3.7 Summarize cloud and virtualization concepts. Flashcards
Hypervisor
Virtualization of systems is provided by the hypervisor. The hypervisor is also known as the virtual machine monitor (VMM) and is the software component that allows you to create and run virtual machines on the system. When you install the hypervisor on a system, that system is then known as the host system, while each virtual machine is known as a guest system.
Hypervisor - Type I
This hypervisor type is software that runs directly on top of the hardware, which then has the host operating system running as a parent virtual machine. This allows the hypervisor to control access to the hardware from the host and the guest systems. Microsoft’s Hyper-V and VMware’s ESXi server are examples of type I hypervisors. These hypervisors are also known as bare metal hypervisors because they run directly on top of the hardware.
Hypervisor - Type II
A type II hypervisor involves having the OS installed on top of the hardware, and then installing virtualization software that will create VMs. Examples of type II hypervisors are VMware Workstation and Oracle VM VirtualBox.
Hypervisor - Application Cells/Containers
Application containers are a feature that allows you to run an application in an isolated container that has its own resources assigned to it. Containers are just like VMs, but ** they share the OS kernel of the host system ** so they perform better than VMs (but provide the isolation features of a VM). Docker is an example of software that provides application containers and is a feature of Windows 10.
VM Sprawl Avoidance
VM sprawl occurs when an organization has a large number of VMs being created without any process in place for building VMs. The problem is that the number of VMs being created outpaces the capability of network administrators to manage all of them. Having VMs pop up all over the place with no central management means no one is able to ensure that all those systems are patched when needed. Remember that a system that is unpatched could create a security hole in your network. Centrally managing VM host systems is a key to solving VM sprawl with management software that is used to deploy VMs.
VM Escape Protection
VM escape allows someone to access the host operating system from the guest OS of the VM. Virtualization vendors create patches for any VM escape vulnerabilities that exist within their products, so be sure to keep your virtualization software patched.
Cloud Storage (& Cloud Computing)
One of the great benefits of cloud technologies is the use of cloud storage. Users are now able to easily store their data in the cloud and access that data from a number of different devices such as desktop PCs, laptops, tablets, and phones. Cloud storage can be used to store personal files such as pictures or documents, but also to store configuration setting for the device so that if you need to wipe the device, the configuration can be easily restored.
Cloud computing has become the way of the future and has many advantages and disadvantages. In this section you will learn about cloud computing and discover some of those advantages and disadvantages. With cloud computing, you can quickly and easily create application environments with a minimal cost up front. For example, I wanted an e-mail server environment, so I created an Office 365 account. Within minutes I had an e-mail server environment up and running (known as Exchange Online), which allowed me to create some mailboxes and then start sending an e-mail. The best part of this example is that I did not have to purchase server hardware or software, and I didn’t need to plan for high availability. It is all part of what the cloud service offers!
Cloud Deployment Models
.
Cloud Deployment Models - SaaS
With SaaS, the application is provided across the Internet, which means that you do not need to install the application at your site.
Cloud Deployment Models - PaaS
Provides the computing platform as a service, which includes the hardware and software required to run a specific system such as an e-mail server or database server.
Cloud Deployment Models - IaaS
Provides computers, data centers, and network equipment as a service that the customer pays a monthly fee for based on the number of resources used.
Cloud Deployment Models - Private
A private cloud means that you create cloud services internally for your company and your company leverages
those services. With a private cloud, the data is stored inside the company.
Cloud Deployment Models - Public
A public cloud is provided by a service provider, and your data stored in the cloud would be located on that provider’s servers. It is important to stress that many organizations are not allowed to store sensitive data in a public cloud where the servers are hosted out of the country. It should be noted that cloud providers are creating data centers in different countries to address this concern.
Cloud Deployment Models - Hybird
A hybrid cloud is a mix of public and private cloud. The company may store nonsensitive data in the public cloud, but keep sensitive data stored in the private cloud.
Cloud Deployment Models - Community
This type of cloud pools computing resources to make IT services available to multiple organizations with common needs, such as real-time access to a back-end database.