Cloud Computing by Rajiv Chopra

Cloud Computing by Rajiv Chopra

Author:Rajiv Chopra
Language: eng
Format: epub
ISBN: 978-93-86286-91-8
Publisher: Mercury Learning and Information
Published: 2017-03-27T04:00:00+00:00


3.4 CREATING A VIRTUALIZED ARCHITECTURE

During virtualization, software known as a Virtual Machine Monitor (VMM) or a Hypervisor is used.

What is a Hypervisor?

A hypervisor is an operating system (OS) that knows how to act as a traffic policeman to guide processes in an orderly manner. It is set at the lowest levels of the hardware environment. In cloud computing, it is necessary to support several types of OSs and a hypervisor is the correct method to do this. It helps you to show and use the same application on several systems without having to physically copy that application onto each system. With virtualization technology, it is possible to use the hypervisor to split the physical computer’s resources. The resources can be split 50–50 or 80–20 between two guest operating systems. The advantage here is that the hypervisor does all the heavy lifting. The guest OS does not care that it is running in a virtual partition. It thinks it has the computer all to itself. There are three different types of hypervisors:

1.Native Hypervisors: They sit on the hardware platform directly. They give better performance to the end users.

2.Embedded Hypervisors: They are integrated into a CPU on a separate chip.

3.Hosted Hypervisors: They run as a different software layer above both the hardware and the OS. This type is useful for both private and public clouds because it improves performance.

Two different virtualization structures are thus formed as follows:

1.Hosted Virtualization.

2.Bare-Metal Virtualization.

Let’s study each of these structures with their pros and cons.



Loading...
Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(6174)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(5210)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(2238)
Kotlin in Action by Dmitry Jemerov(1890)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(1051)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(979)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(893)
Blockchain Basics by Daniel Drescher(863)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(835)
TCP IP by Todd Lammle(744)
Owning Bitcoin: The Illustrated Guide to Security, Privacy, and Potential by Apodaca Richard(721)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(704)
Blockchain: Ultimate Step By Step Guide To Understanding Blockchain Technology, Bitcoin Creation, and the future of Money (Novice to Expert) by Keizer Söze(678)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(650)
Wireless Hacking 101 by Karina Astudillo(650)
Open-Source ESBs in Action: Example Implementations in Mule and ServiceMix by Tijs Rademakers Jos Dirksen(639)
Spring: Developing Java Applications for the Enterprise by Ravi Kant Soni & Amuthan Ganeshan & Rajesh RV(634)
Networking A Beginner's Guide by Bruce Hallberg(634)
MCSA Windows Server 2016 Study Guide: Exam 70-741 by William Panek(582)
Open-Source ESBs in Action: Example Implementations in Mule and ServiceMix by Jos Dirksen Tijs Rademakers(579)