More Subjects
Discussion
The three big hypervisor options include security, support and features. Security remains an important concern because it ensures that software is capable of enabling virtualization. Security limits the likelihood of attacks and keeps the system updated. Local system attacks are prevented that leads to the sustainability of the system. The single server has downsides because security has become a significant concern. Virtual machine or the software monitors the accessibility and control. The attacker can gain access easily if the software has not adopted adequate security parameters. a secure administration policy and standards help in mitigating the risks of security by restricting access to unauthorized persons. Various monitoring and security tools are used that enhance security by detecting the attacks and unauthorized users. Firewalls are commonly used tools for maintaining security CITATION Bha11 \l 1033 (Tholeti, 2011).
The prominent features of hypervisor include the performance of the virtual machine, improvements in IT resources of the company such as dynamic allocation of virtual resources. Consolidation is used for the reduction of the hardware cost. Flexibility and responsiveness are additional features of hypervisor that makes it ideal for virtualization. Flexible substitutes are created in virtualization that offers functions and external interfaces. Virtualization is applicable to physical hardware by combining multiple resources in the form of shared pools that users receive in the form of virtual resources. A single physical logical system is created that improves the overall efficiency of the company CITATION Joh18 \l 1033 (Barrowclough & Asif, 2018).
Hypervisor support for virtual machines improves performance and efficiency in the data centre. Linux is used as a support service for enhancing the overall performance and the capacity of the physical resources. Different hypervisor management components contribute to the overall efficiency. Architectural support is provided by a hypervisor that increased data storage capacity CITATION Sze11 \l 1033 (Szefer & Lee, 2011).
References
Barrowclough, J. P., & Asif, R. (2018). Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks.
Szefer, J., & Lee, R. B. (2011). Architectural support for hypervisor-secure virtualization. ACM.
Tholeti, B. P. (2011). Learn about hypervisors, system virtualization, and how it works in a cloud environment. Retrieved 06 01, 2019, from https://developer.ibm.com/articles/cl-hypervisorcompare/
More Subjects
Join our mailing list
© All Rights Reserved 2023