StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The Key Characteristics of the Implementation of Virtualization and Its Usefulness for Computation - Dissertation Example

Cite this document
Summary
This dissertation "The Key Characteristics of the Implementation of Virtualization and Its Usefulness for Computation" investigates issues regarding virtualization, such as architecture, data distribution and management strategies, performance issues, cost implications, and security. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.6% of users find it useful
The Key Characteristics of the Implementation of Virtualization and Its Usefulness for Computation
Read Text Preview

Extract of sample "The Key Characteristics of the Implementation of Virtualization and Its Usefulness for Computation"

Download file to see previous pages

Virtualization enables the combining and dividing of computing resources using such methodologies as hardware/software partitioning, machine simulation, emulation, time-sharing, and so on (Nanda & Chiueh, N.d.). In short, virtualization provides the necessary support using low-level resources so that the hardware can be used to run several virtual machines (VMs) separate from each other.Some form of virtualization is already present in modern operating systems, notably the virtual memory implementations that allow processes to utilize more memory than is physically present inside the computer.

Similarly, the time-sharing principle is now also common, which allows for multi-tasking. However, the focus in the review is mainly on virtualization in a more complete form using virtual machines.Virtual machines were first developed and used at IBM in the 1960s whereas commercial virtualization has been available only relatively recently. The first virtual machine environment was created on the IBM system/360 model 40 VM (Smith & Nair, 2006: 381). Two other prominent early computers in the history of virtualization were the IBM M44/44X and the Atlas supercomputer (Buytaert et al., 2007). The initial purpose was to enable virtual operating systems to be installed and used on a single piece of hardware.

Thus, it uses existing hardware to emulate another computer. Network cards can also be emulated so as to establish a virtual network.The IBM M44 project, for example, was designed for analyzing and sharing different system concepts together. It involved virtual machines and the use of virtual memory and multi-level programming. The system was implemented at MIT for producing a high-quality timeshare system. The CP-67 and CP-40 were examples of early IBM virtual machines in which the VMM’s were operated on top of the hardware.

It is noticeable that virtualization was very popular when computer hardware used to be expensive.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Issues of virtualisation and their impact on computing approaches Dissertation”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1410775-issues-of-virtualisation-and-their-impact-on
(Issues of Virtualisation and Their Impact on Computing Approaches Dissertation)
https://studentshare.org/family-consumer-science/1410775-issues-of-virtualisation-and-their-impact-on.
“Issues of Virtualisation and Their Impact on Computing Approaches Dissertation”, n.d. https://studentshare.org/family-consumer-science/1410775-issues-of-virtualisation-and-their-impact-on.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Key Characteristics of the Implementation of Virtualization and Its Usefulness for Computation

How Policy Network Analysis Is Used to Analyze Policy

hellip; Each of the approaches has its own strength and advantages but all four fail to recognize that any attempt to use policy networks as an explanatory variable involves three dialectical relationships – one between structure and agency, another between network and context, and the third relationship between network and outcome....
23 Pages (5750 words) Coursework

Comparison between two methods

The second main part of this report is regarding the MERISE technique for the better system modeling and design.... This research is basically aims… SSADM comprises a series of design regulations and procedures that upholds software precision and cleanness, by this means minimizing the time and endeavor essential for coding, debugging and The most important rule of SSADM is that a system should be developed from the top down in hierarchical method and advanced to larger levels in feature....
12 Pages (3000 words) Essay

ICT Consolidation using Virtualization Technologies a Cost Effective Approach

The purpose of the research is to thoroughly examine the concept of virtualization in order to provide a framework within which to understand the future of IT and how managers should be building an approach to IT solutions.... The industry lacked consolidated strategies and an implementation approach of virtualization whereby the ICT Management did not focus on the holistic picture of its benefits to the business at strategic levels.... he concept of virtualization has also been in conflict with the interests of a large number of ICT vendors; hardware vendors as well as software vendors....
40 Pages (10000 words) Research Paper

Knowledge Management and Business Intelligence: trends and integration

In the existing businesses working which are including business intelligence and knowledge management, they are intended to store structured data extensively and its usage in real time to evaluate the results and also correspond them to the strategic management.... This paper also describes the aspects of knowledge management and business intelligence technology and its increasing use and functional support in the working of existing business....
16 Pages (4000 words) Research Paper

Server Virtualization

This paper, Server virtualization, outlines that the rise of popularity of networked systems has spurred an increase in client/server applications.... virtualization is a technique that is used to alter one or more properties of the service, without modification to the clients or servers....
9 Pages (2250 words) Term Paper

Multimedia Integration for Language E-Learning

The aim is to evaluate the learning object and its uses which simplify the learning methodologies.... This paper "Multimedia Integration for Language E-Learning" is based on the E-learning object fundamentals.... The learning object is an interactive representation tool for E-learning....
20 Pages (5000 words) Research Paper

Modularization of ERP Services in the Context of Cloud Computing

This and the software and implementation result in large costs for ERP initiation (Martin, 2003).... The paper "Modularization of ERP Services in the Context of Cloud Computing" describes that modularized cloud-based ERP modules tend to outperform on-premise and hosted ERP within features categorized as an impact on competitive position and organization, direct costs, and functionality and usability....
76 Pages (19000 words) Thesis

A Framework for Customer Relationship Management and Data Mining

There is difficulty in agreeing with this view as the usefulness of an application, technique, statistical tool or data method is not dependent on wide-scale usage.... In addition, it is pointed out the skill set of the people doing the analysis, along with their familiarity with varied statistical tools, systems, and other disciplines are highly important in extracting data that has value and usefulness (Rygielski et al, 2002).... Customer Relationship Management is, in essence, a data capture tool that in and of itself has no value unless an organization has taken the time, effort and analysis to understand what it can do concerning increasing its completeness with respect to data collection areas (Berson and Smith, 2002)....
14 Pages (3500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us