SlideShare uma empresa Scribd logo
1 de 20
Compiled by Pitiel
QUESTION 20
EUCALYPTUS IN CLOUD COMPUTING
EUCALYPTUS
 Stands for Elastic utility Computing Architecture for Linking
Your Programs To Useful Systems
 It is an open source platform for implementing Infrastructure
as a Service (IaaS) in a private or hybrid cloud computing
environment
 The Eucalyptus cloud platform pools together existing
virtualized infrastructure to create cloud resources for
infrastructure as a service, network as a service and storage as
a service.
EUCALYPTUSFEATURES
 Supports both Linux and Windows virtual machines
 Works with multiple hypervisors including VMware, Xen and
KVM
 Internal processes communications are secured through SOAP
and WS-Security
 Multiple clusters can be virtualised as a single cloud
EUCALYPTUSARCHITECTURE
MANAGED MODE
 In this mode, it just manages a local network of instances, which includes
security groups and IP addresses
SYSTEM MODE
 In this mode, it assigns a MAC address and attaches the instance’s network
interface to the physical network through the NC’s bridge
STATIC MODE
 In this mode, it assigns IP addresses to instances
THREEMODESOFEUCALYPTUS
 Users can run Amazon or Eucalyptus machine images as
instances on both the clouds
 It has 100% API compatibility with all the AWS services. There
are many tools developed to interact seamlessly between
AWS and Eucalyptus
 It is not very popular but is a string competitor to OpenStack
and CloudStack
ADVANTAGESOFEUCALYPTUS
Architecture Five main components
installation Is easy compared to other IaaS offerings
administration Strong CLI compatible with EC2 API
security Baseline security + component registration
popularity Medium
IaaS offering Public + private (hybrid)
SUMMARY
QUESTION 23
HYPERVISOR
 A hypervisor is a software that creates and runs virtual machines. It is also called a
virtual machine monitor. It isolates the hypervisor operating system and resources
from the virtual machines and enables the creation and management of those VMs
 The physical hardware that is used as a hypervisor is called the host
 It is paart of the private cloud that manages the virtual machines, i.e. it is the part
(program) that enables multiple operating systems to share the same hardware
HYPERVISOR
 Virtualisation of hardware components of the host computer
so that the virtual machines can be supported by the
hardware machines
 Determining and creating the number of virtual machines
 Is responsible for isolating all virtual machines in a single host
computer so that any changes to or usage of virtual machine
does not affect each other or the host itself
ROLESOFHYPERVISOR
 Hypervisor is used for data replication by data analysis firm
dealing with collecting and organising data
 Hypervisor enables server consolidation due to the
downloadable enhancements allowing servers to be
consolidated
USESOFHYPERVISOR
 Consolidates workloads
 It provides economic relaxation around the datacenter, OS backup,
hardware servers and even cuts down on power usage, making it an
overall cost-effective transition
 VMM offers better uptime, faster deployment, reduced workload and cost
predictions for operational needs
 Secures the operating environment from internal conflicts
 Reduces time consumption in testing and run-time debugging
 Automates the management processes, resulting in low operational
expenses
ADVANTAGESOFAHYPERVISOR
 Lacks the capability of running VMs on domestic computers
 Security may become an issue. While robust, hypervisors may
become an easy cyberattack target. Vulnerability increases
because of the centralised system, the company network,
server rooms
 Causes more intrusions and a possible denial-of-service attack
DISADVANTAGESOFHYPERVISOR
Type 1 hypervisor “bare metal” examples of type 1 hypervisors
are Citrix/Xen Server, Vmware ESXi and Microsoft Hyper-V
Type 2 hypervisor: hypervisors run on a host operating system
that provides virtualisation services. Examples of type 2
hypervisors include Microsoft Virtual PC, Oracle Virtual Box,
Vmware Workstation, Oracle Solaris Zones.
TWOMAINTYPESOFHYPERVISORS
 Runs directly on the underlying computer’s physical hardware,
interacting directly with its CPU, memory and physical
storage. For this reason, type 1 hypervisors are also referred
to as bare-metal hypervisors
 A type 1 hypervisor takes the place of the host operating
system
TYPE1HYPERVISOR
 Type 1 hypervisors are highly efficient because they have direct access to
physical hardware. This also increases their security because there is
nothing in between them and the CPU that an attacker could compromise
 Type 1 hypervisors often need a separate management machine to
administer different VMs and control the host hardware
ADVANTAGESOFTYPE1HYPERVISOR
DISADVANTAGESOFTYPE1HYPERVISORS
 Type 2 or hosted hypervisors, also known as client hypervisors
run as a software layer on top of the OS of the host machine.
They are used to abstract guest operating systems from the
host OS. Support guest virtual machines by coordinating calls
for central processing unit (CPU), OS. This makes it easy for an
end user to run a VM on a personal computing (PC) device
TYPE2HYPERVISOR
 The OS takes care of all the hardware
 Installing a type 2 is much easier than that of a type 1
 They have more points of failure since anything that affect the stability of the base
operating system can also affect the guest OS and the virtual machine. When the
base OS needs a reboot, all the VM will also be rebooted.
ADVANTAGESOFTYPE2HYPERVISOR
DISADVANTAGESOFTYPE2HYPERVISORS
T H E E N D
THANKYOUFORYOURCOOPERATION

Mais conteúdo relacionado

Semelhante a E-TECH.pptx

Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud ComputingPyingkodi Maran
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxVivek Shelke
 
Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptxBinod Rimal
 
Platform virtualization.raj
Platform virtualization.rajPlatform virtualization.raj
Platform virtualization.rajNRajaMohanReddy
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...Neha417639
 
virtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfvirtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfKowsalyaJayakumar2
 
Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloudChetna Purohit
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfAkshithaReddy42848
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computingSoumyajit Basu
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containersSelvaraj Kesavan
 
Security challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governanceSecurity challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governanceAdam Bert Lacay
 
Mid term report
Mid term reportMid term report
Mid term reportlokesh039
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computingMayank Aggarwal
 
Virtualization.pdf
Virtualization.pdfVirtualization.pdf
Virtualization.pdfaimarcarillo
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 

Semelhante a E-TECH.pptx (20)

Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computing
 
Cloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptxCloud Computing_Unit 1- Part 2.pptx
Cloud Computing_Unit 1- Part 2.pptx
 
Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptx
 
Platform virtualization.raj
Platform virtualization.rajPlatform virtualization.raj
Platform virtualization.raj
 
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
virtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfvirtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdf
 
Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloud
 
virtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdfvirtualizationcloudcomputing-140813101008-phpapp02.pdf
virtualizationcloudcomputing-140813101008-phpapp02.pdf
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
 
Vitualisation
VitualisationVitualisation
Vitualisation
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
 
incs775_lect6.ppt
incs775_lect6.pptincs775_lect6.ppt
incs775_lect6.ppt
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Security challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governanceSecurity challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governance
 
Mid term report
Mid term reportMid term report
Mid term report
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computing
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
Virtualization.pdf
Virtualization.pdfVirtualization.pdf
Virtualization.pdf
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 

Último

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

E-TECH.pptx

  • 2. QUESTION 20 EUCALYPTUS IN CLOUD COMPUTING
  • 3. EUCALYPTUS  Stands for Elastic utility Computing Architecture for Linking Your Programs To Useful Systems  It is an open source platform for implementing Infrastructure as a Service (IaaS) in a private or hybrid cloud computing environment  The Eucalyptus cloud platform pools together existing virtualized infrastructure to create cloud resources for infrastructure as a service, network as a service and storage as a service.
  • 4. EUCALYPTUSFEATURES  Supports both Linux and Windows virtual machines  Works with multiple hypervisors including VMware, Xen and KVM  Internal processes communications are secured through SOAP and WS-Security  Multiple clusters can be virtualised as a single cloud
  • 6. MANAGED MODE  In this mode, it just manages a local network of instances, which includes security groups and IP addresses SYSTEM MODE  In this mode, it assigns a MAC address and attaches the instance’s network interface to the physical network through the NC’s bridge STATIC MODE  In this mode, it assigns IP addresses to instances THREEMODESOFEUCALYPTUS
  • 7.  Users can run Amazon or Eucalyptus machine images as instances on both the clouds  It has 100% API compatibility with all the AWS services. There are many tools developed to interact seamlessly between AWS and Eucalyptus  It is not very popular but is a string competitor to OpenStack and CloudStack ADVANTAGESOFEUCALYPTUS
  • 8. Architecture Five main components installation Is easy compared to other IaaS offerings administration Strong CLI compatible with EC2 API security Baseline security + component registration popularity Medium IaaS offering Public + private (hybrid) SUMMARY
  • 10.  A hypervisor is a software that creates and runs virtual machines. It is also called a virtual machine monitor. It isolates the hypervisor operating system and resources from the virtual machines and enables the creation and management of those VMs  The physical hardware that is used as a hypervisor is called the host  It is paart of the private cloud that manages the virtual machines, i.e. it is the part (program) that enables multiple operating systems to share the same hardware HYPERVISOR
  • 11.  Virtualisation of hardware components of the host computer so that the virtual machines can be supported by the hardware machines  Determining and creating the number of virtual machines  Is responsible for isolating all virtual machines in a single host computer so that any changes to or usage of virtual machine does not affect each other or the host itself ROLESOFHYPERVISOR
  • 12.  Hypervisor is used for data replication by data analysis firm dealing with collecting and organising data  Hypervisor enables server consolidation due to the downloadable enhancements allowing servers to be consolidated USESOFHYPERVISOR
  • 13.  Consolidates workloads  It provides economic relaxation around the datacenter, OS backup, hardware servers and even cuts down on power usage, making it an overall cost-effective transition  VMM offers better uptime, faster deployment, reduced workload and cost predictions for operational needs  Secures the operating environment from internal conflicts  Reduces time consumption in testing and run-time debugging  Automates the management processes, resulting in low operational expenses ADVANTAGESOFAHYPERVISOR
  • 14.  Lacks the capability of running VMs on domestic computers  Security may become an issue. While robust, hypervisors may become an easy cyberattack target. Vulnerability increases because of the centralised system, the company network, server rooms  Causes more intrusions and a possible denial-of-service attack DISADVANTAGESOFHYPERVISOR
  • 15. Type 1 hypervisor “bare metal” examples of type 1 hypervisors are Citrix/Xen Server, Vmware ESXi and Microsoft Hyper-V Type 2 hypervisor: hypervisors run on a host operating system that provides virtualisation services. Examples of type 2 hypervisors include Microsoft Virtual PC, Oracle Virtual Box, Vmware Workstation, Oracle Solaris Zones. TWOMAINTYPESOFHYPERVISORS
  • 16.  Runs directly on the underlying computer’s physical hardware, interacting directly with its CPU, memory and physical storage. For this reason, type 1 hypervisors are also referred to as bare-metal hypervisors  A type 1 hypervisor takes the place of the host operating system TYPE1HYPERVISOR
  • 17.  Type 1 hypervisors are highly efficient because they have direct access to physical hardware. This also increases their security because there is nothing in between them and the CPU that an attacker could compromise  Type 1 hypervisors often need a separate management machine to administer different VMs and control the host hardware ADVANTAGESOFTYPE1HYPERVISOR DISADVANTAGESOFTYPE1HYPERVISORS
  • 18.  Type 2 or hosted hypervisors, also known as client hypervisors run as a software layer on top of the OS of the host machine. They are used to abstract guest operating systems from the host OS. Support guest virtual machines by coordinating calls for central processing unit (CPU), OS. This makes it easy for an end user to run a VM on a personal computing (PC) device TYPE2HYPERVISOR
  • 19.  The OS takes care of all the hardware  Installing a type 2 is much easier than that of a type 1  They have more points of failure since anything that affect the stability of the base operating system can also affect the guest OS and the virtual machine. When the base OS needs a reboot, all the VM will also be rebooted. ADVANTAGESOFTYPE2HYPERVISOR DISADVANTAGESOFTYPE2HYPERVISORS
  • 20. T H E E N D THANKYOUFORYOURCOOPERATION