Virtualization Report: Data Center, Security, Cloud Computing Analysis

Verified

Added on  2020/05/16

|5
|775
|100
Report
AI Summary
This report provides an overview of virtualization, focusing on data center virtualization and its implementation using cloud computing techniques. It explores how virtualization can optimize IT infrastructure and reduce costs. The report addresses security considerations, including securing virtual hard disks and segmenting network traffic, while also comparing virtualization with cloud computing. Key differences in resource allocation and configuration are highlighted. The report concludes by emphasizing the benefits of virtualization for companies like Verbania, such as the ability to utilize outdated hardware, maintain secure environments, and reduce operational costs. The report includes references to relevant academic sources.
Document Page
Running head: VIRTUALIZATION
Virtualization
Name of the student
Name of the University
Author note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1VIRTUALIZATION
Answer to question 1
Data centre virtualization is the process of virtualizing a data centre based on cloud
computing techniques. It virtualizes physical servers in a data centre along with networking,
storage and other physical infrastructures. It usually provides a virtual cloud. Virtual data centre
allows the placement of several virtual data centers on the same physical level of infrastructure
thereby making a hierarchy of centers capable of interconnection (Mijumbi et al., 2016). This
helps in IT optimization and reduces capital cost. Virtualization helps to create multiple
platforms in a same physical infrastructure level. The technology, which accounts for
virtualization is Virtual Machine Monitor (VMM) also called virtual manager, which separates
compute environment from the physical level. This technology will help Verbania in addressing
their system requirements.
Answer to question 2
Virtualization is considered to be an excellent method for reducing the need for physical
devices. In addition, virtual machines are considered to be specialized so that a physical location
is not mandatory for maintaining any such infrastructural components required. The first security
consideration includes the need to secure the virtual hard disks of the system. This will help in
reducing the need for security implications (Martins et al., 2014). As a virtual machine is more
prone to security breaches, the need for securing the assets are a necessity.
Another security consideration that can be included is to segment the traffic involved in
the whole architecture such that all the traffic can be monitored effectively from different
Document Page
2VIRTUALIZATION
channels. Reduction in the attacks surface for the hosts is another security consideration which
also reduces the security breaches in the system.
Answer to question 3
Virtualization is termed as the technology which deals with reduced physical spaces
while cloud computing is the methodology applied for achieving that. In case of virtualization,
multiple environments made from simulators are made from 1 hardware system while in case of
cloud computing, an automated virtual resource pool is allocated for any on-demand uses of it.
Moreover, in case of virtualization, the delivery of packaged resources to specific users is
emphasized (Han et al., 2015). On the other hand, in case of cloud computing varied resources
are delivered to groups of users for specified tasks. Lastly, the configuration of a virtualized
system is always considered to be image-based while the configuration of a cloud computational
system is considered to be template-based.
Answer to question 4
Thus, virtualization is a good concept as it helps in reducing the need for physical
resources. This generally helps in creating a virtualized environment rather than a physical one.
In addition, Verbania can efficiently work using the applications which are directly installed in
the virtual server (Liang & Yu, 2015). Moreover, the company can also maintain a secure and
dedicated environment while doing so. Furthermore, the company can use their outdated
hardware by making instances and allocating virtual resources such that they can be used again.
This helps in increasing the profit and reduces the need for considering the overhead charges for
maintains any unnecessary physical resources.
Document Page
3VIRTUALIZATION
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4VIRTUALIZATION
References
Han, B., Gopalakrishnan, V., Ji, L., & Lee, S. (2015). Network function virtualization:
Challenges and opportunities for innovations. IEEE Communications Magazine, 53(2),
90-97.
Liang, C., & Yu, F. R. (2015). Wireless network virtualization: A survey, some research issues
and challenges. IEEE Communications Surveys & Tutorials, 17(1), 358-380.
Martins, J., Ahmed, M., Raiciu, C., Olteanu, V., Honda, M., Bifulco, R., & Huici, F. (2014,
April). ClickOS and the art of network function virtualization. In Proceedings of the 11th
USENIX Conference on Networked Systems Design and Implementation (pp. 459-473).
USENIX Association.
Mijumbi, R., Serrat, J., Gorricho, J. L., Bouten, N., De Turck, F., & Boutaba, R. (2016). Network
function virtualization: State-of-the-art and research challenges. IEEE Communications
Surveys & Tutorials, 18(1), 236-262.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]