Virtualization

Virtualization is a technique of replacing an existing interface with independent orseparated virtual interfaces that resemble the current system’s behavior and functioning. Anotherdefinition of virtualization is bringing together resources or applications that create a virtualinterface from the real interface (Lombropoulos et al., 2021). Virtualization enables theinstallation of more than one operating system in computer hardware […]

To start, you can

Virtualization is a technique of replacing an existing interface with independent or
separated virtual interfaces that resemble the current system’s behavior and functioning. Another
definition of virtualization is bringing together resources or applications that create a virtual
interface from the real interface (Lombropoulos et al., 2021). Virtualization enables the
installation of more than one operating system in computer hardware or making resources such
as a server, a storage device, or an application to operate as multiple virtual components.
Virtualization can also be done on processors, networks, desktops, services, and applications.
With virtualization, the physical attributes of the resources are hidden.
Three requirements are needed in order to accomplish virtualization. The first one is
having an environment for operating the program equivalent to the underlying system. The
second requirement is having complete control of the virtual resources to safeguard the data and
resources that run on each virtualized resource from interference when the physical resources are
shared. The third requirement relates to performance since sharing the physical resource comes
with performance degradation; hence, good performance is needed for the virtualized resources
to work smoothly. Good performance is achieved by providing support for the hardware and
software in prioritizing the instructions’ handling (Popek & Goldberg, 1974).

Justification for Virtualization

Organizations can benefit immensely by virtualizing computing resources. Cost saving is
one factor that motivates organizations to consider investing in virtualization. With
virtualization, cost saving is achieved in several ways, including reducing costs associated with
acquiring and installing physical resources like servers since virtualized applications operate
from a communal server, eliminating the need to purchase servers to run the different operating

1
systems. Virtualization also helps reduce the time and costs associated with deploying resources
and support, which also helps in minimizing downtime. Virtualization also helps in cutting
energy costs as well as reduction of the space requirement for computing resources. Lastly, the
spending on license fees is reduced given that licenses are available for multiple virtual
machines, which are lower than the fees for the dedicated devices (Lombropoulos et al., 2021).
Another benefit of virtualization is enabling faster information recovery in the event of a
mishap. It is easier to recover information from a single storage device than when multiple
devices are involved. Virtualization helps reduce downtime in a disaster since the recovery of
information can take terse times compared to the hours or days it may take to recover data and
recover physical systems. Besides providing opportunities for faster disaster recovery,
visualization also helps in business continuity; the segmented virtual machines enable developers
to clone a virtual machine and undertake tasks like testing applications without interrupting
production. For example, when updating software with a new patch, it is possible to create a new
virtual machine, undertake the update and testing, and then apply it to the production application
(Porgacic et al., 2017).

Evaluating Virtual Technologies/Solutions

The hypervisor is one of the most common virtualization applications. It is software that
is installed in one host computer and allows the installation of multiple operating systems. This
means that the operating systems share the same host and run alongside each other. The
operating systems are delivered as a virtual machine, a virtual replica of a real computer. The
hypervisor assigns each virtual machine a portion of the computing power of the physical
computer, preventing the virtual machines from interfering with one another (Aalam et al.,
2021).

1
Microsoft App-V is another example of a virtualization application. The application
allows applications to stream on a computer without requiring the installation of the application
on the computer. Microsoft App-V converts executable files into virtual components, links with
all the layers of the computer infrastructure, and enables the application to run without
interfering with other parts of the computer infrastructure (Hoppe & Seeling, 2019).
Containerization as an Alternative to Virtualization

One of the alternatives to virtualization is containerization. Unlike virtualization, which
entails replicating an entire machine, containerization entails encapsulating a single or multiple
applications and their associated files into a container that can run on top of an existing operating
system. With containerization, only one operating system is needed rather than installing
different operating systems (Alshalamah & Camara, 2018).

Challenges Associated with Virtualization

One of the challenges associated with virtualization is security risks. Virtual systems are
prone to security threats since they are shared systems, and they can become easily compromised
when users fail to ensure best practices with authorization and passwords. A security threat
targeting the host computer can disrupt an organization’s operations. Security threats come from
data breaches, loss, denial of services, malware, etc. This problem can be countered by isolating
the virtual machine management interfaces, linking the hypervisor only to the application that
requires access, avoiding running untrusted codes on the operating systems, and incorporating
robust security features (Alshalamah & Camara, 2018).
Other challenges associated with virtualization include challenges with backward
compatibility and virtual machine sprawl, which is the creation of unwanted virtual machines.

1
Other challenges include resource distribution, which can lead to some systems functioning
better than others, and the inability to monitor the performance of virtualized systems.

References

Aalam, Z. Kumar, V.& Gour, S. (2021). A review paper on hypervisor and virtual machine
security. Journal of Physics: Conference Series 1950 (2021), 1-9.
Ahmed, A. (2021). Virtualization benefits for education. 10.1016/b978-1-59749-557-.
Alshalamah, A. & Camara, J. (2018). Applying virtualization and containerization techniques in
cybersecurity education. Proceedings of the Information Systems Education Conference
San Antonio, Texas USA.
Hoppe, M.& Seeling, P. (2019). Security of virtualized applications: Microsoft App-V and
VMware ThinApp. Conference Paper, DOI: 10.1007/978-90-481-9112-3_49
Lombropoulos. G. Mitropoulos, S. & Souligereris, C. (2021). Improving business performance
by employing virtualization technology: A case study in the financial sector. Computers
10(52), 1-20.
Postolache, F., Bumbaru, S. & Constantin, F. (2010). Framework on virtualization applications
and benefits. 10.1109/SOFA.2010.5565620.
Porgacic, I. Krnjak, D. & Ozanic, D.(2017). Business Benefits from the Virtualization of an ICT
Infrastructure. International Journal of Engineering Business Management, 4(42), 1-8.

Calculate the price of your order

Select your paper details and see how much our professional writing services will cost.

We`ll send you the first draft for approval by at
Price: $36
  • Freebies
  • Format
  • Formatting (MLA, APA, Chicago, custom, etc.)
  • Title page & bibliography
  • 24/7 customer support
  • Amendments to your paper when they are needed
  • Chat with your writer
  • 275 word/double-spaced page
  • 12 point Arial/Times New Roman
  • Double, single, and custom spacing
  • We care about originality

    Our custom human-written papers from top essay writers are always free from plagiarism.

  • We protect your privacy

    Your data and payment info stay secured every time you get our help from an essay writer.

  • You control your money

    Your money is safe with us. If your plans change, you can get it sent back to your card.

How it works

  1. 1
    You give us the details
    Complete a brief order form to tell us what kind of paper you need.
  2. 2
    We find you a top writer
    One of the best experts in your discipline starts working on your essay.
  3. 3
    You get the paper done
    Enjoy writing that meets your demands and high academic standards!

Samples from our advanced writers

Check out some essay pieces from our best essay writers before your place an order. They will help you better understand what our service can do for you.

Get your own paper from top experts

Order now

Perks of our essay writing service

We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.

  • Swift delivery
    Our writing service can deliver your short and urgent papers in just 4 hours!
  • Professional touch
    We find you a pro writer who knows all the ins and outs of your subject.
  • Easy order placing/tracking
    Create a new order and check on its progress at any time in your dashboard.
  • Help with any kind of paper
    Need a PhD thesis, research project, or a two-page essay? For you, we can do it all.
  • Experts in 80+ subjects
    Our pro writers can help you with anything, from nursing to business studies.
  • Calculations and code
    We also do math, write code, and solve problems in 30+ STEM disciplines.

Take your studies to the next level with our experienced specialists