25
Running Title: Virtualization 1 Virtualization Joshua Ferrill Erik Lindwall Jared Lively Mark Weiss

Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Running Title: Virtualization 1

Virtualization

Joshua Ferrill

Erik Lindwall

Jared Lively

Mark Weiss

Page 2: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 2

Executive Summary

There are many trends and new technologies changing how information technology is

used within an organization. There has been a focus on information technology departments to

consolidate and decrease expenses. One of the technologies that is allowing for consolidation of

computer resources is virtualization. There are many different types of virtualization and only a

few will be covered in this paper.

There are many benefits to virtualization along with just as many risks. Many

companies have been moving resources into virtualization but not all companies have found the

rewards they have been looking for. Not all companies are the same and based on their business

operations and processes, they may find different types of virtualization will have more promise.

Some companies will decide on virtual servers and computers, other will use virtual applications

and processes, each may need a different approach.

Virtualization has help with the flatting of the world’s markets. Smaller companies can

complete and using computing power that was once only found in the largest of enterprises.

Companies will need to decide on where and how virtualizations will be used within their

organizations. With the many variations of virtualization, companies will find some will not

work with their business objectives. There will be others that will create their own ways to use

virtualization. It does appear though that the benefits do outweigh the risks of virtualization.

Page 3: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 3

Paper Purpose and Scope

Organizational resources are become more scares while competition has profoundly

increased among organizations. Organizations are constantly looking to cut cost while becoming

more efficient. Organizations consider many options that include downsizing, outsourcing,

reorganization, and information’s systems to name just a few. In this paper, we are going to

explore how information systems can improve an organization and the cost and benefits of

implementing information systems technology. However, there are many types and sources of

information systems we could explore therefore we will be focusing on a specific topic within

information systems. In this paper, we will discuss the various applications of virtualization and

how they provide benefits that outweigh the limitations and risks associated with its use inside

and outside of an organization.

Literature Review/Investigation

So what exactly is meant by virtualization in information systems? When first hearing

the term, one might think about something that attempts emulate real life. Although this is not

exactly what the term means in information systems, it does have one thing right that

virtualization does attempt to emulate something. Virtualization is “Virtualizing the physical

resources of a computing system to achieve improved degrees of sharing and utilization”

according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008, p. 167). These physical

resources can include hardware, software, data systems, memory, network, storage, and

operating systems. Virtualization may sound like some foreign technology that only a few

people have used but virtualization has been around for about 25 years. In fact, most people

Page 4: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 4

have experienced virtualization with applications such as Google maps or automated lowest price

online shopping (Virtualization in Education, 2007).

Virtualization within organizations includes virtual computers, desktop virtualization, and

server virtualization. Virtual computers are use software to emulate an actually computer while

the hardware may include a large mainframe running many different software programs

(Virtualization in Education, 2007). This is different from the traditional personal computer

because many different operating systems and users can connect to the virtual computer where a

personal computer can only run one operating system for one user. Desktop virtualization is

similar to a virtual computer however, desktop virtualization puts the traditional computer

desktop on a server that can be accessed anywhere (Virtualization in Education, 2007). An

example of this is college information systems that allow students to log into their own desktop

anywhere on a campus computer. Finally, Server virtualization can create multiple servers on

one hardware device (Virtualization in Education, 2007). Instead of having multiple servers,

server virtualization creates a cost effective and simpler hardware set up of servers within an

organization.

Benefits and Challenges of Virtualization

Introduction

Virtualization within an organization’s information system provides many benefits but also

come with many challenges. Virtualization is an important part of the utilization of a system. It

can be used to re-think the way data centers operate as a whole or can simplify your sever

infrastructure. Server virtualization has three main general benefits that can be applied to almost

Page 5: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 5

any organization and the efficient utilization of their systems: consolidation, reliability, and

security.

Discussion

In many organizations, the task performed by servers for physical computers take up a lot

of computing power or space. The cost of running servers has not increased, but their power and

capabilities have. This creates a waste and low returns for organizations on the money invested

in servers. (Barrett & Kipper, 2010) Through consolidation, operating systems and their

workloads are combined and place in a proper order on shared servers with more than enough

available resources to satisfy user demand. This allows servers to run at a higher capacity than

typical 5-25% servers are utilized now. Giving organizations are large cost- benefit. This can

decrease the overall number of servers being used, saving storage space and computing

capabilities. Many organizations use many different types of operating systems, for instance

most companies use Windows 7 or one of Microsoft’s operating systems. Some organizations,

especially larger ones, will run several operating systems to fit their business needs.

Virtualization built on top of x86 architecture can host multiple environments of operating

systems. Multiple operating systems, like UNIX, Linux, or different versions of Windows, can

be consolidated on the same server with virtualization. (Barrett and Kipper, 2010)

Especially in today’s day and age, reliability has become a must have and major concern

for everyone. Organizations that are investing heavily in their server infrastructure have to make

sure company business applications remain online and uninterrupted. However, they are seeing

their costs to maintain these servers steadily rise. Virtualization technologies address this

situation by providing isolation between their virtual running machines. If there is a defect on

Page 6: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 6

one virtual machine, the other virtual machines remain unaffected, even if they are running on

identical severs. Virtualization allows the other virtual machines to continue running as if they

are unaware of the defect. Virtualization creates an environment where it seems as though each

application is running on its own server. This isolation though does not stop flexibility though,

imagine a situation where you have in an organization has three servers where one is running a

client/server application, one is running the batch processes to close out the day’s business and

one is running for data maintenance over the weekend. If three servers are sitting there un-used

it creates a waste and under usage of three very expensive pieces of equipment. Virtualization

allows you to streamline this whole process by a single logical physical partition or isolated

section to be allocated as needed. The part-time partitions allow IT in organizations to utilize

their servers full capabilities, running many of their main business processes in an efficient and

effective manner, minimize costs and maximize server capability. (Barrett & Kipper, 2010)

Security enhancement is another key benefit of virtualization. If a particular isolated

partition is compromised, or assume corrupt, It can be immediately isolated from the other

partitions. This prevents the problem from being extended further to other partitions. Such

measures can be taken to even remove the very resources that the partition relies on to function.

CPU cycles can be reduced, as well as network access and systems can be halted all together if

needed. Such security measures would be very difficult to perform on a physical server. (Barrett

& Kipper, 2010)

Server virtualization seems great and would be practical to almost any organization. It

does however come with challenges. Usually server settings are managed by a switch. IT

organizations can utilize the switch to monitor the traffic on the server. When an organization

Page 7: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 7

implements virtualization, management loses the capability to monitor what goes on between a

single server and a virtual machine. The main loss here is that while virtualization will provided

many necessary features, they lose the ability for the server and server traffic to be properly

watched and managed. (Taylor and Metzler, 2009)

Collapsing multiple severs or physical devices into software affect all the people and

processes supporting the data centers. Virtualization projects cross many separate, but inter-

related information technology departments of an organization. Many people in different

information technology departments like security, storage, networking, and servers will have to

work cross functionally to achieve the objectives of a project. Depending on the size of the

organization, this could have a large effect on IT organizational structures and responsibilities.

(Huff, 1999)

Beginning a virtualization project takes a large financial commitment. Getting executive

backing on the financial undertaking of setting up virtualization can prove very difficult,

especially since most organizational executives are not technology savvy. The executives must

see the potential costs savings upon completion and show there unequivocal support for the

project, particularly the CEO. It is critical that the entire organization understands the

advantages of and buys-in to the project. (Huff, 1999)

Analysis

Virtualization is an interesting and limitless way to streamline data, reduce costs, increase

speed, enhance security, and relate quality information. These benefits though do come with

inherent risk and challenges though of: data management, people management, cost benefits of

Page 8: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 8

implementations, and executive buy in. Weighing these benefits versus challenges will depend

solely on the size or the organization, adequacy of current information systems, knowledge of IT

employees and organizational initiatives.

Types of Virtualization

Introduction

There are several types of virtualization in information technology today. The most

commonly referred to one is server technology. Many people think of virtualization in this way,

it is described as the separating of a computer resource into multiple entities. In fact, though it

can do just the opposite as well. Storage, network and application virtualization are used to

present multiple entities in a single virtual entity. (Dittner & Rule, 2007)

Discussion

Server virtualization is the most common in information technology today. Server

virtualization implementations are present for all CPU platforms and architectures, the most

popular being x86 and IA-32. There are four types of server virtualization: full virtualization,

paravirtualization, operating systems virtualization and native virtualization. Full virtualization

is when every form of software that can be run on a server, can be run on a virtual machine.

(Dittner & Rule, 2007) In paravirtualization, the operating system is reconfigured before being

installed on to a virtual machine. This interface between the operating system and the virtual

machine will differ a bit from the underlying hardware. This lowers overhead costs and

enhances the systems performance that might have been under worked in full virtualization.

(Techtarget.whatis.com, 2011) Operating systems virtualization is type of server virtualization

Page 9: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 9

technology, which works at the operating system layer. The server and the operating system are

virtualized into multiple partitions, where each partition is replicating an actual server.

Operating systems virtualizations tend be quicker or at native speed, they do support all

operating systems function that the server can. (Dittner & Rule, 2007) Native virtualization is

the newest type of server virtualization on the x 86 architecture set-ups. Native virtualization or

hybrid virtualization is a mix of full virtualization and paravirtualization with input/ output

accelerated techniques. Like full virtualization, operating systems can be installed without

configuration or modification. Native virtualization also has the highest CPU memory and

input/output performance of all the x86 virtual machines (Dittner & Rule, 2007).

Storage virtualization provides high performance storage systems for users. In the

simplest form, storage virtualization is a combining of physical disks drives in to a single unit

that exists on a server and operating system. The adoption of storage area networks or SAN has

taken the components of storage virtualization a bit further. Now, without changing any

operating system code, organizations can share storage between multiple servers, even though

each server acts like it has its own dedicated storage. (Dittner & Rule, 2007).

Similar to storage virtualization, companies producing network hardware have been

around the virtualization business for some time, although they are not always recognized as a

form of virtualization. The three main types of network virtualization are Virtual LAN (VLAN),

Virtual IP (VIP), and Virtual Private Network (VPN). VLAN is a is a group of virtual hosts,

regardless of actual physical site, that communicate as if they are connected to the same

broadcast domain. A VLAN have the same characteristics as a (LAN), but are created to provide

separation services that are usually provided by routers. VIP is a virtual address not connected to

Page 10: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 10

a specific computer or network interface card. They are commonly used to replace connection

redundancy. VPN is a private network used to communicate in confidentiality over a public

network. It is commonly used by organizations to allow employees to remote into their

organization’s network via the internet from anywhere a connection can be established. (Dittner

& Rule, 2007)

Application virtualization, commonly referred to as software virtualization, is a newbie in

the virtualization world. Application virtualization is a new way of managing software. It can

remove application conflicts, reduce rollouts of applications, and run multiple types of an

application. Instead of using traditional methods of software package installation procedures,

application virtualization separates the relationship between applications, operating systems, and

servers to place applications and data via virtual software packages. (Dittner & Rule, 2007)

Analysis

Server virtualization is a very powerful tool that can lower costs, reduce server capacity, and

enhance the sharing of information from multiple systems. However, there are other

virtualizations methods that can be used and have just as large of an impact for an organization.

When implemented by an organization, they must first choose the type that will be the most

efficient and effective for their organization. If properly implemented and utilized by an

organization the benefits could be monumental.

Synthesis

Virtual Machine in More Detail

Page 11: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 11

Probably the most common and widely used forms of virtualization are virtual machines, also

known as VM. VM is a program that creates a software environment that runs inside, but

separately from the current operating system and uses the same resources. (Virtual Machines

and VMWare, Part 1, 2011) This allows for testing of applications without losing the primary

operating system if something goes wrong, as well as protection from external threats like

viruses. Since the VM is its own file, any corruption that may occur is only to that file and

cannot go outside of it. It can also allow multiple programs on different platforms to run

concurrently on the same physical machine.

There are three main uses for VM. The simplest one is to run a second operating system from

within the current one. For example, you have a Windows 95 program that will not run on

Windows 7. By using VM, you can run Windows 95, load up the program all while still within

Windows 7. The second usage is to actually boot from the VM and run Windows 95 this way.

In doing this, the actual operating system is isolated from the VM OS, as everything that goes in

is contained in a single VM file. This is an optimal use for testing programs on multiple

platforms, or testing in an unsecured environment. The third use is on servers. By running

multiple instances of VM, one server can actually do the job of several and all the virtual

resources are available for each of the dedicated server applications needing to be run even if

they run simultaneously. (The Different Types of Virtualization, 2011)

It is easy to see where this type of virtualization can come in handy, especially for

programmers and IT professionals. Testing software can easily be done on a test server under

multiple platforms without disrupting the workings of the server. Another benefit is backup and

recovery. Since the VM file is one file, it can be saved to a flash drive, copied to another

Page 12: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 12

machine, and transferred there thus minimizing the amount of time involved in implementation.

A corrupt file can be easily deleted and recovered via snapshot, or the entire file recreated

relatively simply without having to wipe the entire machine and starting over.

The thing to remember is that virtual servers are just that, virtual. Therefore, security settings

on the host machine have nothing to do with the virtual machines. For example, the database

administrator has security access to the physical server, but would have to have an addition

password to be able to access each and any virtual servers that run on the physical machine.

One of the other benefits to using VM is that the old way of doing things required that each

major application required its own server. Email was handled by one server. Accounting and

billing software on another server. Corporate Intranet is handled by another server. Supply

chain management and logistics are handled on another server, etc. Doing things the old way

required four servers, and lots of infrastructure to keep them running, cool, and operating at peak

efficiency, while the entire time each server was only operating at ten percent capacity (for

example).

This is where the use of VM can come in extremely handy. All four servers’ programs could

be consolidated and run on one physical server without loss of functionality and speed. The

systems could communicate within their respected VM environment, and once configured

properly, between themselves and use less bandwidth. The host operating system would

recognize virtual network cards between each of the virtual servers and communications between

them would be transparent and actually faster since there is no need for the information to travel

across physical networks. Virtual Machines and VMWare, Part 1, 2011)

Page 13: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 13

Ultimately, the consolidation onto one physical server from four makes perfect sense. It

saves time and money involved in maintaining multiple physical systems, electricity costs of

running and cooling the equipment, and actually lowers infrastructure bandwidth, ultimately

making the existing network a little faster. All the while, this still allows total access to all

applications by those that are set up securely to use them. The only limitations are the hardware

and infrastructure needed to handle the load. An increase in server memory, processing speed,

hard drive size, or Ethernet speed may be required, but these upgrades are usually cheaply

implemented as opposed to the purchase of another entire server. (Oracle VM VirtualBox, 2011)

An additional benefit to using virtual machines is the snapshot function that was mentioned

earlier. A snapshot is essentially a backup of the existing contents on the server. In the event

there is a hardware failure or corruption, the contents of the virtual server are preserved and can

be brought back to the previous state whenever needed. This saves time and money in the long

run. Anyone who has ever installed a new operating system knows it takes a long time to install

one from a cd, then all the drivers have to be installed, then all the applications need installed,

and finally user specific configurations have to be made. With these snapshots, the virtual server

can be migrated to another machine with the current configurations intact. In the case of a

hardware failure on the physical machine, the time saved in restoring from a snapshot are

significantly less, and the snapshot can be restored to any machine that has the resources

available to run the VM. (VMware, 2011)

In conclusion, VM technology is one of the most popular and best known uses of

virtualization today. The main benefits of VM are they allow any machine to run any operating

system as long as the processor and memory requirements are met, and there is enough free hard

Page 14: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 14

drive space for the applications to be run. Server migrations take significantly less time and

money when using VM as opposed to traditional methods migrating from one physical server to

another. Backups are easily restored from snapshots and can be transferred simply and quickly

to any machine that fulfills the usage requirements. VM allows for consolidation of programs

that have to run on different servers onto one physical server, thus saving more time and money,

while still keeping security in place for the individual programs.

Cloud Computing

When one thinks about virtualization outside of an organization’s information system

infrastructure, a likely candidate would be cloud computing. Now one might want to include a

definition of cloud computing to further elaborate on what it stands for. Multiple journal articles

stated that there was no common standard or definition for cloud computing (Sultan, 2011). One

group of authors mentioned that there are as many definitions as there are commentators on the

subject of cloud computing. Along with that statement, they pointed out that the National

Institute of Standards and Technology (NIST) definition is nearly 800 words long (Marston, Li,

Bandyopadhyay, Zhang, Ghalsasi, 2011). One of the better definitions or descriptions was

referring to more on what cloud computing does and less on what it is.

“The promise of cloud computing is to deliver all the functionality of existing information

technology services (and in fact enable new functionalities that are hitherto infeasible) even as it

dramatically reduces the upfront costs of computing that deter many organizations from

deploying many cutting edge IT services (Marston et al., 2011).”

Page 15: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 15

Two forces or trends in the information system community have pushed cloud computing to

the forefront and made it a technology that has garnered the attention of an industry (Marston et

al., 2011). IT efficiency has increased the use of virtualization inside an organization; it has also

increased its likely use outside of an organization. With the move towards maximizing the

utilization of computing resources, cloud computing has seen the scalable use of hardware and

software resources that allow for more efficient management of computing power (Marston et

al., 2011).

Another trend in the IS world is business agility. Cloud computing has become a competitive

tool allowing organizations to participate at greater levels with less investment. It acts as a

competitive tool through rapid deployment, parallel batch processing, and the use of information

in real time (Marston et al., 2011). The cloud has given companies additional capabilities of

adjusting quickly and scaling their resources to match a changing economy. Companies that use

the cloud, are not limited to physical hardware and do not have to invest additional capital to

increase computational power. The cloud acts as a service (Lillard, Garrison, Schiller, Steele,

2010) and can be scaled or decreased to meet the changing requirements of a company.

Collective intelligence is also a key benefit or element to the cloud. Cloud applications have

the ability to know the current activities of a community and use that knowledge to make it

better. Amazon uses this feature to introduce books that people may find interesting based on

other people shopping within its website. While many cloud applications and services do not

currently focus on using collective intelligence, there will be likely a trend towards its use

(Lillard et al., 2010).

Page 16: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 16

Cloud computing has become an established commodity in today’s business environment. A

research group expects cloud computing to be a $150 billion business by 2014 and according to

another group, $100 billion will be spent by small and medium businesses during the same year

(Marston et al., 2011). With increased use of the cloud, there will be greater number of

innovations and changes to information systems. There will be fewer costs, space requirements

and less of an investment in infrastructure to operate a business. A company will not be limited

to a physical location; they could access their cloud resources anywhere in the world (Barnett &

Kipper, 2010).

Information technology changes at a quick place. It seems that there are always additional

costs from ordering updates to software or a need to upgrade an OS. In the current economic

times, cloud computing does address more than a few financial concerns (Sultan 2011). A big

advantage to operating in a cloud is that it lowers the costs of a company to enter a market.

Cloud computing is a service that can scale depending on the need. Many businesses have peak

times or high volume sales that happen only a few times per year. When additional resources are

not needed, they can be scaled down and the company will not have to pay for unused resources

(Marston et al., 2011).

Many small and medium businesses have already moved to the cloud and more will follow.

Companies have shown that they can compete in business and succeed with the use of cloud.

Startups like Facebook, YouTube, Tripit, and Mint were all able to succeed because cloud

computing promotes innovation while decreasing the cost for computational resources (Marston

et al., 2011).

Page 17: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 17

The small and medium enterprises or businesses will likely find the transition to the cloud

easier and more common then large enterprises. There are a number of reasons why a large

enterprise should not move to the cloud as of yet. One of the more easy reasons is that they may

not find it to be not cost-effective. The size that larger enterprises operate their information

systems resources and data centers could result is significantly lower costs compared to the use

of a cloud (Marston et al., 2011).

There are also security and legal concerns with using the cloud for enterprise activities. A

few of these concerns are network availability, business continuity, security incidents, and the

lost of physical control (Marston et al., 2011). Network availability is just that, is the network

available. If a company has no access to any of their data because it is stored in cloud offsite, it

is no better than if they close their doors. They will be unable to do business until the network

becomes available again.

Business continuity is very important to large enterprises. Companies need assurance that the

operations are protected and will remain functional during a disaster. Many companies demand

service level agreements with uptimes greater than 99.95% and many cloud providers do not

offer such agreements (Marston et al., 2011). Many cloud providers also lack the resources to

provide for the need support during the investigation of a security incident (Winkler, 2011). The

cloud provider may also lack additional resources that are required for the performing of an audit

or the protection of the chain of evidence may be required to meet regulations for enterprises to

operate in a given county (Winkler, 2011).

The last item mentioned was the lack of control over a company’s data (Winkler, 2011).

There are many companies that do not want to give up control over a company asset, but there

Page 18: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 18

are also ones that are required by law to keep control over their data. The European Union data

regulation states that a company is required to know and guarantee that their data is located on a

specified set of servers. With cloud computing, a company’s data could be placed among many

computers that are all members of a gird network (Marston et al., 2011).

Large enterprises do see the benefits to using cloud computing and a few have worked out

solutions to many of their issues with using a cloud. IBM built their own private cloud to

achieve the benefits of cloud computing. IBM created “Blue Cloud” project to address their

concerns over security and legal liability. Private clouds are a growing trend in cloud computing

(Barnett & Kipper, 2010).

The Future of Virtualization

In the future, visualization will play a more vital role in information systems as the

technologies increases and new ways of using virtualization are developed. Virtualization in the

future will include hardware Hypervisors, anti-forensics, mobile visualization, and autonomic

computing according to Coates, Jarrat (1989), and Stokes (2009). Hardware hypervisors are the

virtualization of hardware components opposed to software. The basic idea behind hardware

hypervisors is that right now most virtualization within hardware is done by some specific

software application. Therefore, only the programs that have virtualization software included in

the program or operating system can be virtualized and some software can only run on certain

hardware. Therefore hardware hypervisors will allow the actual hardware the have virtualization

built into its motherboard allowing more programs and compatibility and the ability to boot any

operating system. In essence, moving hypervisor from strictly software applications to the

Page 19: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 19

physical hardware could potentially improve performance, security, and open up more

virtualization options (Coates, Jarrat (1989), and Stokes (2009)).

The next part of virtualization in the future is anti-forensics or an attempt to eliminate

evidence to improve privacy and security (Coates, Jarrat (1989), and Stokes (2009)).

Virtualization will enable anti-forensics since the applications will be considered throwaway and

wiped from the systems according to Coates, Jarrat (1989), and Stokes (2009). Therefore, data

from virtualization will not be used as forensic evidence since it will no longer exist.

Virtualization will also affect mobile devices such as cell phones and tablet devices as they

increase in popularity in the future. One application of this is being able to choose which

operating software you want on your phone. For instance, you might buy a Samsung phone but

then be able to choose a windows operating software, blackberry or android when the phone

starts up states Coates, Jarrat (1989), and Stokes (2009). In addition to more options, the mobile

device would be able to run multiple virtual machines, which would decrease the processing

power need to run the mobile device making it more efficient. Therefore, what once took three

processors to operate would only require two, which would free up space and increase battery

life. In addition, running virtual software on mobile devices will allow employers to issue one

device that run the organizations virtual software and then be able to run the employees personal

software. This would aide in convergence of mobile devices since most employees have a

dedicated mobile device for work and have to carry a personal cell phone (Coates, Jarrat (1989),

and Stokes (2009)).

Autonomic Computing

Page 20: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 20

Finally, as cloud computing becomes more popular and more complex, organizations will

have to find a way to organize the cloud according to Kharif (2008). One solution explained by

Kharif (2008) is called autonomic computing or systems that will be able to regulate themselves

like an autonomic nervous system. In addition, this functionality will allow computers to heal

themselves and decrease human Maintenance time on these systems. Since this technology is,

still years away it is not exactly clear how autonomic computing will work or how it will be

implemented (Kharif, 2008). However according to IBM as systems become increasing complex

humans will no longer be able to managing these systems and a new form of computing will

have to be implemented to control these systems. Although it is not clear, exactly what extent

autonomic computing will have on information systems it will likely take place in servers,

storage, software, and virtualization (Kharif 2008).

Disaster Relief/ Planning

Virtualization has many uses as we have already discusses. However, one the most

important uses of virtualization may be in the used of server virtualization for disaster

preparedness. As organizations begin to rely more on information systems in their daily business

they must be prepared for unexpected outages in their information systems. Traditionally

implementing disaster preparedness was a costly business since purchasing backup hardware was

the most popular solution. However, virtualization has enable organizations to run multiple

servers on one hardware platform and has enable organizations to outsource their virtual systems

to another server in the case of a disaster according to Pregmon (2008). This would still enable a

company to operate if something happened to their physical server or system

Page 21: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 21

Business Continuity will play a major role when planning and using virtualization.

Planning for all the different aspects of business continuity from system failures to site disasters

could and likely will benefit for virtualization (Olzak, T., Boomer, J., Keefer, R., Sabovik, J.

2010). Virtualization simplifies backup and recovery. Standard practice for backup and

recovery is to perform a file level backup. All the important files and those needed to recover a

system will be part of a backup (Hoopes 2009). The recovery of a file level backup could still be

dependent on hardware and may require rebuilding an operating system to work on replacement

or new hardware (Olzak, T., et al. 2010).

Virtualization adds another level of backup, the system itself can be part of the backup.

Virtualized systems are not hardware dependent; they are a series of files that contain the

configuration and settings of the virtual hardware. This adds incredible flexibility and portability

to virtual systems (Hoopes, 2009). Virtualization breaks the dependency that physical hardware

has on restoring systems. System can be moved from one virtual hosting server to another with

little to no downtime, which adds greater portability and quicker recovery (Olazk, T., et al.

2010).

Conclusion

Virtualization is not an answer for every system and process within an organization

(Olazk, T., et al. 2010). An organization should consider it and see if the benefits outweigh the

costs and risks. There are many types of virtualizations and just as many ways of using those

types inside and outside of an organization. Virtualization has given greater capabilities to

companies that have not been able to complete against larger companies who have greater

resources. Companies may find that they need to move to virtualization to remain completive

Page 22: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 22

and deal with new players in a fast changing market. Other companies may find that to meet

their business needs ranging from reducing operational costs of computing to disaster recovery

will find that virtualization may be required to meet those needs.

Many companies ranging from the small to the very large could and will find varying

uses for virtualization. Each company will have to decide on how to apply virtualization to their

business model. Virtualization has changed and will continue to change how information

technology supports, improves, and directs business operations.

Page 23: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 23

References

Barrett, D., Kipper, G. (2010) Visions of the Future: Virtualization and Cloud Computing,

Virtualization and Forensics. Boston: Syngress.

Barrett, D., & Kipper, G. (2010). An Introduction to Virtualization. In Virtualization and

Forensics. Burlington: Elseviser, Inc. Retrieved July 15, 2011 from ScienceDirect

Coates, J., & Jarrat, J. (1989). What futurists believe. Mt. Airy, MD: Lomond

Publication,Inc. Retrieved from EBSCOhost.

Dittner, R., & Rule, D. (2007). An Introduction to Virtualization. In The Best Damn Server

Virtualization Book Period. Burlington: Elseviser, Inc. Retrieved July 21, 2011 from

ScienceDirect

Greaves Group. (n.d.). Virtualization in Education. IBM Global Education White Paper.

Retrieved July 21, 2011, from http://www-

07.ibm.com/solutions/in/education/download/Virtualization%20in%20Educati

Halsey, Mike.(2011) “ The Different Types of Virtualization.” Ghacks.net. Retrieved July 22,

2011 from http://www.ghacks.net/2011/06/30/the-different-types-of-virtualisation/.

Hoopes, J. (2009). Virtualization for security: including sandboxing, disaster recovery, high

availability, forensic analysis, and honeypotting. Boston: Syngress.

Jmunro. (2011) “Virtual Machines and VMware, part 1.” Extremetech.com. Retrieved on July

22, 2011 from http://www.extremetech.com/computing/72186-virtual-machines-vmware-

part-i/2.

Page 24: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 24

Kharif, O. (2008, April 9). Virtualization goes mobile. BusinessWeek Online. Retrieved from

EBSCOhost.

Lillard, T., Garrison, C., Schiller, C., Steele, J.(2010) The Future of Cloud Computing, Digital

Forensics for Network, Internet, and Cloud Computing. Boston: Syngress.

Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A. (2011) Cloud computing -- The

business perspective, Decision Support Systems, Volume 51, Issue 1, Pages 176-189.

Neiger, G., Santoni, A., Leung, F., Rodgers, D., & Uhlig, R. (2006). Intel Virtualization

Technology: Hardware Support for Efficient Processor Virtualization.. Intel Technology

Journal, 10(6), 167-177

Network World. (2009.) The challenges of virtualization? Retrieved July 21, 2011.

http://www.networkworld.com/newsletters/2009/042009wan2.html

Olzak, T., Boomer, J., Sabovik, J., Keefer, R. (2010). Microsoft virtualization: master microsoft

server, desktop, application, and presentation virtualization. Boston: Syngress.

Pregmon, M. (2008). IT Disaster Recovery: Are You Prepared and Ready?. Journal of the

Quality Assurance Institute, 22(1), 26-27. Retrieved from EBSCOhost.

Stokes, J. (2009, May 6). The future of virtualization: a view from the front lines. Ars

technica. Retrieved from EBSCOhost.

Sultan, N.(2011) Reaching for the 'cloud': How SMEs can manage, International Journal of

Information Management, Volume 31, Issue 3, Pages 272-278.

Page 25: Virtualization Joshua Ferrill Erik Lindwall Jared Lively ...blogs.uis.edu/mweiss/files/2011/07/Virtualization.pdf · according to Neiger, Santoni, Leung, Rodgers and, Uhlig (2008,

Virtualization 25

Tech target provides basic definition of information technology topics and references

(http://www.techtarget.whatis.com )

“VM Oracle VirtualBox.” (2011) Virtualbox.org. Retrieved July 22, 2011 from

http://www.virtualbox.org/manual/ch01.html.

Winkler, V. (2011) Security Concerns, Risk Issues, and Legal Aspects, Securing the Cloud.

Boston: Syngress.

“Why Virtualize?.”(2011) Vmware.com. Retrieved July 22, 2011 from

http://www.vmware.com/virtualization/why-virtualize.html.