In this video you will learn about client-side virtualization concepts such as: the purpose of virtual machines, resource requirements, emulator requirements, security requirements, network requirements, and hypervisors.
What is Virtualization?
In computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources. Virtualization allows for standalone computers to run multiple operating systems at the same time while using the same hardware resources.
Virtualization involves understanding 3 primary concepts:
When it comes to running multiple operating systems on one computer, there are two ways this can be achieved: by way of virtualization or emulation.
Purpose of Virtual Machines
The main purpose of virtual machines (VMs) is to allow for computers to operate multiple operating systems at the same time from the same piece of hardware. Without virtualization, operating multiply systems (like Windows & Linux) would require multiple physical units. Operating VMs saves tons of money that it would cost to run multiple physical machines as it relates to the costs associated with physical space to store the devices, cooling and peripheral hardware costs. Another benefit of virtual machines is the ability to run older operating systems without having to change computers and without having to reboot their systems. Also, VMs allow for single computers to run 32-bit and 64-bit versions of the same operating system so that applications that run better in 32-bit mode can be run without the need for a separate computer. Ultimately, VMs can perform multiple tasks at the same time and allow for more work to be done on a single physical machine while saving money on physical hardware investments.
Resource Requirements
The resource requirements for virtualization include:
Emulator Requirements
Due to emulators having to simulate an entire operating system in addition to the hardware used with the operating system, the emulator requirements for virtualization include:
Security Requirements
Even though virtual machines are essentially computers inside of computers, VMs still need to be treated like actual physical computers in terms of securing the virtual device. The security requirements for virtualization include:
Network Requirements
Due to virtual machines being computers inside of computers, in order for a VM (guest) to communicate like a physical computer (host), a VMM must have a network adapter that is bridged (connected) to the network adapter of the physical machine. The VM’s virtual NIC must also have a MAC address and IP address assigned to it by an administrator to allow for network communication. The use of authentication servers can also be used to determine, verify, or deny credentials to a user attempting to log into secured networks.
Hypervisor
A hypervisor (or virtual machine monitor, VMM) is a computer software, firmware or hardware that creates and runs virtual machines. A computer on which a hypervisor runs one or more virtual machines is called a host machine, and each virtual machine is called a guest machine. A virtual machine is a software emulation of the hardware in a working computer. The VMM sets up emulated motherboard chipsets, USB controllers, hard disk host adapters, video cards, and other components of an actual computer as part of the virtual machine (VM), along with setting aside either an expandable or fixed amount of hard disk space. After a hypervisor creates and configures a VM, you install the operating system and apps desired into the VM to have a working emulated computer or virtual machine. The hypervisor is used to start the virtual machine and, depending on the RAM, processor speed, and features, and available hard disk space in the physical computer, the hypervisor can run several virtual machines at the same time.
There are two types of hypervisors:
With a Type 2 hypervisor, guests are one-level removed from the hardware and therefore run less efficiently than do guest on Type 1 hypervisors.
To turn a hypervisor on or off, there a few options: