The Virtualization Technology
The Virtualization Technology
Student’s Name
Affiliation
Course
Date
Introduction
Virtualization refers to the creating a simulated version of something that is not restricted to a virtual computer hardware, storage device, operating system or even the computerized network resources (Cho el al, 2010). Virtualization has the ability to expand hardware utilization by more than ten times while at the same time lower the quantity of power consuming servers. The technique enhances system functionality; increases the power and capacity of the computer hardware and at the same time increase the availability of network bandwidth at lower a lower cost (Portnoy, 2012). Large volumes of data are stored on small devices that have greater functionality, cheap and save time. Situations where data is lost due to crashing of servers is eliminated because the virtualization technology is designed to avoid crashing while at the same time provides a viable option which data can be recovered with ease (Zhang & Zhou, 2011). Despite having a number of benefits the technology too has its setbacks.
The virtual storage is essential in eliminating the physical servers while at the same time create space. The cost of purchasing and maintenance of servers therefore can be directed to other departments of the company and also at the same time expand the company’s profit margins (Cho el al, 2010). The technology is critical in increasing the ability in handling large volumes of data at lower costs while at the same time expand the firm’s profit margins (Somasundaram & Shrivastava, 2009).
The technology enhances the efficiency of data storage of data not being limited by hardware limitations. The virtualization servers consolidate several applications on fewer hardware platforms and in the process expand the compute-ability of the servers and storage devices (Zhang & Zhou, 2011). The technology has initiated the lowering of server hardware for a large number of users with statistics indicating that the reduction could be more than 50% enabling firms to reduce both capital and operating costs (Cerling, 2010).
Virtual disks enable the user sent data between drives with ease. If for instance the user intends to transfer data from drive A to B, usually he/ she will take down A, then transfer the data to drive B then afterwards bring B back online (Cerling, 2010). The use of virtual storage instead allows the user to state the LUN (logical unit number) that corresponds to drive A and command the flow of data to drive B. The transfer of data between the drives is initiated by the system with all the new I/O requests being redirected directly to drive B. The storage virtualization allows the user to manage with ease the heterogeneous storage environments (Cho el al, 2010). It is much easy to manage identical drives because the drives have improved storage functionality and allows the user to handle each drive separately.
While some companies try to categorize their data i.e. important and frequently accessed data is stored on highly efficient and performing drives while the data that is not frequently needed is stored on cheap and slower devices, the virtualization technology can provide a platform where all the data can be stored on high performance devices at minimal costs (Somasundaram & Shrivastava, 2009).
The management of several multiple storage devices is usually time consuming and difficult. Alternatively for the past few years IT experts have implemented the virtual storage as the best alternative for data storage and management. The storage virtualization technology pools together multiple storage devices and in the process hide the intricacy of storage area networks (SAN). The elimination of SAN’s complexity make data backup easy (Cerling, 2010). The technique is essential because it eliminates the storage infrastructural complications and at the same time save costs.
The technology improves systems security and reliability in the sense that the system crashes as a result of memory corruption emanating from software such as the software drivers. The VT-d system provide a new dimension in providing better control of system devices by outlining the architecture for DMA while at the same time interfere the remapping to ensure efficient and better isolation of I/O resources and in due process advance system reliability, availability and security (Cho el al, 2010).
The virtualization technology also offers a well-developed disaster recovery and a dynamic load balancing system. The system’s servers in terms of utilization of resources, In cases where some servers are overloaded, the workload is directed to the underutilized servers therefore creating an equilibrium and balance of workload that the servers handle (Portnoy, 2012). System crashes greatly affects the functionality of any company. System crashes at times can result to complete loss of data (Cho el al, 2010). However, the virtualization technology offers a solution to such problem by enabling a virtual image to be re-imaged on any other server in cases where there is machine failure. The data is then instantly recovered.
The testing and development of virtualization technology enables the user to easily segregate several applications in a controlled environment. Complications that result from numerous installations of many programs are eliminated. An example of such complications is mixed libraries. In this case, the most severe system crashes that could take long periods of time to reinstall take a very short duration to be handled (Portnoy, 2012).
Despite it being a great innovation and has numerous benefits, a number of drawbacks require to be analyzed. The limitations are much limited as compared to the advantages. Many IT professionals are reluctant to implement the technology because the migration from a non-virtualized to a virtualized system is tedious (Portnoy, 2012). It requires highly skilled professionals to facilitate the transition from non-virtual to virtual environment. The transition can be costly too.
Secondly, the virtualization technology is faced with the licensing complexities. A server that runs using the Ubuntu operating system may have a hard time to run on the windows virtualized server without meeting the licensing requirements (Portnoy, 2012). The flexibility nature of the technology is complicated and for the running of two different OS on the same server, it is necessary to regularly update the licensing schemes to enable the two or more OS run effectively.
The running of five servers in one physical server can pose a number of threats. In case the single physical server is destroyed it means the initial five servers will be offline (Cerling, 2010). The five servers the were initially running, in case one is destroyed the other four can still run hence limited data is lost.
On the other hand, virtualized desktops depend largely on centralized servers to offer SAN storage and computing and a much higher bandwidth requisite (Cho el al, 2010). Such condition the network and server vulnerable to capacity limits and outages.
Conclusion
The virtualization storage technological advancement is a major step towards advancing to much greater heights in terms of information science. The ability to not only store but handle and process large volumes of data create a major breakthrough in development of cost effective and better data process and storing devices. However, there is a necessity of limiting the constraints that these devices have so as to make them more appealing to the market.
References
Cerling, T. (2010). Mastering Microsoft virtualization. Indianapolis, Ind.: Wiley Pub..
Cho, K., & Han, S. (2010). The Design of Active Storage Virtualization System for Information Protection. The Journal of the Korean Institute of Information and Communication Engineering, 14(9), 2040-2048.
Portnoy, M. (2012). Virtualization essentials. Indianapolis, IN: John Wiley & Sons.
Somasundaram, G., & Shrivastava, A. (2009). Information storage and management storing, managing, and protecting digital information. Indianapolis, Ind.: Wiley Pub..
Zhang, Y., & Zhou, Y. (2011). Separating computation and storage with storage virtualization. Computer Communications, 34(13), 1539-1548.
Leave a Reply
Want to join the discussion?Feel free to contribute!