Nowadays the use of virtualization in cloud computing domain has become very much popular. Virtualization comes up with the ability which can be used for running a higher number of virtual machines rather than physically available for various users. It is mainly accomplished by running various kinds of idle cycles which can be used for running offload(Malhotra, Agarwal and Jaiswal, 2014). It can be used for utilizing virtual machines which can be used for maximizing the hardware utilization in a cost-effective way. Virtualization has gained acceptance in the last few years due to its improved efficiency in data centers. IaaS (Infrastructure as a Service) generally enables a much large and wider consumer base due to various kinds of services like Amazon and Rackspace cloud service (Swathi, Srikanth, and Reddy,2014). Hardware virtualization comes up with various kinds of limitation when used for scaling a large number of concurrent virtual machines which run on various physical hardware servers. Hence the cost involved in a virtual machine can be considered to be more in comparison to traditional shared hosting.
In the coming pages of the report, a proper idea has been provided regarding cloud computing and virtualization. After that individual review of research papers has been done. Later on, the discussion portion of the report mainly deals with different aspects of virtualization and cloud computing. The report also reflects on hypervisor which is a well-known technology in virtualization. Two type of hypervisor that is type 1 and type 2 has been discussed in details in the above pages of the report. Different kinds of virtualization technology like full virtualization, paravirtualization, OS-level virtualization and lastly hardware-assisted virtualization. Multitenant platform mainly used for running unmodified LAMP application in the flexible, secure and scalable way.
Architectural components
Cloud service models are mainly divided into various aspects like IaaS, PaaS, and SaaS which is exhibited by proper cloud infrastructure (Thakur and Mahajan, 2016). Cloud architecture provides various kinds of cloud components which are used for providing an abstract view of cloud computing.
Software as a Service (SaaS): Various kinds of cloud consumers provide their application in a proper environment for hosting which can be easily accessed by networks from various clients through proper application usage (Rankothge et al., 2015). Cloud consumers does not have any kind of control over cloud infrastructure. It mainly makes use of cloud consumer application which is mainly used in a logical environment in various kinds of SaaS cloud to achieve proper economic scale. It can be also used for proper optimization in various aspects like speed, availability, disaster recovery and lastly maintenance. Some of the examples of SaaS platform are Google Docs and Google mail.
Platform as a Service (PaaS): PaaS is a well-known platform which has been developed by making use of the software lifecycle (Bourguiba et al., 2014). The only kind of difference which can be seen between SaaS and PaaS is that SaaS is considered to be host based cloud application whereas the PaaS platform provides host which is incomplete and in progress. It mainly requires PaaS to easily provide support various application to run on hosting environment. It mainly requires various kinds of development infrastructure which can be easily used for a programming environment and tools for configuration management.
Infrastructure as a Service (IaaS): Different cloud consumer makes use of various IT infrastructures like proper processing and computing resources which are provided in the IaaS cloud (Computing, Thakral and Singh 2014). Virtualization is generally used in IaaS cloud for proper integration and decomposing of physical resources in a proper ad-hoc manner which is used for growing or shrinking for various kinds of demands for cloud consumers. The most basic kind of strategy in virtualization is proper to set up of independent virtual machines which are independent of various underlying hardware and VMs.
Data as a service (DaaS): Proper delivery of virtual storage has become a separate kind of cloud service that is services related to data storage. DaaS is known to be a special kind of IaaS. DaaS mainly allows various consumers to easily pay for things instead for site licensing of entire database (Kumar and Charu, 2015). In some of the traditional storage systems like RDBMS and file storage, some of the DaaS allow table style abstraction. It is mainly used for collecting and retrieving of data in the given timeframe.
Reverse proxy layer: This layer generally consists of one or more Apache server which mainly runs on the standard of HTTP port but makes use of the reverse proxy mechanism. This is mainly implemented by making use of Apache module which is needed for proxy, proxy and proxy connect. For improving the scalability and performance of the system, one can easily make use of apache cache and mem cache.
Virtualization layer: This layer mainly consists of servers like Apache and MYSQL which is implemented on LAMP stack. This virtualization mechanism is generally implemented with the help of multitenant concept in which tenant exists like a separate kind of user in which dedicated home memory is shared by Apache and MYSQL processes. In the virtualization layer, there are only two kinds of layer-like Apache virtualization and MySQL virtualization. Each Apache method of tenant generally runs on its own unprivileged port like tenant user. Each tenant can easily run on multiple LAMP and various kinds of the static website which can easily run on their allocated directory.
Abi cloud: Abi cloud is a well-known platform in computation platform. This type of platform is mainly used for building, integrating and management of various public as well as a private cloud in a different environment (Tao et al., 2014). By making use of Abi cloud, a user can easily make use of automatic deployment and managing of server, system and various kinds of networks. The only difference which can be seen that Abi cloud and another platform of cloud computing is that it is a powerful web-based application. By making use of Abi cloud, one can easily finish deployment of cloud services just dragging the whole thing with the help of mouse (García-Valls, Cucinotta, and Lu, 2014). So, this particular process can be considered to be much easier and flexible in comparison to another kind of cloud computing platform. The reason behind this is the proper deployment of new lines with the help of command lines. Abi cloud can be easily used for deployment and implementation of private as well as a hybrid cloud which mainly works as per the need and requirement of cloud service providers and its configuration. A whole cloud platform based on Abi cloud can be easily deployed to any other Abi cloud platform. It is considered to be much useful for the transformation of the given working environment. This will ultimately make the cloud computing process easier and flexible to use.
Eucalyptus: Eucalyptus stands for Elastic Utility Computing Architecture for linking programs to the user system. It is mainly used for building an open source private cloud platform (Ali, Khan and Vasilakos, 2015). Eucalyptus is known to be an elastic computing service which is used for connecting various user programs to use systems. It is known to be an open source infrastructure which makes use of open source cluster or workstation implementation for elasticity, utility and cloud computing. It makes use of a cloud computing structure which can be used for providing service level protocol. It generally permits various kinds of users to lease network which can be computing capability. At present, Eucalyptus is considered to be compatible with E2C from Amazon. It also provides support to clients with the help of minimum order and notification.
Nimbus: Nimbus is defined to be an open set tool which can be easily be used for cloud computing solution which provides IaaS. It also permits the various users to easily remote sources along with required for proper kind of computing environment. In general, all the functional components can be easily divided into three types (Almorsy, Grundy and Müller, 2016). One kind can be stated as client support which is mainly used for providing support to the various client module. The second module which is mainly used is providing support to various kinds of the cloud platform. It is generally inclusive of framework module and remote inference module. The third kind of framework which is used is the management of various modules which is used for proper management of various sources of cloud computing.
Open Nebula: It is also a well-known kind of cloud service framework. It mainly allows various users to easily manage and implement virtual machines which mainly work on physical resources (Zhan et al., 2015). It can easily set various kinds of the data center of the user which can be used for a flexible network system which can easily adapt to change in various services. The only kind of differences which is encountered between the open nebula and Nimbus is the fact nimbus can easily implement remote surface which is based on E2C. Open nebula is a well-known open source virtual infrastructure which can be easily be used for proper synchronization of storage, virtual techniques. It also creates a platform for the user so that they can dynamically deploy their various services in the distributed infrastructure. With the help of interior surface and open nebula data center, various users can easily deploy any kind of cloud.
Multi-tenant virtualization generally provides a cost-effective alternative along with maintaining its benefits. Multi-tenant virtualization generally provides a much higher degree of the virtual environment (Botta et al., 2016). This can be achieved by proper sharing of various hardware and software platform in a secure way which can be used for providing isolation between two surfaces. The hypervisor is a well-known term in virtualization which allows the different operating system to easily share a single hardware host. It can be easily defined as a low-level program which can be used for providing various system resources to easily access virtual machines. There are mainly two of hypervisor like type 1 and type 2.
Type- 1 hypervisor is also known to be native or bare metal. This particular type of hypervisor mainly runs directly which can be used for the proper managing guest operating system. It does not depend on the type of operating system. While Type -2 hypervisors are known to be a client hypervisor which resides on the top of any operating system. Different type of software virtualization is carried out on the hypervisor because it totally depends on the type of operating system (Oliveira, Thomas, and Espadanal, 2014). Now if any how the operating system fails then all end users in the chain are affected. These hypervisors are nothing but the application which needs to installed on regular basis on the guest operating system. VMware fusion and windows virtual machines all fall under the category of this particular hypervisor. Software virtualization generally provides a better kind of hardware capability rather than bare metal virtualization. OS is mainly considered to be responsible for various kinds of hardware drivers instead of the hypervisor.
There are mainly four kinds of virtualization techniques like full virtualization, paravirtualization, OS-level virtualization and lastly hardware-level virtualization. Full virtualization is a well-known technique in which proper installation of one machine is mainly done on the other (Sridhar, 2016). This virtualization mainly provides support to various kinds of the operating system but along with this, it requires some kind of hardware combination. In paravirtualization, the guest operating system is aware of the fact that it is virtualized. As a result of advance information, the guest operating system can easily short circuit it drivers which can be easily used for minimizing the overhead involved in communication with other devices. In OS-level virtualization, no kind of hypervisor is used (Puthal et al., 2015). It is generally the duty of the host to easily perform various kinds of functions of a virtualized hypervisor. The guest server should run with the same OS (operating system) and just because of it the particular reason it is known as the homogeneous environment. Hardware-assisted virtualization mainly provides an efficient kind of full virtualization with the help of various hardware capabilities. It is mainly considered to be primary in nature from the given host processor. It is also known to be accelerated virtualization and was added in the processor in the year of 2006. Server hardware is generally aware of virtualization. Hardware-assisted virtualization generally minimizes the cost which is associated with the maintenance of overhead of para-virtualization. It generally reduces the various kinds of changes which are needed in the guest operating system. Some improvement in the performance can be easily seen or obtained by making use of this particular virtualization method.
Cloud computing can be stated as one of the most important sectors related to computing which has grown in recent times. The organization can take different types of advantage from the concept of cloud computing. Research is being conducted on different areas of cloud computing which would be altering the internal as well as the external working of any organization (Hashem, 2015). The main aspect which can be related to the technology of cloud computing is the security of the data which is provided. In most of the organization, the security of the data is very much important and there are different types of methods which are included in the concept which provides them the necessary security to safeguard the data. When an organization moves the data to the concept of the cloud the cloud providers are directly responsible for the security of the data. In the context of the security of the data, the access to the data is also very much important. The access to the data is the person who would be able to access the data (Kacamarga, Pardamean, and Wijaya, 2015). In most of the cases, there may be a data thief may occur due to the lack of the access permission which is implemented within the system. The organization can easily store their critical data within the concept of the cloud computing and access the data whenever they need.
The concept of cloud computing can be considered as an area of technology which can include different types of advantage. In most important cases it can be seen that the requirement of the hardware and the software are mainly controlled by the cloud service providers. The charge which is taken from the service which is given is based on a concept of pay per use concept. In actual the organization usually pay for the amount of service which is being used (Pahl, 2015). The organization can include the different functionality of the cloud computing according to the requirement and the need of the organization. In addition to these, the organization can get different types of technical advantage in a manner that the organization can concentrate on the important aspect of the working and concentrate less on another requirement. Cloud computing application can be implemented in more than one field according to the need of the organization within the working of the framework of the organization. The implementation of the concept is within the existing framework so there is no alteration of the methods which has to be done.
The concept of virtualization has been in process for quite a while but it can be stated that its basic application and its implementation has come into the dominant role-playing in recent times (Huang and Wu, 2017). The virtualization concept can be directly be downloaded from the commodity PC server. There are different types of virtualization concept which are available in the market which may include the following factors:
Depending upon the situation it can be stated organization can take the advantage of the more than one type of virtualization types (Rahimi et al., 2014). One of the techniques which can be stated here is the full software virtualization, in this technique, it can be stated that all the hardware of the system is simulated by the software program. Each of the guest operating system and the device drivers believe that it is running on the actual hardware even though the hardware which is underlying is really a software program. The software of the virtualization also thinks that it is actually running on the hardware (Yan and Yu, 2015). One of the advantage which can be stated in this context is that the user can run any type of operating system in it. It can be stated here that the older operating system can also run in this type of environment. The most important part which can be stated here is that the operating system believes it is running on the main architecture is not very much necessary.
Hardware-assisted software virtualization technique can be stated to be available. The commoditized virtualization technique has directly come into existence with the implementation of Intel VT and AMD –V technology. The in370 computer. The introduction of the technology was first introduced on the IBM System. IT can be stated here that the user with the implementation of the hardware-assisted software virtualization the user would be getting the benefit of the software virtualization such as the ability to use the operating system without any sort of modification at the same time it would be beneficial in a way of better performance relating to speed (Xu et al., 2014). On the other hand, it can be stated that due to the importance of the concept of the virtualization it can be very much important to get into the depth of the technology and get a wide range of benefit attached to the concept. Virtualization comprises of a component named hypervisor which comes up extra-privileges. This extra-privilege is considered to be a key component which is used for proper managing of various data and resources. In the last few years, cloud computing and virtualization technologies have improved itself so that it can easily offer various kinds of cloud-based services. Hardware-based virtualization comes up with various kinds of advantages. It generally lacks a high level of scalability which is used for providing various kinds of cloud computing services.
The concept of hybrid virtualization technology can be considered as one of the technologies which would be beneficial in a way of creating a hardware virtualized machine (HVM) that directly uses specific Para-virtualized device driver for the network and the input and output functions (Islam, Manivannan, and Zeadally, 2016). The main advantages which can be stated here are that it provides benefit in the sector of the Para-virtualized virtual machine with the additional hardware acceleration available within the hardware virtual machine (HVM). This technology can be stated to be one of the latest technology and research is being carried out in the field. In the near future, it can be stated that people can get different types of benefit from the concept. It can be stated here that in the access of the concept of the virtualization most of the system resources are widely utilized and there is no loss of resources which gives an added advantage to the concept (Huang and Wu, 2017). The hypervisor can also be a technology which can be included into the concept which can make the system of the user more accurate and fast.
Conclusion
From the above discussion, it can easily conclude that this report is all about cloud computing and virtualization. In the above pages of the report, an individual review has been done on a various research paper related to this topic. In the individual research part various architectural components of cloud computing like SaaS, IaaS and PaaS have been discussed has been discussed in details. After that various kind of cloud-based platform like Abi cloud, Eucalyptus, Nimbus, the Open nebula has been properly reviewed. In the discussion portion of the report, an idea has been provided multi-tenant virtualization. After that two type of hypervisor that is type-1 and type-2 has been discussed in brief. There is mainly four type of virtualization technique that is full virtualization, paravirtualization, OS-level virtualization and lastly hardware-level virtualization has been discussed in details. After that various advantages and disadvantages of cloud computing in the various organization has been discussed in details. There are a large number of virtualization technique which are available currently in the market like hardware virtual machine, full software, paravirtualization, resource virtualization and lastly hardware-assisted virtualization has been discussed in details. In the last few years’ cloud computing has been used in large enterprises which provides various kinds of services to users. The amount of money to be paid by the user mainly depends on its need. Virtualization is a well-known technique which is used in cloud computing for cost saving.
References
Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and challenges. Information sciences, 305, pp.357-383.
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2016. Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, pp.684-700.
Bourguiba, M., Haddadou, K., El Korbi, I. and Pujolle, G., 2014. Improving network I/O virtualization for cloud computing. IEEE Transactions on Parallel and Distributed Systems, 25(3), pp.673-681.
Computing, C., Thakral, D. and Singh, M., 2014. Virtualization in cloud computing. Int. J. Comput. Sci. Mob. Comput, 3(5), pp.1262-1273.
García-Valls, M., Cucinotta, T. and Lu, C., 2014. Challenges in real-time virtualization and predictable cloud computing. Journal of Systems Architecture, 60(9), pp.726-740.
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, pp.98-115.
Huang, D. and Wu, H., 2017. Mobile Cloud Computing: Foundations and Service Models. Morgan Kaufmann.
Islam, T., Manivannan, D. and Zeadally, S., 2016. A classification and characterization of security threats in cloud computing. Int. J. Next-Gener. Comput, 7(1).
Kacamarga, M.F., Pardamean, B. and Wijaya, H., 2015, March. Lightweight virtualization in cloud computing for research. In International Conference on Soft Computing, Intelligence Systems, and Information Technology (pp. 439-445). Springer, Berlin, Heidelberg.
Kumar, R. and Charu, S., 2015. An importance of using virtualization technology in cloud computing. Global Journal of Computers & Technology, 1(2).
Malhotra, L., Agarwal, D. and Jaiswal, A., 2014. Virtualization in cloud computing. J. Inform. Tech. Softw. Eng, 4(2).
Oliveira, T., Thomas, M. and Espadanal, M., 2014. Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information & Management, 51(5), pp.497-510.
Pahl, C., 2015. Containerization and the paas cloud. IEEE Cloud Computing, 2(3), pp.24-31.
Puthal, D., Sahoo, B.P.S., Mishra, S. and Swain, S., 2015, January. Cloud computing features, issues, and challenges: a big picture. In Computational Intelligence and Networks (CINE), 2015 International Conference on (pp. 116-123). IEEE.
Rahimi, M.R., Ren, J., Liu, C.H., Vasilakos, A.V. and Venkatasubramanian, N., 2014. Mobile cloud computing: A survey, state of art and future directions. Mobile Networks and Applications, 19(2), pp.133-143.
Rankothge, W., Ma, J., Le, F., Russo, A. and Lobo, J., 2015, May. Towards making network function virtualization a cloud computing service. In IM (pp. 89-97).
Sridhar, S., 2016. Cloud computing. computing.
Swathi, T., Srikanth, K. and Reddy, S.R., 2014. Virtualization in cloud computing. International Journal of Computer Science and Mobile Computing, 3(5), pp.540-546.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L. and Li, B.H., 2014. CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system. IEEE Transactions on Industrial Informatics, 10(2), pp.1435-1442.
Thakur, P. and Mahajan, M., 2016. Virtualization in Cloud Computing. International Journal of Recent Trends in Engineering & Research (IJRTER), 2, pp.308-315.
Xu, F., Liu, F., Jin, H. and Vasilakos, A.V., 2014. Managing performance overhead of virtual machines in cloud computing: A survey, state of the art, and future directions. Proceedings of the IEEE, 102(1), pp.11-31.
Yan, Q. and Yu, F.R., 2015. Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Communications Magazine, 53(4), pp.52-59.
Zhan, Z.H., Liu, X.F., Gong, Y.J., Zhang, J., Chung, H.S.H. and Li, Y., 2015. Cloud computing resource scheduling and a survey of its evolutionary approaches. ACM Computing Surveys (CSUR), 47(4), p.63.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download