Vous êtes sur la page 1sur 5

Virtualization: Types -Advantages and

Solutions
Table of Contents
Abstract: ........................................................................................................................................................ 1
Introduction: ................................................................................................................................................. 1
Types and advantages of Virtualizations: ..................................................................................................... 2
Server virtualization: ................................................................................................................................. 2
Application Virtualization: ........................................................................................................................ 2
Desktop virtualization: .............................................................................................................................. 3
Storage Virtualization: .............................................................................................................................. 3
Issues with virtualization: ............................................................................................................................. 4
References: ................................................................................................................................................... 5

Abstract:
This study will focus on defining what virtualization is, types of virtualization, its advantage and
disadvantages and virtual service bases solutions. In this fast paced technological era almost every
element can be virtualized. To find significant relation between three basic of virtualization forms:
desktop virtualization, virtualized appliances and server/network virtualization. Majority of information
technology organization have implemented the server virtualization mainly because its cost
effectiveness and creation of virtual machine for provisions.

Introduction:
Virtualization creates a virtual computing, simulated environment as opposite to physical environment.
Virtualization includes computer-induced versions of operating system, hardware, storage devices etc.
This allows the organizations to partition physical computers and server into several virtual machines.
Each of the virtual machine while using resources of host machine can independently run and integrate
different operating systems. While creating multiple virtual machines of computer systems and servers,
with the help of virtualization, the workload and scalability can be improved with less consumption of
time, maintenance, cost and infrastructure.
Types and advantages of Virtualizations:
The basic types of virtual technologies are briefly explained below which includes virtualization of
server, application, desktop and storage.

Server virtualization:
In this type of virtualization, a virtual server is created from a physical server. The physical server is
referred to the actual server which is actually doing the processing and computing which imposed by
application and operating system, it is also called host. However, the virtual server cannot operate in the
absence of a physical server. With the presence of a physical server, multiple virtual servers can be
created, it also known as host.

With virtualization of servers, between application and operating system and physical hardware, the
virtualization layers are placed. Making it possible to install multiple sets of applications and operating
systems on one single physical server. Each set of these servers performs similar function to the physical
server with one major difference is that the virtual servers are running in many instances. These
instances are known as virtual servers and virtual machines. Another important characteristic of a virtual
server is that it can be converted from a physical traditional server running specific configuration of
applications and operating system. The use of server virtualization is beyond duplication of physical
server for various operating systems and applications.

Virtual Machine: the virtual representation of physical server running more than one application and
operating system, it consists of group of files or single files that can be executed and read by the
virtualization layer. Each of the virtual machine behaves as a separate computer system which is self-
contained is unaware of the presence of other virtual machines on the server.

Hypervisor: Also known as virtual machine monitor is the host layer of software that enables single or
multiple operating systems and virtual machines to run on physical server. It is placed above the OS but
not below the virtual machines or operating systems which will allow an addition of another operating
system on top of an existing operating system.

Application Virtualization:
This type of virtualization comprises of technologies which separates the operating systems from
applications. With the help of application virtualization, the application can be independently
distributed in single set of file or executable package. There are two types of application virtualization:
application streaming and sandbox application.

Application streaming: this form of application virtualization divides the application into multiple
packages which is streamed towards users while being stored on central server, only the
application which is required will be streamed towards the user.
Sandbox application: These applications are completely isolated in what is known as bubble
from underlying operating system. While removing the dependency conflict, no additional driver
installation or installation is required. Because it creates an executable file which already
contains all features required to run the application. Different software can run alongside with
the isolate sandboxes without any modification or conflict.

Desktop virtualization:
The separation of desktop, application and user data and operating system from the enclosed
underlying location. The underlying end point is the device of computer which is use to access
the desktop. Desktop virtualization is divided into server side and client side virtualization.

Server side: remotely executing the end user applications on central server which is
streamed towards the endpoint via access virtualizations technology and remote display
protocol.
Client side virtualization: The applications are executed from the end point (user
location) and are presented locally on clients computer.

Storage Virtualization:
This type of virtualization is used at location with where there are multiple storage systems. Storage
virtualizations comprises of set of technologies that creates an abstraction layer between physical
storage system and local storage. Multiple storage devices are stored into one single storage device in a
network which can control and managed through central console. The storage devices can be divided
into two further types: file virtualization and block virtualization.

File virtualization: File virtualization creates a virtual file system in the network of storage
devices. It unites multiple storage devices into single pool of files. It maintains a global mapping
of file locations and keeps track of files which are stored on the storage devices.
Block virtualization: Block virtualization focuses on creating virtual disks so that one storage
system can be created of distributed storage network.

Storage virtualization manages as a single resource by hiding the physical complexities from storage
administrators and applications. It very time consuming to manage when there are multiple storage
devices on a network. Storage virtualization helps in this regard to help administrator to perform
different tasks such as archiving, recovery and backup. (Kampert, 2010)
Issues with virtualization:
Along with benefits, virtualizations also bring more complexities on larger level. Usually,
virtualization grows from pocket deployment which causes great issues for those people who
are implementing and architecting the virtualization are not part of the platform core team.
Security compliance team isnt involved either which results in great level of security threat to
the company. Another major issue is of compliance. Since companies are virtualizing, they do
not comply with virtual infrastructure. Regulatory and compliance issues like access controls,
granular auditing, configuration of hypervisors and to ensure that data cannot be accessed or
modified and is completely segregated. For auditing purposes, the virtual infrastructure should
also meet the regulations like SOX, HIPAA and PCI.

Due to some reason, most organizations cannot achieve the proper efficient control in virtual
machine as compared to actual physical server. Because it is hard to keep up the traditional
process control which occurs in virtual infrastructure with physical structure. Many tools of the
VM end up giving excessive access to the end-user, which allows them to see everything and
could do potential harm too.

When physical servers are merged into single platform machine, it increases the users and
system administrator risk of gaining accessibility to the data. Failure to consider the hidden
costs associated with implementation of virtualization. Company often makes the mistakes of
not considering the hidden costs associated with it like audit and security, life cycle
management and configuration, storage, capacity management and inventory. Also, training
the IT staff and personnel is major concern.
References:
https://esj.com/Articles/2009/08/18/Virtualization-Problems-Solutions.aspx?Page=3

https://jisajournal.springeropen.com/articles/10.1186/s13174-014-0015-z

https://www.slideshare.net/ammarit/virtualization-security-and-threat

https://www.helpnetsecurity.com/2010/03/16/six-common-virtualization-security-risks-and-how-to-
combat-them/

http://searchsecurity.techtarget.com/resources/Virtualization-Security-Issues-and-Threats

http://www.networkcomputing.com/data-centers/top-11-virtualization-risks-identified/2062567936

http://searchcloudsecurity.techtarget.com/tip/Top-virtualization-security-risks-and-how-to-prevent-
them

Vous aimerez peut-être aussi