Prerequisite – Virtualization In Cloud Computing and Types
1. Increased Security –
The ability to control the execution of a guest programs in a completely transparent manner opens new possibilities for delivering a secure, controlled execution environment. All the operations of the guest programs are generally performed against the virtual machine, which then translates and applies them to the host programs.
A virtual machine manager can control and filter the activity of the guest programs, thus preventing some harmful operations from being performed.Resources exposed by the host can then be hidden or simply protected from the guest.Increased security is a requirement when dealing with untrusted code.
- Example-1: Untrusted code can be analyzed in Cuckoo sandboxes environment.
The term sandbox identifies an isolated execution environment where instructions can be filtered and blocked before being translated and executed in the real execution environment.
- Example-2: The expression sandboxed version of the Java Virtual Machine (JVM) refers to a particular configuration of the JVM where, by means of security policy, instructions that are considered potentially harmful can be blocked.
2. Managed Execution –
In particular, sharing, aggregation, emulation, and isolation are the most relevant features.
Figure – Functions enabled by managed execution
3. Sharing –
Virtualization allows the creation of a separate computing environments within the same host. This basic feature is used to reduce the number of active servers and limit power consumption.
4. Aggregation –
Not only it is possible to share physical resource among several guests, but virtualization also allows aggregation, which is the opposite process. A group of separate hosts can be tied together and represented to guests as a single virtual host.This functionality is implemented with cluster management software, which harnesses the physical resources of a homogeneous group of machines and represents them as a single resource.
5. Emulation –
Guest programs are executed within an environment that is controlled by the virtualization layer, which ultimately is a program. Also a completely different environment with respect to the host can be emulated, thus allowing the execution of guest programs requiring specific characteristics that are not present in the physical host.
6. Isolation –
Virtualization allows providing guests—whether they are operating systems, applications, or other entities—with a completely separate environment, in which they are executed. The guest program performs its activity by interacting with an abstraction layer, which provides access to the underlying resources.The virtual machine can filter the activity of the guest and prevent harmful operations against the host.
Besides these characteristics, another important capability enabled by virtualization is performance tuning. This feature is a reality at present, given the considerable advances in hardware and software supporting virtualization. It becomes easier to control the performance of the guest by finely tuning the properties of the resources exposed through the virtual environment. This capability provides a means to effectively implement a quality-of-service (QoS) infrastructure.
7. Portability –
The concept of portability applies in different ways according to the specific type of virtualization considered.
- In the case of a hardware virtualization solution, the guest is packaged into a virtual image that, in most cases, can be safely moved and executed on top of different virtual machines.
- In the case of programming-level virtualization, as implemented by the JVM or the .NET runtime, the binary code representing application components (jars or assemblies) can run without any recompilation on any implementation of the corresponding virtual machine.
- Virtualization In Cloud Computing and Types
- Difference between Cloud Computing and Grid Computing
- Cloud Computing
- CRM and ERP in Cloud Computing
- Anatomy of Cloud Computing
- Energy Efficiency in Cloud Computing
- Load balancing in Cloud Computing
- Cyber Security in Cloud computing
- Licenses and their management in Cloud Computing
- Cloud computing Research challenges
- Cloud Computing Platforms and Technologies
- Different Software License models in Cloud Computing
- Service level agreements in Cloud computing
- Compliance as a Service (CaaS) in Cloud Computing
- Protein structure prediction in Cloud Computing
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.
Improved By : 02DCE