Virtualization : 3CSEC106

Learning Outcomes: 
After learning the course the students should be able to
• Understanding Virtual machines and Implementation of virtual machines
• Understanding virtualization and various ways of using virtualization
• Implementation of private cloud platform using virtualization
• Use virtual machines of public cloud platform
Syllabus: 
Unit NoTopics
1

Fundamentals of Operating System and Networking

Understanding of Operating system concepts, Multiprocessor architecture, Process affinity, Memory, Computer Network, IP Addressing, Subnetting and Supernettting, Designing LANs.

2

Introduction to Virtualization

Physical and virtual machines, Traditional and virtual computing, Understanding virtualization, Need and Applications of virtualization, Limitations, Simulations and Emulations, Challenges in Virtualized environment, tools and technologies in virtualized environments.

3

Types of Virtualization

Various forms of virtualization: Desktop, Application, Server, Hardware, Storage, Memory and   I/O virtualization

4

Server Virtualization

Server consolidation, Privileged instructions, Binary translation, Hypervisors, Types of Hypervisors, Hypervisor architecture, Full Virtualization, Para  Virtualization , Hardware Assisted  Virtualization, Implementation of   Hardware Assisted  Virtualization, Algorithms for  implementation of  Virtualization, Challenges

5

Network and Memory Virtualization

IP addressing, virtual LAN, Memory addressing, Paging, Memory mapping, virtual memory, complexities and solutions of memory virtualization

6

VM Management

VM lifecycle, Process and system level VMs, VM configurations, VM migrations, Migration types and process, VM provisioning, Scaling,VM scheduling, Load balancing: Significance, Types and Algorithms 

7

Storage virtualization

RAID, SCSI, iSCSI, Direct attached storage, Network Attached storage, Storage Area network

8

Virtualization performance and Security

Performance issues, Virtual machine sprawling, Hypervisor vulnerabilities, Hypervisor attacks, VM attacks, VM migration attacks, Security solutions

Text Books: 
Name : 
Virtualization
Author: 
Chris Wolf and Erick M. Halter
Publication: 
A press; 1 edition 2005
Name : 
Systems and Virtualization Management: Standards and New Technologies
Author: 
LatifaBoursas (Editor), Mark Carlson (Editor), Wolfgang Hommel (Editor), Michelle Sibilla (Editor), KesWold (Editor),
Publication: 
October 14, 2008
Reference Books: 
Name: 
Grids, Clouds and Virtualization
Author: 
Massimo Cafaro (Editor), Giovanni Aloisio (Editor)
Publication: 
Springer; edition 2011.
Name: 
VMware ESX Server in the enterprise
Author: 
Edward L. Haletky
Publication: 
Prentice Hall; 1 edition 29 Dec 2007
Name: 
Scheduling and Isolation in Virtualization
Author: 
Gaurav Somani,
Publication: 
VDM VerlagDr.Müller [ISBN: 978-3639295139], Muller Publishers, Germany, Sept. 2010
Name: 
VMware ESX and ESXi in the Enterprise – Planning Deployment of Virtualization Servers
Author: 
Edward Haletky
Publication: 
[ISBN: 978-0137058976]., Prentice Hall; 2 edition February 18, 2011.
Syllabus PDF: 
AttachmentSize
PDF icon VIR.pdf224.28 KB
branch: 
CBA
Course: 
2016
Stream: 
M.Tech