SlideShare a Scribd company logo
1 of 7
Download to read offline
Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications
                         (IJERA)ISSN: 2248-9622www.ijera.com
                   Vol. 2, Issue5, September- October 2012, pp.764-770
   Survey Paper On Different Virtualization TechnologyWith Its
             Merits And Demerits On Organization
                                      Mr. Milind Ramesh Kolte
                                  M.Sc. Computer Application (Semester –III)
                                Shree Ramkrishna Instituteof Computer Education
                                & Applied Sciences, Surat-395009.Gujarat, India.


                      Abstract
         A Virtualized System includes a new layer         The application is installed and runs directly on the
of software, the virtual machine monitor. The              OS, which in turn runs directly on the computer’s
VMM's principal role is to arbitrate accesses to           hardware. The application’s user interface is
the underlying physical host platform's resources          presented via a display that’s directly attached to this
so that multiple operating systems (which are              machine. This simple scenario is familiar to anybody
guests of the Virtual Machine Monitor) can share           who’s ever used Windows.
them. The VMM presents to each guest OS a set of
virtual platform interfaces that constitute a virtual
machine (VM). Once confined to specialized,
proprietary, high-end server and mainframe
systems, virtualization is now becoming more
broadly available and is supported in off-the-shelf
systems based on Intel architecture (IA)
hardware. Virtualization technology provides
hardware support for processor virtualization,                                Operating
enabling simplifications of virtual machine
monitor software. Resulting VMMs can support a
                                                                              System
                                                                              Hardware
wider range of legacy and future operating
systems while maintaining high performance.

Keywords        – Virtualization,       VMM,      Intel             Physical Machine                Application
Architecture, legacy OS
                                                             Figure – 1: A System without virtualization
                  I. INTRODUCTION
          Virtualization is one of the hottest trends in             But it’s not the only choice. In fact, it’s often
information technology today. This is no accident.         not the best choice. Rather than locking these various
While a variety of technologies fall under the             parts together—the operating system to the hardware,
virtualization umbrella, all of them are changing the      the application to the operating system, and the user
IT world in significant ways.                              interface to the local machine—it’s possible to loosen
          Virtualization is software technology which      the direct reliance these parts have on each other.
uses a physical resource such as a server and divides it             Doing this means virtualizing aspects of this
up into virtual resources called virtual machines          environment, something that can be done in various
(VM's). Virtualization allows users to consolidate         ways. The operating system can be decoupled from
physical resources, simplify deployment and                the physical hardware it runs on using hardware
administration, and reduce power and cooling               virtualization, for example, while application
requirements. While virtualization technology is most      virtualization allows an analogous decoupling
popular in the server world, virtualization technology     between the operating system and the applications
is also being used in data storage such as Storage Area    that use it. Similarly, presentation virtualization
Networks, and inside of operating systems such as          allows separating an application’s user interface from
Hyper-V (Hypervisor).                                      the physical machine the application runs on. All of
                                                           these approaches to virtualization help make the links
    II. UNDERSTANDING VERTUALIZATION                       between components less rigid. This lets hardware
         To understand modern virtualization               and software be used in more diverse ways, and it
technologies, think first about a system without them.     also makes both easier to change. Given that most IT
Imagine, for example, an application such as               professionals spend most of their time working with
Microsoft Word running on a standalone desktop             what’s already installed rather than rolling out new
computer.                                                  deployments, making their world more malleable is a
                                                           good thing.



                                                                                                       764 | P a g e
Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications
                         (IJERA)ISSN: 2248-9622www.ijera.com
                   Vol. 2, Issue5, September- October 2012, pp.764-770
Each type of virtualization also brings other benefits      Hardware virtualization can be accomplished in
specific to the problem it addresses. Understanding         various ways, and so Microsoft offers several different
what these are requires knowing more about the              technologies that address this area.
technologies themselves. Accordingly, the next                  They include the following:
sections take a closer look at each one.                         1.) Hyper-V (Windows Server 2008)
                                                                 2.) Virtual Desktop Infrastructure (VDI)
      III. VIRTUALIZATION TECHNOLOGIES                           3.) Virtual PC 2007
A. Hardware Virtualization                                       4.) MS Enterprise Desktop Virtualization
           For most IT people today, the word                        (MED-V)
―virtualization‖ conjures up thoughts of running
multiple operating systems on a single physical             B. Presentation Virtualization
machine. This is hardware virtualization, and while                  Much of the software people use most is
it’s not the only important kind of virtualization, it is   designed to both run and present its user interface on
unquestionably the most visible today.                      the same machine. The applications in Microsoft
           The core idea of hardware virtualization is      Office are one common example, but there are plenty
simple: Use software to create a virtual machine (VM)       of others. While accepting this default is fine much of
that emulates a physical computer. By providing             the time, it’s not without some downside. For
multiple VMs at once, this approach allows running          example, organizations that manage many desktop
several operating systems simultaneously on a single        machines must make sure that any sensitive data on
physical machine.                                           those desktops is kept secure. They’re also obliged to
                                                            spend significant amounts of time and money
                                                            managing the applications resident on those
                                                            machines. Letting an application execute on a remote
                                                            server, yet display its user interface locally
          Operating            Operating                    Presentation virtualization can help.
          System 1             System 2          ..
                Hardware Virtualization
                                                  .
                        Hardware
                                                                             Presentation
                                        Applicatio                           Virtualization
           Physical Machine
                                        n

           Virtual Machine
                                                                            Operating System
    Figure – 2: Hardware virtualization
                                                                               Hardware
          When used on client machines, this approach
is often called desktop virtualization, while using it on       Figure – 3: Presentationvirtualization
server systems is known as server virtualization.                     This approach allows creating virtual
Desktop virtualization can be useful in a variety of        sessions, each interacting with a remote desktop
situations. One of the most common is to deal with          system. The applications executing in those sessions
incompatibility between applications and desktop            rely on presentation virtualization to project their user
operating systems. For example, suppose a user              interfaces remotely. Each session might run only a
running Windows Vista needs to use an application           single application, or it might present its user with a
that runs only on Windows XP with Service Pack 2.           complete desktop offering multiple applications. In
By creating a VM that runs this older operating             either case, several virtual sessions can use the same
system, then installing the application in that VM, this    installed copy of an application.
problem can be solved.                                                Running applications on a shared server like
          Server virtualization also makes restoring        this offers several benefits, including the following:
failed systems easier. VMs are stored as files, and so                1.) Data can be centralized.
restoring a failed system can be as simple as copying                 2.) The cost of managing applications can
its file onto a new machine. Since VMs can have                            be significantly reduced.
different hardware configurations from the physical                   3.) Organizations need no longer worry
machine on which they’re running, this approach also                       about incompatibilities between an
allows restoring a failed system onto any available                        application and a desktop operating
machine. There’s no requirement to use a physically                        system.
identical system.                                                     4.) Presentation virtualization can improve
                                                                           performance.


                                                                                                      765 | P a g e
Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications
                         (IJERA)ISSN: 2248-9622www.ijera.com
                   Vol. 2, Issue5, September- October 2012, pp.764-770
Microsoft’s presentation virtualization technology is
Windows Terminal Services. First released for                                 Application Logic
Windows NT 4, it’s now a standard part of Windows
                                                                             Application Virtualization
Server 2008. Terminal Services lets an ordinary
Windows desktop application run on a shared server
machine yet present its user interface on a remote
system, such as a desktop computer or thin client.
While remote interfaces haven’t always been viewed
through the lens of virtualization, this perspective can                      Operating System
provide a useful way to think about this widely used
technology.                                                                         Hardware
C. Application Virtualization
          Virtualization provides an abstracted view of        Figure – 4: Applicationvirtualization
some computing resource. Rather than run directly on                Application virtualization makes deployment
a physical computer, for example, hardware                 significantly easier. Since applications no longer
virtualization lets an operating system run on a           compete for DLL versions or other shared aspects of
software abstraction of a machine. Similarly,              their environment, there’s no need to test new
presentation virtualization lets an application’s user     applications for conflicts with existing applications
interface be abstracted to a remote device. In both        before they’re rolled out. And as Figure 4 suggests,
cases, virtualization loosens an otherwise tight bond      these virtual applications can run alongside ordinary
between components.                                        applications—not everything needs to be virtualized.
          Another bond that can benefit from more
abstraction is the connection between an application       D. Other VirtualizationTechnology
and the operating system it runs on. Every application          This overview looks at three kinds of
depends on its operating system for a range of             virtualization: hardware, presentation, and application.
services, including memory allocation, device drivers,     Similar kinds of abstraction are also used in other
and much more. Incompatibilities between an                contexts, however. Among the most important are,
application and its operating system can be addressed      1.) Memory Virtualization
by either hardware virtualization or presentation           The term memory virtualization decouples
virtualization, as described earlier. But what about            volatile random access memory (RAM) resources
incompatibilities between two applications installed            from individual systems in the data center, and
on the same instance of an operating system?                    then aggregates those resources into a virtualized
Applications commonly share various things with                 memory pool available to any computer in the
other applications on their system, yet this sharing can        cluster. The memory pool is accessed by the
be problematic. For example, one application might              operating system or applications running on top
require a specific version of a dynamic link library            of the operating system. The distributed memory
(DLL) to function, while another application on that            pool can then be utilized as a high-speed cache, a
system might require a different version of the same            messaging layer, or a large, shared memory
DLL. Installing both applications leads to what’s               resource for a CPU or a GPU application.
commonly known as DLL hell, where one of them               Memory virtualization allows networked, and
overwrites the version required by the other. To avoid          therefore distributed, servers to share a pool of
this, organizations often perform extensive testing             memory to overcome physical memory
before installing a new application, an approach that’s         limitations, a common bottleneck in software
workable but time-consuming and expensive.                      performance.
          Application virtualization solves this           2.) Network Virtualization
problem by creating application-specific copies of all      The term network virtualization is used to
shared resources, as Figure 4 illustrates. The                  describe a number of different things. Perhaps
problematic things an application might share with              the most common is the idea of a virtual private
other applications on its system—registry entries,              network (VPN). VPNs abstract the notion of a
specific DLLs, and more—are instead packaged with               network connection, allowing a remote user to
it, creating a virtual application. When a virtual              access an organization’s internal network just as
application is deployed, it uses its own copy of these          if she were physically attached to that network.
shared resources.                                               VPNs are a widely implemented idea, and they
                                                                can use various technologies. In the Microsoft
                                                                world, the primary VPN technologies today are
                                                                Internet Security and Acceleration (ISA) Server
                                                                2006 and Internet Application Gateway 2007.




                                                                                                          766 | P a g e
Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications
                         (IJERA)ISSN: 2248-9622www.ijera.com
                   Vol. 2, Issue5, September- October 2012, pp.764-770
3.) Storage Virtualization
 The term storage virtualization is also used quite        Development and Testing Environments :-
    broadly. In a general sense, it means providing a               By usingvirtualization, a developer or tester
    logical, abstracted view of physical storage           can replicate a distributed environment containing
    devices, and so anything other than a locally          several systems on a single piece of hardware. This
    attached disk drive might be viewed in this light.     negates having a bunch of servers sitting around for
 A simple example is folder redirection in                the occasional use of developers or testers.
    Windows, which lets the information in a folder        Virtualization is also useful in test and development
    be stored on any network-accessible drive. Much        environments in another way. One of the side effects
    more powerful (and more complex) approaches            of exercising software is that early versions often
    also fit into this category, including storage area    crash and damage not only the application, but also
    networks (SANs) and others. However it’s done,         the underlying operating system as well as other
    the benefits of storage virtualization are             applications in the software stack. To recover, it’s
    analogous to those of every other kind of              necessary to reinstall all the software. Again, this is
    virtualization: more abstraction and less direct       areal drag on productivity.
    coupling between components.
                                                            Quality of Service :-
4.) Database Virtualization                                         IT organizations must focus on the quality
 Database virtualization is the decoupling of the         of service they deliver — how well they keep
    database layer, which lies between the storage         software infrastructures available and performing
    and application layers within the application          well.
    stack. Virtualization at the database layer allows              Fortunately, virtualization, when properly
    hardware resources to be extended to allow for         managed, can help improve quality of service because
    better sharing resources between applications and      it removes hardware dependence. By virtualizing
    users, masking of the physical location and            systems, it is possible to quickly respond to failures
    configuration of a database from querying              of all types: hardware, network, even virtualization
    programs, as well as enable more scalable              software itself. It can also be used to pre-emptively
    computing.                                             avoid failure by moving workloads off a system that
A. Virtual Data Partitioning                               is showing signs of problems (memory, disk, and so
B. Horizontal Data Partitioning                            on).
                                                                    Given the demands on IT organizations to
 Advantages :-                                            continuously improve their operations in order to
C. Added flexibility and agility for existing              achieve business goals, it’s incumbent upon them to
   computing infrastructure.                               explore how virtualization can help improve quality
D. Enhanced database performance.                          of service.
E. Pooling and sharing computing resources.                         Companies run many applications that they
F. Simplification     of     administration     and        consider mission critical, which is a fancy term
   management.                                             meaning that the company relies on these applications
G. Increased             fault            tolerance.       for a fundamental part of their business.

IV. UNDERSTANDING VIRTUALIZATION USE CASES                  Simple Failover :-
          Virtualization is useful in a number of                    The hypervisor (Hyper – V) is constantly
scenarios. They range from simple and                      monitoring each virtual machine’s status, so it’s
straightforward to complex and transformational.           relatively straightforward to configure it to start a
Understanding how you want to use virtualization is        new instance of a virtual machine should it notice a
critical; because that will dictate which virtualization   previously running virtual machine is no longer
solution is most appropriate for you. This chapter         present. Because all the hypervisor has to do is start a
goes over some of the main uses of virtualization.         new virtual machine based on the VM’s image, the
                                                           outage duration of a virtual machine may be mere
 Server Consolidation :-                                  seconds. Obviously, this is a huge improvement over
          The first application of virtualization is       the minutes to days durations typical of non-
usually server consolidation. In fact, server              virtualized system restores.
consolidation is what most people think of when they
consider virtualization. Server consolidation refers to     High Availability :-
taking separate server instances and migrating them                 High availability (HA) extends the concept
into virtual machines running on a single server. To       of simple failover to incorporate an additional
be technically correct, consolidation is also the act of   hardware server. Instead of crashed virtual machine
taking a number of separate servers and migrating          being started on the same piece of hardware, it is
them onto fewer servers, with multiple virtual             started on a different server, thereby avoiding the
machines running on each server.



                                                                                                    767 | P a g e
Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications
                         (IJERA)ISSN: 2248-9622www.ijera.com
                   Vol. 2, Issue5, September- October 2012, pp.764-770
problem of a hardware-precluding virtualization                      Again, efficiency in operation is vital for
failover.                                                  replication — just because the data is being moved to
          HA provides an extra layer of failover           storage location doesn’t mean that keeping the data
protection at the cost of additional virtualization        flowing efficiently isn’t important.
software complexity                                                  Smart replication software keeps up-to-the-
                                                           minute changes flowing to the central location,
 Clustering :-                                            thereby ensuring that an IT organization can quickly
           Clustering is designed to ensure that no data   locate data assets and use them to rebuild a failed
is lost in the event of a software or hardware failure.    system.
Clustering has typically been offered by application
vendors as an add-on to their base product, with some      V. RETHINKINGVIRTUALIZATION IN BUSINESS
attendant drawbacks like extra expense, redundant                                  TERMS
solutions, and infrastructure complexity.                   [ INTEL VERTUALIZATION TECHNOLOGY BRIEF ]
           Part of the extra expense reflects the fact      Realizing the general value of the virtualized
that you need extra hardware standing by, with the            operating model, Intel addressed virtualization at
mirrored system on standby, ready to take over                the foundation - the chip level - where they could
should the primary system fail. You don’t need to be          simultaneously eliminate the need for
a genius to recognize that buying a second set of             modifications to the hosted operating systems
hardware makes clustering significantly more                  and provide better performance. The resulting
expensive. However, if you’ve got millions of U.S.            Intel® Virtualization Technology (Intel® VT)
dollars’ worth of transactions occurring on your              not only provides a consistent approach, but also
system, keeping a redundant server ready may be a             opens the door for wider use of virtualization
worthwhile investment. And techniques exist that can          concepts such as Real-Time System.
allow you to run other work on the stand-by server          In simple terms, Intel VT adds new instructions,
until it is needed.                                           registers and interrupts management that can be
                                                              used by VMM software to manage virtual
 Data Mirroring :-                                           environments. These new capabilities can be
          All of the qualities of service mechanisms          used to create a VMM that requires no changes
we’ve discussed thus far address how to keep virtual          to the hosted operating systems. Consequently,
machines up and running. But what about data? After           legacy systems are well supported and the VMM
all, applications inside virtual machines are useless         is not dependent on operating system version,
without data — so clearly it’s important to ensure            update or patches.
data availability as part of an overall quality of          End users begin to realize the benefits from Intel
service strategy.                                             VT after the suppliers of virtualization software
          One way of keeping data available is to             modify their products to use the new capabilities.
mirror it. As the name implies, mirroring data means          Intel has involved the virtualization community
that data in one place is reflected to another, ensuring      in the specification and development
that they are exact copies of oneanother.                   Process and work is underway to utilize Intel VT
          Mirroring enables real-time consistency             in commercial products. For example, Microsoft
between two data stores. This makes it possible to            has committed to ongoing support of Intel VT in
immediately shift between one system and another by           Windows Servers, and the open source VMM,
attaching the second system to the mirrored data.             Xen 3.0, supports Intel VT.
          Mirroring      achieves      this    real-time    Intel VT becomes especially attractive when
consistency by feeding a constant stream of data              considered in concert with Intel's Dual-Core
changes — whether additions, updates, or deletions            technology to provide enhanced performance and
— from one location to another.                               concurrency of multiple environments to enhance
                                                              real-time capabilities. Further advances such as
 Data Replication :-                                         Quad-Core will provide additional capabilities.
         Data replication is a second service oriented
toward improving data quality of service. Unlike           The Hardware Virtualization Advantage:-
mirroring, which focuses on keeping copies of data          Intel Virtualization Technology provides silicon
consistent in real-time, replication addresses the need        based functionality that works together with
to keep complete copies of data available so that they         compatible VMM software to improve upon
can be used for system rebuild purposes.                       software-only      solutions.   Because      this
         Replicationis typically accomplished by               virtualization hardware provides a new
sending copies of data to a centralized storage                architecture upon which the operating system
location, enabling an organization to be certain that it       runs directly, it removes the binary translation.
has copies of critical data security stored in case of a       Thus it eliminates associated performance
need to recover some specific data assets.                     overhead and vastly simplifies the design of the




                                                                                                  768 | P a g e
Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications
                                  (IJERA)ISSN: 2248-9622www.ijera.com
                            Vol. 2, Issue5, September- October 2012, pp.764-770
           VMM, in turn allowing VMMs to be written to
                                                                                   100%
           common standards and to be more robust.




                                                                       R a ti o
          The advantage of increase supportability of the                           80%
           overall virtual machine solution.VMMs running                             60%
           under the Intel Virtualization Technology can be
                                                                                     40%                               Performance
           fully validated on the hardware, including
           certification that they execute directly using the                        20%                               Security
           architecture’s full instruction set.
          Intel Virtualization Technology will provide the                           0%                               Benefit
           basis for a rich ecosystem of virtualization
           solutions that encompass both server and desktop
           environments.

                     VI. BUSINESS SURVEY
          Microsoft, Cisco, Oracle, EMC2 are market-               Figure – 5: Result
           leading innovative companies has adopted the
           virtualization technology by enabling the                          VII. PITFALLS TO AVOID
           application as virtual applications hosted in             In some cases it doesn’t wait any type of
           virtual machines are secured across the network            protection.
           with heightened security, availability, and               Don’t skimp on training.
           performance.                                              Don’t expose for legal issues.
          There are no anymore security issues after                Don’t imagine that virtualization is ―Static‖.
           adopting the pull of virtualization.                      Don’t skip the ―Boring stuff‖. It’s an overhead
          I highlighted some related survey in below table           for cloud infrastructure.
           based upon the company and its product and the            Don’t Overlook the Organization.
           nature of effect.                                         Don’t Overlook the Hardware.
                                                                     Don’t Overlook the Service Management.
Most Valuable Leading Company                                        Be Prepared for Even More Virtualization in
Compan    Product       Performanc          Securit    Increase       Future.
y                       e                   y          d
                        Status              Issues     Benefit                       VIII. CONCLUSION
                                                       [In %]                 The pull of Virtualization is strong – the
            SharePoint      +++             Yes        70%          economics are too attractive to resist. And for most
Microsof    SQL Server      +++             None       50%          organizations, there’s no reason to fight against this
t           Azure           ++              None       up      to   pull. Well-managed virtualization technologies can
                                                       90%          make their world better.
             UCS                                                              Virtualization technologies provide several
Cisco        [Unified       +++           None         up      to   important features that make it a powerful tool to use
             Computing                                 73%          in a wide range of applications. These include but are
             System]                                                not limited to server consolidation, application
             Oracle                                                 sandboxing, access to varieties of hardware and
Oracle       [Database /                                            operating     systems,    testing,   simple    system
             Web logic +++                Yes          40%          administration and quality of service. All these
             applications                                           features have made this technology extremely popular
             ]                                                      in academia and industry. A closer look reveals that
             Storage                                                although most of them have an operating
EMC2         Application +++              None         60%          environment similar to the end-user, they vary greatly
             Software                                               in their architecture design, implementation and the
 1) In above table I used the +++ strategy for its high better      level of abstraction at which they operate.
    performance after adopting virtualization. And similarly
    (++) for better but not so much as compared to (+++)                                   REFERENCE
    strategy.                                                         1]          White Paper: Virtualization Overview from
 2) There are basically no security issues in adopting                            VMware. http://www.vmware.com
    virtualization technolgy but in some of the criteria I found      2]          White Paper: Intel Core Processors –
    security issues in some application even if after adopting                    Understanding Desktop Virtualization.
    virtualzation.                                                    3]          White Paper By ALAN MURPHY –
 3) One main important factor I found is that company’s                           Virtualization Defined in Eight Different
    annual income has been increased.                                             Ways.
                                                                      4]          http://www.virtualizationtechnology.com



                                                                                                              769 | P a g e
Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications
                       (IJERA)ISSN: 2248-9622www.ijera.com
                 Vol. 2, Issue5, September- October 2012, pp.764-770
5]    Virtualization and Disaster Recovery by J.
      Peter Bruzzese.
6]    White     Paper:     Business     Value   of
      Virtualization By HP – AI Gillen, Randy
      Perry, Tim Grieser, July – 2008.
7]    White Paper: Desktop Virtualization By
      NComputing
8]    Understanding Microsoft Virtualization
      Solutions by Microsoft [2nd Edition].
9]    Intel Solution White Paper: Server
      Virtualization on Intel Architecture.
10]   Technology Brief: Intel Virtualization
      Technology by Matt Gillespie.
11]   http://www.wikipedia.com/vmware
12]   http://www.intel.com/platforms/applied/indp
      c/pdf/ARC-Intel-Virtualization-v1.pdf




                                                                              770 | P a g e

More Related Content

What's hot

Microsoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheetMicrosoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheetDavid J Rosenthal
 
Remote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayRemote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayObserveIT
 
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...247 Invest
 
Build New Applications into the Cloud with Microsoft Windows Azure: Datasheet
Build New Applications into the Cloud with Microsoft Windows Azure: DatasheetBuild New Applications into the Cloud with Microsoft Windows Azure: Datasheet
Build New Applications into the Cloud with Microsoft Windows Azure: DatasheetMicrosoft Private Cloud
 
iStart the desktop goes virtual
iStart the desktop goes virtualiStart the desktop goes virtual
iStart the desktop goes virtualHayden McCall
 
Microsoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft India - System Center Desktop Virtualization Strategy WhitepaperMicrosoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft India - System Center Desktop Virtualization Strategy WhitepaperMicrosoft Private Cloud
 
Citrix Synergy Barcelona 2012 Day Two Super Session
Citrix Synergy Barcelona 2012 Day Two Super SessionCitrix Synergy Barcelona 2012 Day Two Super Session
Citrix Synergy Barcelona 2012 Day Two Super SessionCitrix
 
3529 v mware_solution_brochure_final
3529 v mware_solution_brochure_final3529 v mware_solution_brochure_final
3529 v mware_solution_brochure_finalVictor Diaz Campos
 
Virtual Insight 032609
Virtual Insight 032609Virtual Insight 032609
Virtual Insight 032609patriciafriar
 
Xen client4.5 customer-presentation-2012-12-28
Xen client4.5 customer-presentation-2012-12-28Xen client4.5 customer-presentation-2012-12-28
Xen client4.5 customer-presentation-2012-12-28Nuno Alves
 
Smart Virtual Appliances Made Easy with IBM Image Construction and Compositio...
Smart Virtual Appliances Made Easy with IBM Image Construction and Compositio...Smart Virtual Appliances Made Easy with IBM Image Construction and Compositio...
Smart Virtual Appliances Made Easy with IBM Image Construction and Compositio...IBM India Smarter Computing
 
Vstorm Overview V1.1
Vstorm Overview V1.1Vstorm Overview V1.1
Vstorm Overview V1.1Meznir
 
Personal v disk_planning_guide
Personal v disk_planning_guidePersonal v disk_planning_guide
Personal v disk_planning_guideKunKun Ng
 
Security challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governanceSecurity challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governanceAdam Bert Lacay
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
VDI Infraestructure
VDI InfraestructureVDI Infraestructure
VDI InfraestructureJuanchi_43
 
Microsoft Windows Azure - Cloud Services Platform Datasheet
Microsoft Windows Azure - Cloud Services Platform DatasheetMicrosoft Windows Azure - Cloud Services Platform Datasheet
Microsoft Windows Azure - Cloud Services Platform DatasheetMicrosoft Private Cloud
 
White Paper: Sizing EMC VNX Series for VDI Workload — An Architectural Guidel...
White Paper: Sizing EMC VNX Series for VDI Workload — An Architectural Guidel...White Paper: Sizing EMC VNX Series for VDI Workload — An Architectural Guidel...
White Paper: Sizing EMC VNX Series for VDI Workload — An Architectural Guidel...EMC
 

What's hot (19)

Microsoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheetMicrosoft System Center 2012 overview datasheet
Microsoft System Center 2012 overview datasheet
 
Remote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayRemote Access Outgoing VDI Gateway
Remote Access Outgoing VDI Gateway
 
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...
 
Build New Applications into the Cloud with Microsoft Windows Azure: Datasheet
Build New Applications into the Cloud with Microsoft Windows Azure: DatasheetBuild New Applications into the Cloud with Microsoft Windows Azure: Datasheet
Build New Applications into the Cloud with Microsoft Windows Azure: Datasheet
 
iStart the desktop goes virtual
iStart the desktop goes virtualiStart the desktop goes virtual
iStart the desktop goes virtual
 
Microsoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft India - System Center Desktop Virtualization Strategy WhitepaperMicrosoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft India - System Center Desktop Virtualization Strategy Whitepaper
 
Citrix Synergy Barcelona 2012 Day Two Super Session
Citrix Synergy Barcelona 2012 Day Two Super SessionCitrix Synergy Barcelona 2012 Day Two Super Session
Citrix Synergy Barcelona 2012 Day Two Super Session
 
3529 v mware_solution_brochure_final
3529 v mware_solution_brochure_final3529 v mware_solution_brochure_final
3529 v mware_solution_brochure_final
 
Virtual Insight 032609
Virtual Insight 032609Virtual Insight 032609
Virtual Insight 032609
 
Xen client4.5 customer-presentation-2012-12-28
Xen client4.5 customer-presentation-2012-12-28Xen client4.5 customer-presentation-2012-12-28
Xen client4.5 customer-presentation-2012-12-28
 
vDesk: Introduction to Desktop Virtualization
vDesk: Introduction to Desktop VirtualizationvDesk: Introduction to Desktop Virtualization
vDesk: Introduction to Desktop Virtualization
 
Smart Virtual Appliances Made Easy with IBM Image Construction and Compositio...
Smart Virtual Appliances Made Easy with IBM Image Construction and Compositio...Smart Virtual Appliances Made Easy with IBM Image Construction and Compositio...
Smart Virtual Appliances Made Easy with IBM Image Construction and Compositio...
 
Vstorm Overview V1.1
Vstorm Overview V1.1Vstorm Overview V1.1
Vstorm Overview V1.1
 
Personal v disk_planning_guide
Personal v disk_planning_guidePersonal v disk_planning_guide
Personal v disk_planning_guide
 
Security challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governanceSecurity challenges for adoption of virtualization for effective e governance
Security challenges for adoption of virtualization for effective e governance
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
VDI Infraestructure
VDI InfraestructureVDI Infraestructure
VDI Infraestructure
 
Microsoft Windows Azure - Cloud Services Platform Datasheet
Microsoft Windows Azure - Cloud Services Platform DatasheetMicrosoft Windows Azure - Cloud Services Platform Datasheet
Microsoft Windows Azure - Cloud Services Platform Datasheet
 
White Paper: Sizing EMC VNX Series for VDI Workload — An Architectural Guidel...
White Paper: Sizing EMC VNX Series for VDI Workload — An Architectural Guidel...White Paper: Sizing EMC VNX Series for VDI Workload — An Architectural Guidel...
White Paper: Sizing EMC VNX Series for VDI Workload — An Architectural Guidel...
 

Viewers also liked

Clase 3
Clase 3Clase 3
Clase 3UPTM
 
Rendicion cuentas asamblea
Rendicion cuentas asambleaRendicion cuentas asamblea
Rendicion cuentas asambleaRobert Gallegos
 
Cifras creciemiento pais
Cifras creciemiento paisCifras creciemiento pais
Cifras creciemiento paisRobert Gallegos
 
Texto de contabilidad comercial cecilia acosta
Texto de contabilidad comercial cecilia acostaTexto de contabilidad comercial cecilia acosta
Texto de contabilidad comercial cecilia acostaRobert Gallegos
 
Unidad ii
Unidad iiUnidad ii
Unidad iiUPTM
 
Se presencial 1 - segundo día-version final
Se presencial 1 - segundo día-version finalSe presencial 1 - segundo día-version final
Se presencial 1 - segundo día-version finalINFOD
 
Presentación general del ciclo
Presentación general del cicloPresentación general del ciclo
Presentación general del cicloINFOD
 
Se presencial 1 - primer día
Se presencial 1 - primer díaSe presencial 1 - primer día
Se presencial 1 - primer díaINFOD
 

Viewers also liked (20)

Ab25144148
Ab25144148Ab25144148
Ab25144148
 
Ag25181192
Ag25181192Ag25181192
Ag25181192
 
Aq25256259
Aq25256259Aq25256259
Aq25256259
 
Am25227236
Am25227236Am25227236
Am25227236
 
Bc25325327
Bc25325327Bc25325327
Bc25325327
 
Aj25210213
Aj25210213Aj25210213
Aj25210213
 
Clase 3
Clase 3Clase 3
Clase 3
 
Geopolitica del saber
Geopolitica del saberGeopolitica del saber
Geopolitica del saber
 
Guayaquil ecologico ap
Guayaquil ecologico apGuayaquil ecologico ap
Guayaquil ecologico ap
 
img182
img182img182
img182
 
Rendicion cuentas asamblea
Rendicion cuentas asambleaRendicion cuentas asamblea
Rendicion cuentas asamblea
 
Cifras creciemiento pais
Cifras creciemiento paisCifras creciemiento pais
Cifras creciemiento pais
 
Texto de contabilidad comercial cecilia acosta
Texto de contabilidad comercial cecilia acostaTexto de contabilidad comercial cecilia acosta
Texto de contabilidad comercial cecilia acosta
 
Unidad ii
Unidad iiUnidad ii
Unidad ii
 
Se presencial 1 - segundo día-version final
Se presencial 1 - segundo día-version finalSe presencial 1 - segundo día-version final
Se presencial 1 - segundo día-version final
 
Presentación general del ciclo
Presentación general del cicloPresentación general del ciclo
Presentación general del ciclo
 
Se presencial 1 - primer día
Se presencial 1 - primer díaSe presencial 1 - primer día
Se presencial 1 - primer día
 
Geografía PS3
Geografía PS3Geografía PS3
Geografía PS3
 
Script Files
Script FilesScript Files
Script Files
 
Arte
ArteArte
Arte
 

Similar to Dz25764770

Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computingMayank Aggarwal
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software TestingColloquium
 
Microsoft Virtualization View
Microsoft Virtualization View Microsoft Virtualization View
Microsoft Virtualization View sanjoysanyal
 
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxInternational Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxvrickens
 
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...IJNSA Journal
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computingijtsrd
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudeSAT Journals
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudeSAT Publishing House
 
The Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop VirtualizationThe Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop VirtualizationHTS Hosting
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technologysanjoysanyal
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing Priti Banya Mohanty
 
virtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxvirtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxZarwashgulrez
 
Virtualization using VMWare Workstation and Cloud Computing
Virtualization using VMWare Workstation and Cloud ComputingVirtualization using VMWare Workstation and Cloud Computing
Virtualization using VMWare Workstation and Cloud ComputingHitesh Gupta
 

Similar to Dz25764770 (20)

Virtualization Approach: Theory and Application
Virtualization Approach: Theory and ApplicationVirtualization Approach: Theory and Application
Virtualization Approach: Theory and Application
 
Virtualization: Force driving cloud computing
Virtualization: Force driving cloud computingVirtualization: Force driving cloud computing
Virtualization: Force driving cloud computing
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
 
Ijebea14 260
Ijebea14 260Ijebea14 260
Ijebea14 260
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
 
Microsoft Virtualization View
Microsoft Virtualization View Microsoft Virtualization View
Microsoft Virtualization View
 
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxInternational Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docx
 
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computing
 
Cc
CcCc
Cc
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
The Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop VirtualizationThe Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop Virtualization
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
Sna lab prj (1)
Sna lab prj (1)Sna lab prj (1)
Sna lab prj (1)
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technology
 
Virtualization in Cloud computing
Virtualization in Cloud computing Virtualization in Cloud computing
Virtualization in Cloud computing
 
virtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxvirtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptx
 
Virtualization using VMWare Workstation and Cloud Computing
Virtualization using VMWare Workstation and Cloud ComputingVirtualization using VMWare Workstation and Cloud Computing
Virtualization using VMWare Workstation and Cloud Computing
 

Dz25764770

  • 1. Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications (IJERA)ISSN: 2248-9622www.ijera.com Vol. 2, Issue5, September- October 2012, pp.764-770 Survey Paper On Different Virtualization TechnologyWith Its Merits And Demerits On Organization Mr. Milind Ramesh Kolte M.Sc. Computer Application (Semester –III) Shree Ramkrishna Instituteof Computer Education & Applied Sciences, Surat-395009.Gujarat, India. Abstract A Virtualized System includes a new layer The application is installed and runs directly on the of software, the virtual machine monitor. The OS, which in turn runs directly on the computer’s VMM's principal role is to arbitrate accesses to hardware. The application’s user interface is the underlying physical host platform's resources presented via a display that’s directly attached to this so that multiple operating systems (which are machine. This simple scenario is familiar to anybody guests of the Virtual Machine Monitor) can share who’s ever used Windows. them. The VMM presents to each guest OS a set of virtual platform interfaces that constitute a virtual machine (VM). Once confined to specialized, proprietary, high-end server and mainframe systems, virtualization is now becoming more broadly available and is supported in off-the-shelf systems based on Intel architecture (IA) hardware. Virtualization technology provides hardware support for processor virtualization, Operating enabling simplifications of virtual machine monitor software. Resulting VMMs can support a System Hardware wider range of legacy and future operating systems while maintaining high performance. Keywords – Virtualization, VMM, Intel Physical Machine Application Architecture, legacy OS Figure – 1: A System without virtualization I. INTRODUCTION Virtualization is one of the hottest trends in But it’s not the only choice. In fact, it’s often information technology today. This is no accident. not the best choice. Rather than locking these various While a variety of technologies fall under the parts together—the operating system to the hardware, virtualization umbrella, all of them are changing the the application to the operating system, and the user IT world in significant ways. interface to the local machine—it’s possible to loosen Virtualization is software technology which the direct reliance these parts have on each other. uses a physical resource such as a server and divides it Doing this means virtualizing aspects of this up into virtual resources called virtual machines environment, something that can be done in various (VM's). Virtualization allows users to consolidate ways. The operating system can be decoupled from physical resources, simplify deployment and the physical hardware it runs on using hardware administration, and reduce power and cooling virtualization, for example, while application requirements. While virtualization technology is most virtualization allows an analogous decoupling popular in the server world, virtualization technology between the operating system and the applications is also being used in data storage such as Storage Area that use it. Similarly, presentation virtualization Networks, and inside of operating systems such as allows separating an application’s user interface from Hyper-V (Hypervisor). the physical machine the application runs on. All of these approaches to virtualization help make the links II. UNDERSTANDING VERTUALIZATION between components less rigid. This lets hardware To understand modern virtualization and software be used in more diverse ways, and it technologies, think first about a system without them. also makes both easier to change. Given that most IT Imagine, for example, an application such as professionals spend most of their time working with Microsoft Word running on a standalone desktop what’s already installed rather than rolling out new computer. deployments, making their world more malleable is a good thing. 764 | P a g e
  • 2. Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications (IJERA)ISSN: 2248-9622www.ijera.com Vol. 2, Issue5, September- October 2012, pp.764-770 Each type of virtualization also brings other benefits Hardware virtualization can be accomplished in specific to the problem it addresses. Understanding various ways, and so Microsoft offers several different what these are requires knowing more about the technologies that address this area. technologies themselves. Accordingly, the next They include the following: sections take a closer look at each one. 1.) Hyper-V (Windows Server 2008) 2.) Virtual Desktop Infrastructure (VDI) III. VIRTUALIZATION TECHNOLOGIES 3.) Virtual PC 2007 A. Hardware Virtualization 4.) MS Enterprise Desktop Virtualization For most IT people today, the word (MED-V) ―virtualization‖ conjures up thoughts of running multiple operating systems on a single physical B. Presentation Virtualization machine. This is hardware virtualization, and while Much of the software people use most is it’s not the only important kind of virtualization, it is designed to both run and present its user interface on unquestionably the most visible today. the same machine. The applications in Microsoft The core idea of hardware virtualization is Office are one common example, but there are plenty simple: Use software to create a virtual machine (VM) of others. While accepting this default is fine much of that emulates a physical computer. By providing the time, it’s not without some downside. For multiple VMs at once, this approach allows running example, organizations that manage many desktop several operating systems simultaneously on a single machines must make sure that any sensitive data on physical machine. those desktops is kept secure. They’re also obliged to spend significant amounts of time and money managing the applications resident on those machines. Letting an application execute on a remote server, yet display its user interface locally Operating Operating Presentation virtualization can help. System 1 System 2 .. Hardware Virtualization . Hardware Presentation Applicatio Virtualization Physical Machine n Virtual Machine Operating System Figure – 2: Hardware virtualization Hardware When used on client machines, this approach is often called desktop virtualization, while using it on Figure – 3: Presentationvirtualization server systems is known as server virtualization. This approach allows creating virtual Desktop virtualization can be useful in a variety of sessions, each interacting with a remote desktop situations. One of the most common is to deal with system. The applications executing in those sessions incompatibility between applications and desktop rely on presentation virtualization to project their user operating systems. For example, suppose a user interfaces remotely. Each session might run only a running Windows Vista needs to use an application single application, or it might present its user with a that runs only on Windows XP with Service Pack 2. complete desktop offering multiple applications. In By creating a VM that runs this older operating either case, several virtual sessions can use the same system, then installing the application in that VM, this installed copy of an application. problem can be solved. Running applications on a shared server like Server virtualization also makes restoring this offers several benefits, including the following: failed systems easier. VMs are stored as files, and so 1.) Data can be centralized. restoring a failed system can be as simple as copying 2.) The cost of managing applications can its file onto a new machine. Since VMs can have be significantly reduced. different hardware configurations from the physical 3.) Organizations need no longer worry machine on which they’re running, this approach also about incompatibilities between an allows restoring a failed system onto any available application and a desktop operating machine. There’s no requirement to use a physically system. identical system. 4.) Presentation virtualization can improve performance. 765 | P a g e
  • 3. Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications (IJERA)ISSN: 2248-9622www.ijera.com Vol. 2, Issue5, September- October 2012, pp.764-770 Microsoft’s presentation virtualization technology is Windows Terminal Services. First released for Application Logic Windows NT 4, it’s now a standard part of Windows Application Virtualization Server 2008. Terminal Services lets an ordinary Windows desktop application run on a shared server machine yet present its user interface on a remote system, such as a desktop computer or thin client. While remote interfaces haven’t always been viewed through the lens of virtualization, this perspective can Operating System provide a useful way to think about this widely used technology. Hardware C. Application Virtualization Virtualization provides an abstracted view of Figure – 4: Applicationvirtualization some computing resource. Rather than run directly on Application virtualization makes deployment a physical computer, for example, hardware significantly easier. Since applications no longer virtualization lets an operating system run on a compete for DLL versions or other shared aspects of software abstraction of a machine. Similarly, their environment, there’s no need to test new presentation virtualization lets an application’s user applications for conflicts with existing applications interface be abstracted to a remote device. In both before they’re rolled out. And as Figure 4 suggests, cases, virtualization loosens an otherwise tight bond these virtual applications can run alongside ordinary between components. applications—not everything needs to be virtualized. Another bond that can benefit from more abstraction is the connection between an application D. Other VirtualizationTechnology and the operating system it runs on. Every application This overview looks at three kinds of depends on its operating system for a range of virtualization: hardware, presentation, and application. services, including memory allocation, device drivers, Similar kinds of abstraction are also used in other and much more. Incompatibilities between an contexts, however. Among the most important are, application and its operating system can be addressed 1.) Memory Virtualization by either hardware virtualization or presentation  The term memory virtualization decouples virtualization, as described earlier. But what about volatile random access memory (RAM) resources incompatibilities between two applications installed from individual systems in the data center, and on the same instance of an operating system? then aggregates those resources into a virtualized Applications commonly share various things with memory pool available to any computer in the other applications on their system, yet this sharing can cluster. The memory pool is accessed by the be problematic. For example, one application might operating system or applications running on top require a specific version of a dynamic link library of the operating system. The distributed memory (DLL) to function, while another application on that pool can then be utilized as a high-speed cache, a system might require a different version of the same messaging layer, or a large, shared memory DLL. Installing both applications leads to what’s resource for a CPU or a GPU application. commonly known as DLL hell, where one of them  Memory virtualization allows networked, and overwrites the version required by the other. To avoid therefore distributed, servers to share a pool of this, organizations often perform extensive testing memory to overcome physical memory before installing a new application, an approach that’s limitations, a common bottleneck in software workable but time-consuming and expensive. performance. Application virtualization solves this 2.) Network Virtualization problem by creating application-specific copies of all  The term network virtualization is used to shared resources, as Figure 4 illustrates. The describe a number of different things. Perhaps problematic things an application might share with the most common is the idea of a virtual private other applications on its system—registry entries, network (VPN). VPNs abstract the notion of a specific DLLs, and more—are instead packaged with network connection, allowing a remote user to it, creating a virtual application. When a virtual access an organization’s internal network just as application is deployed, it uses its own copy of these if she were physically attached to that network. shared resources. VPNs are a widely implemented idea, and they can use various technologies. In the Microsoft world, the primary VPN technologies today are Internet Security and Acceleration (ISA) Server 2006 and Internet Application Gateway 2007. 766 | P a g e
  • 4. Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications (IJERA)ISSN: 2248-9622www.ijera.com Vol. 2, Issue5, September- October 2012, pp.764-770 3.) Storage Virtualization  The term storage virtualization is also used quite  Development and Testing Environments :- broadly. In a general sense, it means providing a By usingvirtualization, a developer or tester logical, abstracted view of physical storage can replicate a distributed environment containing devices, and so anything other than a locally several systems on a single piece of hardware. This attached disk drive might be viewed in this light. negates having a bunch of servers sitting around for  A simple example is folder redirection in the occasional use of developers or testers. Windows, which lets the information in a folder Virtualization is also useful in test and development be stored on any network-accessible drive. Much environments in another way. One of the side effects more powerful (and more complex) approaches of exercising software is that early versions often also fit into this category, including storage area crash and damage not only the application, but also networks (SANs) and others. However it’s done, the underlying operating system as well as other the benefits of storage virtualization are applications in the software stack. To recover, it’s analogous to those of every other kind of necessary to reinstall all the software. Again, this is virtualization: more abstraction and less direct areal drag on productivity. coupling between components.  Quality of Service :- 4.) Database Virtualization IT organizations must focus on the quality  Database virtualization is the decoupling of the of service they deliver — how well they keep database layer, which lies between the storage software infrastructures available and performing and application layers within the application well. stack. Virtualization at the database layer allows Fortunately, virtualization, when properly hardware resources to be extended to allow for managed, can help improve quality of service because better sharing resources between applications and it removes hardware dependence. By virtualizing users, masking of the physical location and systems, it is possible to quickly respond to failures configuration of a database from querying of all types: hardware, network, even virtualization programs, as well as enable more scalable software itself. It can also be used to pre-emptively computing. avoid failure by moving workloads off a system that A. Virtual Data Partitioning is showing signs of problems (memory, disk, and so B. Horizontal Data Partitioning on). Given the demands on IT organizations to  Advantages :- continuously improve their operations in order to C. Added flexibility and agility for existing achieve business goals, it’s incumbent upon them to computing infrastructure. explore how virtualization can help improve quality D. Enhanced database performance. of service. E. Pooling and sharing computing resources. Companies run many applications that they F. Simplification of administration and consider mission critical, which is a fancy term management. meaning that the company relies on these applications G. Increased fault tolerance. for a fundamental part of their business. IV. UNDERSTANDING VIRTUALIZATION USE CASES  Simple Failover :- Virtualization is useful in a number of The hypervisor (Hyper – V) is constantly scenarios. They range from simple and monitoring each virtual machine’s status, so it’s straightforward to complex and transformational. relatively straightforward to configure it to start a Understanding how you want to use virtualization is new instance of a virtual machine should it notice a critical; because that will dictate which virtualization previously running virtual machine is no longer solution is most appropriate for you. This chapter present. Because all the hypervisor has to do is start a goes over some of the main uses of virtualization. new virtual machine based on the VM’s image, the outage duration of a virtual machine may be mere  Server Consolidation :- seconds. Obviously, this is a huge improvement over The first application of virtualization is the minutes to days durations typical of non- usually server consolidation. In fact, server virtualized system restores. consolidation is what most people think of when they consider virtualization. Server consolidation refers to  High Availability :- taking separate server instances and migrating them High availability (HA) extends the concept into virtual machines running on a single server. To of simple failover to incorporate an additional be technically correct, consolidation is also the act of hardware server. Instead of crashed virtual machine taking a number of separate servers and migrating being started on the same piece of hardware, it is them onto fewer servers, with multiple virtual started on a different server, thereby avoiding the machines running on each server. 767 | P a g e
  • 5. Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications (IJERA)ISSN: 2248-9622www.ijera.com Vol. 2, Issue5, September- October 2012, pp.764-770 problem of a hardware-precluding virtualization Again, efficiency in operation is vital for failover. replication — just because the data is being moved to HA provides an extra layer of failover storage location doesn’t mean that keeping the data protection at the cost of additional virtualization flowing efficiently isn’t important. software complexity Smart replication software keeps up-to-the- minute changes flowing to the central location,  Clustering :- thereby ensuring that an IT organization can quickly Clustering is designed to ensure that no data locate data assets and use them to rebuild a failed is lost in the event of a software or hardware failure. system. Clustering has typically been offered by application vendors as an add-on to their base product, with some V. RETHINKINGVIRTUALIZATION IN BUSINESS attendant drawbacks like extra expense, redundant TERMS solutions, and infrastructure complexity. [ INTEL VERTUALIZATION TECHNOLOGY BRIEF ] Part of the extra expense reflects the fact  Realizing the general value of the virtualized that you need extra hardware standing by, with the operating model, Intel addressed virtualization at mirrored system on standby, ready to take over the foundation - the chip level - where they could should the primary system fail. You don’t need to be simultaneously eliminate the need for a genius to recognize that buying a second set of modifications to the hosted operating systems hardware makes clustering significantly more and provide better performance. The resulting expensive. However, if you’ve got millions of U.S. Intel® Virtualization Technology (Intel® VT) dollars’ worth of transactions occurring on your not only provides a consistent approach, but also system, keeping a redundant server ready may be a opens the door for wider use of virtualization worthwhile investment. And techniques exist that can concepts such as Real-Time System. allow you to run other work on the stand-by server  In simple terms, Intel VT adds new instructions, until it is needed. registers and interrupts management that can be used by VMM software to manage virtual  Data Mirroring :- environments. These new capabilities can be All of the qualities of service mechanisms used to create a VMM that requires no changes we’ve discussed thus far address how to keep virtual to the hosted operating systems. Consequently, machines up and running. But what about data? After legacy systems are well supported and the VMM all, applications inside virtual machines are useless is not dependent on operating system version, without data — so clearly it’s important to ensure update or patches. data availability as part of an overall quality of  End users begin to realize the benefits from Intel service strategy. VT after the suppliers of virtualization software One way of keeping data available is to modify their products to use the new capabilities. mirror it. As the name implies, mirroring data means Intel has involved the virtualization community that data in one place is reflected to another, ensuring in the specification and development that they are exact copies of oneanother.  Process and work is underway to utilize Intel VT Mirroring enables real-time consistency in commercial products. For example, Microsoft between two data stores. This makes it possible to has committed to ongoing support of Intel VT in immediately shift between one system and another by Windows Servers, and the open source VMM, attaching the second system to the mirrored data. Xen 3.0, supports Intel VT. Mirroring achieves this real-time  Intel VT becomes especially attractive when consistency by feeding a constant stream of data considered in concert with Intel's Dual-Core changes — whether additions, updates, or deletions technology to provide enhanced performance and — from one location to another. concurrency of multiple environments to enhance real-time capabilities. Further advances such as  Data Replication :- Quad-Core will provide additional capabilities. Data replication is a second service oriented toward improving data quality of service. Unlike The Hardware Virtualization Advantage:- mirroring, which focuses on keeping copies of data  Intel Virtualization Technology provides silicon consistent in real-time, replication addresses the need based functionality that works together with to keep complete copies of data available so that they compatible VMM software to improve upon can be used for system rebuild purposes. software-only solutions. Because this Replicationis typically accomplished by virtualization hardware provides a new sending copies of data to a centralized storage architecture upon which the operating system location, enabling an organization to be certain that it runs directly, it removes the binary translation. has copies of critical data security stored in case of a Thus it eliminates associated performance need to recover some specific data assets. overhead and vastly simplifies the design of the 768 | P a g e
  • 6. Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications (IJERA)ISSN: 2248-9622www.ijera.com Vol. 2, Issue5, September- October 2012, pp.764-770 VMM, in turn allowing VMMs to be written to 100% common standards and to be more robust. R a ti o  The advantage of increase supportability of the 80% overall virtual machine solution.VMMs running 60% under the Intel Virtualization Technology can be 40% Performance fully validated on the hardware, including certification that they execute directly using the 20% Security architecture’s full instruction set.  Intel Virtualization Technology will provide the 0% Benefit basis for a rich ecosystem of virtualization solutions that encompass both server and desktop environments. VI. BUSINESS SURVEY  Microsoft, Cisco, Oracle, EMC2 are market- Figure – 5: Result leading innovative companies has adopted the virtualization technology by enabling the VII. PITFALLS TO AVOID application as virtual applications hosted in  In some cases it doesn’t wait any type of virtual machines are secured across the network protection. with heightened security, availability, and  Don’t skimp on training. performance.  Don’t expose for legal issues.  There are no anymore security issues after  Don’t imagine that virtualization is ―Static‖. adopting the pull of virtualization.  Don’t skip the ―Boring stuff‖. It’s an overhead  I highlighted some related survey in below table for cloud infrastructure. based upon the company and its product and the  Don’t Overlook the Organization. nature of effect.  Don’t Overlook the Hardware.  Don’t Overlook the Service Management. Most Valuable Leading Company  Be Prepared for Even More Virtualization in Compan Product Performanc Securit Increase Future. y e y d Status Issues Benefit VIII. CONCLUSION [In %] The pull of Virtualization is strong – the SharePoint +++ Yes 70% economics are too attractive to resist. And for most Microsof SQL Server +++ None 50% organizations, there’s no reason to fight against this t Azure ++ None up to pull. Well-managed virtualization technologies can 90% make their world better. UCS Virtualization technologies provide several Cisco [Unified +++ None up to important features that make it a powerful tool to use Computing 73% in a wide range of applications. These include but are System] not limited to server consolidation, application Oracle sandboxing, access to varieties of hardware and Oracle [Database / operating systems, testing, simple system Web logic +++ Yes 40% administration and quality of service. All these applications features have made this technology extremely popular ] in academia and industry. A closer look reveals that Storage although most of them have an operating EMC2 Application +++ None 60% environment similar to the end-user, they vary greatly Software in their architecture design, implementation and the 1) In above table I used the +++ strategy for its high better level of abstraction at which they operate. performance after adopting virtualization. And similarly (++) for better but not so much as compared to (+++) REFERENCE strategy. 1] White Paper: Virtualization Overview from 2) There are basically no security issues in adopting VMware. http://www.vmware.com virtualization technolgy but in some of the criteria I found 2] White Paper: Intel Core Processors – security issues in some application even if after adopting Understanding Desktop Virtualization. virtualzation. 3] White Paper By ALAN MURPHY – 3) One main important factor I found is that company’s Virtualization Defined in Eight Different annual income has been increased. Ways. 4] http://www.virtualizationtechnology.com 769 | P a g e
  • 7. Mr. Milind Ramesh Kolte / International Journal of Engineering Research and Applications (IJERA)ISSN: 2248-9622www.ijera.com Vol. 2, Issue5, September- October 2012, pp.764-770 5] Virtualization and Disaster Recovery by J. Peter Bruzzese. 6] White Paper: Business Value of Virtualization By HP – AI Gillen, Randy Perry, Tim Grieser, July – 2008. 7] White Paper: Desktop Virtualization By NComputing 8] Understanding Microsoft Virtualization Solutions by Microsoft [2nd Edition]. 9] Intel Solution White Paper: Server Virtualization on Intel Architecture. 10] Technology Brief: Intel Virtualization Technology by Matt Gillespie. 11] http://www.wikipedia.com/vmware 12] http://www.intel.com/platforms/applied/indp c/pdf/ARC-Intel-Virtualization-v1.pdf 770 | P a g e