StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Virtualization of Information Systems Technology - Essay Example

Cite this document
Summary
The essay "Virtualization of Information Systems Technology" focuses on the critical analysis of the major issues in a better understanding of virtualization as an information systems technology. A study of virtualization at different levels is given detailed information about the hardware level.

 
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Virtualization of Information Systems Technology
Read Text Preview

Extract of sample "Virtualization of Information Systems Technology"

Logo) PC 109 Computer Systems A Report on Virtualization November 18, Table of Contents Executive Summary 3 Introduction 4 Findings 5 Hardware, Operating System and High Level Virtualization 5 How virtualization complements new generation hardware 6 Para Virtualization 8 Exploring the guest operating system 12 Cloud computing 13 Conclusion 14 Recommendation 14 References 15 Appendix I 16 Appendix II 17 Executive Summary This project aims at gaining a better understanding of virtualization as an information systems technology. First, a study of virtualization at different levels is given detailing information about hardware level, operating system level and application level virtualization in the contemporary application of information systems. In addition, an examination of how this spectacular innovation has enhanced the ability of existing hardware has been provided. The second part of this report gives an account of the practical exercise undertaken to demonstrate the application of virtualization in real life situation. Installation of VMware Player 5 on Windows 7 was conducted, installation of a guest operating system (Kali Linux x64) done and screenshots asserting the completion of these steps presented. A brief into the future of cloud computing as an application of virtualization has been documented too to cement the fact that indeed the technology has incalculable potential. Introduction Virtualization has caused a significant paradigm shift in the way information technology is being used to offer business solutions. This technology has taken over the IT market with a bang as most businesses and companies struggle not to be left out on this ingenious feat of computer engineering. With virtualization, hardware has been stretched to unimaginable levels and concerns over storage, safety and availability of information will soon be a thing of the past. Through it, imposing technologies have emerged to the measure of cloud computing that have taken center stage in the online service industry. A host of many more IT dreams have been made realities following the advent of virtualization. Findings Hardware, Operating System and High Level Virtualization Virtualization is the concept of subdividing a computer resource into several virtual versions of it so as to create multiple operating environments. This virtualization is common implemented upon storage devices, operating systems, servers and networks. Hardware virtualization entails embedding a virtual machine manager, called a hypervisor, into the circuitry of hardware so as to allow multiple operating systems to run (Rouse). The work of the hypervisor is to control allocation of memory, processor and other hardware resources to the different operating systems on the computer without requiring source code to translate addresses and instructions. Each OS is made to ‘see’ that it has its own set of hardware components when actually the hypervisor allocates in an alternating manner. This concept is largely applied in servers where resources are pooled together into a single resource and then allocated to the operating systems upon request. In this way, maximal utilization of resources such as disk space and processor time is attained. Operating system virtualization on the hand utilizes a single kernel (operating system) to run instances of other operating systems. It is also called container-based virtualization in which the virtualization is implemented as an application running inside the host operating. The instances of the other operating systems also called containers, then run as virtual machines on top of the virtualization layer (Rouse). Given that it is the host operating system that handles all system calls, this architecture boasts less overhead and has improved performance as the guest operating systems do not have to be completely installed onto the hardware. Management operations can be effected at great speeds because the virtual machines can easily establish links back to the parent OS. However, Rouse explains, this model suffers the disadvantage that all the containers have to use the operating system type of the host. Although it has limited application, organizations providing hosting services use it to provide secure and efficient OS for customers to operate upon. High level virtualization that encompasses application virtualization involves running an application in a thin client (repackaging the application in different format) with few programs and letting it access other programs on the server. In this way, the application is able to run simultaneously with other applications that might be incompatible with it (Jansen). The applications do not interfere with the execution of each other because they are contained in their own kind of sandbox which is shielded from other applications. Application virtualization has limitation s when it comes to programs that are tied to OS specific features such as antivirus programs. They however still find application in banking, business scenario simulations, e-commerce, stock trading, and insurance sales and marketing (Jansen). How virtualization complements new generation hardware According to Siebert, a section of users claim that virtualization does not cut down on the cost of an IT system, rather it is expensive, and feel its recent widespread adoption is based on the fact that it is the ‘in’ thing. Findings from careful study leans on the contrary, however. Much as virtualizing comes at a greater price, its overall advantages far outweigh the disadvantages. With this technology, hardware components are made to offer maximum performance beyond that which they can give in environments where virtualization has not been employed. Administration of tasks is centralized and a result made easier. To gain a clear understanding of how hardware capabilities can be extended, virtualization is analyzed in the following scenarios: servers, network and storage. Server virtualization involves abstracting operating system and applications from the hardware of the system so as to achieve a less costly and more efficient environment (vmware). Server hardware resources are dispensed to clients only when required. This way, resources are utilized optimally like CPU time and primary memory given that a server only uses 15% of its resources. According to VMware, virtualization increases utilization of server resources up to 80%, saves cost of operation to about 50% and gives a better server consolidation ratio. Current business needs have brought about a great necessity for large data storage ways which existing hardware do not offer yet. Server virtualization has come in handy to address this technological deficiency. In this model, physical storage devices distributed on a network are pooled together and centrally managed as one huge data center. It is from this virtualization that storage area networks (SANs) are borne. By bringing together smaller storage devices to form a large more efficient and robust data center, a number of advantages are achieved. These include: significant improvement in storage resource utilization and flexibility, simplifies OS patching and driver requirements regardless of storage topology, increase in application uptime and simplified day-to-day operations, leverages and complements existing storage infrastructure (vmware). Network virtualization on the other hand involves reproduction of a physical network in software (vmware). The virtual networks created still offer the same advantages of the physical network plus the obvious strengths of virtualization. Rouse explains that in a virtual network, resources are combined and then subdivided into channels that are then allocated independently to servers or devices in real time. This way, the complexity of the network is broken down into smaller, simpler tasks that are easy to manage. Network virtualization ends up with logical devices and services present in an actual network such as switches, routers, ports, VPNs and firewalls and applications can then run on them just the way they would do in a physical network (vmware). With virtualization, therefore, less powerful hardware can be made sufficient enough to handle the ever increasing business demands. As a result, operating costs are reduced through efficient use of energy and server consolidation. Administration tasks are simplified through centralized control and system efficiency through the ‘use only when required’ policy. Para Virtualization Para virtualization is a lightweight virtualization technique that allows multiple operating systems to run on the same hardware without conflict. Unlike in hypervisor models which enable the guest OS to operate without knowledge that it is virtualized, para virtualization lets the guest OS know that it is being virtualized before it can exploit the resources of the computer system (Ferro 2012). Full server virtualization requires that the whole system be emulated including its disks, BIOS, NIC, processors and memory which in most cases are not used fully. Para virtualization overcomes this limitation by using a virtual machine monitor that operates with an operating system that has been customized for it. In this way, para virtualization results in an abstraction that makes operating systems perform better as a full system emulation is not needed (McCarty). Systems that employ full virtualization, observes Rouse, have their virtual machines trap privileged instructions a phenomena that is time consuming and thus adversely affects performance. Para virtualization eliminates this limitation by modifying the hos OS. The performance advantage achieved through modifying the host OS, explains McCarty, comes at a great cost of flexibility and security. Flexibility in software solutions is lost due to the need to modify the host operating system which in some cases may not support such changes. The market has more of the already made operating systems therefore coming up with a custom host means manipulating these existing options. For instance, distributions like Red Hat Linux, Enterprise Linux and Windows Server do not offer this modifiability thus cannot be used for solutions involving par virtualization (McCarty). This modification also gives the guest OS closer control to the hardware thus introducing risks of impacting on the low level hardware. Other guest operating systems running on the machine are also exposed to these effects. In addition, para virtualization has reliability issues arising from the fact that modifying host OS entails a complex procedure (Ferro). Despite these apparently overwhelming disadvantages, para virtualization finds some application in the contemporary IT world probably due to its performance strengths. Dunlap (2012) indicates quite a number of hardware and services can be para-virtualized in order to utilize the strengths of this technology. These include “disk and network devices, interrupts and timers, emulated platform: motherboard, device buses, BIOS, legacy boot, privileged instructions and page tables (memory access).” McCarty further highlights that para virtualization is used in cases where it is hard to separate development and testing, during migration to new systems, capacity management and disaster recovery. Guest Operating system installation Fig. 1.0. Installing VMware Player 5 start Fig.1.1. VMware Player 5 installation progress Fig.1.2. VMware Player 5 complete Fig.1.3. VMware welcome window Fig. 1.4. Creating a new VM from a DVD Fig.1.5. Choosing the guest OS distribution Fig.1.6. Guest OS (Kali Linux x64) installation progress Exploring the guest operating system In this assignment, the guest operating system installed was a distribution of Linux, Kali Linux (x64) and the host is Windows 7 (x64). For purposes of demonstration, appendices have been provided containing screen shots of the various features of the guest OS. To boot into Kali Linux, the created image is selected from the VMware Player 5 window as shown in Fig. 2.0 of the appendix. The system then boots just the way it would on a normal computer giving a terminal console with log information. A desktop version of the guest OS is then displayed within the VMware window from which various tasks can be executed. Windows can be maximized giving one the impression that they are really running an OS directly on the computer system. Fig. 2.1 shows the host OS and guest OS running different tasks concurrently. Using the VMware, a different OS can run applications that are incompatible with the host without interfering with those applications running on the host. For instance, Figure 2.2, 2.3, 2.4 show Kali Linux running applications like the terminal, file explorer, and browser that cannot run on windows systems. The guest OS operation gives the impression that it has its own set of processor, RAM and hard disk space yet it has just been given a virtual form of the host disk resources. This is evident by the fact that the specifications of the guest OS can be edited as shown in Fig. 2.5 in the appendix II. Cloud computing Cloud computing has been described by many as the next wave in technology. In fact, one would not be fouled for claiming that it is the in thing currently. The potential encased in this computing through the internet has lured businesses into considering it as a cheaper, more efficient and reliable way of providing solutions. Menegaz postulates that by 2016 more than a quarter of all applications will be available on the cloud due to the fact that most software products are being tailored to run in distributed environments. Greater adoption of cloud options will bring about more development of cloud solutions and competition in business will be taken to the next level. Software as a Service (SaaS) perception and its great adoption is prove enough of just how aggressive business has embraced cloud computing. With this enormous potential, it is definitely important to examine reasons why cloud computing has received such a passionate acceptance in the market. First, it is cost effective as companies do not need to expend on purchase of software and licensing them for multiple users. Storage is always a challenge with hardware limited to only a certain capacity; cloud offers almost unlimited storage options at relatively lower costs. With this storage, backup and recovery is also simplified as well as security because the host companies take care of all the risks. Cloud also offers great software scalability and integration. Issues with software updates is an obligation lifted from the shoulders of businesses. However, cloud services are also prone to attacks and failures thus risks operations of businesses in their eventuality. These have impacted on its adoption insignificantly because its spread is so imposing. Conclusion After successful completion of all the steps of this exercise, one can confidently stand by the assertion that virtualization is the ‘in’ thing. The existence of overwhelming and magnificent software operating under its principles is sufficient reason for its adoption. With virtualization, hardware resources can be maximized, software availability enhanced, almost unlimited storage space created and most importantly is the concept of SaaS (Software as a Service) that eliminates the cost of purchasing, licensing and maintaining software. Feasibility and application of the=is solution is unquestionable given the highly successful practical experience with some of the existing software solutions built upon its concepts. With virtualization, the world is our oyster. Recommendation The benefits harnessed from the use of virtualization far outweigh its limitations, if any, and this has and should be the reason solutions should shift to this technology. Instead of firms spending millions on purchasing new servers and network devices, virtual forms of these expensive resources can be made and utilized the same way physical ones would. Software is always expensive, needs licensing and constant updates. By outsourcing software we do away with the costs and hustle of training employees on installation, use and maintenance of such. SaaS comes in handy by offering a reliable, cheap and secure access to software. Though not a smashing invention, cloud computing and virtualization are our best solutions to business. References Dunlap, G (2012). Introduction to para virtualization spectrum with Xen. Linux.com. Available from http://www.linux.com/news/enterprise/systems-management/658784-the-spectrum-of-paravirtualization-with-xen-part-2 Ferro, G (2012). Intro to server virtualization: Hypervisor vs. para virtualization. [WWW]. Petri. Available from http://www.petri.com/hypervisor-vs-paravirtualization.htm Jansen, C. Application virtualization. [WWW]. Techopedia. Available from http://www.techopedia.com/definition/573/application-virtualization McCarty, R. Para-virtualization explained. [WWW]. TechTarget. Available from http://searchservervirtualization.techtarget.com/tip/Paravirtualization-explained Menegaz, G (2014). Future of cloud computing: 5 predictions. [WWW]. IBM. Available from http://thoughtsoncloud.com/2014/05/future-cloud-computing-5-predictions/ Rouse, M. Virtualization. [WWW]. TechTarget. Available from http://searchservervirtualization.techtarget.com/definition/virtualization Siebert, C. Virtualization benefits. [WWW].TechTarget. Available from http://searchvmware.techtarget.com/Virtualization-benefits-are-worth-the-extra-cost-over-physical-servers-alone vmware (2014). Virtualization. [WWW]. Available from http://www.vmware.com/virtualization Appendix I Fig.2.0. Choosing VM to run Fig. 2.1. Host and guest OS running concurrently Fig. 2.2. Kali terminal showing processes Appendix II Fig. 2.3. Kali file explorer Fig. 2.4. Kali browser Fig. 2.5. Edit VM specifications Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Systems Essay Example | Topics and Well Written Essays - 3000 words - 3”, n.d.)
Computer Systems Essay Example | Topics and Well Written Essays - 3000 words - 3. Retrieved from https://studentshare.org/information-technology/1665775-computer-systems
(Computer Systems Essay Example | Topics and Well Written Essays - 3000 Words - 3)
Computer Systems Essay Example | Topics and Well Written Essays - 3000 Words - 3. https://studentshare.org/information-technology/1665775-computer-systems.
“Computer Systems Essay Example | Topics and Well Written Essays - 3000 Words - 3”, n.d. https://studentshare.org/information-technology/1665775-computer-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Virtualization of Information Systems Technology

Virtualization Strategy for Mid-Sized Businesses

This assignment "virtualization Strategy for Mid-Sized Businesses" shows that nowadays, businesses are more and more having a propensity towards the idea of virtualization to move or re-establish server, network, and storage resources based on their business preferences.... To deal with such kinds of challenges, virtualization guarantees performance optimization by assigning the exact resources.... Moreover, it also guarantees high availability and reduction in response time by offering instantaneous failover and revival of the business application to its usual operation (Mikkilineni & Kankanhalli, 2010) virtualization is the formation of a virtual (instead of genuine) version of an application or device, such as a server, an operating system, a storage device or network resources....
12 Pages (3000 words) Assignment

Cloud Computing

Furthermore, cloud computing is a successful contributor economically for cyberinfrastructure as it 'makes applications dramatically easier to develop and deploy, thus expanding the feasible scope of applications possible within a budget and organizational constraints, and shifting the scientist's and engineer's effort away from information technology development and concentrating it on scientific and engineering research.... Business Trends Information technology organization has already invested millions since the 1990s, to contribute to reshaping cloud computing....
12 Pages (3000 words) Research Proposal

Virtualisation Technologies

Even so, such issues can be addressed within a short time accordingly unlike when physical systems are being used.... Users can access information they need at their own convenience.... This paper ''Virtualisation Technologies'' tells that virtualization is simply creating an online-based system that can be used to deliver processes.... virtualization is being deployed and implemented by many institutions of all kinds across the world....
13 Pages (3250 words) Essay

Computer Systems and Virtualization

A single piece of hardware is divided into multiple instances by technology is known as virtualization.... Hence, as soon as a web application is deployed with virtualization technology, we can get a guest operating system powered by the hypervisor.... The paper "Computer systems and Virtualization" highlights that the Virtual Directory is a separate register including a website that connects to an additional directory.... Likewise, the hypervisor hosts an operating system that provides management of assets for many operating systems of visitors as well as nodes....
13 Pages (3250 words) Assignment

Telecommunications and Networking

The Commerce Department's National Institute of Standards and technology (NIST) have illustrated some helpful definitions that focus on three concepts (Ryan, Loeffler 2010): The core components of a cloud are consists of the data center hardware and software.... An essay "Telecommunications and Networking" reports that a perception of an imaginary cloud that illustrates the Internet or most likely a corporate network environment....
11 Pages (2750 words) Essay

Concepts Associated with Desktop Virtualization

lient virtualization uses the 'hypervisor' model software which is connected to the client device so that one desktop is able to run numerous operating systems efficiently.... This is different from hosted virtualization as it runs numerous operating systems.... This is beneficial for the various information departments as it helps in reducing costs for desktop hardware.... The author of the current paper under the title "Concepts Associated with Desktop virtualization" argues in a well-organized manner that desktop virtualization is in the market for quite some time, however, it has gained importance in recent times....
4 Pages (1000 words) Assignment

Cloud Computing Virtualisation Security Threats

ystem virtualization is often implemented through the use of hyper visor technology.... Virtualization is a key element of Infrastructure as a Service cloud offering (Alliance, 2011) and has a widespread use in sections of the Software as a Service and Infrastructure as a Service too (technology, 2010).... The purpose of this paper is to present an overview of the various virtualization security vulnerabilities plus threats that are particular to hypervisors....
6 Pages (1500 words) Literature review

Virtualization and Virtual Machines

Virtualization has greatly improved the processing of information in various organizations.... Virtualization is one of the technologies that are applied in the field of information technology.... The efficiency of information processing, storage, and delivery to the targeted clients has also improved tremendously.... Virtualization of x86 significantly improves efficiency and bring down the overall cost of information technology services....
16 Pages (4000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us