Cloud Computing by Rajiv Chopra
Author:Rajiv Chopra
Language: eng
Format: epub
ISBN: 978-93-86286-91-8
Publisher: Mercury Learning and Information
Published: 2017-03-27T04:00:00+00:00
3.4 CREATING A VIRTUALIZED ARCHITECTURE
During virtualization, software known as a Virtual Machine Monitor (VMM) or a Hypervisor is used.
What is a Hypervisor?
A hypervisor is an operating system (OS) that knows how to act as a traffic policeman to guide processes in an orderly manner. It is set at the lowest levels of the hardware environment. In cloud computing, it is necessary to support several types of OSs and a hypervisor is the correct method to do this. It helps you to show and use the same application on several systems without having to physically copy that application onto each system. With virtualization technology, it is possible to use the hypervisor to split the physical computer’s resources. The resources can be split 50–50 or 80–20 between two guest operating systems. The advantage here is that the hypervisor does all the heavy lifting. The guest OS does not care that it is running in a virtual partition. It thinks it has the computer all to itself. There are three different types of hypervisors:
1.Native Hypervisors: They sit on the hardware platform directly. They give better performance to the end users.
2.Embedded Hypervisors: They are integrated into a CPU on a separate chip.
3.Hosted Hypervisors: They run as a different software layer above both the hardware and the OS. This type is useful for both private and public clouds because it improves performance.
Two different virtualization structures are thus formed as follows:
1.Hosted Virtualization.
2.Bare-Metal Virtualization.
Let’s study each of these structures with their pros and cons.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7796)
Grails in Action by Glen Smith Peter Ledbrook(7706)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6701)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6696)
Running Windows Containers on AWS by Marcio Morales(6217)
Kotlin in Action by Dmitry Jemerov(5077)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4987)
Combating Crime on the Dark Web by Nearchos Nearchou(4575)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4479)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4427)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4245)
The Age of Surveillance Capitalism by Shoshana Zuboff(3966)
Python for Security and Networking - Third Edition by José Manuel Ortega(3815)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3517)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3484)
Learn Wireshark by Lisa Bock(3393)
Mastering Python for Networking and Security by José Manuel Ortega(3364)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3339)
Blockchain Basics by Daniel Drescher(3309)
