Service Virtualization Removing Constraints to Modern

Author: Shridhar Mittal
CEO and President, iTKO Inc.
Realizing Virtualization's Full Potential Most large organizations are in the process of adopting hardware virtualization approaches during the development of their enterprise applications. Virtualization is being used today by many IT organizations seeking to reduce their costs and improve overall agility. There are different types of virtualization available, the most familiar being the practice of simulating the behavior of a physical IT asset in a software emulator and hosting that emulator in a virtual environment. This type of hardware virtualization can help companies better manage their physical resources, improve their utilization, and increase business agility by removing physical constraints regarding resource access, capacity, and data volatility.

Realizing Virtualization's Full Potential
Most large organizations are in the process of adopting hardware virtualization approaches during the development of their enterprise applications. Most often, the key driver is to improve utilization of physical server capacity. However, hardware virtualization is not appropriate or feasible in all circumstances.

What if we could also apply the benefits of virtualization to other areas where enterprises may spend 60 percent or more of an enterprise IT budget, such as the extensive development and delivery costs of these applications? Many remaining critical challenges can be resolved with the complementary use of Service Virtualization, which leads to substantial additional benefits and improved ROI.

Service virtualization (SV) involves the simulation of software service behavior and the modeling of a virtual service to stand in for the actual service during development and testing. Service virtualization is complementary to hardware virtualization, and provides a solution to address each of the aforementioned hardware virtualization limitations such as:

* Providing 24/7 access to the service to support more concurrent development efforts
* Removing system dependency constraints so that you can test components and complex systems earlier and more often
* Simplifying test data management across distributed systems
* Reducing or eliminating the cost of invoking third party systems for non-production use

Service virtualization entails capturing the behavior, performance, and data associated with the target system to facilitate the efficient development and testing of complex, distributed applications. The opportunities presented by SV offer significant breakthroughs in productivity and agility for the entire enterprise application development and deployment lifecycle.

Limitations of Hardware Virtualization

* Systems that can't be imaged on a hypervisor: Mainframes, externally hosted partner services, SaaS, and cloud based applications are all examples of systems that could definitely benefit from virtualization, but often cannot leverage hardware virtualization. In many cases, these assets are the most mission critical and the most costly to provide access and capacity.

* Total cost of ownership is far more than hardware: Where hardware virtualization is possible, it clearly reduces the hardware acquisition cost, but that is usually just a fraction of the total cost of ownership. The majority of the costs comprise of the IT labor overhead of maintaining the server images, software configurations (especially when publishing changes to them), installs, patches, and licensing costs.

* Hardware virtualization is not always appropriate: A clear example of this is when we are considering the performance management lab. You might deploy hardware virtualization in the performance lab, but the basic assumption of underutilized capacity is inherently false when you are driving thousands of transactions into a VM.

Service virtualization can offer a solution to these shortcomings. With SV, we take real multi-tier, distributed software architectures, capture their behavior, and bring them into a virtual environment so that we can interact with them freely without real world constraints. You can control their behavior, their capacity, their access, and also control them in the ways completely unrelated to what the real world would impose.

Example before Service Virtualization

Let's assume that we have multiple teams that need to develop, integrate, and test against an existing application with 3 downstream dependencies (starting from the bottom up):

Access to a mainframe: There are dozens of project teams, and each needs access to the mainframe. Yet these teams receive very limited access, and often during timeslots that do not align to their project plan. Team leaders will exclaim, 'I can't build or test my application without access to a mainframe, and yet, I barely ever get access'. This is a persistent problem that introduces risk, unacceptable delays, lost productivity, and added cost.

Access to a database: One team owns a database that is accessed by others. This database is currently accessible in a development lab, but multiple test teams need to access the data, and they conflict with each other and invalidate the test results.

Access to the Web service: A required web service doesn’t exist yet, it is under development. The team has a scope and a due date, but is missing a key dependency.

All of the above are examples of very real world constraints - and there are many more. Let’s now apply SV to capture these IT assets as virtual services and bring them into a virtual modeling environment where each team can eliminate these physical constraints and redefine them on their terms.

After Applying Service Virtualization
Let’s look at the same environment with three downstream dependencies after applying SV techniques (starting from the bottom up):

Resolved mainframe access issues: While the mainframe is accessible, SV involves capturing the traffic between the application and the mainframe, analyzing the way that system responds in, and building a sophisticated, dynamic model of that behavior which is then hosted as a virtual service that is accessible 24/7 in a virtual service environment.

Captured test data: We need more than just database access to have stable, relevant data for testing. We need the ability to make changes to the database rapidly without impacting other teams. SV allows you to recapture up to 50-60 percent of productive time on the database by modifying its behavior in an unconstrained virtual world, as opposed to the physical world.

Modeled Service under development: Using software, we can construct a model for that Web service from a WSDL, XML samples, or other artifacts, so that the teams can go productive much more rapidly as opposed to waiting for that contract to be signed, and then waiting for someone to build and deliver the Web service.

A significant last benefit of this approach is that it requires no third party access fees or costs for accessing pay-per-use or pay-for-volume types of services used in the software development lifecycle.


Organizations involved in the development and delivery of complex, modern applications should consider the benefits afforded by service virtualization. Service virtualization allows development and testing teams access an ever-increasing number of dependent services and systems of record that are not readily available. It is a strategy for letting teams take the principles of virtualization beyond the data center and simulate more distributed, complex environments where significant value can be realized.
Previous  article
Write your comment now

Email    Password: 
Don't have SiliconIndia account? Sign up    Forgot your password? Reset
Reader's comments(2)
1: From: Mrs. Mary David

This mail may be a surprise to you because you did not give me the permission to do so and neither do you know me but before I tell you about myself I want you to please forgive me for sending this mail without your permission. I am writing this letter in confidence believing that if it is the will of God for you to help me and my family, God almighty will bless and reward you abundantly. I need an honest and trust worthy person like you to entrust this huge transfer project unto.

My name is Mrs. Mary David, The Branch Manager of a Financial Institution. I am a Ghanaian married with 3 kids. I am writing to solicit your assistance in the transfer of US$7,500,000.00 Dollars. This fund is the excess of what my branch in which I am the manager made as profit last year (i.e. 2010 financial year). I have already submitted an annual report for that year to my head office in Accra-Ghana as I have watched with keen interest as they will never know of this excess. I have since, placed this amount of US$7,500,000.00 Dollars on an Escrow Coded account without a beneficiary (Anonymous) to avoid trace.

As an officer of the bank, I cannot be directly connected to this money thus I am impelled to request for your assistance to receive this money into your bank account on my behalf. I agree that 40% of this money will be for you as a foreign partner, in respect to the provision of a foreign account, and 60% would be for me. I do need to stress that there are practically no risk involved in this. It's going to be a bank-to-bank transfer. All I need from you is to stand as the original depositor of this fund so that the fund can be transferred to your account.

If you accept this offer, I will appreciate your timely response to me. This is why and only reason why I contacted you, I am willing to go into partnership investment with you owing to your wealth of experience, So please if you are interested to assist on this venture kindly contact me back for a brief discussion on how to proceed.

All correspondence must be via my private E-mail ( for obvious security reasons.

Best regards,
Mrs. Mary David.
Posted by: mary lovely david - Monday 26th, September 2011
2: Hi my dear,
My name is Mounace, i would like to establish a true relationship with you in one love. please send email to me at ( i will reply to you with my picture and tell you more about myself. thanks and remain blessed for me,
Your new friend Mounace
Posted by: mounace love love - Thursday 09th, June 2011
More articles
by Kaushal Mehta - Founder & CEO, Motif Inc..
The retail industry is witnessing an increased migration of customers from traditional brick and mortar retail to E-commerce (online retail)...more>>
by Samir Shah - CEO, Zephyr .
You probably do because you are on the phone with them! For all of you working in some technical management capacity here in Silicon Valley,...more>>
by Raj Karamchedu - Chief Operating Officer, Legend Silicon .
These days are a mixed bag for me. Of late I have been considering "doing something bigger and better," in my life, perhaps seriously though...more>>
by Madhavi Vuppalapati - CEO of Prithvi Information Solutions .
IT Services Rise of Tier II companies The Indian IT outsourcing industry is going through very exciting phase in its business life...more>>
by Bhaskar Bakthavatsalu- Country Manager, India and SAARC of Check Point Software Technologies.
Data loss occurs every day through corporate email. In fact, given the sheer number of emails an organization sends every day, data loss inc...more>>