Research Paper: Find a peer reviewed article in the following databases provided by the UC Library and write a 500-word paper reviewing the literature concerning one of this week’s topics, e.g. Virtualization, or Securing the Cloud.
Select only scholarly peer reviewed articles and papers.
Must use the following databases for your research:
URL:
https://ucumberlands.libguides.com/security
Research Paper:
Find a peer reviewed article in the following databases provided by the UC Library and write a 500-word paper reviewing the literature concerning one of this week’s topics, e.g. Virtualization, or Securing the Cloud.
Select only scholarly peer reviewed articles and papers.
Must use the following databases for your research:
· ACM Digital Library
· IEEE/IET Electronic Library
· SAGE Premier
URL:
https://ucumberlands.libguides.com/security
Please refer ataached PPT for clear understanding of the question
School of Computer & Information Sciences
ITS-532 Cloud Computing
Chapter 8 – Virtualization
Content from:
Primary Textbook: Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning.
Secondary Textbook: Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall.
1
Learning Objectives
Define and describe virtualization.
Discuss the history of virtualization.
Describe various types of virtualization.
List the pros and cons of virtualization.
Identify applications that are well suited, as well as those that are not suited, for virtualization.
Describe why companies should employ virtualization.
Virtualization Defined
The use of hardware and software to create the perception that one or more entities exist, although the entities, in actuality, are not physically present.
Using virtualization, we can make one server appear to be many, a desktop computer appear to be running multiple operating systems simultaneously, a network connection appear to exist, or a vast amount of disk space or a vast number of drives to be available.
Server Virtualization
Making one server appear as many. Each virtual server may run the same or different operating systems.
Server virtualization provides greater CPU utilization, a smaller equipment footprint, less power consumption, and support for multiple operating systems.
Desktop Virtualization
Allows a user to switch between multiple operating systems on the same computer. (An operating system that resides within a virtualized environment is known as a guest operating system.)
Some desktop virtualization techniques can provide an operating system environment on demand.
Desktop virtualization provides support for multiple operating systems, which is very convenient for software developers, testers, and help desk support staff.
Virtualization Technologies
Virtual Machines can be created by Operating Systems as shown in Figure 5.8 or with Hardware as shown in Figure 5.9. Operating system virtualization can provide more flexibility while hardware based virtualization can provide increased performance.
6
(Erl, 2014)
Figure 5.8
Figure 5.9
Virtual Networks
Create the illusion that a user is connected directly to a company network and resources, although no such physical connection may exist.
Virtual networks are sometimes called virtual private networks or VPNs. Using a VPN, users can connect to a network and access the network resources from any Internet-connected computer.
Virtual networks let network administrators to segment a network, making different departments such as management, development, and sales appear to have their own separate networks.
Virtual Storage
Provides users (and applications) with access to scalable and redundant physical storage through the use of abstract, or logical, disk drives or file systems, or a database interface.
Virtual Memory
Virtual memory combines RAM with a page file on disk to create the illusion, to running programs, of the existence of a vast amount of RAM.
Advantages of Virtual Memory
A running program (process) appears to have unlimited memory.
The operating system can easily manage several different programs, running at the same time, and keep each program’s data and instructions secure.
The operating system can take advantage of disk storage, which is considerably less expensive than RAM.
Disadvantage of Virtual Memory
The disadvantage of virtual memory is that the paging process (the process of moving instructions and data between RAM and disk) adds overhead, mostly because disk drives are much slower than RAM.
Original Servers
Server computers originally required their own chassis, disk, power supply, and fan. Servers consumed considerable power, took up considerable space, and generated considerable heat within the data center.
Green Computing
Power off devices when they are not in use.
Power up energy-intensive devices, such as laser printers, only when needed.
Use notebooks when possible instead of desktops.
Use the computer’s built-in power management features.
Minimize unnecessary printing.
Dispose of e-waste (devices, ink cartridges, monitors, and so on) in compliance with government regulations.
Blade Servers
The blade server is designed to fit within a rack with other blade servers. This reduces the server’s physical footprint, makes the server easier to cool, and reduces the server’s power consumption.
The Problem
Most servers today are either very busy, running at a high level of CPU utilization, or are idle a significant portion of the time, waiting for something to do.
Load Balancing
Using load balancing, the IT staff can supply the number of servers necessary to meet the server workload at a given time.
Server Virtualization
Through virtualization, a single physical server can be made to look like multiple separate servers, potentially running different operating systems.
Microsoft Hyper-V
Microsoft servers now utilize an underlying technology the company refers to as Hyper-V to allow administrators to create virtual servers.
Advantages of Hyper-V
The ability to consolidate servers and increase CPU utilization
Enhanced business continuity and disaster recovery
Ease of deploying testing and support environments
Enhanced support for Windows-based client virtualization
Improved load balancing
Ability to move live virtual machines from one physical server to another on the fly for load balancing and scalability
VMware ESXi
VMware is one of the best-known providers of virtualization solutions. For companies that need to support multiple operating systems within a virtual-server environment, Vmware ESXi provides the solution.
ESXi provides the following:
Support for multiple operating systems
Server consolidation
Automated resource management to drive disaster recovery and service-level agreements
Detail cost-reporting services
Automated load balancing
Centralized management and administration of virtual servers and the underlying machines
Virtual Desktop
The term for a desktop computer that runs two or more operating systems.
Desktop virtualization allows a desktop computer to run two or more operating systems at the same time and allows a user to quickly switch between the systems.
Advantages of Virtual Desktops
A single desktop computer can simultaneously run multiple operating systems.
There is reduced need for duplicate hardware.
Less power is consumed.
Microsoft Desktop Virtualization Tools
Microsoft Virtual Desktop Infrastructure (VDI) suite
Microsoft Application Virtualization (App-V)
Microsoft Enterprise Desktop Virtualization (MED-V)
Microsoft Remote Desktop Services (RDS)
Microsoft User State Virtualization (USV)
Windows Thin computer
VMware View
A tool for providing virtual desktops on demand. Using View, system administrators can centralize the on-demand delivery of an operating system and user-assigned applications.
Advantages of Vmware View
Simplified desktop operating system and application management
Automated desktop provisioning (account generation)
Virtual-desktop image management
Support for a variety of client platforms
Virtual Private Network (VPN)
VPN software uses a secure Internet connection to give the user the illusion that he or she is physically connected to the remote network from his or her current location.
Virtual Network
Virtual local-area network (VLAN), which uses special routers to segment part of the physical network in such a way that the group appears to have its own private network.
Data Storage Virtualization
Data storage virtualization hides the physical storage device or devices from the logical presentation that users or applications use to access the space.
Advantages of Cloud-Based Storage
Scalable disk storage space on demand
The ability to pay as you go for the needed storage
Behind-the-scenes backup and data replication
Support for common operating systems
Access from anywhere, anytime, and essentially any device
Ease of document sharing
Disadvantages of Cloud-Based Storage
Some users are not comfortable with their data residing in the cloud.
Cloud-based file access is slower than local file access due to network overhead.
Not All Applications Are Appropriate for Virtualization
Applications with unique hardware requirements: If an application requires a unique device or hardware device driver, the virtualization software may be unable to support the device.
Graphics-intensive applications: If an application is graphics intensive, such as a 3-D modeling program, the virtual device drivers may slow down the I/O processing to an unacceptable level.
Motivation to Virtualize
Increased device utilization (particularly CPU utilization)
Decreased device footprint
Decreased power consumption
Simplified operating system and application administration
Ease of software provisioning and patch releases
Device and storage scalability
Increased user access to key resources
Motivation to Virtualize
Continued
Increased flexibility in supporting multiple operating system environments
Improved use and management of software licenses
Improved utilization reporting, which leads to improved capacity planning
Improved disaster recovery and business continuity
Disadvantages of Virtualization
New staff or staff training may be required to understand the virtualization process.
Not all applications are well suited for virtualization.
The virtualization process adds slight overhead, which will make some applications run more slowly.
Key Terms
References
Primary:
Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning.
Secondary:
Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall.
34
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.