VIRTUALIZATION TECHNOLOGIES BY COLLIN DONALDSON. PHYSICAL COMPUTING Install Hardware Load Operating System and other software Deploy either manually or.

Slides:



Advertisements
Similar presentations
Run a Virtual Machine. Virtualization Have you ever imitated someone else? That's because your mind is thinking/ imagining as that person Same to a Computer:
Advertisements

Server Virtualization Gina Myers. Definition Creating virtual machines (VMs) “VMs are software entities that emulate a real machine’s functionality” ◦
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Chapter 21: Mobile Virtualization Infrastracture and Related Security Issues Guide to Computer Network Security.
Intro to Hypervisors. Big Picture: “It’s like VMWare Player, except you can build an entire network in it.” Multiple machines Switches Routers Multiple.
Virtualization for Cloud Computing
Installing software on personal computer
Virtualization 101.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 3 Desktop Virtualization McGraw-Hill.
To run the program: To run the program: You need the OS: You need the OS:
Red Hat Installation. Installing Red Hat Linux is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on.
Presented by : Ran Koretzki. Basic Introduction What are VM’s ? What is migration ? What is Live migration ?
Space Science and Engineering Center University of Wisconsin-Madison Virtual Machines: A method for distributing DB processing software Liam Gumley.
Virtualization and Open source Software Mr. Lau Ka Lun – Lai King Catholic Secondary School Date: 9 th, 21 st, 22 nd March, 2011.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
Virtualization Week 20. This week Virtualization – What is it? – Software on different operating systems? Group Presentations – minutes per group.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
Virtualization Lab 3 – Virtualization Fall 2012 CSCI 6303 Principles of I.T.
TRD 1: NMRbox Development
Hands-On Virtual Computing
Introduction to VMware Virtualization
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
V IRTUALIZATION Sayed Ahmed B.Sc. Engineering in Computer Science & Engineering M.Sc. In Computer Science.
Linux in a Virtual Environment Nagarajan Prabakar School of Computing and Information Sciences Florida International University.
Network Plus Virtualization Concepts. Virtualization Overview Virtualization is the emulation of a computer environment called a Virtual Machine. A Hypervisor.
INTRODUCTION TO VIRTUALIZATION KRISTEN WILLIAMS MOSES IKE.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
Virtualization One computer can do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Turning hardware.
Operating-System Structures
Hands-On Virtual Computing
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
Virtual Machines. A virtual machine takes the layered approach to its logical conclusion. It treats hardware and the operating system kernel as though.
Cloud Computing – UNIT - II. VIRTUALIZATION Virtualization Hiding the reality The mantra of smart computing is to intelligently hide the reality Binary->
Virtual Machines Mr. Monil Adhikari. Agenda Introduction Classes of Virtual Machines System Virtual Machines Process Virtual Machines.
Jaime Frey Computer Sciences Department University of Wisconsin-Madison Condor and Virtual Machines.
COMP1321 Digital Infrastructure Richard Henson March 2016.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
Virtual PC 2007 Virtualization for Fermi Desktops KTF
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
VIRTUALIZATION TECHNIQUES By:- Aman, Denis and Dharit.
VMware Recovery Software RECOVER DATA FROM CORRUPT VMDK FILE.
VirtualBox. VirtualBox – key points ● What is a virtual machine. ● How to get the software. ● Install the host software. ● General Tweeks. ● Security.
GNU and Linux.
Using Virtualization in the Classroom
Virtual Machine and VirtualBox
Guide to Operating Systems, 5th Edition
Introduction to VMware Virtualization
CSC227: Operating Systems
Agenda Hardware Virtualization Concepts
Dag Toppe Larsen UiB/CERN CERN,
Virtualization OVERVIEW
Dag Toppe Larsen UiB/CERN CERN,
Desktop Virtualization
Virtualization, Cloud Computing and Big Data
TYPES OF SERVER. TYPES OF SERVER What is a server.
3.2 Virtualisation.
Chapter 21: Virtualization Technology and Security
Virtual Machines.
Chapter 2. Malware Analysis in VMs
Chapter 22: Virtualization Security
Virtualization 101.
Guide to Operating Systems, 5th Edition
Partition Starter Find out what disk partitioning is, state key features, find a diagram and give an example.
Virtual Machine and VirtualBox
Virtual Machine and VirtualBox
Virtual Machine and VirtualBox
Introduction to VM Les 5 12 September 2019.
Presentation transcript:

VIRTUALIZATION TECHNOLOGIES BY COLLIN DONALDSON

PHYSICAL COMPUTING Install Hardware Load Operating System and other software Deploy either manually or via a network To Run Multiple Operating Systems: Multi-booting Run from USB Run from live disc

INTRO TO VIRTUALIZATION Creating a virtual (rather than actual) version of something, including but not limited to a virtual computer hardware platform, operating system, storage device, or computer network resources. Virtualization is a fundamental part of cloud computing Hypervisor: A piece of computer software, firmware or hardware that creates and runs virtual machines. Type 1: Native/Bare-metal: Run directly on hardware Type 2: Hosted: Run on a conventional OS

ADVANTAGESOF VIRTUALIZATION Often free or relatively low cost Easy installation and uninstallation Less hardware hassles Hands-on learning of new kinds of technology Use software normally unavailable on your machine Test software/hardware in a safe environment Save energy

VIRTUALIZATION TECHNIQUES Host/Guest OS: OS functions as a host, virtual machines are guests/clients. Uses Type 2 hypervisors. Hypervisor: Uses a Type 1 hypervisor and a custom minimal OS. Emulation/Simulation: Creates custom virtual hardware/software to imitate real hardware/software. Jails/Linux Containers: Virtual applications run on a host OS.

COMMON USE OF DIFFERENT VIRTUALIZATION TECHNIQUES Host/Guest OS: Virtual Desktops. Hypervisor and Jails: Virtual Servers Emulators: Custom/Embedded hardware environments and accompanying software (e.g. video game emulators) We will focus on Host/Guest OS

VIRTUAL SECURITY Virtual machines have some unique security considerations, as well as applications Virtual machines can still get viruses and can transmit them to your physical machine, or vice versa Few viruses target VMs, one such virus is detailed on the next page VMs you plan on keeping should be protected like their physical counterparts

VM-CENTRIC VIRUS “CRISIS”

VIRTUALIZATION-CENTRIC SECURITY TECHNIQUES Sandboxing: Run risky applications in a VM that is disconnected from your host OS and network Server Isolation: Servers running on the same machine can be isolated virtually either by virtualizing them or by running each in its own VM Virtual Honeypots and Honeynets: Honeypots are computers designed to lure attackers/malware/spam away from your actual computer. Honeynets are n

DEMO by-step-guide/

NOTES FOR DOI Oracle Virtual Box and VMWare Player are good FREE virtualization software You may have to download operating systems to mount (.iso files) Some processors have virtualization technology that needs to be enabled via the BIOS menu (your software should indicate such) Some of your hardware might not jive with your virtual machines Some Linux and OS-X distributions default to Console view (text only) when you install them, type “startx” to switch to GUI view