Virtualization is a little bit like creating something out of nothing. In the IT world it is related to hardare, operating system or network infrastructure. It is one of methods to split and make to cooperate diffrent elements. Thsi term is applicable to hardware and software solutions and allows to separate resources and their clients from each other.
Virtualization allows for example to separate hardware from OS, two operation systems from each other or applications from data. It can be called as a some kind of fraud, which allows to ‘explain’ to your OS that it works in totally diffrent environment. This way you can separate operating system from the hardware where it was installed. You can virtualize computer, it parts i.e RAM, graphics, applications. Thanks to that any given envirornment have more memory, there can be more than one operating systems run on the computer or diffrent language versions of the same program. It is possible to virtualize single station, server or even whole IT systems.
The criteria of effectiveness of virtual machines where formulated in th eighties. According to these rules software working on virtual machine must be working in the same way as on real computer. Virtual machine must also control whole virtualized resources and most of the instructions should be executed without machine.
There are diffrent types of storage virtualization but the most common one is called hardware virtualization. It is about creating virtual machien, which fakes complete computer system and separates virtual machines from the hardware they are run on. It always one to install and run in the same time many diffrent OS in another system. One step further is desktop virtualization which separates user’s desktop from the machine. Computer with hypervisor managing all virtual machines becomes therefore server and users using virtual systems connect to it through the network or other tools. Thanks to thaat it is easier to manage multiple operating systems and from users perspective, the one is allowed to get access to the machine from diffrent locations. This solution gives also graeater flexibility computing power.
End of part 1