Enhancing the Security of Software-Defined Networks

Total Page:16

File Type:pdf, Size:1020Kb

Enhancing the Security of Software-Defined Networks Deep Learning: Enhancing the Security of Software-Defined Networks Ahmed Dawoud M.Sc. Software Development & M.Sc. Information and Communication Technologies A thesis submitted for the degree of Doctor of Philosophy School of Computing, Engineering and Mathematics Western Sydney University June 2019 Abstract Software-defined networking (SDN) is a communication paradigm that promotes network flexibility and programmability by separating the control plane from the data plane. SDN consolidates the logic of network devices into a single entity known as the controller. SDN raises significant security challenges related to its architecture and associated characteristics such as programmability and centralisation. Notably, security flaws pose a risk to controller integrity, confidentiality and availability. The SDN model introduces separation of the forwarding and control planes. It detaches the control logic from switching and routing devices, forming a central plane or network controller that facilitates communications between applications and devices. The architecture enhances network resilience, simplifies management procedures and supports network policy enforcement. However, it is vulnerable to new attack vectors that can target the controller. Current security solutions rely on traditional measures such as firewalls or intrusion detection systems (IDS). An IDS can use two different approaches: signature-based or anomaly-based detection. The signature-based approach is incapable of detecting zero-day attacks, while anomaly-based detection has high false-positive and false-negative alarm rates. Inaccuracies related to false-positive attacks may have significant consequences, specifically from threats that target the controller. Thus, improving the accuracy of the IDS will enhance controller security and, subsequently, SDN security. A centralised network entity that controls the entire network is a primary target for intruders. The controller is located at a central point between the applications and the data plane and has two interfaces for plane communications, known as northbound and southbound, respectively. Communications between the controller, the application and data planes are prone to various types of attacks, such as eavesdropping and tampering. The controller software is vulnerable to attacks such as buffer and stack overflow, which enable remote code execution that can result in attackers taking control of the entire network. Additionally, traditional network attacks are more destructive. This thesis introduces a threat detection approach aimed at improving the accuracy and efficiency of the IDS, which is essential for controller security. To evaluate the 1 effectiveness of the proposed framework, an empirical study of SDN controller security was conducted to identify, formalise and quantify security concerns related to SDN architecture. The study explored the threats related to SDN architecture, specifically threats originating from the existence of the control plane. The framework comprises two stages, involving the use of deep learning (DL) algorithms and clustering algorithms, respectively. DL algorithms were used to reduce the dimensionality of inputs, which were forwarded to clustering algorithms in the second stage. Features were compressed to a single value, simplifying and improving the performance of the clustering algorithm. Rather than using the output of the neural network, the framework presented a unique technique for dimensionality reduction that used a single value—reconstruction error—for the entire input record. The use of a DL algorithm in the pre-training stage contributed to solving the problem of dimensionality related to k-means clustering. Using unsupervised algorithms facilitated the discovery of new attacks. Further, this study compares generative energy-based models (restricted Boltzmann machines) with non-probabilistic models (autoencoders). The study implements TensorFlow in four scenarios. Simulation results were statistically analysed using a confusion matrix, which was evaluated and compared with similar related works. The proposed framework, which was adapted from existing similar approaches, resulted in promising outcomes and may provide a robust prospect for deployment in modern threat detection systems in SDN. The framework was implemented using TensorFlow and was benchmarked to the KDD99 dataset. Simulation results showed that the use of the DL algorithm to reduce dimensionality significantly improved detection accuracy and reduced false-positive and false-negative alarm rates. Extensive simulation studies on benchmark tasks demonstrated that the proposed framework consistently outperforms all competing approaches. This improvement is a further step towards the development of a reliable IDS to enhance the security of SDN controllers. 2 Declaration of Original Work I certify that this thesis does not incorporate without acknowledgement any material previously submitted for a degree or diploma in any university and that to the best of my knowledge and belief it does not contain any material previously published or written by another person, except where due reference is made in the text. Signe _____/____/_____28 11 2019 3 Acknowledgements First and foremost I want to express my gratitude and appreciations to my supervisor Dr. Seyed Shahrestani for his guidance, support, and motivation during my prolonged PhD journey. I appreciate all his contributions of time, ideas and expertise to make this work possible. I would like to express my special appreciation and thanks to Dr. Chun Raun, for her patient listening and vital comments. Also, it is inevitable to express my thanks to graduate research school administrative staff for their continuous and prompt support. During the long and intense years of my studies and research I lost people who shared me the dreams, I would like to honour their memory in this work, to my father and my uncle Ibrahim. A special thanks to my beloved wife Sara, and my sons Hamza and Mohamed without them I would finish this work a year and half earlier. 4 Table of Contents Abstract ............................................................................................................................ 1 Declaration of Original Work ........................................................................................ 3 Acknowledgements .......................................................................................................... 4 Table of Contents ............................................................................................................ 5 List of Figures .................................................................................................................. 8 List of Tables ................................................................................................................. 10 List of Abbreviations .................................................................................................... 11 Publications .................................................................................................................... 13 Chapter 1: Introduction ............................................................................................... 15 1.1 Introduction ........................................................................................................... 15 1.2 Motivation ............................................................................................................. 17 1.3 Research Methodology .......................................................................................... 19 1.4 Research Questions and Scope .............................................................................. 23 1.5 Contributions ......................................................................................................... 23 1.6 Thesis Structure ..................................................................................................... 25 Chapter 2: Software-Defined Networks ...................................................................... 28 2.1 Introduction ........................................................................................................... 28 2.2 Software-Defined Network Architecture .............................................................. 30 2.2.1 Software-Defined Network Controller ........................................................... 31 2.2.2 Controller Anatomy: OpenDaylight ............................................................... 33 2.2.3 OpenFlow Protocol ........................................................................................ 35 2.3 Software-Defined Network Applications .............................................................. 39 2.3.1 Network Traffic Engineering ......................................................................... 39 2.3.2 Network Monitoring ...................................................................................... 40 2.3.3 Software-Defined Networks for Virtualisation .............................................. 41 2.4 Software-Defined Networds in Various Networking Environments .................... 43 2.4.1 Software-Defined Networks for the Internet of Things ................................. 43 2.4.2 Software-Defined Networks for Cloud and Data Centres.............................. 44 2.4.3 Software-Defined Networks for Wireless Networks and 5G ......................... 46 2.5 Software-Defined Network Challenges ...............................................................
Recommended publications
  • The Server Virtualization Landscape, Circa 2007
    ghaff@ illuminata.com Copyright © 2007 Illuminata, Inc. single user license Gordon R Haff Illuminata, Inc. TM The Server Virtualization Bazaar, Circa 2007 Inspired by both industry hype and legitimate customer excitement, many Research Note companies seem to have taken to using the “virtualization” moniker more as the hip phrase of the moment than as something that’s supposed to convey actual meaning. Think of it as “eCommerce” or “Internet-enabled” for the Noughts. The din is loud. It doesn’t help matters that virtualization, in the broad sense of “remapping physical resources to more useful logical ones,” spans a huge swath of Gordon Haff technologies—including some that are so baked-in that most people don’t even 27 July 2007 think of them as virtualization any longer. Personally licensed to Gordon R Haff of Illuminata, Inc. for your personal education and individual work functions. Providing its contents to external parties, including by quotation, violates our copyright and is expressly forbidden. However, one particular group of approaches is capturing an outsized share of the limelight today. That would, of course, be what’s commonly referred to as “server virtualization.” Although server virtualization is in the minds of many inextricably tied to the name of one company—VMware—there are many companies in this space. Their offerings include not only products that let multiple virtual machines (VMs) coexist on a single physical server, but also related approaches such as operating system (OS) virtualization or containers. In the pages that follow, I offer a guide to today’s server virtualization bazaar— which at first glance can perhaps seem just a dreadfully confusing jumble.
    [Show full text]
  • AIX Workload Partition Management in IBM AIX Version
    Front cover Workload Partition Management in IBM AIX Version 6.1 Presents updated technical planning information for AIX V6.1 TL2 Covers new partition mobility, isolation, NIM support, and WPAR Manager features Provides walk-through examples for AIX system administrators Shane Brandon Anirban Chatterjee Henning Gammelmark Vijayasekhar Mekala Liviu Rosca Arindom Sanyal ibm.com/redbooks International Technical Support Organization Workload Partition Management in IBM AIX Version 6.1 December 2008 SG24-7656-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (December 2008) This edition applies to AIX 6.1 TL2. © Copyright International Business Machines Corporation 2008. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . x Preface . xi The team that wrote this book . xi Acknowledgements . xiii Become a published author . xiv Comments welcome. xiv Part 1. Introduction . 1 Chapter 1. Introduction to AIX workload partitions . 3 1.1 Workload management and partitioning in AIX systems. 4 1.1.1 AIX Workload Manager . 4 1.1.2 Logical partitions . 5 1.1.3 PowerVM (formerly Advanced POWER Virtualization) . 6 1.2 AIX6 Workload Partitions . 7 1.2.1 Global environment . 9 1.2.2 System WPAR . 10 1.2.3 Application WPAR. 10 1.3 WPAR isolation and security . 10 1.3.1 Processes . 11 1.3.2 Users. 11 1.3.3 Resources . 11 1.4 Other WPAR features . 12 1.4.1 Checkpoint/restart . 12 1.4.2 Live application mobility .
    [Show full text]
  • IBM Powervm Virtualization Introduction and Configuration
    Front cover IBM PowerVM Virtualization Introduction and Configuration Understand PowerVM features and capabilities Plan, implement, and set up PowerVM virtualization Updated to include new POWER7 technologies Mel Cordero Lúcio Correia Hai Lin Vamshikrishna Thatikonda Rodrigo Xavier ibm.com/redbooks International Technical Support Organization IBM PowerVM Virtualization Introduction and Configuration June 2013 SG24-7940-05 Note: Before using this information and the product it supports, read the information in “Notices” on page xxi. Sixth Edition (June 2013) This edition applies to: Version 7, Release 1 of AIX Version 7, Release 1 of IBM i Version 2, Release 2, Modification 2, Fixpack 26 of the Virtual I/O Server Version 7, Release 7, Modification 6 of the HMC Version AL730, release 95 of the POWER7 System Firmware Version AL740, release 95 of the POWER7 System Firmware © Copyright International Business Machines Corporation 2004, 2013. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . xi Tables . xix Notices . xxi Trademarks . xxii Preface . xxiii Authors . xxiii Now you can become a published author, too! . xxvi Comments welcome. xxvi Stay connected to IBM Redbooks . .xxvii Summary of changes . xxix June 2013, Sixth Edition. xxix Part 1. Overview . 1 Chapter 1. PowerVM technologies. 3 1.1 The value of PowerVM . 4 1.2 What is PowerVM . 4 1.2.1 New PowerVM features . 6 1.2.2 PowerVM editions . 7 1.2.3 Activating the PowerVM feature . 12 1.3 The POWER Hypervisor . 15 1.4 Logical partitioning technologies . 17 1.4.1 Dedicated LPAR .
    [Show full text]
  • Veritas Infoscale™ 7.4 Virtualization Guide - AIX Last Updated: 2018-05-31 Legal Notice Copyright © 2018 Veritas Technologies LLC
    Veritas InfoScale™ 7.4 Virtualization Guide - AIX Last updated: 2018-05-31 Legal Notice Copyright © 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This product may contain third-party software for which Veritas is required to provide attribution to the third-party (“Third-Party Programs”). Some of the Third-Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Refer to the third-party legal notices document accompanying this Veritas product or available at: https://www.veritas.com/about/legal/license-agreements The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Veritas Technologies LLC and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. VERITAS TECHNOLOGIES LLC SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
    [Show full text]
  • Opensaf and Vmware from the Perspective of High Availability
    OpenSAF and VMware from the Perspective of High Availability Ali Nikzad A Thesis in The Department of Computer Science and Software Engineering Presented in Partial Fulfillment of the Requirements for the Degree of Master of Applied Science (Software Engineering) at Concordia University Montreal, Quebec, Canada November 2013 © Ali Nikzad, 2013 CONCORDIA UNIVERSITY School of Graduate Studies This is to certify that the thesis prepared By: Ali Nikzad Entitled: OpenSAF and VMware from the Perspective of High Availability and submitted in partial fulfillment of the requirements for the degree of complies with the regulations of the University and meets the accepted standards with respect to originality and quality. Signed by the final examining committee: Dr. T. Popa _______________________________ Chair Dr. J. Rilling __ ________________________ Examiner Dr. J. Paquet ___________________________ Examiner Dr. F. Khendek_ ________________________ Supervisor Dr. M. Toeroe _ ______________________ Co-Supervisor Approved by Dr. S. P. Mudur________________________ Chair of Department Dr. C. Trueman___________________________________ Dean of Faculty Date: November 2013 ii Abstract OpenSAF and VMware from the Perspective of High Availability Ali Nikzad Cloud is becoming one of the most popular means of delivering computational services to users who demand services with higher availability. Virtualization is one of the key enablers of the cloud infrastructure. Availability of the virtual machines along with the availability of the hosted software components are the fundamental ingredients for achieving highly available services in the cloud. There are some availability solutions developed by virtualization vendors like VMware HA and VMware FT. At the same time the SAForum specifications and OpenSAF as a compliant implementation offer a standard based open solution for service high availability.
    [Show full text]
  • International Journal for Scientific Research & Development
    IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 02, 2014 | ISSN (online): 2321-0613 Virtualization : A Novice Approach Amithchand Sheety1 Mahesh Poola2 Pradeep Bhat3 Dhiraj Mishra4 1,2,3,4 Padmabhushan Vasantdada Patil Pratishthan’s College of Engineering, Eastern Express Highway, Near Everard Nagar, Sion-Chunabhatti, Mumbai-400 022, India. Abstract— Virtualization provides many benefits – greater as CPU. Although hardware is consolidated, typically efficiency in CPU utilization, greener IT with less power OS are not. Instead, each OS running on a physical consumption, better management through central server becomes converted to a distinct OS running inside environment control, more availability, reduced project a virtual machine. The large server can "host" many such timelines by eliminating hardware procurement, improved "guest" virtual machines. This is known as Physical-to- disaster recovery capability, more central control of the Virtual (P2V) transformation. desktop, and improved outsourcing services. With these 2) Consolidating servers can also have the added benefit of benefits, it is no wondered that virtualization has had a reducing energy consumption. A typical server runs at meteoric rise to the 2008 Top 10 IT Projects! This white 425W [4] and VMware estimates an average server paper presents a brief look at virtualization, its benefits and consolidation ratio of 10:1. weaknesses, and today’s “best practices” regarding 3) A virtual machine can be more easily controlled and virtualization. inspected from outside than a physical one, and its configuration is more flexible. This is very useful in I. INTRODUCTION kernel development and for teaching operating system Virtualization, in computing, is a term that refers to the courses.
    [Show full text]
  • A Comparison of Powervm and X86-Based Virtualization Performance
    A Comparison of PowerVM and x86-Based Virtualization Performance October 20, 2009 Elisabeth Stahl, Mala Anand IBM Systems and Technology Group IBM PowerVM Virtualization Virtualization technologies allow IT organizations to consolidate workloads running on multiple operating systems and software stacks and allocate platform resources dynamically to meet specific business and application requirements. Leadership virtualization has become the key technology to efficiently deploy servers in enterprise data centers to drive down costs and become the foundation for server pools and cloud computing technology. Therefore, the performance of this foundation technology is critical for the success of server pools and cloud computing. Virtualization may be employed to: • Consolidate multiple environments, including underutilized servers and systems with varied and dynamic resource requirements • Grow and shrink resources dynamically, derive energy efficiency, save space, and optimize resource utilization • Deploy new workloads through provisioning virtual machines or new systems rapidly to meet changing business demands • Develop and test applications in secure, independent domains while production can be isolated to its own domain on the same system • Transfer live workloads to support server migrations, balancing system load, or to avoid planned downtime • Control server sprawl and thereby reduce system management costs The latest advances in IBM® PowerVM™ offer broader platform support, greater scalability, higher efficiency in resource utilization, and more flexibility and robust heterogeneous server management than ever before. This paper will discuss the advantages of virtualization, highlight IBM PowerVM, and analyze the performance of virtualization technologies using industry-standard benchmarks. PowerVM With IBM Power™ Systems and IBM PowerVM virtualization technologies, an organization can consolidate applications and servers by using partitioning and virtualized system resources to provide a more flexible, dynamic IT infrastructure.
    [Show full text]
  • (Paas) Aggregator: a Multi-Cloud Library
    PLATFORM AS A SERVICE (PAAS) AGGREGATOR: A MULTI-CLOUD LIBRARY Supervised by: Dr. H. M. N. Dilum Bandara Prepared by: S.A.F.M. Pulle (158241A) M.Sc. in Computer Science Department of Computer Science and Engineering University of Moratuwa Sri Lanka May 2017 PLATFORM AS A SERVICE (PAAS) AGGREGATOR: A MULTI-CLOUD LIBRARY Supervised by: Dr. H. M. N. Dilum Bandara Prepared by: S.A.F.M. Pulle (158241A) Thesis submitted in partial fulfillment of the requirements for the Degree of MSc in Computer Science specializing in Cloud Computing Department of Computer Science and Engineering University of Moratuwa Sri Lanka May 2017 DECLARATION I declare that this is my own work and this dissertation does not incorporate without acknowledgement any material previously submitted for a Degree or Diploma in any other University or institute of higher learning and to the best of my knowledge and belief, it does not contain any material previously published or written by another person except where the acknowledgement is made in the text. Also, I hereby grant to University of Moratuwa the non-exclusive right to reproduce and distribute my dissertation, in whole or in part in print, electronic or other medium. I retain the right to use this content in whole or part in future works (such as articles or books). Signature: ……………… Date: ………………. Name: S.A.F.M. Pulle The above candidate has carried out research for the Masters dissertation under my supervision. Signature of the supervisor: …………………………. Date: ………………. Name: Dr. H. M. N. Dilum Bandara i ABSTRACT Platform as a Service (PaaS) has become a key enabler of software-driven innovation facilitating rapid iteration and developer agility.
    [Show full text]
  • Risk Mitigation in Virtualized Systems
    1 Introduction 1 Master Thesis University of Applied Sciences Luzern Risk Mitigation in Virtualized Systems Author: Markus Pfister Referent: Armand Portmann Co-Referent: Marcel Hiestand Period: June 23, 2008 to September 15, 2008 1 Introduction 2 Table of contents 1 INTRODUCTION ........................................................................................................................... 11 1.1 CITATIONS ................................................................................................................................ 11 1.2 DEFINITION OF VIRTUALIZATION .............................................................................................. 11 1.3 MOTIVATIONS FOR USING VIRTUALIZATION TECHNOLOGY ...................................................... 11 2 VIRTUALIZATION OVERVIEW ............................................................................................... 14 2.1 INTRODUCTION ......................................................................................................................... 14 3 VIRTUALIZATION TECHNIQUES ........................................................................................... 15 3.1 ENABLERS ................................................................................................................................. 15 3.1.1 Ring security model .................................................................................................................. 15 3.1.1.1 Expensive security perimeter switches ......................................................................................
    [Show full text]
  • IBM Powervm Virtualization Introduction and Configuration
    Front cover IBM PowerVM Virtualization Introduction and Configuration Understand PowerVM features and capabilities Plan, implement, and set up PowerVM virtualization Updated to include new POWER7 technologies Mel Cordero Lúcio Correia Hai Lin Vamshikrishna Thatikonda Rodrigo Xavier ibm.com/redbooks International Technical Support Organization IBM PowerVM Virtualization Introduction and Configuration June 2013 SG24-7940-05 Note: Before using this information and the product it supports, read the information in “Notices” on page xxi. Sixth Edition (June 2013) This edition applies to: Version 7, Release 1 of AIX Version 7, Release 1 of IBM i Version 2, Release 2, Modification 2, Fixpack 26 of the Virtual I/O Server Version 7, Release 7, Modification 6 of the HMC Version AL730, release 95 of the POWER7 System Firmware Version AL740, release 95 of the POWER7 System Firmware © Copyright International Business Machines Corporation 2004, 2013. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . xi Tables . xix Notices . xxi Trademarks . xxii Preface . xxiii Authors . xxiii Now you can become a published author, too! . xxvi Comments welcome. xxvi Stay connected to IBM Redbooks . .xxvii Summary of changes . xxix June 2013, Sixth Edition. xxix Part 1. Overview . 1 Chapter 1. PowerVM technologies. 3 1.1 The value of PowerVM . 4 1.2 What is PowerVM . 4 1.2.1 New PowerVM version 2.2.2 features. 6 1.2.2 PowerVM editions . 7 1.2.3 Activating the PowerVM feature . 12 1.3 The POWER Hypervisor . 15 1.4 Logical partitioning technologies .
    [Show full text]
  • Download an Upgrade
    ALAGAPPA UNIVERSITY (Accredited with ‘A+’ Grade by NAAC (with CGPA: 3.64) in the Third Cycle and Graded as category - I University by MHRD-UGC) (A State University Established by the Government of Tamilnadu) KARAIKUDI – 630 003 DIRECTORATE OF DISTANCE EDUCATION M.Sc. (Computer Science) Second Year – Third Semester 341 32 CLOUD COMPUTING Copy Right Reserved For Private Use only i Author: Dr. C.Balakrishnan Assistant Pro fessor Alagappa Institute of Skill Development Alagappa University, Karaikudi. 630 003. “The Copyright shall be vested with Alagappa University” All rights reserved. No part of this publication which is material protected by this copyright notice may be reproduced or transmitted or utilized or stored in any form or by any means now known or hereinafter invented, electronic, digital or mechanical, including photocopying, scanning, recording or by any information storage or retrieval system, without prior written permission from the Alagappa University, Karaikudi, Tamil Nadu. Reviewer: Mr. S. Balasubramanian Assistant Professor in Computer Science Directorate of Distance Education Alagappa University Karaikudi – 03. ii CLOUD COMPUTING SYLLABI-BOOK MAPPING TABLE Syllabi Mapping in Book UNIT BLOCK 1 : CLOUD COMPUTING BASICS 1-23 Introduction: History – Working with cloud computing – pros and 1 1-11 cons of cloud computing – Benefits Developing cloud services – pros and cons of cloud service 2 12-17 development - types of cloud service development 3 Discovering cloud services development services and tools 18-23 BLOCK 2 : CLOUD
    [Show full text]
  • Cloud Computing
    www.getmyuni.com Cloud Computing www.getmyuni.com 7. Cloud Virtualization Technology www.getmyuni.com 7. Cloud Virtualization Technology Chapter Topics 7.1 Introduction 7.2 Virtualization defined, 7.3 virtualization benefits, 7.4 Server virtualization, 7.5 Virtualization for x86 architecture, 7.6 Hypervisor management software, 7.7 Logical partitioning, 7.8 VIO server 7.9 Virtual infrastructure requirements. 7.10 Summary www.getmyuni.com 7. Cloud Virtualization Technology 7.1 Introduction ● Virtualization represents the logical view of data representation- the power to compute in virtualized environments. ● It is a technique that has been used in large mainframe computer for 30+ years. It is used to manage a group of computers together- instead of managing resources separately. www.getmyuni.com 7. Cloud Virtualization Technology 7.2 Virtualization Defined Virtualization is an abstraction layer (hypervisor) that decouples the physical hardware from the operating system to deliver greater IT resources utilization and flexibility Virtualization can bring the following benefits ● save money ● increased control ● simplify disaster recovery ● business readiness assessment www.getmyuni.com 7. Cloud Virtualization Technology 7.2.1 Why Virtualization? Here are some reasons for going for virtualization ● lower cost of infrastructure ● Reducing the cost of adding to that infrastructure ● Gathering information across IT set up for increased utilization and collaboration ● Deliver on SLA response time during spikes in production ● Building heterogeneous infrastructure that are responsive www.getmyuni.com 7. Cloud Virtualization Vechnology 7.2.2 Infrastructure Virtualization Evolution ● The objective of virtualization is to reduce complexity in building and managing IT infrastructure. ● Virtualization has been in operation in mainframe computers ● different machines can run different operating systems and multiple applications on the same physical computer.
    [Show full text]