkernel schedules the VMM for each virtual machine and allocates and manages the resources needed by the virtual machines.
  12. The Virtual Machine does, however, require real computing resources from the host -- so it uses a virtual machine monitor to coordinate instructions to the CPU . It validates all the guest-issued CPU instructions and manages any executed code that requires addition privileges.
  13. The server administrator uses ESX management console called VMware Infrastructure Client to manage and divide one physical server into multiple isolated virtual environments called virtual machines.
  14. It also allows the administrator to move those virtual machines between physical servers and assign memory, CPU, disk and network resources. Because the VMware virtualization layer is in complete control of the host's hardware, it makes it possible to provide fine-grained resource allocations to each virtual machine.
  15. Precise amounts of host processor, memory, network I/O and disk I/O resources can be granted to each virtual machine and those allocations can be dynamically adjusted as workloads and service levels change.