[UNIT
Virtualization Infrastructure
and Docker
Syllabus
Baye? ae - Network Virtualization - Storage Virtualization - System-level of Operating
Virtualization - Application Virtualization - Virtual clusters and Resource Management - Containers
vs, Virtual Machines - Introduction to Docker - Docker Components - Docker Container - Docker
Images and Repositories
Contents
3.1 Desktop Virtualization
3.2. Network Virtualization
3.3 Storage Virtualization
3.4 System - Level of Operating Virtualization
3.5 Application Virtualization
3.6 Virtual Clusters and Resource Management
3.7 Introduction to Docker
3.8 Two Marks Questions with AnswersVirtualization Infrastructure ang
Cloud Computing 3-2
Desktop Virtualization
irtunlizati technology that sllovigaliaasiesionmancaaiapses of
© Desktop virtualization is a ology Je host, residing in a data center or ty
multiple user desktop instances on a sing
cloud. It is achieved by using pbumaags resides ‘on top of oe host server
hardware to manage and allow virtual desktops to utilize the computing power
the underlying server hardware.
* Fig. 3.1.1 shows desktop virtualization.
Client Virtual desktop Server
Fig. 3.1.1 Desktop virtualization
* The three most popular types i m are
Infrastructure (VDI), ktop Services (RD: na
(Daa).
Types of Desktop Virtualization
1. Virtual desktop infrastructure
© A popular virtualization is Vi ructure (VDI)
VDI uses a deliver nt virtual desktops to many
types of connected devices.
* With a persistent virtual desktop, each user has a
image they can customize with apps and data, knowing the desktop will be saved
for future use.
* A non-persistent VDI allows users to access from an identical
pool when they need it. Once the user logs out of a non-persistent VDI, the VDI
reverts to its unaltered state.
* Characteristics of VDI
i) Virtual desktops live within virtual machines on a centralized server.
4) Each virtual desktop includes an operating system image, typically Microsoft
Windows
iti) The virtual machines are host-based, meaning multiple instances of them cat
be housed on the same server within the datacenter.
TECHNICAL PUBLICATIONS® - an up-thrust for knowiedgeGoud Computing 3-3 Virtualization Infrastructure and Docker
iv) End eat. such as PCs, tablets or thin client terminals, must be constantly
connected to the centrally managed server so they can maintain access to the
virtualized desktops they're hosting.
y) The Seas broker is a software layer that acts as an intermediary between
Es es virtual Tesources, which finds a virtual desktop within the resource
pool for each client upon successful access of the VDI environment.
+ Here are some reasons why VDI is beneficial :
a) Save money on licensing and individual Workstations/PCs by using thin
dents.
b) Fully secured virtual environment that is fully monitored and managed.
©) Centralized management and backups.
d) Secure remote access from anywhere in the world.
e) Cost reduction for multiple software licenses.
+ Disadvantages :
a) If an individual requires different applications from the other users, they will
require a completely different image, without changing the applications for
other users. i
b) A substantial initial outlay is required for the main server hardware, storage
and network infrastructure. This might not be feasible for some smaller
businesses
©) Administrators, savvy to the limitations, problem solving and installation of
VDls will either have to be brought in or existing IT staff given the relevant
training,
4) If a problem occurs, this will generally affect all users, rather than being able
to isolate problems if operating systems run off individual PCs.
2. Remote Desktop Services
* Remote Desktop Services (RDS) mote Desktop Session Host (RDSH) are
beneficial where only (ee amare, alization. They allow users
to remotely access Windows applications and desktops using the Microsoft
Windows server operating system.
© RDS is a more cost-effective solution, since one Windows server can support
multiple users.
3. Desktop-as-a-Service (DaaS) met
S) is a flexibl tualization solution that uses
+ De -as-a-service (Daa
Bees etal ‘machines backed by a third-party provider. Using DaaS,
TECHNICAL PUBLICATIONS® - an up-thrust for knowledge7
Virtualization Infrastructure ang
Cloud Computing 3-4 Cooke,
organizations can outsource desktop virtualization solutions that help a user a
access computer applications and desktops from any endpoint platform or device
i Benefits of Desktop Virtualization
1. Resource utilization ; Since IT resources for desktop virtualization are concentrate
in a data center, resources are pooled for efficiency.
2. Remote workforce enablement : Since each virtual desktop resides in cent
servers, new user desktops can be provisioned in minutes and become instantly
available for new users to access.
3. VDI offers security improvements compared with running everything locally.
Network Virtualization
. mn refers to the technology that enables partitioning or
aggregating a s and presenting them to various users
in a way that each user experiences an isolated and unique view of the physical
network.
* Network virtualization creates whereby each application sees its
own logical network independent of the physical network.
° AgyirtualglAN (VLAN) is an
example of network virtualization
that provides an easy, flexible,
and less expensive way to
manage networks
Workload
* VLANs make large networks
more manageable by enabling a
centralized configuration _of
devices located in _ physically
diverse locations. Network virtualization platform
* Fig. 321 shows network Requirement : IP transport
virtualization.
Consider a company in which the
users of a department’ are
separated over a metropolitan
area with their resources centrally
located at one office.
«In a typical network, each
Physical network
location has its own network
Fig. 3.2.1 Network virtualization
TECHNICAL PUBLICATIONS® - an up-thrust for knowledgeCloud Computing 3-5 Virtualization Infrastructure and Docker
connected to the others through routers. When network packets cross routers,
latency influences network performance.
+ With VLANs, users with similar access requirements can be grouped together into
the same virtual network, This setup eliminates the need for network routing.
« As a result, although users are physically located at disparate locations, they
appear to be at the si
me location a res locally.
+ In addition to improving network performance, VEANS also provide enhanced
security by isolating sensitive data from the other networks and by restricting
access to the resources located within the networks.
¢ Network virtualization decouples the roles of the traditional Internet Service
Providers (ISPs) into Infrastructure Providers (InPs) and Service Providers (SPs)
Benefits :
1, Reduces thejfitiiibéF of physical devices needed.
2. Easily segment net
3. Permits rapid change / scalability and agile deployment,
-
Security from destruction of physical devices.
El Storage Virtualization
© Storage virtualization is a , in the form of
functional {RAID levels and controllers, Operating systems and applications with
device can access the disks directly by themselves for writing.
© Storage virtualization in cloud computing olan oat
from Storage Area Networks (SANs) and makes them appear as a single virtual
storage device. Virtualization storage separates the storage mai
agement software
from the underlying hardware infrastructure to provide more flexibility and
scalable pools of storage resources,
orage virtualization.
* Fig, 3.3.1 shows s
«+ Storage virtualization refers to the abstraction of storage systems from applications
or computers. It is a foundation forthe implementation of other technologies, such
as thin provisioning and data protection, which are transparent to the server.
* Storage virtualization provides theyability to pool storage systems into a
consolidated, shared capacity that can be managed from a central point of control.
+ Example of storage virtualizations are host-based volume management, LUN
creation, tion and disk addressing.
© Storage virtualization has the following characteristics :
1, The availability of logical volumes separate from physical hard disk
constraints,
TECHNICAL PUBLICATIONS® - an up-thrust for knowledgeFig. 3.3.1 Storage virtualization
2 The capability of abstracting multivendor storage devices into one group and
reallocating storage space independently of size or physical location.
3. The capability of having automated storage optimization and management.
Top level servers assigned one virtual volume, which is currently in use by an
application. These virtual volumes are mapped to the actual storage in the arrays
When an 1/O is sent to a virtual volume,
it is redirected through the virtualization
at the storage network layer to the mapped physical array.
Primary types of storage virtualizations are block level virtualization and file
virtualization.
Currently there are three methods of s
torage virtualization :
L
lization : This method places a management program on the
host system and has the benefit of leveraging the SAN asset as it is.
2. Fi
‘abric-based 1 l= be done via network switches of
appliance servers. In ‘ances, independent appliances, such as switches
routers and dedicated servers are pla
ced between servers and storage and have
tssra6* virtualization function. The purpose behind this is to reduce te
impact on the existing SAN and se
rvers,
3, ‘rtualization : This is a virtualization implemented at the
storage-system level,
TECHNICAL PUBLICATIONS® - an up-thrust for knowledgei loud Computing Sa
FEMI Storage Virtualization Chattengos
s virtualizati
oe eae has evolved at a time when data explosion threatened to
throw tprise storage Management totally out of gear.
partiaitionally; ;
Traditionally, managing disk storage was once simple : If enterprises needed more
space, they got a bigger disk dri
; Wve. However, as data storage needs grew, multiple
k dri , 6 q
eee ne to be added. Over time technologies such as RAID,
ae ‘ached storage and storage-area networks evolved to tackle these
storage challenges.
Virtualization Infrastructure and Docker
But managing and maintaining thousands of disk drives presented an even more
serious challenge and storage virtualization emerged to tackle these.
1, Scalability : Ensure storage devices perform appropriate requirements. Each
array is managed independently.
2. Functionality : Virtualized environment must provide same or better
functionality. It must be continue to leverage existing functionality on arrays.
3. Manageability : Virtualization device breaks end-to-end view of storage
infrastructure and must integrate existing management tools.
4. Support : Interoperability in multi-vendor environment.
« A good storage virtualization solution should :
1. Enhance the storage resources it is virtualizing through the aggregation of
services to increase the return of existing assets.
2. Not add another level of complexity in configuration and management.
3. Improve performance rather than act as a bottleneck in order for it to be
scalable. Scalability is the capability of a system to maintain performance
linearly as new resources are added.
4. Provide secure multi-tenancy so that users and data can share virtual resources
without exposure to other users’ bad behavior or mistakes
5. Not be proprietary, but virtualize other vendor storage in the same way as its
own storage to make the management seamless,
EER] Types of Storage Virtualization
* Storage virtualization provides the ability to pool storage systems into a
consolidated, shared capacity that can be managed from a central point of control
Virtualization can be implemented in both storage area network and network
attached storage.
* Storage virtualization are of two types : Block level and File level
pe
TECHNICAL PUBLICATIONS® - an up-thrust for knowledgeInfrastructure, ea
lock Level Virtualization
virtualization is used in storage area network. The act of “Poy
Block level
i + more block-based storage services for the
virtui to one 0} -
eres block service to clients. Some examples of block vietualiate q
aggregation. 3
which is used for data storage 1s progression of bytes and bits and ig
up of a proposed length. Data which is aligned in these blocks is called as wa
and inserting data into the block is called blocking.
+ Block level storage virtualization provides storage to operating systems
in the form of virtual disks. Fig. 3.3.2 Shows block level virtualization
Server 3| S
sen] [sed oa
Server Storage area network Server 5
Various types of secondary storage devices
: &
Fig. 3.3.2 Block level virtualization
applications
« There are two types of block level virtualization. One is disk level virtualization,
whereby an ion process moves data from a physical disk level to a LUN
level and is ee. a physical device.
¢ Another method is virtualization, which, unlike disk level
virtualization, hides the physical layer of RAID controllers and disks and hi
and virtualizes the entire storage system.
* SCSI commands are transmitted in between the initiator and target. There is 7°
overhead file system like an ext3.
* Block level file system utilize ‘COE protocol.
* Block level file storage is pretty expensive but is very much reliable. It is high!
customizable storage and is versatile and speedy.
v) Block-level virtualization is usually just called storage virtualization and serves
applications such as database software that need block-level access to data. TH
disks will typically (but not always) reside in Storage Area Network arta
(SANs).
_—a
TECHNICAL PUBLICATIONS® - an up-thrust for knowledgeoud COmP Virtualization infrastructure and Docker
po File Level Virtualization
k attached st
+ Networ! storage uses alization,
; Provides storage volumes to operating, systems and
oe of files and directories. Access to storage is through
cn as Common Internet File System and Network File
« File level storage virtualization
applications in the f
network protocols,
systems.
«Storage resotrces and capacity is may be underutilized because files are bound to
a specific file server. It is necessary move the file from one: server to another
server
« File-level storage is the Predominant storage technology used on hard drives,
Network-Attached Storage (NAS) systems and similar storage systems. Fig. 3.3.3
shows file level virtualization,
Various types of
secondary storage
File server sayings,
a
Device
Switch
Node 4 Node 2 Node 3
Fig. 3.3.3 File level virtualization
* Moving large number of files in not possible because it requires the server is to be
down. Server and some applications need to be reconfigured with the new path.
It creates the problem for network administrators for improving the storage
efficiency while maintaining the required service level
* This file of virtualization only simplifies the file mobility. It provides location
transparency to user. File level storage works with an ext3 file system. Data is
Written and read into files, which have variable lengths
—
©
TECHNICAL PUBLICATIONS® - an wo-thrust for Rnowledge
ae llAra Virtualization Infrastructure J
Cloud Computing “
‘ f virtual machine file syste;
ile level storage will not support 0! 4 system. It g
+ nal boot up, which is essential for ESX and ESXi host servers, “Pon
«This type storage cannot handle heavy traffic on the network. Recovery of gig.
much faster in this level of data storage system. Storage resources and capaci ql
may be underutilized because files are bound to a specific file server. "
necessary move the file from one server to another server.
Difference between Block Level and File Level Virtualization
Block level File level
| Block-Level virtualization works before the file The server that uses the storage must have
Block’ Levee It replaces controllers and takes software installed on it in order to enable
| ‘over at the disk level. file-level usage.
It is based on SAN. It is based on NAS.
| Block addresses are used to Read/Write data _Files are accessed by "semantics" instructions,
to the storage media. Data inside files is accessed by byte-ranges
within the file.
Storage is accessible using fibre channel or File level storage is usually accessible using
iscsL common file level protocols such as CIFS and
NES.
EESd Benefits of Storage Virtualization
* Benefits of storage virtualization :
1. Data is stored in more convenient locations away from the specific host,
2. The storage devices are able to perform advanced functions like de-duplication,
replication, thin provisioning and disaster recovery functionality
3. By abstracting the storage level, IT operations can become more flexible in how
storage is partitioned, provided and protected
4. Improved physical resource utilization
Lower total cost of ownership : Virtualized storage allows more to be done
with the same or less storage.
EZ] system - Level of Operating Virtualization
* Operating - system - level virtualization is a SEHWEEViviWalization method where
the kernel of an operating system allows for multiple isolated user-space instances
instead of just one. Such instances,
id
which are sometimes called containers am
software containers.
* This refers to an abstraction layer between traditional OS and user applications.
TECHNICAL PUBLICATIONS® - an un-thrust for knowledaecoud COMP ell Virtualization infrastructure and Docker
a E ;
This pee Virtualization creates isolated containers on a single physical server
and the OS instances to utilize the hard-ware and software in data centers.
Containers behave like real servers. With containers you can create a portable,
consistent operating environment for development, testing and deployment.
This virtualization creates virtual hosting environments to allocates hardware
resources among a large number of mutually distrusting users.
Operating - system - level virtualization usually imposes little to no overhead,
because programs in virtual partitions use the operating system’s normal system
call interface and do not need to be subjected to emulation or be run in an
intermediate virtual machine.
Operating system-level virtualization is not as flexible as other virtualization
approaches since it cannot host a guest operating system different from the host
one, or a different guest kernel.
Instead of trying to run an entire guest OS, container virtualization isolates the
guests, but doesn’t try to virtualize the hardware. Instead, you have containers for
each virtual environment.
With container-based technologies, you'll need a patched kernel and user tools to
run the virtual environments. The kernel provides process isolation and performs
resource management.
Why operating system level virtualization is required ?
Operating system level virtualization provides feasible solution for hardware level
virtualization issue. It inserts a virtualization layer inside an operating system
to partition a machine's physical resources,
It enables multiple isolated VMs within a single operating system kernel. This
kind of VM is often called a virtual execution environment (VE), Virtual Private
System (VPS) or simply container.
From the user's point of view, virtual execution environment look like real servers.
ecution environment has its own set of processes, file
This means a virtual ex
network interfaces with IP addresses, routing tables,
system, user accounts,
firewall rules etc.
Although VEs can be customized for different people, they share the same
operating system Kernel. Therefore, OS-evel virtualization is also called single-OS
image virtualization
fan up-thrust for knowledge
TECHNICAL PUBLICATION’Y Peet cv0 challenges : : 7
rutin 5 :
i a ‘number of physical machines and vir
ity to use a variable
Peerettte ereniing on the ‘needs of a problem. For, eximpiag
BRUM cay ried’ cry a single CPU: during some phases” of "executions iy
may need hundreds of CPUs at other times.
2. It is related to slow operation of instantiating new virtual machine. Currently,
new virtual machines originate. either as fresh boots or as replicates of
template VM, unaware of the current application state. Therefore, to
better support cloud computing, a large amount of research and development
should be done.
Advantages of OS virtualization :
1. OS virtualization provide least overhead among all types of virtualization solution,
2, They offer highest performance and highest density of virtual environment.
3. Low resource requirements.
4, High Scalability.
Disadvantage of OS virtualization :
1, They support only one operating system as base and guest OS in a single server.
2. It supports library level virtualization.
Ea Application Virtualization
* Virtualization at the application level virtualizes an application as a VM. On @
traditional OS, an application often runs as a process. Therefore, application-level
virtualization is also known as process-level virtualization.
A fully virtualized application is not installed in the traditional sense, although it
is still executed as if it were. The application behaves at runtime like it is directly
interfacing with the original operating system and all the resources managed by it
but can be isolated to varying degrees.
* Full application virtualization requires a virtualization layer. Application
virtualization layers replace part of the runtime environment normally provid
by the operating system.
TECHNICAL PUBLICATIONS® - An inthe far bentadae
ws|
oud Computing
eis Virtualization Infrastructure and Docker
The layer intercepts all
transparently redirects th
ystem, it becomes easy to run the application on a
ifferent
ciferent computer. “and! previously incompatible appiicallotellcan a teatete
side-by-side.
The most poy i
ie fetta ae approach is to deploy High Level Language (HLL) VMs. Here
: a ion layer sits as an application program on top of the operating
system, and the layer exports an abstraction of a VM that can run programs
written and compiled to a particular abstract machine definition. Any program
written in the HLL and compiled for this VM will be able to run on it.
Benefits
1. Application virtualization uses fewer resources than a separate virtual machine.
2. Application virtualization also enables simplified operating system migrations.
3. Applications can be transferred to removable media or between computers
without the need of installing them, becoming portable software.
Limitations :
1. Not all computer programs can be virtualized.
2. Lower performance.
Eg Virtual Clusters and Resource Management
‘As with traditional physical servers, Virtual Machines (VMs) can also be clustered.
A VM cluster starts with two or more physical servers.
Most virtualization platforms, including XenServer and VMware ESX Server,
support a bridging mode which allows all domains to appear on the network as
individual hosts. By using this mode, VMs can communicate with one another
freely through the virtual network interface card and configure the network
automatically.
Virtual clusters enable admins to deploy, track and manage containers across
various systems to ensure performance, security and governance and low costs
With many VMs, an inefficient configuration always causes problems with
overloading or underutilization.
Amazon's EC2 provides elastic computing power in a cloud. EC2 permits
customers to create VMs and to manage user accounts over the time of their use.
Xen Server and VMware ESXi Server support a bridging mode which allows all
domains to appear on the network as individual hosts. With this mode VMs can
TECHNICAL PUBLICATIONS® - an up-thrust for knowledaeVirtualization Infrastructure
Cloud Computing 3-14